3,499 research outputs found

    An exploration of issues and limitations in current methods of TOPSIS and fuzzy TOPSIS

    Get PDF
    Decision making is an important process for organizations. Common practice involves evaluation of prioritized alternatives based on a given set of criteria. These criteria conflict with each other and commonly no solution can satisfy all criteria simultaneously. This problem is known as Multi Criteria Decision Making (MCDM) or Multi Criteria Decision Analysis (MCDA) problem. One of the well-known techniques in MCDM is the ‘Technique for Order Preference by Similarity to Ideal Solution’ (TOPSIS) which was introduced by Hwang and Yoon in 1981 [1]. However, this technique uses crisp information which is impractical in many real world situations because decision makers usually express opinions in natural language such as Poor and Good. Information in the form of natural language, i.e. words, in turn is characterized by fuzziness and uncertainty (i.e. ‘what is the meaning of poor’). This uncertainty can be a challenge for decision makers. Zadeh [2] introduced the concept of fuzzy sets, which enables systematic reasoning with imprecise and fuzzy information by using fuzzy sets to represent linguistic terms numerically to then handle uncertain human judgement

    A comparison between two types of Fuzzy TOPSIS method

    Get PDF
    Multi Criteria Decision Making methods have been developed to solve complex real-world decision problems. The Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is currently one of the most popular methods and has been shown to provide helpful outputs in various application areas. In recent years, a variety of extensions, including fuzzy extensions of TOPSIS have been proposed. One challenge that has arisen is that it is not straightforward to differentiate between the multiple variants of TOPSIS existing today. Thus, in this paper, a comparison between the classical Fuzzy TOPSIS method proposed by Chen in 2000 and the recently Fuzzy TOPSIS proposed extension by Yuen in 2014 is made. The purpose of this comparative study is to show the difference between both methods and to provide context for their respective strengths and limitations both in complexity of application, and expressiveness of results. A detailed synthetic numeric example and comparison of both methods are provided

    Exploring subsethood to determine firing strength in non-singleton fuzzy logic systems

    Get PDF
    Real world environments face a wide range of sources of noise and uncertainty. Thus, the ability to handle various uncertainties, including noise, becomes an indispensable element of automated decision making. Non-Singleton Fuzzy Logic Systems (NSFLSs) have the potential to tackle uncertainty within the design of fuzzy systems. The firing strength has a significant role in the accuracy of FLSs, being based on the interaction of the input and antecedent fuzzy sets. Recent studies have shown that the standard technique for determining firing strengths risks substantial information loss in terms of the interaction of the input and antecedents. Recently, this issue has been addressed through exploration of alternative approaches which employ the centroid of the intersection (cen-NS) and the similarity (sim-NS) between input and antecedent fuzzy sets. This paper identifies potential shortcomings in respect to the previously introduced similarity-based NSFLSs in which firing strength is defined as the similarity between an input FS and an antecedent. To address these shortcomings, this paper explores the potential of the subsethood measure to generate a more suitable firing level (sub-NS) in NSFLSs featuring various noise levels. In the experiment, the basic waiter tipping fuzzy logic system is used to examine the behaviour of sub-NS in comparison with the current approaches. Analysis of the results shows that the sub-NS approach can lead to more stable behaviour in real world applications

    A comparison between two types of Fuzzy TOPSIS method

    Get PDF
    Multi Criteria Decision Making methods have been developed to solve complex real-world decision problems. The Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is currently one of the most popular methods and has been shown to provide helpful outputs in various application areas. In recent years, a variety of extensions, including fuzzy extensions of TOPSIS have been proposed. One challenge that has arisen is that it is not straightforward to differentiate between the multiple variants of TOPSIS existing today. Thus, in this paper, a comparison between the classical Fuzzy TOPSIS method proposed by Chen in 2000 and the recently Fuzzy TOPSIS proposed extension by Yuen in 2014 is made. The purpose of this comparative study is to show the difference between both methods and to provide context for their respective strengths and limitations both in complexity of application, and expressiveness of results. A detailed synthetic numeric example and comparison of both methods are provided

    Modelling cyber-security experts' decision making processes using aggregation operators

    Get PDF
    An important role carried out by cyber-security experts is the assessment of proposed computer systems, during their design stage. This task is fraught with difficulties and uncertainty, making the knowledge provided by human experts essential for successful assessment. Today, the increasing number of progressively complex systems has led to an urgent need to produce tools that support the expert-led process of system-security assessment. In this research, we use Weighted Averages (WAs) and Ordered Weighted Averages (OWAs) with Evolutionary Algorithms (EAs) to create aggregation operators that model parts of the assessment process. We show how individual overall ratings for security components can be produced from ratings of their characteristics, and how these individual overall ratings can be aggregated to produce overall rankings of potential attacks on a system. As well as the identification of salient attacks and weak points in a prospective system, the proposed method also highlights which factors and security components contribute most to a component's difficulty and attack ranking respectively. A real world scenario is used in which experts were asked to rank a set of technical attacks, and to answer a series of questions about the security components that are the subject of the attacks. The work shows how finding good aggregation operators, and identifying important components and factors of a cyber-security problem can be automated. The resulting operators have the potential for use as decision aids for systems designers and cyber-security experts, increasing the amount of assessment that can be achieved with the limited resources available

    Music as a Service as an Alternative to Music Piracy? - An Empirical Investigation of the Intention to Use Music Streaming Services

    Get PDF
    Despite increasing acceptance of digital channels, total sales in the music business decreased by 31 % from 2004 to 2010. Music piracy is still considered one of the main causes for this. However, several studies found no effects or even positive effects of illegal downloading on record sales. In the past, piracy has been counteracted especially by prosecution and legal offers. Music as a Service (MaaS) represents a new, differing distribution approach in digital music. In contrast to the wellknown music platforms for so-called àla- carte downloads, such as the iTunes Store, MaaS possesses two important characteristics: transmission (streaming instead of downloading) and pricing model (flat rate instead of pay-perdownload). Therefore, the consumption of music by means of purchasing and downloading is replaced by a monthly payment service (paid MaaS) and an ad-supported (free MaaS) service. First user surveys suggest that many music pirates are making use of these offers. To find out if MaaS is an attractive distribution channel for music pirates, we developed a model to explain the intention to use MaaS based on the Theory of Planned Behavior. To empirically test this model, we surveyed 132 music pirates. Among others, the outcome shows that the intention to use free MaaS is mainly affected by the attitude towardsMaaS, while using paid MaaS is predominantly a result of the influence of users’ closest peers. The attitude towards MaaS is positively influenced by the desire to receive music recommendations, the payment type (in the form of a flat rate model), and the relative advantage of MaaS compared to illegal choices

    Adaptive data communication interface: a user-centric visual data interpretation framework

    Get PDF
    In this position paper, we present ideas about creating a next generation framework towards an adaptive interface for data communication and visualisation systems. Our objective is to develop a system that accepts large data sets as inputs and provides user-centric, meaningful visual information to assist owners to make sense of their data collection. The proposed framework comprises four stages: (i) the knowledge base compilation, where we search and collect existing state-of-the-art visualisation techniques per domain and user preferences; (ii) the development of the learning and inference system, where we apply artificial intelligence techniques to learn, predict and recommend new graphic interpretations (iii) results evaluation; and (iv) reinforcement and adaptation, where valid outputs are stored in our knowledge base and the system is iteratively tuned to address new demands. These stages, as well as our overall vision, limitations and possible challenges are introduced in this article. We also discuss further extensions of this framework for other knowledge discovery tasks

    Nanoparticles Composed of Zn and ZnO Inhibit \u3cem\u3ePeronospora tabacina\u3c/em\u3e Spore Germination \u3cem\u3ein vitro\u3c/em\u3e and \u3cem\u3eP. tabacina\u3c/em\u3e Infectivity on Tobacco Leaves

    Get PDF
    Manufactured nanoparticles (NPs) are increasingly being used for commercial purposes and certain NP types have been shown to have broad spectrum antibacterial activity. In contrast, their activities against fungi and fungi-like oomycetes are less studied. Here, we examined the potential of two types of commercially available Zn NPs (Zn NPs and ZnO NPs) to inhibit spore germination and infectivity on tobacco leaves resulting from exposure to the fungi-like oomycete pathogen Peronospora tabacina (P. tabacina). Both types of NPs, as well as ZnCl2 and bulk ZnO control treatments, inhibited spore germination compared to a blank control. ZnO ENMs were shown to be a much more powerful suppressor of spore germination and infectivity than bulk ZnO. ZnO and Zn NPs significantly inhibited leaf infection at 8 and 10 mg·L−1, respectively. Both types of NPs were found to provide substantially higher concentration dependent inhibition of spore germination and infectivity than could be readily explained by the presence of dissolved Zn. These results suggest that both NP types have potential for use as economic, low-dose, potentially non-persistent anti-microbial agents against the oomycete P. tabacina

    A similarity-based inference engine for non-singleton fuzzy logic systems

    Get PDF
    In non-singleton fuzzy logic systems (NSFLSs) input uncertainties are modelled with input fuzzy sets in order to capture input uncertainty such as sensor noise. The performance of NSFLSs in handling such uncertainties depends both on the actual input fuzzy sets (and their inherent model of uncertainty) and on the way that they affect the inference process. This paper proposes a novel type of NSFLS by replacing the composition-based inference method of type-1 fuzzy relations with a similarity-based inference method that makes NSFLSs more sensitive to changes in the input's uncertainty characteristics. The proposed approach is based on using the Jaccard ratio to measure the similarity between input and antecedent fuzzy sets, then using the measured similarity to determine the firing strength of each individual fuzzy rule. The standard and novel approaches to NSFLSs are experimentally compared for the well-known problem of Mackey-Glass time series predictions, where the NSFLS's inputs have been perturbed with different levels of Gaussian noise. The experiments are repeated for system training under both noisy and noise-free conditions. Analyses of the results show that the new method outperforms the standard approach by substantially reducing the prediction errors

    A similarity-based inference engine for non-singleton fuzzy logic systems

    Get PDF
    In non-singleton fuzzy logic systems (NSFLSs) input uncertainties are modelled with input fuzzy sets in order to capture input uncertainty such as sensor noise. The performance of NSFLSs in handling such uncertainties depends both on the actual input fuzzy sets (and their inherent model of uncertainty) and on the way that they affect the inference process. This paper proposes a novel type of NSFLS by replacing the composition-based inference method of type-1 fuzzy relations with a similarity-based inference method that makes NSFLSs more sensitive to changes in the input's uncertainty characteristics. The proposed approach is based on using the Jaccard ratio to measure the similarity between input and antecedent fuzzy sets, then using the measured similarity to determine the firing strength of each individual fuzzy rule. The standard and novel approaches to NSFLSs are experimentally compared for the well-known problem of Mackey-Glass time series predictions, where the NSFLS's inputs have been perturbed with different levels of Gaussian noise. The experiments are repeated for system training under both noisy and noise-free conditions. Analyses of the results show that the new method outperforms the standard approach by substantially reducing the prediction errors
    • …
    corecore