Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (13)

Search Parameters:
Keywords = fuzzy keyword search

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
64 pages, 6191 KiB  
Review
Techniques and Models for Addressing Occupational Risk Using Fuzzy Logic, Neural Networks, Machine Learning, and Genetic Algorithms: A Review and Meta-Analysis
by Chris Mitrakas, Alexandros Xanthopoulos and Dimitrios Koulouriotis
Appl. Sci. 2025, 15(4), 1909; https://doi.org/10.3390/app15041909 - 12 Feb 2025
Cited by 2 | Viewed by 2366
Abstract
This article aims to present a structured literature review that utilizes computational intelligence techniques, specifically fuzzy logic, neural networks, genetic algorithms, and machine learning, to assist in the assessment of workplace risk from human factors. The general aim is to highlight the existing [...] Read more.
This article aims to present a structured literature review that utilizes computational intelligence techniques, specifically fuzzy logic, neural networks, genetic algorithms, and machine learning, to assist in the assessment of workplace risk from human factors. The general aim is to highlight the existing literature on the subject, while the specific goal of the research is to attempt to answer research questions that emerge after the review and classification of the literature, which are aspects that have not previously been addressed. The methodology for retrieving relevant articles involved a keyword search in the Scopus database. The results from the search were filtered based on the selected criteria. The research spans a 40-year period, from 1984 to 2024. After filtering, 296 articles relevant to the topic were identified. Statistical analysis highlights fuzzy systems as the technique with the highest representation (163 articles), followed by neural networks (81 articles), with machine learning and genetic algorithms ranking next (25 and 20 articles, respectively). The main conclusions indicate that the primary sectors utilizing these techniques are industry, transportation, construction, and cross-sectoral models and techniques that are applicable to multiple occupational fields. An additional finding is the reasoning behind researchers’ preference for fuzzy systems over neural networks, primarily due to the availability or lack of accident databases. The review also highlighted gaps in the literature requiring further research. The assessment of occupational risk continues to present numerous challenges, and the future trend suggests that fuzzy systems and machine learning may be prominent. Full article
(This article belongs to the Special Issue Applications of Artificial Intelligence in Industrial Engineering)
Show Figures

Figure 1

17 pages, 2370 KiB  
Article
Analysis of the Use of Similarity Coefficients in Manufacturing Cell Formation Processes
by Miguel Afonso Sellitto
Appl. Syst. Innov. 2025, 8(1), 23; https://doi.org/10.3390/asi8010023 - 11 Feb 2025
Viewed by 1068
Abstract
This study investigated the application of similarity coefficients in cellular layout and group technology in industrial organizations, focusing on multicellular manufacturing. Cell formation methods and techniques were explored, ranging from similarity of operations to production volume, in addition to the main elements of [...] Read more.
This study investigated the application of similarity coefficients in cellular layout and group technology in industrial organizations, focusing on multicellular manufacturing. Cell formation methods and techniques were explored, ranging from similarity of operations to production volume, in addition to the main elements of group technology. Cellular layout and group technology offer tangible benefits to industrial processes, such as increased operational efficiency, reduced production costs, and improved quality of final products. The choice and implementation of techniques based on similarity take into account factors such as product variety, production volume, process complexity, and market demand. One of the techniques is the use of similarity coefficients. The purpose of this study is to analyze the use of similarity coefficients in the cell formation process. The technical contribution of this study is that now practitioners have a detailed guide to applying similarity coefficients and verifying the results of the cell formation process in manufacturing activities. A bibliometric search using convenient keywords in the Google Scholar search engine identified the incidences of twenty types of similarity coefficients. The most cited coefficient, the Jaccard coefficient, was tested in standard and non-standard application cases, and the results were compared to support a conclusion. Further research should involve quantitative techniques such as multicriteria evaluation and fuzzy logic in the cell formation process. Full article
Show Figures

Figure 1

21 pages, 2457 KiB  
Article
Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme
by Xixi Yan, Pengyu Cheng, Yongli Tang and Jing Zhang
Appl. Sci. 2024, 14(24), 11740; https://doi.org/10.3390/app142411740 - 16 Dec 2024
Cited by 1 | Viewed by 931
Abstract
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud environment, as search keywords that are misspelled [...] Read more.
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud environment, as search keywords that are misspelled to some extent can still generate search trapdoors that are as effective as correct keywords. In scenarios where multiple users can search for ciphertext, most fuzzy searchable encryption schemes ignore the security issues associated with malicious cloud services and are inflexible in multi-user scenarios. For example, in medical application scenarios where malicious cloud servers may exist, diverse types of files need to correspond to doctors in the corresponding departments, and there is a lack of fine-grained access control for sharing decryption keys for different types of files. In the application of medical cloud storage, malicious cloud servers may return incorrect ciphertext files. Since diverse types of files need to be guaranteed to be accessible by doctors in the corresponding departments, sharing decryption keys with the corresponding doctors for different types of files is an issue. To solve these problems, a verifiable fuzzy searchable encryption with blockchain-assisted multi-user scenarios is proposed. Locality-sensitive hashing and bloom filters are used to realize multi-keyword fuzzy search, and the bigram segmentation algorithm is optimized for keyword conversion to improve search accuracy. To realize fine-grained access control in multi-user scenarios, ciphertext-policy attribute-based encryption (CP-ABE) is used to distribute the shared keys. In response to the possibility of malicious servers tampering with or falsifying users’ search results, the scheme leverages the blockchain’s technical features of decentralization, non-tamperability, and traceability, and uses smart contracts as a trusted third party to carry out the search work, which not only prevents keyword-guessing attacks within the cloud server, but also solves the verification work of search results. The security analysis leads to the conclusion that the scheme is secure under the adaptively chosen-keyword attack. Full article
Show Figures

Figure 1

27 pages, 8427 KiB  
Article
A Social Media Knowledge Retrieval Method Based on Knowledge Demands and Knowledge Supplies
by Runsheng Miao, Yuchen Huang and Zhenyu Zhang
Mathematics 2023, 11(14), 3154; https://doi.org/10.3390/math11143154 - 18 Jul 2023
Cited by 1 | Viewed by 1616
Abstract
In large social media knowledge retrieval systems, employing a keyword-based fuzzy matching method to obtain knowledge presents several challenges, such as irrelevant, inaccurate, disorganized, or non-systematic knowledge results. Therefore, this paper proposes a knowledge retrieval method capable of returning hierarchical, systematized knowledge results. [...] Read more.
In large social media knowledge retrieval systems, employing a keyword-based fuzzy matching method to obtain knowledge presents several challenges, such as irrelevant, inaccurate, disorganized, or non-systematic knowledge results. Therefore, this paper proposes a knowledge retrieval method capable of returning hierarchical, systematized knowledge results. The method can match the knowledge demands according to the keyword input by users and then present the knowledge supplies corresponding to the knowledge demands as results to the users. Firstly, a knowledge structure named Knowledge Demand is designed to represent the genuine needs of social media users. This knowledge structure measures the popularity of topic combinations in the Topic Map, so the topic combinations with high popularity are regarded as the main content of the Knowledge Demands. Secondly, the proposed method designs a hierarchical and systematic knowledge structure, named Knowledge Supply, which provides Knowledge Solutions matched with the Knowledge Demands. The Knowledge Supply is generated based on the Knowledge Element Repository, using the BLEU similarity matrix to retrieve Knowledge Elements with high similarity, and then clustering these Knowledge Elements into several knowledge schemes to extract the Knowledge Solutions. The organized Knowledge Elements and Knowledge Solutions are the presentation of each Knowledge Supply. Finally, this research crawls posts in the “Autohome Forum” and conducts an experiment by simulating the user’s actual knowledge search process. The experiment shows that the proposed method is an effective knowledge retrieval method, which can provide users with hierarchical and systematized knowledge. Full article
Show Figures

Figure 1

29 pages, 667 KiB  
Review
Leveraging Searchable Encryption through Homomorphic Encryption: A Comprehensive Analysis
by Ivone Amorim and Ivan Costa
Mathematics 2023, 11(13), 2948; https://doi.org/10.3390/math11132948 - 1 Jul 2023
Cited by 13 | Viewed by 5535
Abstract
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used. However, traditional encryption schemes limit the efficient search and [...] Read more.
The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used. However, traditional encryption schemes limit the efficient search and retrieval of encrypted data. To tackle this challenge, innovative approaches have emerged, such as the utilization of Homomorphic Encryption (HE) in Searchable Encryption (SE) schemes. This paper provides a comprehensive analysis of the advancements in HE-based privacy-preserving techniques, focusing on their application in SE. The main contributions of this work include the identification and classification of existing SE schemes that utilize HE, a comprehensive analysis of the types of HE used in SE, an examination of how HE shapes the search process structure and enables additional functionalities, and the identification of promising directions for future research in HE-based SE. The findings reveal the increasing usage of HE in SE schemes, particularly Partially Homomorphic Encryption. The popularity of this type of HE schemes, especially Paillier’s cryptosystem, can be attributed to its simplicity, proven security properties, and widespread availability in open-source libraries. The analysis also highlights the prevalence of index-based SE schemes using HE, the support for ranked search and multi-keyword queries, and the need for further exploration in functionalities such as verifiability and the ability to authorize and revoke users. Future research directions include exploring the usage of other encryption schemes alongside HE, addressing omissions in functionalities like fuzzy keyword search, and leveraging recent advancements in Fully Homomorphic Encryption schemes. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

18 pages, 2877 KiB  
Article
Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes
by Je-Kuan Lin, Wun-Ting Lin and Ja-Ling Wu
Cryptography 2023, 7(2), 28; https://doi.org/10.3390/cryptography7020028 - 15 May 2023
Cited by 7 | Viewed by 3366
Abstract
Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval [...] Read more.
Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval mechanisms for stored data have become critical problems. Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryption algorithms. However, most existing schemes only support single-keyword or provide no ranking searching results, which could be inflexible and inefficient in satisfying the real world’s actual needs. We propose a flexible multi-keyword ranked searchable attribute-based scheme using search trees to overcome the above-mentioned problems, allowing users to combine their fuzzy searching keywords with AND–OR logic gates. Moreover, our enhanced scheme not only improves its privacy protection but also goes a step further to apply a semantic search to boost the flexibility and the searching experience of users. With the proposed index-table method and the tree-based searching algorithm, we proved the efficiency and security of our schemes through a series of analyses and experiments. Full article
Show Figures

Figure 1

17 pages, 2241 KiB  
Article
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment
by Buzhen He and Tao Feng
Cryptography 2023, 7(2), 16; https://doi.org/10.3390/cryptography7020016 - 24 Mar 2023
Cited by 4 | Viewed by 3251
Abstract
While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension between [...] Read more.
While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension between data accessibility and data privacy. Due to the lack of integrity and correctness authentication in most searchable encryption techniques, malicious cloud servers may deliver false search results to users. Based on public key encryption with searching (PEKS), the study suggests a privacy-preserving method for verifiable fuzzy keyword searches based on the Ethernet blockchain in a cloud context to overcome the aforementioned security concerns. The search user can check the accuracy and integrity of the query document using the unalterability characteristics of the Ethernet blockchain system in this scheme to prevent the cloud server from giving incorrect query results. Furthermore, a fair transaction between the cloud server and the data user is achieved and can be tracked back to the malicious user using hash functions and Ethereum smart contracts, even if the user or the cloud is malicious. Finally, the security analysis shows that, under the random oracle model, our technique fulfils the adaptive selection keyword’s semantic security. The performance assessment demonstrates that the proposed scheme outperforms other related schemes in terms of computational efficiency. Full article
Show Figures

Graphical abstract

11 pages, 981 KiB  
Article
Fuzzy Keyword Searchable Encryption Scheme Based on Blockchain
by Yongbo Jiang, Juncheng Lu and Tao Feng
Information 2022, 13(11), 517; https://doi.org/10.3390/info13110517 - 28 Oct 2022
Cited by 3 | Viewed by 2388
Abstract
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of interest in fuzzy search. In addition, during the searchable [...] Read more.
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of interest in fuzzy search. In addition, during the searchable encryption, the cloud server may return invalid results to the data user to save computing costs or for other reasons. At the same time, the user may refuse to pay the service fee after receiving the correct result. To solve the above problems, this paper proposes a fuzzy keyword searchable encryption scheme based on blockchain, which uses edit distance to generate fuzzy keyword sets and generates a secure index with verification tags for each fuzzy keyword set to verify the authenticity of the returned results. The penalty mechanism is introduced through the blockchain to realize the fairness of service payment between users and cloud servers. Security analysis shows that the scheme achieves non-adaptive semantic security. Performance analysis and functional comparison show that the scheme is effective and can meet the requirements of searching applications in the cloud environment. Full article
Show Figures

Figure 1

15 pages, 2837 KiB  
Article
The Brain Research Hotspot Database (BRHD): A Panoramic Database of the Latest Hotspots in Brain Research
by Pin Chen, Xue Lin, Anna Liu and Jian Li
Brain Sci. 2022, 12(5), 638; https://doi.org/10.3390/brainsci12050638 - 12 May 2022
Cited by 1 | Viewed by 2672
Abstract
Brain science, an emerging, dynamic, multidisciplinary basic research field, is generating numerous valuable data. However, there are still several obstacles for the utilization of these data, such as data fragmentation, heterogeneity, availability, and annotation divergence. Thus, to overcome these obstacles and construct an [...] Read more.
Brain science, an emerging, dynamic, multidisciplinary basic research field, is generating numerous valuable data. However, there are still several obstacles for the utilization of these data, such as data fragmentation, heterogeneity, availability, and annotation divergence. Thus, to overcome these obstacles and construct an online community, we developed a panoramic database named Brain Research Hotspot Database (BRHD). As of 30 January 2022, the database had been integrated with standardized vocabularies from various resources, including 423,681 papers, 46,344 patents, 9585 transcriptomic datasets, 261 cell markers, as well as with information regarding brain initiatives that were officially launched and well-known scholars in brain research. Based on the keywords entered by users and the search options they set, data can be accessed and retrieved through exact and fuzzy search scenarios. In addition, for brain diseases, we developed three featured functions based on deep data mining: (1) a brain disease–genome network, which collects the associations between common brain diseases, genes, and mutations reported in the literature; (2) brain and gut microbiome associations, based on the literature related to this topic, with added annotations for reference; (3) 3D brain structure, containing a high-precision brain anatomy model with visual links to quickly connect to an organ-on-a-chip database. In short, the BRHD integrates data from a variety of brain science resources to provide a friendly user interface and freely accessible viewing and downloading environment. Furthermore, the original functions developed based on these data provide references and insights for brain research. Full article
Show Figures

Figure 1

25 pages, 2513 KiB  
Article
Harvesting Crowdsourcing Platforms’ Traffic in Favour of Air Forwarders’ Brand Name and Sustainability
by Damianos P. Sakas and Nikolaos Th. Giannakopoulos
Sustainability 2021, 13(15), 8222; https://doi.org/10.3390/su13158222 - 23 Jul 2021
Cited by 27 | Viewed by 4092
Abstract
In the modern digitalised era, the total number of businesses and organisations utilising crowdsourcing services has risen, leading to an increase of their website traffic. In this way, there is plenty of space for marketers and strategists to capitalise big data from both [...] Read more.
In the modern digitalised era, the total number of businesses and organisations utilising crowdsourcing services has risen, leading to an increase of their website traffic. In this way, there is plenty of space for marketers and strategists to capitalise big data from both their own and the crowdsourcer’s websites. This can lead to a comprehension of factors affecting their brand name, sustainability (gross profit) and consequently visitor influence. The first of the three staged contexts, based on web data, includes the retrieval of web data analytics and metrics from five air forwarding and five crowdsourcing websites in 210 observation days. At stage two, we deployed a diagnostic-exploratory model, through Fuzzy Cognitive Mapping (FCM), and in the last stage, an Agent-Based Model is deployed for data prediction and simulation. We concluded that crowdsourcing referral traffic increases air forwarders’ top 3 keywords volume, and decreases social traffic and total keywords volume, which then boosts their global web rank and gross profit. The exact opposite results occur with crowdsourcing search traffic. To sum up, the contribution of this paper is to offer realistic and well-informed insights to marketers about SEO and SEM strategies for brand name and profit enhancement, based on harvesting crowdsourcing platform traffic. Full article
(This article belongs to the Special Issue Crowd-Powered e-Services)
Show Figures

Figure 1

31 pages, 1558 KiB  
Article
A Trimming Design Method Based on Bio-Inspired Design for System Innovation
by Peng Zhang, Xindi Li, Zifeng Nie, Fei Yu and Wei Liu
Appl. Sci. 2021, 11(9), 4060; https://doi.org/10.3390/app11094060 - 29 Apr 2021
Cited by 21 | Viewed by 3276
Abstract
The application of design knowledge determines the innovativeness of a technical scheme obtained by trimming (a tool for problem analysis and solving in TRIZ). However, limitations in the knowledge, experience and expertise of designers constrain the range of design knowledge that they can [...] Read more.
The application of design knowledge determines the innovativeness of a technical scheme obtained by trimming (a tool for problem analysis and solving in TRIZ). However, limitations in the knowledge, experience and expertise of designers constrain the range of design knowledge that they can apply, thus reducing the effectiveness of trimming. In this paper, biological strategies are introduced to the trimming process to compensate for limitations imposed by the insufficient professional knowledge of designers, thereby improving design innovation. Therefore, this paper proposes a new design method that combines the trimming method and bio-inspired design (BID). First, a trimming analysis of the target system is carried out. Taking the missing functions of the trimmed system as a potential breakthrough point, a keyword search mode based on “V(verb)O(object)P(property) + the effect/features of the associated function” is used to search for biological prototypes in the biological knowledge base. Second, a fuzzy comprehensive evaluation method is used to analyze the biological prototypes from three dimensions, namely, compatibility, completeness and feasibility, and the best-matching biological prototype is selected. Finally, the biological solution is transformed into an engineering design scheme through a resource derivation process based on structure–function–attribute analogies. The proposed method can expand the range of design solutions by adding biological strategies as a new resource to solve trimming problems. The feasibility and effectiveness of the method are verified by redesigning a steel tape armoring machine. Full article
(This article belongs to the Special Issue Assembly System Design in the Industry 4.0)
Show Figures

Figure 1

24 pages, 2996 KiB  
Article
Discussing the Use of Complexity Theory in Engineering Management: Implications for Sustainability
by Gianpaolo Abatecola and Alberto Surace
Sustainability 2020, 12(24), 10629; https://doi.org/10.3390/su122410629 - 19 Dec 2020
Cited by 5 | Viewed by 4191
Abstract
What is the state-of-the-art literature regarding the adoption of the complexity theory (CT) in engineering management (EM)? What implications can be derived for future research and practices concerning sustainability issues? In this conceptual article, we critically discuss the current status of complexity research [...] Read more.
What is the state-of-the-art literature regarding the adoption of the complexity theory (CT) in engineering management (EM)? What implications can be derived for future research and practices concerning sustainability issues? In this conceptual article, we critically discuss the current status of complexity research in EM. In this regard, we use IEEE Transactions on Engineering Management, because it is currently considered the leading journal in EM, and is as a reliable, heuristic proxy. From this journal, we analyze 38 representative publications on the topic published since 2000, and extrapolated through a rigorous keyword-based article search. In particular, we show that: (1) the adoption of CT has been associated with a wide range of key themes in EM, such as new product development, supply chain, and project management. (2) The adoption of CT has been witnessed in an increasing amount of publications, with a focus on conceptual modeling based on fuzzy logics, stochastic, or agent-based modeling prevailing. (3) Many key features of CT seem to be quite clearly observable in our dataset, with modeling and optimizing decision making, under uncertainty, as the dominant theme. However, only a limited number of studies appear to formally adhere to CT, to explain the different EM issues investigated. Thus, we derive various implications for EM research (concerning the research in and practice on sustainability issues). Full article
Show Figures

Figure 1

18 pages, 4333 KiB  
Article
MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers
by Jingsha He, Jianan Wu, Nafei Zhu and Muhammad Salman Pathan
Future Internet 2018, 10(5), 38; https://doi.org/10.3390/fi10050038 - 1 May 2018
Cited by 2 | Viewed by 5468
Abstract
To enhance the efficiency of data searching, most data owners store their data files in different cloud servers in the form of cipher-text. Thus, efficient search using fuzzy keywords becomes a critical issue in such a cloud computing environment. This paper proposes a [...] Read more.
To enhance the efficiency of data searching, most data owners store their data files in different cloud servers in the form of cipher-text. Thus, efficient search using fuzzy keywords becomes a critical issue in such a cloud computing environment. This paper proposes a method that aims at improving the efficiency of cipher-text retrieval and lowering storage overhead for fuzzy keyword search. In contrast to traditional approaches, the proposed method can reduce the complexity of Min-Hash-based fuzzy keyword search by using Min-Hash fingerprints to avoid the need to construct the fuzzy keyword set. The method will utilize Jaccard similarity to rank the results of retrieval, thus reducing the amount of calculation for similarity and saving a lot of time and space overhead. The method will also take consideration of multiple user queries through re-encryption technology and update user permissions dynamically. Security analysis demonstrates that the method can provide better privacy preservation and experimental results show that efficiency of cipher-text using the proposed method can improve the retrieval time and lower storage overhead as well. Full article
Show Figures

Figure 1

Back to TopTop