Abstract
Cyber-networks are characterized by two distinct types of nodes—devices and users—and by voluminous interactions in real time. All computational intelligence approaches to the analysis of these networks must deal with complexities of these interactions and their high data rates. This paper describes a computationally feasible approach to querying large cyber-networks using word-based queries. The attribute memberships and connection strengths in these cyber-networks are described granularly using appropriate vocabularies of words, where the words themselves are modeled using interval type-2 (IT2) fuzzy membership functions (MF) on an appropriate scale. By employing precomputation and storage of these word representations and queries, automated monitoring functions in large cyber-networks can be performed in real time via simple arithmetic calculations. We provide an illustrative example using data from a real cyber-network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rickard, J.T., Yager, R.R.: Perceptual computing in social networks. In: Proceeding of International Fuzzy System Association World Congress/North American Fuzzy Information Processing Society Annual Meeting, Paper #9, Edmonton, Alberta, Canada, June 2013
Yager, R.R.: Intelligent social network analysis using granular computing. Int. J. Intell. Syst. 23(11), 1196–1219 (2008)
Yager, R.R.: Concept representation and database structures in fuzzy social relational networks. IEEE Trans. Syst. Man Cybern Part A Syst. Hum. 40(2), 413–419 (2010)
Zadeh, L.: Fuzzy logic = computing with words. IEEE Trans. Fuzzy Syst. 4(2), 103–111 (1996)
Mendel, J.M., Wu, D.: Perceptual Computing: Aiding People in Making Subjective Judgments, Piscataway. IEEE Press, NJ (2010)
Rickard, J.T., Aisbett, J., Yager R.R., Gibbon, G.: Fuzzy weighted power means in evaluation decisions. In: Proceeding World Symposium on Soft Computing, Paper #100, San Francisco, CA, May 2011
Rickard, J.T., Aisbett, J., Yager, R.R., Gibbon, G.: Linguistic weighted power means: comparison with the linguistic weighted average. In: Proceeding of FUZZ-IEEE 2011, 2011 World Congress on Computational Intelligence, pp. 2185–2192, Taipei, Taiwan, June 2011
Rickard, J.T., Aisbett, J.: New classes of threshold aggregation functions based upon the Tsallis q-exponential with applications to perceptual computing. IEEE Trans. Fuzzy Syst. 22(3), 672–684 (2014)
Aisbett, J., Rickard, J.T.: Centroids of type-1 and type-2 fuzzy sets when membership functions have spikes. IEEE Trans. Fuzzy Syst. 22(3), 685–692 (2014)
Dujmović, J.J.: Continuous preference logic for system evaluation. IEEE Trans. Fuzzy Syst. 15(6), 1082–1099 (2007)
Dujmović, J.J.: Partial absorption function. J. Univ. Belgrade, EE Dept., ser. Mathematics and Physics, 659, pp. 156–163 (1979)
Jaccard, P.: Nouvelles recherches sur la distribution florale. Bull de la Societe de Vaud des Sciences Naturelles 44, 223 (1908)
Rickard, J.T., Aisbett, J., Gibbon, G.: Fuzzy subsethood for fuzzy sets of Type 2 and generalized Type n. IEEE Trans. Fuzzy Syst. 17(1), 50–60 (2009)
Vlachos, I., Sergiadis, G.: Subsethood, entropy, and cardinality for interval-valued fuzzy sets—an algebraic derivation. Fuzzy Sets Syst. 158, 1384–1396 (2007)
Wu, D., Mendel, J.M., Coupland, S.: Enhanced interval approach for encoding words into interval type-2 fuzzy sets and its convergence analysis. IEEE Trans. Fuzzy Syst. 20(3), 499–513 (2012)
Acknowledgements
This material is based on research sponsored by the US Air Force Academy under agreement number FA7000-12-2-0020. The US Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright notation thereon.
The authors acknowledge the use of the USAF Academy Center for Cyberspace Research, including cadet teams to develop prototype software and simulation scenarios. Graph construction capability and scalability were explored and evaluated by Lieutenant Bryan Hall and Lieutenant Josiah Lane using simulated cyber-network records. Their work was extended to include the perception engine vocabulary attributes. The application of imprecise queries and graph similarity was evaluated by Lieutenant Elliot Unseth and Lieutenant Jon Beabout. The imprecise graph similarity research was extended with the perceptual computing IT2 fuzzy approach.
Disclaimer
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies and endorsements, either expressed or implied of the US Air Force Academy or the US Government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rickard, J.T., Ott, A.E. (2016). Querying Cyber-Networks Using Words. In: Zadeh, L., Abbasov, A., Yager, R., Shahbazova, S., Reformat, M. (eds) Recent Developments and New Direction in Soft-Computing Foundations and Applications. Studies in Fuzziness and Soft Computing, vol 342. Springer, Cham. https://doi.org/10.1007/978-3-319-32229-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-32229-2_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32227-8
Online ISBN: 978-3-319-32229-2
eBook Packages: EngineeringEngineering (R0)