51 research outputs found

    Dynamic system with no equilibrium and its chaos anti-synchronization

    Get PDF
    Recently, systems with chaos and the absence of equilibria have received a great deal of attention. In our work, a simple five-term system and its anti-synchronization are presented. It is special that the system has a hyperbolic sine nonlinearity and no equilibrium. Such a system generates chaotic behaviours, which are verified by phase portraits, positive Lyapunov exponent as well as an electronic circuit. Moreover, the system displays multistable characteristic when changing its initial conditions. By constructing an adaptive control, chaos anti-synchronization of the system with no equilibrium is obtained and illustrated via a numerical example

    A new fuzzy reinforcement learning method for effective chemotherapy

    Get PDF
    A key challenge for drug dosing schedules is the ability to learn an optimal control policy even when there is a paucity of accurate information about the systems. Artificial intelligence has great potential for shaping a smart control policy for the dosage of drugs for any treatment. Motivated by this issue, in the present research paper a Caputo–Fabrizio fractional-order model of cancer chemotherapy treatment was elaborated and analyzed. A fix-point theorem and an iterative method were implemented to prove the existence and uniqueness of the solutions of the proposed model. Afterward, in order to control cancer through chemotherapy treatment, a fuzzy-reinforcement learning-based control method that uses the State-Action-Reward-State-Action (SARSA) algorithm was proposed. Finally, so as to assess the performance of the proposed control method, the simulations were conducted for young and elderly patients and for ten simulated patients with different parameters. Then, the results of the proposed control method were compared with Watkins’s Q-learning control method for cancer chemotherapy drug dosing. The results of the simulations demonstrate the superiority of the proposed control method in terms of mean squared error, mean variance of the error, and the mean squared of the control action—in other words, in terms of the eradication of tumor cells, keeping normal cells, and the amount of usage of the drug during chemotherapy treatment

    Finite-time projective synchronization of fractional-order delayed quaternion-valued fuzzy memristive neural networks

    Get PDF
    In this paper, the finite-time projective synchronization (FTPS) problem of fractionalorder quaternion-valued fuzzy memristor neural networks (FOQVFMNNs) is studied. Through establishing a feedback controller with signed functions and an adaptive controller, sufficient conditions for FTPS for FOQVFMNNs are obtained. Furthermore, the synchronization establishment time is calculated. Finally, the practicability of the conclusions is verified by numerical simulations

    Machine learning methods for systemic risk analysis in financial sectors.

    Get PDF
    Financial systemic risk is an important issue in economics and financial systems. Trying to detect and respond to systemic risk with growing amounts of data produced in financial markets and systems, a lot of researchers have increasingly employed machine learning methods. Machine learning methods study the mechanisms of outbreak and contagion of systemic risk in the financial network and improve the current regulation of the financial market and industry. In this paper, we survey existing researches and methodologies on assessment and measurement of financial systemic risk combined with machine learning technologies, including big data analysis, network analysis and sentiment analysis, etc. In addition, we identify future challenges, and suggest further research topics. The main purpose of this paper is to introduce current researches on financial systemic risk with machine learning methods and to propose directions for future work.This research has been partially supported by grants from the National Natural Science Foundation of China (#U1811462, #71874023, #71771037, #71725001, and #71433001)

    Finite-time lag projective synchronization of delayed fractional-order quaternion-valued neural networks with parameter uncertainties

    Get PDF
    This paper discusses a class issue of finite-time lag projective synchronization (FTLPS) of delayed fractional-order quaternion-valued neural networks (FOQVNNs) with parameter uncertainties, which is solved by a non-decomposition method. Firstly, a new delayed FOQVNNs model with uncertain parameters is designed. Secondly, two types of feedback controller and adaptive controller without sign functions are designed in the quaternion domain. Based on the Lyapunov analysis method, the non-decomposition method is applied to replace the decomposition method that requires complex calculations, combined with some quaternion inequality techniques, to accurately estimate the settling time of FTLPS. Finally, the correctness of the obtained theoretical results is testified by a numerical simulation example

    Two-stage prioritization procedure for multiplicative AHP-group decision making

    Get PDF
    In this paper, we propose two-stage prioritization procedure (TSPP) for multiplicative Analytic Hierarchy Process-group decision making (AHP-GDM), which involves determining the group priority vector based on the individual pair-wise comparison matrices (PCMs), simultaneously considering the consensus and consistency of the individual PCMs. The first stage of the TSPP involves checking and revising the individual PCMs for reaching the acceptable consensus and consistency. The second stage of the TSPP involves estimating the group priority vector using Bayesian approach. The main characteristics of the proposed TSPP are as follows: 1) It makes full use of the prior information as well as the sample information during the Bayesian revision of the individual PCMs and the Bayesian estimation of the group priority vector; 2) It ensures that the revised individual PCMs reach the acceptable consensus and consistency; 3) It enriches the aggregation methods for the collective preference in multiplicative AHP-GDM. Finally, two numerical examples are used to evaluate the applicability and effectiveness of the proposed TSPP by the comparisons with several other methods

    Behavior monitoring methods for trade-based money laundering integrating macro and micro prudential regulation: a case from China

    Get PDF
    Trade-based Money Laundering, a new form of money laundering using international trade as a signboard, always appears along with speculative capital movement which has been accepted as the most concerned and consensus incentive giving rise to the collapse of the financial market. Unfortunately, preventing money laundering is very difficult since money laundering always has a plausible trade characterization. To reach this goal, supervision for regulator and financial institutions aims to effectively monitor micro entities’ behavior in financial markets. The main purpose of this paper is to establish a monitoring method including accurate recognition and classified supervision for Trade-based Money Laundering by means of knowledge-driven multi-class classification algorithms associated with macro and micro prudential regulation, such that the model can forecast the predicted class from the concerned management areas. Based on empirical data from China, we demonstrate the application and explain how the monitor method can help to improve management efficiency in the financial market. First published online 8 May 201

    Machine learning methods for systemic risk analysis in financial sectors

    Get PDF
    Financial systemic risk is an important issue in economics and financial systems. Trying to detect and respond to systemic risk with growing amounts of data produced in financial markets and systems, a lot of researchers have increasingly employed machine learning methods. Machine learning methods study the mechanisms of outbreak and contagion of systemic risk in the financial network and improve the current regulation of the financial market and industry. In this paper, we survey existing researches and methodologies on assessment and measurement of financial systemic risk combined with machine learning technologies, including big data analysis, network analysis and sentiment analysis, etc. In addition, we identify future challenges, and suggest further research topics. The main purpose of this paper is to introduce current researches on financial systemic risk with machine learning methods and to propose directions for future work. First published online 6 May 201

    Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection

    No full text
    An intrusion detection system is one of the main defense lines used to provide security to data, information, and computer networks. The problems of this security system are the increased processing time, high false alarm rate, and low detection rate that occur due to the large amount of data containing various irrelevant and redundant features. Therefore, feature selection can solve this problem by reducing the number of features. Choosing appropriate feature selection methods that can reduce the number of features without a negative effect on the classification accuracy is a major challenge. This challenge motivated us to investigate the application of different wrapper feature selection techniques in intrusion detection. The performance of the selected techniques, such as the genetic algorithm (GA), sequential forward selection (SFS), and sequential backward selection (SBS), were analyzed, addressed, and compared to the existing techniques. The efficiency of the three feature selection techniques with two classification methods, including support vector machine (SVM) and multi perceptron (MLP), was compared. The CICIDS2017, CSE-CIC-IDS218, and NSL-KDD datasets were considered for the experiments. The efficiency of the proposed models was proved in the experimental results, which indicated that it had highest accuracy in the selected datasets

    Performance Analysis of Feature Subset Selection Techniques for Intrusion Detection

    No full text
    An intrusion detection system is one of the main defense lines used to provide security to data, information, and computer networks. The problems of this security system are the increased processing time, high false alarm rate, and low detection rate that occur due to the large amount of data containing various irrelevant and redundant features. Therefore, feature selection can solve this problem by reducing the number of features. Choosing appropriate feature selection methods that can reduce the number of features without a negative effect on the classification accuracy is a major challenge. This challenge motivated us to investigate the application of different wrapper feature selection techniques in intrusion detection. The performance of the selected techniques, such as the genetic algorithm (GA), sequential forward selection (SFS), and sequential backward selection (SBS), were analyzed, addressed, and compared to the existing techniques. The efficiency of the three feature selection techniques with two classification methods, including support vector machine (SVM) and multi perceptron (MLP), was compared. The CICIDS2017, CSE-CIC-IDS218, and NSL-KDD datasets were considered for the experiments. The efficiency of the proposed models was proved in the experimental results, which indicated that it had highest accuracy in the selected datasets
    • …
    corecore