Application of Artificial Intelligence in Decision Making

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "D2: Operations Research and Fuzzy Decision Making".

Deadline for manuscript submissions: 31 May 2025 | Viewed by 15428

Special Issue Editors


E-Mail Website
Guest Editor
Department of Artificial Intelligence, Sejong University, Seoul 05006, Republic of Korea
Interests: machine learning; artificial intelligence; information system; IoT; health informatics
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Data Science, Sejong University, Seoul, Republic of Korea
Interests: data mining and analysis; machine learning; image processing; artificial intelligence; health informatics
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In today's digitally connected world, advanced artificial intelligence (AI) techniques are being employed in various applications ranging from image processing to social network analysis, and from computer-generated images to routing algorithms. The impact of AI on the world is expected to be immense, transforming everything from corporate to domestic applications. It is predicted that AI will contribute more to the global economy than China and India combined, and almost every successful industry or corporation will use some form of AI within the next decade.

Applied artificial intelligence has the potential to revolutionize decision-making in various sectors such as science, engineering, industry, medical, robotics, manufacturing, entertainment, optimization, and business. This Special Issue aims to showcase the latest research and breakthroughs in AI and highlight their practical applications in various fields.

The topics of interest for this Special Issue include, but are not limited to, the application of AI in the Internet of Things (IoT), cyber–physical systems (CPS), intelligent transportation systems (ITS), and smart vehicles. Additionally, this Special Issue addresses topics such as big data analysis, deep learning, neural networks, fuzzy systems, distributed AI systems, decision-support systems, knowledge representation, expert systems, image processing, pattern recognition, speech recognition, and fault detection, analysis, diagnostics, and monitoring.

The aim of this Special Issue is to encourage researchers and practitioners to submit high-quality original research or review articles on these subjects in order to disseminate the latest developments and practical applications of AI in various industries. This Special Issue will also feature case studies and benchmarking in order to showcase the practical applications of AI in industry.

Dr. Muhammad Syafrudin
Dr. Norma Latif Fitriyani
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • advanced artificial intelligence
  • image processing
  • social network analysis
  • routing algorithms
  • decision-making
  • optimization
  • Internet of Things (IoT)
  • cyber–physical systems (CPS)
  • intelligent transportation systems (ITS)
  • big data analysis
  • deep learning
  • neural networks
  • fuzzy systems
  • distributed AI systems
  • decision-support systems
  • expert systems
  • pattern recognition
  • speech recognition
  • fault detection

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (8 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

29 pages, 5780 KiB  
Article
Zero Trust Strategies for Cyber-Physical Systems in 6G Networks
by Abdulrahman K. Alnaim and Ahmed M. Alwakeel
Mathematics 2025, 13(7), 1108; https://doi.org/10.3390/math13071108 - 27 Mar 2025
Cited by 1 | Viewed by 372
Abstract
This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security [...] Read more.
This study proposes a Zero Trust security framework for 6G-enabled Cyber-Physical Systems (CPS), integrating Adaptive Access Control (AAC), end-to-end encryption, and blockchain to enhance security, scalability, and real-time threat detection. As 6G networks facilitate massive device connectivity and low-latency communication, traditional perimeter-based security models are inadequate against evolving cyber threats such as Man-in-the-Middle (MITM) attacks, Distributed Denial-of-Service (DDoS), and data breaches. Zero Trust security eliminates implicit trust by enforcing continuous authentication, strict access control, and real-time anomaly detection to mitigate potential threats dynamically. The proposed framework leverages blockchain technology to ensure tamper-proof data integrity and decentralized authentication, preventing unauthorized modifications to CPS data. Additionally, AI-driven anomaly detection identifies suspicious behavior in real time, optimizing security response mechanisms and reducing false positives. Experimental evaluations demonstrate a 40% reduction in MITM attack success rates, 5.8% improvement in authentication efficiency, and 63.5% lower latency compared to traditional security methods. The framework also achieves high scalability and energy efficiency, maintaining consistent throughput and response times across large-scale CPS deployments. These findings underscore the transformative potential of Zero Trust security in 6G-enabled CPS, particularly in mission-critical applications such as healthcare, smart infrastructure, and industrial automation. By integrating blockchain-based authentication, AI-powered threat detection, and adaptive access control, this research presents a scalable and resource-efficient solution for securing next-generation CPS architectures. Future work will explore quantum-safe cryptography and federated learning to further enhance security, ensuring long-term resilience in highly dynamic network environments. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

29 pages, 3674 KiB  
Article
Advanced Tax Fraud Detection: A Soft-Voting Ensemble Based on GAN and Encoder Architecture
by Masad A. Alrasheedi, Samia Ijaz, Ayed M. Alrashdi and Seung-Won Lee
Mathematics 2025, 13(4), 642; https://doi.org/10.3390/math13040642 - 16 Feb 2025
Viewed by 678
Abstract
The world prevalence of the two types of authorized and fraudulent transactions makes it difficult to distinguish between the two operations. The small percentage of fraudulent transactions, in turn, gives rise to the class imbalance problem. Hence, an adequately robust fraud detection mechanism [...] Read more.
The world prevalence of the two types of authorized and fraudulent transactions makes it difficult to distinguish between the two operations. The small percentage of fraudulent transactions, in turn, gives rise to the class imbalance problem. Hence, an adequately robust fraud detection mechanism must exist for tax systems to avoid their collapse. It has become significantly difficult to obtain any dataset, specifically a tax return dataset, because of the rising importance of privacy in a society where people generally feel squeamish about sharing personal information. Because of this, we arrive at the decision to synthesize our dataset by employing publicly available data, as well as enhance them through Correlational Generative Adversarial Networks (CGANs) and the Synthetic Minority Oversampling Technique (SMOTE). The proposed method includes a preprocessing stage to denoise the data and identify anomalies, outliers, and dimensionality reduction. Then the data have undergone enhancement using the SMOTE and the proposed CGAN techniques. A unique encoder design has been proposed, which serves the purpose of exposing the hidden patterns among legitimate and fraudulent records. This research found anomalous deductions, income inconsistencies, recurrent transaction manipulations, and irregular filing practices that distinguish fraudulent from valid tax records. These patterns are identified by encoder-based feature extraction and synthetic data augmentation. Several machine learning classifiers, along with a voting ensemble technique, have been used both with and without data augmentation. Experimental results have shown that the proposed Soft-Voting technique outperformed the original without an ensemble method. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

15 pages, 772 KiB  
Article
MFAN: Multi-Feature Attention Network for Breast Cancer Classification
by Inzamam Mashood Nasir, Masad A. Alrasheedi and Nasser Aedh Alreshidi
Mathematics 2024, 12(23), 3639; https://doi.org/10.3390/math12233639 - 21 Nov 2024
Cited by 7 | Viewed by 966
Abstract
Cancer-related diseases are some of the major health hazards affecting individuals globally, especially breast cancer. Cases of breast cancer among women persist, and the early indicators of the diseases go unnoticed in many cases. Breast cancer can therefore be treated effectively if the [...] Read more.
Cancer-related diseases are some of the major health hazards affecting individuals globally, especially breast cancer. Cases of breast cancer among women persist, and the early indicators of the diseases go unnoticed in many cases. Breast cancer can therefore be treated effectively if the detection is correctly conducted, and the cancer is classified at the preliminary stages. Yet, direct mammogram and ultrasound image diagnosis is a very intricate, time-consuming process, which can be best accomplished with the help of a professional. Manual diagnosis based on mammogram images can be cumbersome, and this often requires the input of professionals. Despite various AI-based strategies in the literature, similarity in cancer and non-cancer regions, irrelevant feature extraction, and poorly trained models are persistent problems. This paper presents a new Multi-Feature Attention Network (MFAN) for breast cancer classification that works well for small lesions and similar contexts. MFAN has two important modules: the McSCAM and the GLAM for Feature Fusion. During channel fusion, McSCAM can preserve the spatial characteristics and extract high-order statistical information, while the GLAM helps reduce the scale differences among the fused features. The global and local attention branches also help the network to effectively identify small lesion regions by obtaining global and local information. Based on the experimental results, the proposed MFAN is a powerful classification model that can classify breast cancer subtypes while providing a solution to the current problems in breast cancer diagnosis on two public datasets. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

21 pages, 1133 KiB  
Article
A Stacking Ensemble Based on Lexicon and Machine Learning Methods for the Sentiment Analysis of Tweets
by Sharaf J. Malebary and Anas W. Abulfaraj
Mathematics 2024, 12(21), 3405; https://doi.org/10.3390/math12213405 - 31 Oct 2024
Viewed by 1629
Abstract
Sentiment is employed in various fields, such as collecting web-based opinions for the formulation of governmental policies, measuring employee and customer satisfaction levels in business organizations, and measuring the sentiment of the public in political and security matters. The field has recently faced [...] Read more.
Sentiment is employed in various fields, such as collecting web-based opinions for the formulation of governmental policies, measuring employee and customer satisfaction levels in business organizations, and measuring the sentiment of the public in political and security matters. The field has recently faced new challenges since algorithms must operate with highly unstructured sentiment data from social media. In this study, the authors present a new stacking ensemble method that combines the lexicon-based approach with machine learning algorithms to improve the sentiment analysis of tweets. Due to the complexity of the text with very ill-defined syntactic and grammatical patterns, using lexicon-based techniques to extract sentiment from the content is proposed. On the same note, the contextual and nuanced aspects of sentiment are inferred through machine learning algorithms. A sophisticated bat algorithm that uses an Elman network as a meta-classifier is then employed to classify the extracted features accurately. Substantial evidence from three datasets that are readily available for public analysis re-affirms the improvements this innovative approach brings to sentiment classification. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

26 pages, 1232 KiB  
Article
Effort-Aware Fault-Proneness Prediction Using Non-API-Based Package-Modularization Metrics
by Mohsin Shaikh, Irfan Tunio, Jawad Khan and Younhyun Jung
Mathematics 2024, 12(14), 2201; https://doi.org/10.3390/math12142201 - 13 Jul 2024
Cited by 1 | Viewed by 789
Abstract
Source code complexity of legacy object-oriented (OO) software has a trickle-down effect over the key activities of software development and maintenance. Package-based OO design is widely believed to be an effective modularization. Recently, theories and methodologies have been proposed to assess the complementary [...] Read more.
Source code complexity of legacy object-oriented (OO) software has a trickle-down effect over the key activities of software development and maintenance. Package-based OO design is widely believed to be an effective modularization. Recently, theories and methodologies have been proposed to assess the complementary aspects of legacy OO systems through package-modularization metrics. These package-modularization metrics basically address non-API-based object-oriented principles, like encapsulation, commonality-of-goal, changeability, maintainability, and analyzability. Despite their ability to characterize package organization, their application towards cost-effective fault-proneness prediction is yet to be determined. In this paper, we present theoretical illustration and empirical perspective of non-API-based package-modularization metrics towards effort-aware fault-proneness prediction. First, we employ correlation analysis to evaluate the relationship between faults and package-level metrics. Second, we use multivariate logistic regression with effort-aware performance indicators (ranking and classification) to investigate the practical application of proposed metrics. Our experimental analysis over open-source Java software systems provides statistical evidence for fault-proneness prediction and relatively better explanatory power than traditional metrics. Consequently, these results guide developers for reliable and modular package-based software design. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

38 pages, 2043 KiB  
Article
Boosting Institutional Identity on X Using NLP and Sentiment Analysis: King Faisal University as a Case Study
by Khalied M. Albarrak and Shaymaa E. Sorour
Mathematics 2024, 12(12), 1806; https://doi.org/10.3390/math12121806 - 11 Jun 2024
Cited by 3 | Viewed by 1690
Abstract
Universities increasingly leverage social media platforms, especially Twitter, for news dissemination, audience engagement, and feedback collection. King Faisal University (KFU) is dedicated to enhancing its institutional identity (ID), grounded in environmental sustainability and food security, encompassing nine critical areas. This study aims to [...] Read more.
Universities increasingly leverage social media platforms, especially Twitter, for news dissemination, audience engagement, and feedback collection. King Faisal University (KFU) is dedicated to enhancing its institutional identity (ID), grounded in environmental sustainability and food security, encompassing nine critical areas. This study aims to assess the impact of KFU’s Twitter interactions on public awareness of its institutional identity using systematic analysis and machine learning (ML) methods. The objectives are to: (1) Determine the influence of KFU’s Twitter presence on ID awareness; (2) create a dedicated dataset for real-time public interaction analysis with KFU’s Twitter content; (3) investigate Twitter’s role in promoting KFU’s institutional identity across 9-ID domains and its changing impact over time; (4) utilize k-means clustering and sentiment analysis (TFIDF and Word2vec) to classify data and assess similarities among the identity domains; and (5) apply the categorization method to process and categorize tweets, facilitating the assessment of word meanings and similarities of the 9-ID domains. The study also employs four ML models, including Logistic Regression (LR) and Support Vector Machine (SVM), with the Random Forest (RF) model combined with Word2vec achieving the highest accuracy of 100%. The findings underscore the value of KFU’s Twitter data analysis in deepening the understanding of its ID and guiding the development of effective communication strategies. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

17 pages, 3474 KiB  
Article
A Fault Detection System for Wiring Harness Manufacturing Using Artificial Intelligence
by Jinwoo Song, Prashant Kumar, Yonghawn Kim and Heung Soo Kim
Mathematics 2024, 12(4), 537; https://doi.org/10.3390/math12040537 - 8 Feb 2024
Cited by 2 | Viewed by 2879
Abstract
Due to its simplicity, accuracy, and adaptability, Crimp Force Monitoring (CFM) has long been the standard for fault detection in wiring harness manufacturing. However, it necessitates frequent reconfigurations based on the variability in materials, dependency on operator skill, and high costs of implementation, [...] Read more.
Due to its simplicity, accuracy, and adaptability, Crimp Force Monitoring (CFM) has long been the standard for fault detection in wiring harness manufacturing. However, it necessitates frequent reconfigurations based on the variability in materials, dependency on operator skill, and high costs of implementation, and thus reconfiguration presents significant challenges. To solve these problems, this paper introduces a fault detection system that employs an Artificial Intelligence (AI) classification model to enhance the performance and cost-efficiency of the quality control process of wiring harness manufacturing. Since there are no labeled data to train the classification model at the onset of manufacturing, a small number of normal data from each production run are manually extracted to train the model. To address the constraint of the limited available data, the system generates synthetic data from normal data, simulating potential defects by using Regional Selective Data Scaling (RSDS). This innovative method performs upscaling or downscaling on specific regions of the original data to produce synthetic abnormal data, which enables the fault detection system to efficiently train its classification model with a dataset consisting solely of normal operation data. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

Review

Jump to: Research

42 pages, 9098 KiB  
Review
Consequential Advancements of Self-Supervised Learning (SSL) in Deep Learning Contexts
by Mohammed Majid Abdulrazzaq, Nehad T. A. Ramaha, Alaa Ali Hameed, Mohammad Salman, Dong Keon Yon, Norma Latif Fitriyani, Muhammad Syafrudin and Seung Won Lee
Mathematics 2024, 12(5), 758; https://doi.org/10.3390/math12050758 - 3 Mar 2024
Cited by 16 | Viewed by 4692
Abstract
Self-supervised learning (SSL) is a potential deep learning (DL) technique that uses massive volumes of unlabeled data to train neural networks. SSL techniques have evolved in response to the poor classification performance of conventional and even modern machine learning (ML) and DL models [...] Read more.
Self-supervised learning (SSL) is a potential deep learning (DL) technique that uses massive volumes of unlabeled data to train neural networks. SSL techniques have evolved in response to the poor classification performance of conventional and even modern machine learning (ML) and DL models of enormous unlabeled data produced periodically in different disciplines. However, the literature does not fully address SSL’s practicalities and workabilities necessary for industrial engineering and medicine. Accordingly, this thorough review is administered to identify these prominent possibilities for prediction, focusing on industrial and medical fields. This extensive survey, with its pivotal outcomes, could support industrial engineers and medical personnel in efficiently predicting machinery faults and patients’ ailments without referring to traditional numerical models that require massive computational budgets, time, storage, and effort for data annotation. Additionally, the review’s numerous addressed ideas could encourage industry and healthcare actors to take SSL principles into an agile application to achieve precise maintenance prognostics and illness diagnosis with remarkable levels of accuracy and feasibility, simulating functional human thinking and cognition without compromising prediction efficacy. Full article
(This article belongs to the Special Issue Application of Artificial Intelligence in Decision Making)
Show Figures

Figure 1

Back to TopTop