Evaluation of the Digital Marketing Technologies Using the Logarithm Methodology of Additive Weights in Fuzzy Environments DOI

Sourour Aouadni,

Ismahene Aouadni

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 32

Published: Oct. 25, 2024

Customers' buying habits and the marketing tactics businesses employ, including digital marketing, have changed because of new way living migration many customers into virtual world. In this study, authors are interested in evaluating technologies (DMT) using fuzzy logarithm methodology additive weights (FLMAW). This study's primary contribution is LMAW model that it suggests for planners decision-makers to use when choosing DMT. Additionally, a real case Saudi food company conducted demonstrate viability suggested strategy. The FLMAW outcomes were contrasted with those FTOPSIS FCOPRAS techniques illustrate effectiveness which had been proven. sensitivity method was compared second stage rank reversal problem. Lastly, approach yields reliable results.

Language: Английский

Research on the evaluation of China’s Supply Chain Finance policy based on text mining DOI Creative Commons

M. Li,

Yin Dong

PLoS ONE, Journal Year: 2025, Volume and Issue: 20(3), P. e0317743 - e0317743

Published: March 10, 2025

Supply Chain Finance (SCF) aims to manage the capital flow, logistics and information flow of small medium-sized enterprises (SMEs) in upstream downstream supply chain while optimizing risk control. Like other types financial services, development SCF is highly influenced by policy factors; however, related research remains relatively limited. This study explore current state policymaking China provide scientific recommendations for from a perspective. First, using BERTopic model, 3,439 SCF-related academic papers 181 central-level texts CNKI database were analyzed thematic clustering. Then, comprehensively considering distribution operational characteristics SCF, Policy Modeling Consistency (PMC) Index model was constructed evaluate texts. The findings reveal several issues China’s policymaking: limited focus, fluctuating levels formulation, significant homogenization content. proposes optimization policies, including expanding scope fostering synergy among different diversifying use tools, broadening range target groups addressed policies.

Language: Английский

Citations

0

СТРУКТУРИЗАЦІЯ СВІТОВОГО НАУКОВОГО ДОРОБКУ ЩОДО РОЛІ ТА МІСЦЯ КІБЕРБЕЗПЕКИ У СИСТЕМІ ЗАБЕЗПЕЧЕННЯ ЕКОНОМІЧНОЇ БЕЗПЕКИ ДЕРЖАВИ DOI
V. Koibichuk, Victoria Bozhenko

Трансформаційна економіка, Journal Year: 2025, Volume and Issue: 1 (10), P. 42 - 50

Published: Feb. 28, 2025

Дослідження спрямоване на структуризацію світового наукового доробку та системний огляд ролі місця кібербезпеки у системі забезпечення економічної безпеки держави. Для цього застосовано комплексний бібліометричний наукометричний аналіз підґрунті масиву публікацій, отриманих за відповідним пошуковим запитом базі даних Scopus загальним обсягом 1077, проіндексованих період з 2004 року по вересень 2024 р. Поєднання сучасних інструментів бібліометричного аналізу (VOSviewer, SciVal), мови програмування R, програмного R Studio, пакетів Shiny, Bibliometrix, igraph їх відповідних бібліотек і функцій дозволило ретельно дослідили отриманий набір публікацій науковців світу, щоб виявити нові тенденції, ключові теми прогалини в знаннях означеній темі дослідження. Отже, першому етапі згенеровано масив що індексуються базою експортовано форматах csv BibTex для подальшого аналізу. На другому дослідження сформовано 8 тематичних кластерів програмному забезпеченні VOSviewer визначено хронологічну послідовність напрямків досліджень світу щодо тематики Третім етапом наукові галузі держави, де вчені, дослідники, аналітики висвітлюють свої напрацювання. Такими галузями є інформатика, інженерія забезпечення, комп’ютерні науки соціальні повідкові науки. четвертому побудовано ряд бібліометричних метрик допомогою igraph, а саме: деревоподібну карту, відображає частоти використання ключових слів авторів; карту мережі співпраці дослідників означеною темою; алювіальну діаграму, еволюцію держави; ступінь розвитку її значущість.

Citations

0

Adaptive Management of Multi-Scenario Projects in Cybersecurity: Models and Algorithms for Decision-Making DOI Creative Commons
В С Тынченко,

Alexander Lomazov,

Vadim Lomazov

et al.

Big Data and Cognitive Computing, Journal Year: 2024, Volume and Issue: 8(11), P. 150 - 150

Published: Nov. 4, 2024

In recent years, cybersecurity management has increasingly required advanced methodologies capable of handling complex, evolving threat landscapes. Scenario network-based approaches have emerged as effective strategies for managing uncertainty and adaptability in projects. This article introduces a scenario approach projects, utilizing fuzzy linguistic models Takagi–Sugeno–Kanga neural network. Drawing upon L. Zadeh’s theory variables, the methodology integrates expert analysis, continuous genetic algorithm to predict membership function parameters. Fuzzy production rules are employed decision-making, while Mamdani inference enhances interpretability. enables multi-scenario planning across multi-stage Preliminary results from research prototype an intelligent system—designed analyze project stages adaptively construct trajectories—suggest proposed is effective. computational experiments, use procedures resulted over 25% reduction errors compared traditional methods, particularly adjusting scenarios pessimistic baseline projections. While promising, this requires further testing diverse contexts. Future studies will aim refine adaptation optimize system response high-risk environments.

Language: Английский

Citations

1

Survey of Transformer-Based Malicious Software Detection Systems DOI Open Access
M. M. Al-Shomrani, Aiiad Albeshri, Badraddin Alturki

et al.

Electronics, Journal Year: 2024, Volume and Issue: 13(23), P. 4677 - 4677

Published: Nov. 27, 2024

In the recent past, level of cyber threats has changed drastically, leading to current transformation cybersecurity landscape. For example, emerging like Zero-day and polymorphic malware cannot be detected by conventional detection methods heuristic signature-based methods, which have proven useful in identification malware. view this shift paradigm, study proposes discuss utilization transformer models improve effectiveness accuracy efficiency detecting malicious software. regard, adopts application transformers identifying different forms software: ransomware, spyware, trojans. Transformers are endowed with ability handle sequential data capture intricate patterns. By employing deep learning techniques conducting thorough contextual analysis, these enhance process subtle indications compromise, traditional may overlook. This research also explains challenges limitations related transformer-based real-world settings, include computing requirements large-scale labeled datasets’ requirements. end, article suggests potential future avenues order integrate into systems.

Language: Английский

Citations

1

Evaluation of the Digital Marketing Technologies Using the Logarithm Methodology of Additive Weights in Fuzzy Environments DOI

Sourour Aouadni,

Ismahene Aouadni

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 32

Published: Oct. 25, 2024

Customers' buying habits and the marketing tactics businesses employ, including digital marketing, have changed because of new way living migration many customers into virtual world. In this study, authors are interested in evaluating technologies (DMT) using fuzzy logarithm methodology additive weights (FLMAW). This study's primary contribution is LMAW model that it suggests for planners decision-makers to use when choosing DMT. Additionally, a real case Saudi food company conducted demonstrate viability suggested strategy. The FLMAW outcomes were contrasted with those FTOPSIS FCOPRAS techniques illustrate effectiveness which had been proven. sensitivity method was compared second stage rank reversal problem. Lastly, approach yields reliable results.

Language: Английский

Citations

0