Sustainable supplier selection and optimal quantity transportation (S3OQT) play an important role in supply chain management. This research represents a new four-stage solution approach for S3OQT where the multi-crite...
详细信息
Sustainable supplier selection and optimal quantity transportation (S3OQT) play an important role in supply chain management. This research represents a new four-stage solution approach for S3OQT where the multi-criteria decision making (MCDM) methods are integrated through an optimization model. In first stage, a new uncertainty interval type-2 spherical fuzzy set (IT2SFS) is introduced to help the decision-makers (DMs) for securing and reliable results in hesitancy situations. We develop a new operator on IT2SFS under Dombi t-norm and t-conorm by integrating Muirhead mean (MM) operator based on Choquet integral (CI). The preferences and priorities to the sustainable criteria based on interaction and interrelationship are represented by CI. Thereafter, the weights of the criteria and sub-criteria are determined by CI-indifference threshold-based attribute ratio analysis (ITARA) method by utilizing the proposed operator. In second stage, to evaluate the weights of the suppliers and to rank these, we construct a new MCDM method CI-TODIM (an acronym in Portuguese of interactive multi-criteria decision-making)-measurement alternatives and ranking according to compromise solution (MARCOS) method by utilizing the proposed operator and then finally design a new ranking function. In third stage, a new model on stochastic multi-objective mixed-integer non-linear solid transportation problem (SM2NSTP) is established to identify suitable supplier under sustainable risk criteria, and then, optimal quantity of products are transported from each supplier. Thereafter, we propose TOPSIS-neutrosophic-game theoretic approach (TNGTA) to obtain Pareto-optimal solution. We apply Ε-constraint method to obtain Pareto-optimal solution from SM2NSTP model. In the fourth stage, a comparative study is drawn among the obtained Pareto-optimal solutions that are extracted from TNGTA and Ε-constraint method. Finally, two MCDM models, CRITIC-TOPSIS and CRITIC-MARCOS, are used to help the DMs for s
Deep learning (DL) is deployed in Deep Neural Networks (DNNs), Recurrent Neural Networks (RNNs), Convolutional Neural Networks (CNNs), Deep Stacked Networks (DSNs), Deep Belief Networks (DBNs), and Deep Boltzmann Mach...
详细信息
Martin-Löf's type theory is a theory in which one can write both specifications and programs. By interpreting propositions as types, predicate logic is available when formulating a specification. The rules of...
详细信息
Martin-Löf's type theory is a theory in which one can write both specifications and programs. By interpreting propositions as types, predicate logic is available when formulating a specification. The rules of type theory are formulated as tactics which makes a “top down” construction of programs possible. These ideas are illustrated by a formal derivation of a program for a partitioning problem.
The development of multi-agent technology for assessing the availability of information at the software development initial stages is an actual task, the solution of which is the purpose of this study. The paper prese...
详细信息
The purpose of this study is increasing the usability of the user interfaces (UI) by ensuring their compliance with Gestalt principles. The developed method of evaluating the compliance of the UI with Gestalt principl...
详细信息
作者:
Mucahit SoyluResul DasInonu University
Department of Organized Industrial Zone Vocational School Computer Programming Malatya Turkiye Firat University
Faculty of Technology Department of Software Engineering 23119 Elazig Turkiye
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the...
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the UNSW-NB15 dataset to generate dynamic and meaningful graphs. In the data cleaning phase, missing and erroneous data were removed, unnecessary columns were discarded, and the data was transformed into a format suitable for modeling. Then, the data was converted into homogeneous graphs, and heterogeneous structures were created for analysis using the GAT model. GAT prioritizes relationships between nodes in the graph with an attention mechanism, effectively detecting attack patterns. The analyzed data was then converted into interactive graphs using tools like SigmaJS, with attacks between the same nodes grouped to reduce graph complexity. Users can explore these dynamic graphs in detail, examine attack types, and track events over time. This approach significantly benefits cybersecurity professionals, allowing them to better understand, track, and develop defense strategies against cyberattacks.
In this study, we propose an effective system called RG-Guard that detects potential risks and threats in the use of cryptocurrencies in the metaverse ecosystem. In order for the RG-Guard engine to detect suspicious t...
详细信息
In this study, we propose an effective system called RG-Guard that detects potential risks and threats in the use of cryptocurrencies in the metaverse ecosystem. In order for the RG-Guard engine to detect suspicious transactions, Ethereum network transaction information and phishing wallet addresses were collected, and a unique dataset was created after the data preprocessing process. During the data preprocessing process, we manually distinguished the features within the original dataset that contained potential risk indicators. The learning process of the RG-Guard engine in risk classification was achieved by developing a deep learning model based on LSTM + Softmax. In the training process of the model, RG-Guard was optimised for maximum accuracy, and optimum hyperparameters were obtained. The reliability and dataset performance of the preferred LSTM + Softmax model were verified by comparing it with algorithms used in risk classification and detection applications in the literature (Decision tree, XG boost, Random forest and light gradient boosting machine). Accordingly, among the trained models, LSTM + Softmax has the highest accuracy with an F1-score of 0.9950. When a cryptocurrency transaction occurs, RG-Guard extracts the feature vectors of the transaction and assigns a risk level between 1 and 5 to the parameter named βrisk. Since transactions with βrisk > = 3 are labelled as suspicious transactions, RG-Guard blocks this transaction. Thus, thanks to the use of the RG-Guard engine in metaverse applications, it is aimed to easily distinguish potential suspicious transactions from instant transactions. As a result, it is aimed to detect and prevent instant potential suspicious transactions with the RG-Guard engine in money transfers, which have the greatest risk in cryptocurrency transactions and are the target of fraud. The original dataset prepared in the proposed study and the hybrid LSTM + Softmax model developed specifically for the model are expected to c
Production rules are a popular representation for encoding heuristic knowledge in programs for scientific and medical problem solving. However, experience with one of these programs, mycin, indicates that the represen...
Production rules are a popular representation for encoding heuristic knowledge in programs for scientific and medical problem solving. However, experience with one of these programs, mycin, indicates that the representation has serious limitations: people other than the original rule authors find it difficult to modify the rule set, and the rules are unsuitable for use in other settings, such as for application to teaching. These problems are rooted in fundamental limitations in mycin"s original rule representation: the view that expert knowledge can be encoded as a uniform, weakly structured set of if/then associations is found to be wanting. To illustrate these problems, this paper examines mycin"s rules from the perspective of a teacher trying to justify them and to convey a problem-solving approach. We discover that individual rules play different roles, have different kinds of justifications, and are constructed using different rationales for the ordering and choice of premise clauses. This design knowledge, consisting of structural and strategic concepts which lie outside the representation, is shown to be procedurally embedded in the rules. Moreover, because the data/hypothesis associations are themselves a proceduralized form of underlying disease models, they can only be supported by appealing to this deeper level of knowledge. Making explicit this structural, strategic and support knowledge enhances the ability to understand and modify the system.
Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well a...
详细信息
If the distance between two vertices becomes longer after the removal of a vertex u, then u is called a hinge vertex. In this paper, a linear time sequential algorithm is presented to find all hinge vertices of an int...
详细信息
暂无评论