Search results

1 – 10 of 182
Content available
Article
Publication date: 28 March 2023

Seniye Banu Garip, Orkan Zeynel Güzelci, Ervin Garip and Serkan Kocabay

This study aims to present a novel Genetic Algorithm-Based Design Model (GABDM) to provide reduced-risk areas, namely, a “safe footprint,” in interior spaces during earthquakes…

201

Abstract

Purpose

This study aims to present a novel Genetic Algorithm-Based Design Model (GABDM) to provide reduced-risk areas, namely, a “safe footprint,” in interior spaces during earthquakes. This study focuses on housing interiors as the space where inhabitants spend most of their daily lives.

Design/methodology/approach

The GABDM uses the genetic algorithm as a method, the Nondominated Sorting Genetic Algorithm II algorithm, and the Wallacei X evolutionary optimization engine. The model setup, including inputs, constraints, operations and fitness functions, is presented, as is the algorithmic model’s running procedure. Following the development phase, GABDM is tested with a sample housing interior designed by the authors based on the literature related to earthquake risk in interiors. The implementation section is organized to include two case studies.

Findings

The implementation of GABDM resulted in optimal “safe footprint” solutions for both case studies. However, the results show that the fitness functions achieved in Case Study 1 differed from those achieved in Case Study 2. Furthermore, Case Study 2 has generated more successful (higher ranking) “safe footprint” alternatives with its proposed furniture system.

Originality/value

This study presents an original approach to dealing with earthquake risks in the context of interior design, as well as the development of a design model (GABDM) that uses a generative design method to reduce earthquake risks in interior spaces. By introducing the concept of a “safe footprint,” GABDM contributes explicitly to the prevention of earthquake risk. GABDM is adaptable to other architectural typologies that involve footprint and furniture relationships.

Details

Construction Innovation , vol. 24 no. 1
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 23 January 2024

Chong Wu, Zijiao Zhang, Chang Liu and Yiwen Zhang

This paper aims to propose a bed and breakfast (B&B) recommendation method that takes into account review timeliness and user preferences to help consumers choose the most…

Abstract

Purpose

This paper aims to propose a bed and breakfast (B&B) recommendation method that takes into account review timeliness and user preferences to help consumers choose the most satisfactory B&B.

Design/methodology/approach

This paper proposes a B&B ranking method based on improved intuitionistic fuzzy sets. First, text mining and cluster analysis are combined to identify the concerns of consumers and construct an attribute set. Second, an attribute-level-based text sentiment analysis is established. The authors propose an improved intuitionistic fuzzy set, which is more in line with the actual situation of sentiment analysis of online reviews. Next, subjective-objective combinatorial assignments are applied, considering the consumers’ preferences. Finally, the vlsekriterijumska optimizacija i kompromisno resenje (VIKOR) algorithm, based on the improved score function, is advised to evaluate B&Bs.

Findings

A case study is presented to illustrate the use of the proposed method. Comparative analysis with other multi-attribute decision-making (MADM) methods proves the effectiveness and superiority of the VIKOR algorithm based on the improved intuitionistic fuzzy sets proposed in this paper.

Originality/value

Proposing a B&B recommendation method that takes into account review timeliness and user customization is the innovation of this paper. In this approach, the authors propose improved intuitionistic fuzzy sets. Compared with the traditional intuitionistic fuzzy set, the improved intuitionistic fuzzy set increases the abstention membership, which is more in line with the actual situation of attribute-level sentiment analysis of online reviews.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 22 February 2024

Yuzhuo Wang, Chengzhi Zhang, Min Song, Seongdeok Kim, Youngsoo Ko and Juhee Lee

In the era of artificial intelligence (AI), algorithms have gained unprecedented importance. Scientific studies have shown that algorithms are frequently mentioned in papers…

84

Abstract

Purpose

In the era of artificial intelligence (AI), algorithms have gained unprecedented importance. Scientific studies have shown that algorithms are frequently mentioned in papers, making mention frequency a classical indicator of their popularity and influence. However, contemporary methods for evaluating influence tend to focus solely on individual algorithms, disregarding the collective impact resulting from the interconnectedness of these algorithms, which can provide a new way to reveal their roles and importance within algorithm clusters. This paper aims to build the co-occurrence network of algorithms in the natural language processing field based on the full-text content of academic papers and analyze the academic influence of algorithms in the group based on the features of the network.

Design/methodology/approach

We use deep learning models to extract algorithm entities from articles and construct the whole, cumulative and annual co-occurrence networks. We first analyze the characteristics of algorithm networks and then use various centrality metrics to obtain the score and ranking of group influence for each algorithm in the whole domain and each year. Finally, we analyze the influence evolution of different representative algorithms.

Findings

The results indicate that algorithm networks also have the characteristics of complex networks, with tight connections between nodes developing over approximately four decades. For different algorithms, algorithms that are classic, high-performing and appear at the junctions of different eras can possess high popularity, control, central position and balanced influence in the network. As an algorithm gradually diminishes its sway within the group, it typically loses its core position first, followed by a dwindling association with other algorithms.

Originality/value

To the best of the authors’ knowledge, this paper is the first large-scale analysis of algorithm networks. The extensive temporal coverage, spanning over four decades of academic publications, ensures the depth and integrity of the network. Our results serve as a cornerstone for constructing multifaceted networks interlinking algorithms, scholars and tasks, facilitating future exploration of their scientific roles and semantic relations.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 7 November 2023

Matheus Francisco, João Pereira, Lucas Oliveira, Sebastião Simões Cunha and G.F. Gomes

The present paper aims at the multi-objective optimization of a reentrant hexagonal cell auxetic structure. In addition, a parametric analysis will be carried out to verify how…

30

Abstract

Purpose

The present paper aims at the multi-objective optimization of a reentrant hexagonal cell auxetic structure. In addition, a parametric analysis will be carried out to verify how each of the design factors impact each of the responses.

Design/methodology/approach

The multi-objective optimization of five different responses of an auxetic model was considered: mass, critical buckling load under compression effort, natural frequency, Poisson's ratio and failure load. The response surface methodology was applied, and a new meta-heuristic of optimization called the multi-objective Lichtenberg algorithm was applied to find the optimized configuration of the model. It was possible to increase the failure load by 26.75% in compression performance optimization. Furthermore, in the optimization of modal performance, it was possible to increase the natural frequency by 37.43%. Finally, all 5 responses analyzed simultaneously were optimized. In this case, it was possible to increase the critical buckling load by 42.55%, the failure load by 28.70% and reduce the mass and Poisson's ratio by 15.97 and 11%, respectively. This paper addresses something new in the scientific world to date when evaluating in a multi-objective optimization problem, the compression and modal performance of an auxetic reentrant model.

Findings

It was possible to find multi-objective optimized structures. It was possible to increase the critical buckling load by 42.82%, and the failure load in compression performance by 26.75%. Furthermore, in the optimization of modal performance, it was possible to increase the natural frequency by 37.43%, and decrease the mass by 15.97%. Finally, all 5 responses analyzed simultaneously were optimized. In this case, it was possible to increase the critical buckling load by 42.55%, increase the failure load by 28.70% and reduce the mass and Poisson's ratio by 15.97 and 11%, respectively.

Originality/value

There is no work in the literature to date that performed the optimization of 5 responses simultaneously of a reentrant hexagonal cell auxetic structure. This paper also presents an unprecedented statistical analysis in the literature that verifies how the design factors impact each of the responses.

Details

Engineering Computations, vol. 40 no. 9/10
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 5 May 2021

Samrat Gupta and Swanand Deodhar

Communities representing groups of agents with similar interests or functions are one of the essential features of complex networks. Finding communities in real-world networks is…

Abstract

Purpose

Communities representing groups of agents with similar interests or functions are one of the essential features of complex networks. Finding communities in real-world networks is critical for analyzing complex systems in various areas ranging from collaborative information to political systems. Given the different characteristics of networks and the capability of community detection in handling a plethora of societal problems, community detection methods represent an emerging area of research. Contributing to this field, the authors propose a new community detection algorithm based on the hybridization of node and link granulation.

Design/methodology/approach

The proposed algorithm utilizes a rough set-theoretic concept called closure on networks. Initial sets are constructed by using neighborhood topology around the nodes as well as links and represented as two different categories of granules. Subsequently, the authors iteratively obtain the constrained closure of these sets. The authors use node mutuality and link mutuality as merging criteria for node and link granules, respectively, during the iterations. Finally, the constrained closure subsets of nodes and links are combined and refined using the Jaccard similarity coefficient and a local density function to obtain communities in a binary network.

Findings

Extensive experiments conducted on twelve real-world networks followed by a comparison with state-of-the-art methods demonstrate the viability and effectiveness of the proposed algorithm.

Research limitations/implications

The study also contributes to the ongoing effort related to the application of soft computing techniques to model complex systems. The extant literature has integrated a rough set-theoretic approach with a fuzzy granular model (Kundu and Pal, 2015) and spectral clustering (Huang and Xiao, 2012) for node-centric community detection in complex networks. In contributing to this stream of work, the proposed algorithm leverages the unexplored synergy between rough set theory, node granulation and link granulation in the context of complex networks. Combined with experiments of network datasets from various domains, the results indicate that the proposed algorithm can effectively reveal co-occurring disjoint, overlapping and nested communities without necessarily assigning each node to a community.

Practical implications

This study carries important practical implications for complex adaptive systems in business and management sciences, in which entities are increasingly getting organized into communities (Jacucci et al., 2006). The proposed community detection method can be used for network-based fraud detection by enabling experts to understand the formation and development of fraudulent setups with an active exchange of information and resources between the firms (Van Vlasselaer et al., 2017). Products and services are getting connected and mapped in every walk of life due to the emergence of a variety of interconnected devices, social networks and software applications.

Social implications

The proposed algorithm could be extended for community detection on customer trajectory patterns and design recommendation systems for online products and services (Ghose et al., 2019; Liu and Wang, 2017). In line with prior research, the proposed algorithm can aid companies in investigating the characteristics of implicit communities of bloggers or social media users for their services and products so as to identify peer influencers and conduct targeted marketing (Chau and Xu, 2012; De Matos et al., 2014; Zhang et al., 2016). The proposed algorithm can be used to understand the behavior of each group and the appropriate communication strategy for that group. For instance, a group using a specific language or following a specific account might benefit more from a particular piece of content than another group. The proposed algorithm can thus help in exploring the factors defining communities and confronting many real-life challenges.

Originality/value

This work is based on a theoretical argument that communities in networks are not only based on compatibility among nodes but also on the compatibility among links. Building up on the aforementioned argument, the authors propose a community detection method that considers the relationship among both the entities in a network (nodes and links) as opposed to traditional methods, which are predominantly based on relationships among nodes only.

Details

Information Technology & People, vol. 37 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 16 August 2023

Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…

Abstract

Purpose

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.

Design/methodology/approach

Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.

Findings

The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.

Originality/value

A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 17 May 2022

Da’ad Ahmad Albalawneh and M.A. Mohamed

Using a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization…

Abstract

Purpose

Using a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization technique to solve the dynamic vehicle routing problem. Using a GA solver, the estimated routing time for 300 chromosomes (routes) was the shortest and most efficient over 30 generations.

Design/methodology/approach

In transportation systems, the objective of route planning techniques has been revised from focusing on road directors to road users. As a result, the new transportation systems use advanced technologies to support drivers and provide them with the road information they need and the services they require to reduce traffic congestion and improve routing problems. In recent decades, numerous studies have been conducted on how to find an efficient and suitable route for vehicles, known as the vehicle routing problem (VRP). To identify the best route, VRP uses real-time information-acquired geographical information systems (GIS) tools.

Findings

This study aims to develop a route planning tool using ArcGIS network analyst to enhance both cost and service quality measures, taking into account several factors to determine the best route based on the users’ preferences.

Originality/value

Furthermore, developing a route planning tool using ArcGIS network analyst to enhance both cost and service quality measures, taking into account several factors to determine the best route based on the users’ preferences. An adaptive genetic algorithm (GA) is used to determine the optimal time route, taking into account factors that affect vehicle arrival times and cause delays. In addition, ArcGIS' Network Analyst tool is used to determine the best route based on the user's preferences using a real-time map.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 April 2023

Sebi Neelamkavil Pappachan

This study aims to intend and implement the optimal power flow, where tuning the production cost is done with the inclusion of stochastic wind power and different kinds of…

Abstract

Purpose

This study aims to intend and implement the optimal power flow, where tuning the production cost is done with the inclusion of stochastic wind power and different kinds of flexible AC transmission systems (FACTS) devices. Here, the speed with fitness-based krill herd algorithm (SF-KHA) is adopted for deciding the FACTS devices’ optimal sizing and placement integrated with wind power. Here, the modified SF-KHA optimizes the sizing and location of FACTS devices for attaining the minimum average production cost and real power depletions of the system. Especially, the objective includes reserve cost for overestimation, cost of thermal generation of the wind power, direct cost of scheduled wind power and penalty cost for underestimation. The efficiency of the offered method over several popular optimization algorithms has been done, and the comparison over different algorithms establishes proposed KHA algorithm attains the accurate optimal efficiency for all other algorithms.

Design/methodology/approach

The proposed FACTS devices-based power system with the integration of wind generators is based on the accurate placement and sizing of FACTS devices for decreasing the actual power loss and total production cost of the power system.

Findings

Through the cost function evaluation of the offered SF-KHA, it was noted that the proposed SF-KHA-based power system had secured 13.04% superior to success history-based adaptive differential evolution, 9.09% enhanced than differential evolution, 11.5% better than artificial bee colony algorithm, 15.2% superior to particle swarm optimization and 9.09% improved than flower pollination algorithm.

Originality/value

The proposed power system with the accurate placement and sizing of FACTS devices and wind generator using the suggested SF-KHA was effective when compared with the conventional algorithm-based power systems.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 42 no. 6
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 27 February 2023

Guanxiong Wang, Xiaojian Hu and Ting Wang

By introducing the mass customization service mode into the cloud logistics environment, this paper studies the joint optimization of service provider selection and customer order…

210

Abstract

Purpose

By introducing the mass customization service mode into the cloud logistics environment, this paper studies the joint optimization of service provider selection and customer order decoupling point (CODP) positioning based on the mass customization service mode to provide customers with more diversified and personalized service content with lower total logistics service cost.

Design/methodology/approach

This paper addresses the general process of service composition optimization based on the mass customization mode in a cloud logistics service environment and constructs a joint decision model for service provider selection and CODP positioning. In the model, the two objective functions of minimum service cost and most satisfactory delivery time are considered, and the Pareto optimal solution of the model is obtained via the NSGA-II algorithm. Then, a numerical case is used to verify the superiority of the service composition scheme based on the mass customization mode over the general scheme and to verify the significant impact of the scale effect coefficient on the optimal CODP location.

Findings

(1) Under the cloud logistics mode, the implementation of the logistics service mode based on mass customization can not only reduce the total cost of logistics services by means of the scale effect of massive orders on the cloud platform but also make more efficient use of a large number of logistics service providers gathered on the cloud platform to provide customers with more customized and diversified service content. (2) The scale effect coefficient directly affects the total cost of logistics services and significantly affects the location of the CODP. Therefore, before implementing the mass customization logistics service mode, the most reasonable clustering of orders on the cloud logistics platform is very important for the follow-up service combination.

Originality/value

The originality of this paper includes two aspects. One is to introduce the mass customization mode in the cloud logistics service environment for the first time and summarize the operation process of implementing the mass customization mode in the cloud logistics environment. Second, in order to solve the joint decision optimization model of provider selection and CODP positioning, this paper designs a method for solving a mixed-integer nonlinear programming model using a multi-layer coding genetic algorithm.

Details

Kybernetes, vol. 53 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 18 April 2024

Vaishali Rajput, Preeti Mulay and Chandrashekhar Madhavrao Mahajan

Nature’s evolution has shaped intelligent behaviors in creatures like insects and birds, inspiring the field of Swarm Intelligence. Researchers have developed bio-inspired…

Abstract

Purpose

Nature’s evolution has shaped intelligent behaviors in creatures like insects and birds, inspiring the field of Swarm Intelligence. Researchers have developed bio-inspired algorithms to address complex optimization problems efficiently. These algorithms strike a balance between computational efficiency and solution optimality, attracting significant attention across domains.

Design/methodology/approach

Bio-inspired optimization techniques for feature engineering and its applications are systematically reviewed with chief objective of assessing statistical influence and significance of “Bio-inspired optimization”-based computational models by referring to vast research literature published between year 2015 and 2022.

Findings

The Scopus and Web of Science databases were explored for review with focus on parameters such as country-wise publications, keyword occurrences and citations per year. Springer and IEEE emerge as the most creative publishers, with indicative prominent and superior journals, namely, PLoS ONE, Neural Computing and Applications, Lecture Notes in Computer Science and IEEE Transactions. The “National Natural Science Foundation” of China and the “Ministry of Electronics and Information Technology” of India lead in funding projects in this area. China, India and Germany stand out as leaders in publications related to bio-inspired algorithms for feature engineering research.

Originality/value

The review findings integrate various bio-inspired algorithm selection techniques over a diverse spectrum of optimization techniques. Anti colony optimization contributes to decentralized and cooperative search strategies, bee colony optimization (BCO) improves collaborative decision-making, particle swarm optimization leads to exploration-exploitation balance and bio-inspired algorithms offer a range of nature-inspired heuristics.

1 – 10 of 182