期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Attribute Reduction of Hybrid Decision Information Systems Based on Fuzzy Conditional Information Entropy
1
作者 Xiaoqin Ma Jun Wang +1 位作者 Wenchang Yu Qinli Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2063-2083,共21页
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr... The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data. 展开更多
关键词 Hybrid decision information systems fuzzy conditional information entropy attribute reduction fuzzy relationship rough set theory(RST)
下载PDF
An Information Analysis Decision System
2
作者 He Zhongxion and Feng YazhongDept. of Computer Science, Northern Jiaotong University., Beijing 100039 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1992年第2期74-77,共4页
In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on ... In recent years, we are increasingly coping with macro, complex and large-scale system in whichinformations twist together. It is a worthwhile research to develop general computer-aided meth-od for decision-making on the basis of processing, analysing and deducing from the informationobtained. 展开更多
关键词 In IAD An information Analysis decision System
下载PDF
Whispered Tuning: Data Privacy Preservation in Fine-Tuning LLMs through Differential Privacy
3
作者 Tanmay Singh Harshvardhan Aditya +1 位作者 Vijay K. Madisetti Arshdeep Bahga 《Journal of Software Engineering and Applications》 2024年第1期1-22,共22页
The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactic... The proliferation of Large Language Models (LLMs) across various sectors underscored the urgency of addressing potential privacy breaches. Vulnerabilities, such as prompt injection attacks and other adversarial tactics, could make these models inadvertently disclose their training data. Such disclosures could compromise personal identifiable information, posing significant privacy risks. In this paper, we proposed a novel multi-faceted approach called Whispered Tuning to address privacy leaks in large language models (LLMs). We integrated a PII redaction model, differential privacy techniques, and an output filter into the LLM fine-tuning process to enhance confidentiality. Additionally, we introduced novel ideas like the Epsilon Dial for adjustable privacy budgeting for differentiated Training Phases per data handler role. Through empirical validation, including attacks on non-private models, we demonstrated the robustness of our proposed solution SecureNLP in safeguarding privacy without compromising utility. This pioneering methodology significantly fortified LLMs against privacy infringements, enabling responsible adoption across sectors. 展开更多
关键词 NLP Differential Privacy Adversarial Attacks Informed decisions
下载PDF
PSA-based prostate cancer screening: the role of active surveillance and informed and shared decision making 被引量:6
4
作者 Lionne D F Venderbos Monique J Roobol 《Asian Journal of Andrology》 SCIE CAS CSCD 2011年第2期219-224,共6页
Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used ... Since the first publication describing the identification of prostate-specific antigen (PSA) in the 1960s, much progress has been made. The PSA test changed from being initially a monitoring tool to being also used as a diagnostic tool. Over time, the test has been heavily debated due to its lack of sensitivity and specificity. However, up to now the PSA test is still the only biomarker for the detection and monitoring of prostate cancer. PSA-based screening for prostate cancer is associated with a high proportion of unnecessary testing and overdiagnosis with subsequent overtreatment. In the early years of screening for prostate cancer, high rates of uptake were very important. However, over time the opinion on PSA-based screening has shifted towards the notion of informed choice. Nowadays, it is thought to be unethical to screen men without them being aware of the pros and cons of PSA testing, as well as the fact that an informed choice is related to better patient outcomes. Now, as the results of three major screening studies have been presented and the downsides of screening are becoming better understood, informed choice is becoming more relevant. 展开更多
关键词 active surveillance informed decision making PSA testing shared decision making
下载PDF
Research on Influencing Factors of Information Dissemination Based on User Preference
5
作者 LIU yang ZHU junxuan 《International English Education Research》 2017年第5期34-37,共4页
The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analy... The rapid development of the Intemet makes the social network of information dissemination has undergone tremendous changes. Based on the introduction of social network information dissemination mode, this paper analyzes the influencing factors of information dissemination, establishes the user preference model through CP-nets tool, and combines the AHP principle to mine the user's preference order, and obtain the user's optimal preference feature Portfolio, and finally collect the user in the microblogging platform in the historical behavior data. the use of NetLogo different users of information dissemination decision to predict. 展开更多
关键词 information dissemination User preference CP-nets Propagation decision prediction
下载PDF
A Multi-objective Chance-constrained Information-gap Decision Model for Active Management to Accommodate Multiple Uncertainties in Distribution Networks 被引量:1
6
作者 Shida Zhang Shaoyun Ge +3 位作者 Hong Liu Junkai Li Chenghong Gu Chengshan Wang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2023年第1期17-34,共18页
The load demand and distributed generation(DG)integration capacity in distribution networks(DNs)increase constantly,and it means that the violation of security constraints may occur in the future.This can be further w... The load demand and distributed generation(DG)integration capacity in distribution networks(DNs)increase constantly,and it means that the violation of security constraints may occur in the future.This can be further worsened by short-term power fluctuations.In this paper,a scheduling method based on a multi-objective chance-constrained information-gap decision(IGD)model is proposed to obtain the active management schemes for distribution system operators(DSOs)to address these problems.The maximum robust adaptability of multiple uncertainties,including the deviations of growth prediction and their relevant power fluctuations,can be obtained based on the limited budget of active management.The systematic solution of the proposed model is developed.The max term constraint in the IGD model is converted into a group of normal constraints corresponding to extreme points of the max term.Considering the stochastic characteristics and correlations of power fluctuations,the original model is equivalently reformulated by using the properties of multivariate Gaussian distribution.The effectiveness of the proposed model is verified by a modified IEEE 33-bus distribution network.The simulation result delineates a robust accommodation space to represent the adaptability of multiple uncertainties,which corresponds to an optional active management strategy set for future selection. 展开更多
关键词 Active management distribution network multiple uncertainties information gap decision theory chance constraint
原文传递
Robustness Assessment of Wind Power Generation Considering Rigorous Security Constraints for Power System: A Hybrid RLO-IGDT Approach
7
作者 Lianyong Zuo Shengshi Wang +6 位作者 Yong Sun Shichang Cui Jiakun Fang Xiaomeng Ai Baoju Li Chengliang Hao Jinyu Wen 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第2期518-529,共12页
Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted... Fossil fuel depletion and environmental pollution problems promote development of renewable energy(RE)glob-ally.With increasing penetration of RE,operation security and economy of power systems(PS)are greatly impacted by fluctuation and intermittence of renewable power.In this paper,information gap decision theory(IGDT)is adapted to handle uncertainty of wind power generation.Based on conventional IGDT method,linear regulation strategy(LRS)and robust linear optimization(RLO)method are integrated to reformulate the model for rigorously considering security constraints.Then a robustness assessment method based on hybrid RLO-IGDT approach is proposed for analyzing robustness and economic performance of PS.Moreover,a risk-averse linearization method is adapted to convert the proposed assessment model into a mixed integer linear programming(MILP)problem for convenient optimization without robustness loss.Finally,results of case studies validate superiority of proposed method in guaranteeing operation security rigorously and effectiveness in assessment of RSR for PS without overestimation.Index Terms-Hybrid RLO-IGDT approach,information gap decision theory(IGDT),operation security,robustness assessment,robustness security region(RSR). 展开更多
关键词 IGDT approach information gap decision theory(IGDT) operation security robustness assessment robustness security region(RSR)
原文传递
An Information Fusion Model of Innovation Alliances Based on the Bayesian Network 被引量:2
8
作者 Jun Xia Yuqiang Feng +1 位作者 Luning Liu Dongjun Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第3期347-356,共10页
To solve the problem of information fusion from multiple sources in innovation alliances, an information fusion model based on the Bayesian network is presented. The multi-source information fusion process of innovati... To solve the problem of information fusion from multiple sources in innovation alliances, an information fusion model based on the Bayesian network is presented. The multi-source information fusion process of innovation alliances was classified into three layers, namely, the information perception layer, the feature clustering layer,and the decision fusion layer. The agencies in the alliance were defined as sensors through which information is perceived and obtained, and the features were clustered. Finally, various types of information were fused by the innovation alliance based on the fusion algorithm to achieve complete and comprehensive information. The model was applied to a study on economic information prediction, where the accuracy of the fusion results was higher than that from a single source and the errors obtained were also smaller with the MPE less than 3%, which demonstrates the proposed fusion method is more effective and reasonable. This study provides a reasonable basis for decision-making of innovation alliances. 展开更多
关键词 information fusion innovation alliance Bayesian networks forecasting model decision making big data
原文传递
TOWARDS REAL-TIME CUSTOMIZED MANAGEMENT OF SUPPLY AND DEMAND CHAINS 被引量:8
9
作者 JamesM.TIEN AnanthKRISHNAMURTHY AliYASAR 《Systems Science and Systems Engineering》 CSCD 2004年第3期257-278,共22页
Our focus herein is on developing an effective taxonomy for the simultaneous and real-timemanagement of supply and demand chains.More specifically,the taxonomy is developed in terms ofits underpinning components and i... Our focus herein is on developing an effective taxonomy for the simultaneous and real-timemanagement of supply and demand chains.More specifically,the taxonomy is developed in terms ofits underpinning components and its research foci.From a components perspective,we first considerthe value chain of supplier,manufacturer,assembler,retailer,and customer,and then develop aconsistent set of definitions for supply and demand chains based on the location of the customer orderpenetration point.From a research perspective,we classify the methods that are employed in themanagement of these chains,based on whether supply and/or demand are flexible or fixed.Interestingly,our taxonomy highlights a very critical research area at which both supply and demandare flexible,thus manageable.Simultaneous management of supply and demand chains sets the stagefor mass customization which is concerned with meeting the needs of an individualized customermarket.Simultaneous and real-time management of supply and demand chains set the stage forreal-time mass customization(e.g.,wherein a tailor first laser scans an individual's upper torso andthen delivers a uniquely fitted jacket within a reasonable period,while the individual is waiting).Thebenefits of real-time mass customization can not be over-stated as products and services becomeindistinguishable and are co-produced in real-time,resulting in an overwhelming economicadvantage. 展开更多
关键词 Value chain supply chain demand chain TAXONOMY real-time management mass customization information and decision technologies SERVICES
原文传递
Cyber risk at the edge:current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains 被引量:1
10
作者 Petar Radanliev David De Roure +5 位作者 Kevin Page Jason R.C.Nurse Rafael Mantilla Montalvo Omar Santos La’Treall Maddox Pete Burnap 《Cybersecurity》 CSCD 2020年第1期155-175,共21页
Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber r... Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0,with a specific focus on the mitigation of cyber risks.An analytical framework is presented,based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies.This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning(AI/ML)and real-time intelligence for predictive cyber risk analytics.The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge.This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed,and when AI/ML technologies are migrated to the periphery of IoT networks. 展开更多
关键词 Industry 4.0 Supply chain design Transformational design roadmap IIoT supply chain model decision support for information management artificial intelligence and machine learning(AI/ML) dynamic self-adapting system cognition engine predictive cyber risk analytics
原文传递
Cyber risk at the edge:current and future trends on cyber risk analytics and artificial intelligence in the industrial internet of things and industry 4.0 supply chains
11
作者 Petar Radanliev David De Roure +5 位作者 Kevin Page Jason R.C.Nurse Rafael Mantilla Montalvo Omar Santos La’Treall Maddox Pete Burnap 《Cybersecurity》 2018年第1期767-787,共21页
Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber r... Digital technologies have changed the way supply chain operations are structured.In this article,we conduct systematic syntheses of literature on the impact of new technologies on supply chains and the related cyber risks.A taxonomic/cladistic approach is used for the evaluations of progress in the area of supply chain integration in the Industrial Internet of Things and Industry 4.0,with a specific focus on the mitigation of cyber risks.An analytical framework is presented,based on a critical assessment with respect to issues related to new types of cyber risk and the integration of supply chains with new technologies.This paper identifies a dynamic and self-adapting supply chain system supported with Artificial Intelligence and Machine Learning(AI/ML)and real-time intelligence for predictive cyber risk analytics.The system is integrated into a cognition engine that enables predictive cyber risk analytics with real-time intelligence from IoT networks at the edge.This enhances capacities and assist in the creation of a comprehensive understanding of the opportunities and threats that arise when edge computing nodes are deployed,and when AI/ML technologies are migrated to the periphery of IoT networks. 展开更多
关键词 Industry 4.0 Supply chain design Transformational design roadmap IIoT supply chain model decision support for information management artificial intelligence and machine learning(AI/ML) dynamic self-adapting system cognition engine predictive cyber risk analytics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部