The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr...The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.展开更多
In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on ...In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on the basis of processing, analysing and deducing from the informationobtained.展开更多
The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactic...The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors.展开更多
Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used ...Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used as a diagnostic tool. Over time, the test has been heavily debated due to its lack of sensitivity and specificity. However, up to now the PSA test is still the only biomarker for the detection and monitoring of prostate cancer. PSA-based screening for prostate cancer is associated with a high proportion of unnecessary testing and overdiagnosis with subsequent overtreatment. In the early years of screening for prostate cancer, high rates of uptake were very important. However, over time the opinion on PSA-based screening has shifted towards the notion of informed choice. Nowadays, it is thought to be unethical to screen men without them being aware of the pros and cons of PSA testing, as well as the fact that an informed choice is related to better patient outcomes. Now, as the results of three major screening studies have been presented and the downsides of screening are becoming better understood, informed choice is becoming more relevant.展开更多
The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analy...The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analyzes the influencing factors of information dissemination, establishes the user preference model through CP-nets tool, and combines the AHP principle to mine the user's preference order, and obtain the user's optimal preference feature Portfolio, and finally collect the user in the microblogging platform in the historical behavior data. the use of NetLogo different users of information dissemination decision to predict.展开更多
The load demand and distributed generation(DG)integration capacity in distribution networks(DNs)increase constantly,and it means that the violation of security constraints may occur in the future.This can be further w...The load demand and distributed generation(DG)integration capacity in distribution networks(DNs)increase constantly,and it means that the violation of security constraints may occur in the future.This can be further worsened by short-term power fluctuations.In this paper,a scheduling method based on a multi-objective chance-constrained information-gap decision(IGD)model is proposed to obtain the active management schemes for distribution system operators(DSOs)to address these problems.The maximum robust adaptability of multiple uncertainties,including the deviations of growth prediction and their relevant power fluctuations,can be obtained based on the limited budget of active management.The systematic solution of the proposed model is developed.The max term constraint in the IGD model is converted into a group of normal constraints corresponding to extreme points of the max term.Considering the stochastic characteristics and correlations of power fluctuations,the original model is equivalently reformulated by using the properties of multivariate Gaussian distribution.The effectiveness of the proposed model is verified by a modified IEEE 33-bus distribution network.The simulation result delineates a robust accommodation space to represent the adaptability of multiple uncertainties,which corresponds to an optional active management strategy set for future selection.展开更多
Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted...Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR).展开更多
To solve the problem of information fusion from multiple sources in innovation alliances, an information fusion model based on the Bayesian network is presented. The multi-source information fusion process of innovati...To solve the problem of information fusion from multiple sources in innovation alliances, an information fusion model based on the Bayesian network is presented. The multi-source information fusion process of innovation alliances was classified into three layers, namely, the information perception layer, the feature clustering layer,and the decision fusion layer. The agencies in the alliance were defined as sensors through which information is perceived and obtained, and the features were clustered. Finally, various types of information were fused by the innovation alliance based on the fusion algorithm to achieve complete and comprehensive information. The model was applied to a study on economic information prediction, where the accuracy of the fusion results was higher than that from a single source and the errors obtained were also smaller with the MPE less than 3%, which demonstrates the proposed fusion method is more effective and reasonable. This study provides a reasonable basis for decision-making of innovation alliances.展开更多
Our focus herein is on developing an effective taxonomy for the simultaneous and real-timemanagement of supply and demand chains.More specifically,the taxonomy is developed in terms ofits underpinning components and i...Our focus herein is on developing an effective taxonomy for the simultaneous and real-timemanagement of supply and demand chains.More specifically,the taxonomy is developed in terms ofits underpinning components and its research foci.From a components perspective,we first considerthe value chain of supplier,manufacturer,assembler,retailer,and customer,and then develop aconsistent set of definitions for supply and demand chains based on the location of the customer orderpenetration point.From a research perspective,we classify the methods that are employed in themanagement of these chains,based on whether supply and/or demand are flexible or fixed.Interestingly,our taxonomy highlights a very critical research area at which both supply and demandare flexible,thus manageable.Simultaneous management of supply and demand chains sets the stagefor mass customization which is concerned with meeting the needs of an individualized customermarket.Simultaneous and real-time management of supply and demand chains set the stage forreal-time mass customization(e.g.,wherein a tailor first laser scans an individual's upper torso andthen delivers a uniquely fitted jacket within a reasonable period,while the individual is waiting).Thebenefits of real-time mass customization can not be over-stated as products and services becomeindistinguishable and are co-produced in real-time,resulting in an overwhelming economicadvantage.展开更多
Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber r...Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0,with a specific focus on the mitigation of cyber risks.An analytical framework is presented,based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies.This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning(AI/ML)and real-time intelligence for predictive cyber risk analytics.The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge.This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed,and when AI/ML technologies are migrated to the periphery of IoT networks.展开更多
Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber r...Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0,with a specific focus on the mitigation of cyber risks.An analytical framework is presented,based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies.This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning(AI/ML)and real-time intelligence for predictive cyber risk analytics.The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge.This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed,and when AI/ML technologies are migrated to the periphery of IoT networks.展开更多
基金Anhui Province Natural Science Research Project of Colleges and Universities(2023AH040321)Excellent Scientific Research and Innovation Team of Anhui Colleges(2022AH010098).
文摘The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data.
文摘In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on the basis of processing, analysing and deducing from the informationobtained.
文摘The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors.
文摘Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used as a diagnostic tool. Over time, the test has been heavily debated due to its lack of sensitivity and specificity. However, up to now the PSA test is still the only biomarker for the detection and monitoring of prostate cancer. PSA-based screening for prostate cancer is associated with a high proportion of unnecessary testing and overdiagnosis with subsequent overtreatment. In the early years of screening for prostate cancer, high rates of uptake were very important. However, over time the opinion on PSA-based screening has shifted towards the notion of informed choice. Nowadays, it is thought to be unethical to screen men without them being aware of the pros and cons of PSA testing, as well as the fact that an informed choice is related to better patient outcomes. Now, as the results of three major screening studies have been presented and the downsides of screening are becoming better understood, informed choice is becoming more relevant.
文摘The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analyzes the influencing factors of information dissemination, establishes the user preference model through CP-nets tool, and combines the AHP principle to mine the user's preference order, and obtain the user's optimal preference feature Portfolio, and finally collect the user in the microblogging platform in the historical behavior data. the use of NetLogo different users of information dissemination decision to predict.
基金supported by the National Natural Science Foundation of China(No.U1866207)。
文摘The load demand and distributed generation(DG)integration capacity in distribution networks(DNs)increase constantly,and it means that the violation of security constraints may occur in the future.This can be further worsened by short-term power fluctuations.In this paper,a scheduling method based on a multi-objective chance-constrained information-gap decision(IGD)model is proposed to obtain the active management schemes for distribution system operators(DSOs)to address these problems.The maximum robust adaptability of multiple uncertainties,including the deviations of growth prediction and their relevant power fluctuations,can be obtained based on the limited budget of active management.The systematic solution of the proposed model is developed.The max term constraint in the IGD model is converted into a group of normal constraints corresponding to extreme points of the max term.Considering the stochastic characteristics and correlations of power fluctuations,the original model is equivalently reformulated by using the properties of multivariate Gaussian distribution.The effectiveness of the proposed model is verified by a modified IEEE 33-bus distribution network.The simulation result delineates a robust accommodation space to represent the adaptability of multiple uncertainties,which corresponds to an optional active management strategy set for future selection.
基金supported by the National Key R&D Program of China(No.2022YFB2404000).
文摘Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR).
基金supported by the National Natural Science Foundation of China(Nos.71472053,71429001,and91646105)
文摘To solve the problem of information fusion from multiple sources in innovation alliances, an information fusion model based on the Bayesian network is presented. The multi-source information fusion process of innovation alliances was classified into three layers, namely, the information perception layer, the feature clustering layer,and the decision fusion layer. The agencies in the alliance were defined as sensors through which information is perceived and obtained, and the features were clustered. Finally, various types of information were fused by the innovation alliance based on the fusion algorithm to achieve complete and comprehensive information. The model was applied to a study on economic information prediction, where the accuracy of the fusion results was higher than that from a single source and the errors obtained were also smaller with the MPE less than 3%, which demonstrates the proposed fusion method is more effective and reasonable. This study provides a reasonable basis for decision-making of innovation alliances.
文摘Our focus herein is on developing an effective taxonomy for the simultaneous and real-timemanagement of supply and demand chains.More specifically,the taxonomy is developed in terms ofits underpinning components and its research foci.From a components perspective,we first considerthe value chain of supplier,manufacturer,assembler,retailer,and customer,and then develop aconsistent set of definitions for supply and demand chains based on the location of the customer orderpenetration point.From a research perspective,we classify the methods that are employed in themanagement of these chains,based on whether supply and/or demand are flexible or fixed.Interestingly,our taxonomy highlights a very critical research area at which both supply and demandare flexible,thus manageable.Simultaneous management of supply and demand chains sets the stagefor mass customization which is concerned with meeting the needs of an individualized customermarket.Simultaneous and real-time management of supply and demand chains set the stage forreal-time mass customization(e.g.,wherein a tailor first laser scans an individual's upper torso andthen delivers a uniquely fitted jacket within a reasonable period,while the individual is waiting).Thebenefits of real-time mass customization can not be over-stated as products and services becomeindistinguishable and are co-produced in real-time,resulting in an overwhelming economicadvantage.
基金This work was funded by the UK EPSRC[grant number:EP/S035362/1,EP/N023013/1,EP/N02334X/1]and by the Cisco Research Centre[grant number 1525381].
文摘Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0,with a specific focus on the mitigation of cyber risks.An analytical framework is presented,based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies.This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning(AI/ML)and real-time intelligence for predictive cyber risk analytics.The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge.This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed,and when AI/ML technologies are migrated to the periphery of IoT networks.
基金funded by the UK EPSRC[grant number:EP/S035362/1,EP/N023013/1,EP/N02334X/1]by the Cisco Research Centre[grant number 1525381].
文摘Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0,with a specific focus on the mitigation of cyber risks.An analytical framework is presented,based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies.This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning(AI/ML)and real-time intelligence for predictive cyber risk analytics.The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge.This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed,and when AI/ML technologies are migrated to the periphery of IoT networks.