Current Issue : January - March Volume : 2019 Issue Number : 1 Articles : 6 Articles
Nowadays, more and more applications are dependent on storage and management of\nsemi-structured information. For scientific research and knowledge-based decision-making, such data\noften needs to be published, e.g., medical data is released to implement a computer-assisted clinical\ndecision support system. Since this data contains individualsâ?? privacy, they must be appropriately\nanonymized before to be released. However, the existing anonymization method based on l-diversity\nfor hierarchical data may cause serious similarity attacks, and cannot protect data privacy very well.\nIn this paper, we utilize fuzzy sets to divide levels for sensitive numerical and categorical attribute\nvalues uniformly (a categorical attribute value can be converted into a numerical attribute value\naccording to its frequency of occurrences), and then transform the value levels to sensitivity levels.\nThe privacy model (....)-anonymity for hierarchical data with multi-level sensitivity is proposed.\nFurthermore, we design a privacy-preserving approach to achieve this privacy model. Experiment\nresults demonstrate that our approach is obviously superior to existing anonymous approach in\nhierarchical data in terms of utility and security....
With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet.\nHowever, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data\nloss, and denial of data access in the course of information transmission. Cross-site scripting (XSS) is a form of web security attack\nwhich involves the injection of malicious codes into web applications from untrusted sources. Interestingly, recent research\nstudies on the web application security centre focus on attack prevention and mechanisms for secure coding; recent methods for\nthose attacks do not only generate high false positives but also have little considerations for the users who oftentimes are the\nvictims of malicious attacks. Motivated by this problem, this paper describes an â??intelligentâ? tool for detecting cross-site scripting\nflaws in web applications. This paper describes the method implemented based on fuzzy logic to detect classic XSS weaknesses and\nto provide some results on experimentations. Our detection framework recorded 15% improvement in accuracy and 0.01%\nreduction in the false-positive rate which is considerably lower than that found in the existing work by Koli et al. Our approach\nalso serves as a decision-making tool for the users....
We applied a new method for the identification of fuzzy periods and the insertion and deletion of characters were taken into\nconsideration while studying theworks of poetry.The techniqueemploys genetic algorithm, dynamic programming, and theMonte\nCarlo method. In the present work, the technique was applied to poems written by the famous Russian and foreign classics. A total\nof 95 poems were studied; and fuzzy periods possessing high statistical significance were identified with more than half of the\npoems under study.The existence of correlation between the stressed vowel letters in a poemwith the position of the fuzzy periods\nwas shown. The present study shows that a work of poetry contains both semantic component and fuzzy periods of letters; hence\na poem could have psychological impact on the audience....
This paper presents an adaptive fuzzy synchronization control strategy for a class of different uncertain fractional-order\nchaotic/hyperchaotic systems with unknown external disturbances via T-S fuzzy systems, where the parallel distributed\ncompensation technology is provided to design adaptive controller with fractional adaptation laws. T-S fuzzy models are employed\nto approximate the unknown nonlinear systems and tracking error signals are used to update the parametric estimates. The\nasymptotic stability of the closed-loop system and the boundedness of the states and parameters are guaranteed by fractional\nLyapunov theory.This approach is also valid for synchronization of fractional-order chaotic systemswith the same system structure.\nOne constructive example is given to verify the feasibility and superiority of the proposed method....
The paper dwells on the methodology of neural-fuzzy approach to solving the problem of ship collision prevention in a heavy traffic\nzone. The authors present the technique of using maneuvering board to form the elements of learning sample. The authors prove\nthat it is rational to use a neural-fuzzy system, where generation is carried out by the lattice method without clustering.The authors\ninvestigate the effect of optimization on the quality differences.The researchers define optimal membership functions that are used\nto generate the input linguistic variables of a neural-fuzzy system....
Thereduction of energy resources and the increase in environmental consciousness have recently increased the interest in renewable\nenergy sources. Wind energy is from renewable energy sources, which are used in many countries. Turkey has a lot alternative\nwind energy plants thanks to its favorable geographical location.Where the wind power plant is to be established is a complex and\nimportant decisive factor. It is very important to select the appropriate wind power plant site to take advantage of wind energy and\nreduce costs. In this study, we aimed to reach the solution of wind energy plant site selection. For this purpose 4 alternative wind\npower plant locations have been identified. To evaluate the alternatives, 10 criteria in four dimensions including wind potential,\nlocation, cost, and social benefits are selected. Since the Multicriterion Decision Making (MCDM) methods are often used in\nproblem of location selection from past to present, TOPSIS method combined with intuitionistic fuzzy set (IFS) has been used\nto achieve this goal. The main purpose of the TOPSIS method is to rank the alternatives in the worst way. The IFS are used to\nreflect approval, rejection, and hesitation of decision makers by dealing with real life uncertainty, imprecision, vagueness, and\nlinguistic human decisions. Finally, a numerical example is applied for wind power plant site selection. In order to demonstrate\nthe effectiveness of IFS, the problem is solved by the Fuzzy TOPSIS method using the same data. Then, the obtained results are\ncompared with the IFS method to show the effectiveness of the proposed method....
Loading....