Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 1–20
Abstract
This paper investigates the problem of partitioning a complete weighted graph into complete subgraphs, each having the same number of vertices, with the objective of minimizing the sum of edge weights of the resulting subgraphs. This NP-complete problem arises in many applications such as assignment and scheduling-related group partitioning problems and micro-aggregation techniques. In this paper, we present a mathematical programming model and propose a complementary column generation approach to solve the resulting model. A dual based lower bounding feature is also introduced to curtail the notorious tailing-off effects often induced when using column generation methods. Computational results are presented for a wide range of test problems.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 21–34
Abstract
The best-worst method (BWM) is a multi-criteria decision-making method which works based on a pairwise comparison system. Using such a systematic pairwise comparison enhances consistency and reliability of results. The BWM results in single solution when there are two or three criteria, and for problems with fully-consistent systems, with any number of criteria. To obtain the weights of criteria for not fully-consistent comparison systems with more than three criteria, there may be a multiple optimal solution. Although multiple optimality may be desirable in some cases, in other cases, decision-makers prefer to have a unique optimal solution. This study proposes new models which result in a unique solution. The proposed models have less constraints in comparison with the previous models.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 35–63
Abstract
Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is a very common and useful method for solving multi-criteria decision making problems in certain and uncertain environments. Single valued neutrosophic hesitant fuzzy set (SVNHFS) and interval neutrosophic hesitant fuzzy set (INHFS) are developed on the integration of neutrosophic set and hesitant fuzzy set. In this paper, we extend TOPSIS method for multi-attribute decision making based on single valued neutrosophic hesitant fuzzy set and interval neutrosophic hesitant fuzzy set. Furthermore, we assume that the attribute weights are known, incompletely known or completely unknown. We establish two optimization models for SVNHFS and INHFS with the help of maximum deviation method. Finally, we provide two numerical examples to validate the proposed approach.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 65–88
Abstract
A large number of modern mobile devices, embedded devices and smart home devices are equipped with a voice control. Automatic recognition of the entire audio stream, however, is undesirable for the reasons of the resource consumption and privacy. Therefore, most of these devices use a voice activation system, whose task is to find the specified in advance word or phrase in the audio stream (for example, Ok, Google) and to activate the voice request processing system when it is found. The voice activation system must have the following properties: high accuracy, ability to work entirely on the device (without using remote servers), consumption of a small amount of resources (primarily CPU and RAM), noise resistance and variability of speech, as well as a small delay between the pronunciation of the key phrase and the system activation. This work is a systematic literature review on voice activation systems that satisfy the above properties. We describe the principle of various voice activation systems’ operation, the characteristic representation of sound in such systems, consider in detail the acoustic modelling and, finally, describe the approaches used to assess the models’ quality. In addition, we point to a number of open questions in this problem.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 89–112
Abstract
Using different operational laws on membership and non-membership information, various intuitionistic fuzzy aggregation operators based on Archimedean t-norm and t-conorm or their special cases have been extensively investigated for multi-criteria decision making. In spite of this, they are not suitable for some practical cases. In this paper, symmetric intuitionistic fuzzy weighted mean operators w.r.t. general weighted Archimedean t-norms and t-conorms are introduced to deal neutrally or fairly with membership and non-membership information to meet the need of decision makers in some cases. The relationship among the proposed operators and the existing ones is discussed. Particularly, using the parameters in the aggregation operators, the attitude whether the decision maker is optimistic, pessimistic or impartial is reflected. At last, an example is given to show the behaviour of the proposed operators for multi-criteria decision making under intuitionistic fuzzy environment.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 113–130
Abstract
In mobile ad hoc network (MANET), routing has been the main issue because its high mobility and maintaining its routing structures are important requirements. Geographical routing mostly relies on real time location information, however, there exist lags in correctness of location information, and malicious nodes can cause troubles in accurate location tracking in the network. In order to ensure the correctness of location update information, in this paper, we propose a novel design based on a cluster based geographic routing (CBGR) formulation (Muthusenthil and Murugavalli, 2014), wherein we add a position verification technique based on a direct symmetry test (DST) to securely verify the location claims. We further introduce a new noise threshold parameter in the CBGR formulation to evaluate the correctness of location information based on a DST. Then a location based encryption scheme is employed to protect the estimated location against the eavesdropping attacks. With our simulation results, we show that the proposed location verification technique for CBGR (LVT-CBGR) network enhances the network security and performs better compared to other protocols in terms of performance metrics. The experimental outcomes illustrate the fact that our approach is well-geared to scale down the overall network expenditure.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 131–142
Abstract
The Industry 4.0 and smart city solutions are impossible to be implemented without using IoT devices. There can be several problems in acquiring data from these IoT devices, problems that can lead to missing values. Without a complete set of data, the automation of processes is not possible or is not satisfying enough. The aim of this paper is to introduce a new algorithm that can be used to fill in the missing values of signals sent by IoT devices. In order to do that, we introduce Shepard local approximation operators in Riesz MV-algebras for one variable function and we structure the set of possible values of the IoT devices signals as Riesz MV-algebra. Based on these local approximation operators we define a new algorithm and we test it to prove that it can be used to fill in the missing values of signals sent by IoT devices.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 143–160
Abstract
Phishing activities remain a persistent security threat, with global losses exceeding 2.7 billion USD in 2018, according to the FBI’s Internet Crime Complaint Center. In literature, different generations of phishing websites detection methods have been observed. The oldest methods include manual blacklisting of known phishing websites’ URLs in the centralized database, but they have not been able to detect newly launched phishing websites. More recent studies have attempted to solve phishing websites detection as a supervised machine learning problem on phishing datasets, designed on features extracted from phishing websites’ URLs. These studies have shown some classification algorithms performing better than others on differently designed datasets but have not distinguished the best classification algorithm for the phishing websites detection problem in general. The purpose of this research is to compare classic supervised machine learning algorithms on all publicly available phishing datasets with predefined features and to distinguish the best performing algorithm for solving the problem of phishing websites detection, regardless of a specific dataset design. Eight widely used classification algorithms were configured in Python using the Scikit Learn library and tested for classification accuracy on all publicly available phishing datasets. Later, classification algorithms were ranked by accuracy on different datasets using three different ranking techniques while testing the results for a statistically significant difference using Welch’s T-Test. The comparison results are presented in this paper, showing ensembles and neural networks outperforming other classical algorithms.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 161–184
Abstract
In this paper, we present the 2-tuple linguistic neutrosophic CODAS model based on the traditional fuzzy CODAS (combinative distance-based assessment) model and some fundamental theories of 2-tuple linguistic neutrosophic information. Firstly, we briefly review the definition of 2-tuple linguistic neutrosophic sets (2TLNSs) and introduce the score function, the accuracy function, operation laws and some aggregation operators of 2TLNNs. Then, the calculation steps of traditional fuzzy CODAS model are briefly presented. Furthermore, by combining the traditional fuzzy CODAS model with 2TLNNs information, the 2-tuple linguistic neutrosophic CODAS model is established and the computing steps for multiple attribute group decision making (MAGDM) are simply depicted. Our presented model is more accurate and effective for considering the combinative form of two distance measurements, including fuzzy weighted Hamming distance (HD) and fuzzy weighted Euclidean distance (ED). Finally, a numerical example for safety assessment of construction project has been given to illustrate this new model and some comparisons between 2TLNNs CODAS model and two 2TLNNs aggregation operators are also made to further illustrate the advantages of the new method.
Pub. online:23 Mar 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 31, Issue 1 (2020), pp. 185–204
Abstract
Departing from conventional TFP index without variable-specific analysis, this paper applies a novel Malmquist productivity index on the basis of the multi-directional efficiency analysis to investigate not only the overall total factor productivity growth, but also the variable-specific productivity growth in the Chinese banking sector. Moreover, considering heterogenous types of banks, the metafrontier framework is taken into account. It is found that the total factor productivity tended to decline in the Chinese banking during 2005–2015 with technological change being the main source of regress. The large state-owned commercial banks performed better than the small-medium commercial banks in terms of total factor productivity growth.