1
|
Lai Q, Wan Z, Zhang H, Chen G. Design and Analysis of Multiscroll Memristive Hopfield Neural Network With Adjustable Memductance and Application to Image Encryption. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2023; 34:7824-7837. [PMID: 35143405 DOI: 10.1109/tnnls.2022.3146570] [Citation(s) in RCA: 18] [Impact Index Per Article: 9.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
Abstract
Memristor is an ideal electronic device used as an artificial nerve synapse due to its unique memory function. This article presents a design of a new Hopfield neural network (HNN) that can generate multiscroll attractors by utilizing a new memristor as a synapse in the HNN. Differing from the others, this memristor is constructed with hyperbolic tangent functions. Taking the memristor as a self-feedback synapse of a neuron in the HNN, the memristive HNN can yield multidouble-scroll attractors, and its parameters can be used to effectively control the number of double scrolls contained in an attractor. Interestingly, the generation of multidouble-scroll attractors is independent of the memductance function but depends only on the internal state equation. Thus, the memductance function can be adjusted to yield various complex dynamical behaviors. Moreover, amplitude control effects and quantitatively controllable multistability are revealed by numerical analysis. The accurate reproduction of some dynamical behaviors by a designed circuit verifies the correctness of the numerical analysis. Finally, based on the proposed memristive HNN, a novel image encryption scheme in the 3-D setting is designed and evaluated, demonstrating its good encryption performances.
Collapse
|
2
|
Boui A Boya BF, Danao AA, Kengne LK, Kengne J. Control and symmetry breaking aspects of a geomagnetic field inversion model. CHAOS (WOODBURY, N.Y.) 2023; 33:013139. [PMID: 36725646 DOI: 10.1063/5.0115772] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/27/2022] [Accepted: 12/23/2022] [Indexed: 06/18/2023]
Abstract
In this work, we consider the geomagnetic field inversion model proposed by Gissinger et al. [Europhys. Lett. 90(4), 49001 (2010)], where a quadratic term is added for symmetry control purposes. The resulting system is explored in both symmetric and asymmetric modes of operation. In the symmetric case, we report a bursting phenomenon and heterogeneous multistability of six and four different attractors. We show that the model owns an offset adjustment feature. In the asymmetric case, the model develops different phenomena, such as the coexistence of (four and three) asymmetric attractors, asymmetric (periodic and chaotic) bursting oscillation, and transient asymmetric bursting phenomenon. The effect of symmetry breaking is also manifested in the bubbles of bifurcation. It is shown that this system can leave from the multistable state to a monostable state by adjusting the coupling parameter of a linear controller. Moreover, microcontroller-based implementation of the system is considered to check the correctness of the numerical results.
Collapse
Affiliation(s)
- Bertrand Frederick Boui A Boya
- Research Unit of Automation and Applied Computer (UR-AIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
| | - Adile Adoum Danao
- Department of Industrial Engineering and Maintenance, Polytechnic University of Mongo, Mongo, Chad
| | - Léandre Kamdjeu Kengne
- Research Unit of Automation and Applied Computer (UR-AIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
| | - Jacques Kengne
- Research Unit of Automation and Applied Computer (UR-AIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
| |
Collapse
|
3
|
Boya BFBA, Kengne J, Djuidje Kenmoe G, Effa JY. Four-scroll attractor on the dynamics of a novel Hopfield neural network based on bi-neurons without bias current. Heliyon 2022; 8:e11046. [PMID: 36303901 PMCID: PMC9593194 DOI: 10.1016/j.heliyon.2022.e11046] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/08/2022] [Revised: 09/13/2022] [Accepted: 10/07/2022] [Indexed: 11/05/2022] Open
Abstract
The dynamics of a neural network under several factors (bias current and electromagnetic induction effect) are recently used to simulate activities of the brain under different excitation. In this paper, we introduce a novel Hopfield neural network (HNN) based on two neurons with a memristive synaptic weight connected between neuron one and two based of flux controlled memristor recently proposed by Hua M. et al., in 2022. Using analysis tools, we proved that this model can develop rich dynamical characteristics such as various number of equilibrium points when the parameters are varied, four-scroll attractors, transient chaos, multistability of more than three different attractors and intermittency chaos phenomenon are reported. Moreover, when increasing a synaptic weight, the model shows bursting oscillations phenomenon. To obtain the normal state of the brain, the control of multistability to a strange monostable state is carry out. Finally, microcontroller implementation of the model is considered to verify the numerical analysis.
Collapse
Affiliation(s)
- Bertrand Frederick Boui A Boya
- Research Unit of Automation and Applied Computer (UR-AIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
- Laboratory of Mechanics, Department of Physics, Faculty of Science, University of Yaoundé 1, Yaoundé, Cameroon
- Corresponding author at: Research Unit of Automation and Applied Computer (UR-AIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon.
| | - Jacques Kengne
- Research Unit of Automation and Applied Computer (UR-AIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
| | - Germaine Djuidje Kenmoe
- Laboratory of Mechanics, Department of Physics, Faculty of Science, University of Yaoundé 1, Yaoundé, Cameroon
| | - Joseph Yves Effa
- Department of Physics, University of Ngaoundere, P.O. Box 454, Ngaoundere, Cameroon
| |
Collapse
|
4
|
Xu C, Liu Z, Aouiti C, Li P, Yao L, Yan J. New exploration on bifurcation for fractional-order quaternion-valued neural networks involving leakage delays. Cogn Neurodyn 2022; 16:1233-1248. [PMID: 36237401 PMCID: PMC9508321 DOI: 10.1007/s11571-021-09763-1] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/04/2021] [Revised: 10/16/2021] [Accepted: 11/27/2021] [Indexed: 11/24/2022] Open
Abstract
During the past decades, many works on Hopf bifurcation of fractional-order neural networks are mainly concerned with real-valued and complex-valued cases. However, few publications involve the quaternion-valued neural networks which is a generalization of real-valued and complex-valued neural networks. In this present study, we explorate the Hopf bifurcation problem for fractional-order quaternion-valued neural networks involving leakage delays. Taking advantage of the Hamilton rule of quaternion algebra, we decompose the addressed fractional-order quaternion-valued delayed neural networks into the equivalent eight real valued networks. Then the delay-inspired bifurcation condition of the eight real valued networks are derived by making use of the stability criterion and bifurcation theory of fractional-order differential dynamical systems. The impact of leakage delay on the bifurcation behavior of the involved fractional-order quaternion-valued delayed neural networks has been revealed. Software simulations are implemented to support the effectiveness of the derived fruits of this study. The research supplements the work of Huang et al. (Neural Netw 117:67-93, 2019).
Collapse
Affiliation(s)
- Changjin Xu
- Guizhou Key Laboratory of Economics System Simulation, Guizhou University of Finance and Economics, Guiyang, 550004 People’s Republic of China
- Guizhou Key Laboratory of Big Data Statistical Analysis, Guiyang, 550025 People’s Republic of China
| | - Zixin Liu
- School of Mathematics and Statistics, Guizhou University of Finance and Economics, Guiyang, 550004 People’s Republic of China
| | - Chaouki Aouiti
- Faculty of Sciences of Bizerta, UR13ES47 Research Units of Mathematics and Applications, University of Carthage, Bizerta, 7021 Tunisia
| | - Peiluan Li
- School of Mathematics and Statistics, Henan University of Science and Technology, Luoyang, 471023 People’s Republic of China
| | - Lingyun Yao
- Library, Guizhou University of Finance and Economics, Guiyang, 550004 People’s Republic of China
| | - Jinling Yan
- School of Mathematics and Statistics, Henan University of Science and Technology, Luoyang, 471023 People’s Republic of China
| |
Collapse
|
5
|
Njitacke ZT, Koumetio BN, Ramakrishnan B, Leutcho GD, Fozin TF, Tsafack N, Rajagopal K, Kengne J. Hamiltonian energy and coexistence of hidden firing patterns from bidirectional coupling between two different neurons. Cogn Neurodyn 2022; 16:899-916. [PMID: 35847537 PMCID: PMC9279548 DOI: 10.1007/s11571-021-09747-1] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/27/2021] [Revised: 10/27/2021] [Accepted: 11/03/2021] [Indexed: 11/30/2022] Open
Abstract
In this paper, bidirectional-coupled neurons through an asymmetric electrical synapse are investigated. These coupled neurons involve 2D Hindmarsh-Rose (HR) and 2D FitzHugh-Nagumo (FN) neurons. The equilibria of the coupled neurons model are investigated, and their stabilities have revealed that, for some values of the electrical synaptic weight, the model under consideration can display either self-excited or hidden firing patterns. In addition, the hidden coexistence of chaotic bursting with periodic spiking, chaotic spiking with period spiking, chaotic bursting with a resting pattern, and the coexistence of chaotic spiking with a resting pattern are also found for some sets of electrical synaptic coupling. For all the investigated phenomena, the Hamiltonian energy of the model is computed. It enables the estimation of the amount of energy released during the transition between the various electrical activities. Pspice simulations are carried out based on the analog circuit of the coupled neurons to support our numerical results. Finally, an STM32F407ZE microcontroller development board is exploited for the digital implementation of the proposed coupled neurons model.
Collapse
Affiliation(s)
- Zeric Tabekoueng Njitacke
- Department of Electrical and Electronic Engineering, College of Technology (COT), University of Buea, P.O. Box 63, Buea, Cameroon
- Research Unit of Automation and Applied Computer (URAIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
- Department of Automation, Biomechanics and Mechatronics, Lodz University of Technology, Lodz, Poland
| | - Bernard Nzoko Koumetio
- Research Unit of Automation and Applied Computer (URAIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
- Research Unit of Condensed Matter, Department of Physics, Faculty of Sciences, Electronics and Signal Processing (UR-MACETS), University of Dschang, P.O. Box 67, Dschang, Cameroon
| | | | - Gervais Dolvis Leutcho
- Research Unit of Condensed Matter, Department of Physics, Faculty of Sciences, Electronics and Signal Processing (UR-MACETS), University of Dschang, P.O. Box 67, Dschang, Cameroon
- Department of Electrical Engineering, École de Technologie Supérieure (ÉTS), Montréal, Québec H3C1K3 Canada
| | - Theophile Fonzin Fozin
- Department of Electrical and Electronic Engineering, Faculty of Engineering and Technology (FET), University of Buea, P.O. Box 63, Buea, Cameroon
| | - Nestor Tsafack
- Research Unit of Automation and Applied Computer (URAIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
- Research Unit of Condensed Matter, Department of Physics, Faculty of Sciences, Electronics and Signal Processing (UR-MACETS), University of Dschang, P.O. Box 67, Dschang, Cameroon
| | - Kartikeyan Rajagopal
- Center for Nonlinear Systems, Chennai Institute of Technology, Chennai, Tamil Nadu India
| | - Jacques Kengne
- Research Unit of Automation and Applied Computer (URAIA), Electrical Engineering Department of IUT-FV, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
| |
Collapse
|
6
|
Badr A. Instant-Hybrid Neural-Cryptography (IHNC) based on fast machine learning. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07539-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Abstract
AbstractNowadays, cryptographic systems’ designers are facing significant challenges in their designs. They have to constantly search for new ideas of fast unbreakable algorithms with a very powerful key generator. In this paper, we propose a novel hybrid neural-cryptography methodology. It depends on new rule of very fast Backpropagation (BP) instant machine learning (ML). This proposed Hybrid Cryptography system is constructed from Encryptor and Decryptor based on the asymmetric Autoencoder type. The Encryptor encrypts and compresses a set of data to be instant code (i-code) using public key. While the Decryptor recovers this i-code (ciphered-data) based on two keys together. The first is the private key and the other is called instant-key (i-key). This i-key is generated from 3 factors as well (the original data itself, the generated i-code and the private key). The i-key is changing periodically with every transformation of plain data set, so it is powerful unpredictable key against the brute force.
Collapse
|
7
|
Design and Implementation of a Multidimensional Visualization Reconstruction System for Old Urban Spaces Based on Neural Networks. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:4253128. [PMID: 35694601 PMCID: PMC9184188 DOI: 10.1155/2022/4253128] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/15/2022] [Revised: 05/11/2022] [Accepted: 05/18/2022] [Indexed: 11/17/2022]
Abstract
This article presents an in-depth study and analysis of the construction of a convolutional neural network model and multidimensional visualization system of old urban space and proposes the design of a multifaceted visualization reconstruction system of old urban space based on a neural network. It also quantitatively analyzes the essential spatial attribute characteristics of urban shadow areas as nodes of the overall urban dynamic network in three dimensions—spatial connection strength, spatial connection distance, and spatial connection direction—summarizes the characteristics of urban old spatial structure from the perspective of a dynamic network, and then proposes the model of urban old spatial design from the perspective of an active network. The shallow depth of the network structure is used to reduce the parameters in the learning process of reconfigurable convolutional neural networks using data sets so that the model learns more general features. For the situation where the number of data sets is small, data augmentation is used to expand the size of the data sets and improve the recognition accuracy of the reconfigurable convolutional neural network. A real-time update method of multifaceted data visualization for big data scenarios is proposed and implemented to reduce the network load and network latency caused by charts of multidimensional data changes, reduce the data error rate, and maintain the system stability in the old urban space concurrency scenario.
Collapse
|
8
|
Abstract
Considering a nonlinear dynamic oscillator, a high Lyapunov exponent indicates a high degree of randomness useful in many applications, including cryptography. Most existing oscillators yield very low Lyapunov exponents. The proposed work presents a general strategy to derive an n-D hyperchaotic map with a high Lyapunov exponent. A 2D case study was analyzed using some well-known nonlinear dynamic metrics including phase portraits, bifurcation diagrams, finite time Lyapunov exponents, and dimension. These metrics indicated that the state of the novel map was more scattered in the phase plane than in the case of some traditional maps. Consequently, the novel map could produce output sequences with a high degree of randomness. Another important observation was that the first and second Lyapunov exponents of the proposed 2D map were both positive for the whole parameter space. Consequently, the attractors of the map could be classified as hyperchaotic attractors. Finally, these hyperchaotic sequences were exploited for image encryption/decryption. Various validation metrics were exploited to illustrate the security of the presented methodology against cryptanalysts. Comparative analysis indicated the superiority of the proposed encryption/decryption protocol over some recent state-of-the-art methods.
Collapse
|
9
|
Jan A, Parah SA, Malik BA. IEFHAC: Image encryption framework based on hessenberg transform and chaotic theory for smart health. MULTIMEDIA TOOLS AND APPLICATIONS 2022; 81:18829-18853. [PMID: 35282407 PMCID: PMC8904209 DOI: 10.1007/s11042-022-12653-1] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/17/2021] [Revised: 03/21/2021] [Accepted: 02/09/2022] [Indexed: 05/10/2023]
Abstract
Smart cities aim to improve the quality of life by utilizing technological advancements. One of the main areas of innovation includes the design, implementation, and management of data-intensive medical systems also known as big-data Smart Healthcare systems. Smart health systems need to be supported by highly efficient and resilient security frameworks. One of the important aspects that smart health systems need to provide, is timely access to high-resolution medical images, that form about 80% of the medical data. These images contain sensitive information about the patient and as such need to be secured completely. To prevent unauthorized access to medical images, the process of image encryption has become an imperative task for researchers all over the world. Chaos-based encryption has paved the way for the protection of sensitive data from being altered, modified, or hacked. In this paper, we present an Image Encryption Framework based on Hessenberg transform and Chaotic encryption (IEFHAC), for improving security and reducing computational time while encrypting patient data. IEFHAC uses two 1D-chaotic maps: Logistic map and Sine map for the confusion of data, while diffusion has been achieved by applying the Hessenberg household transform. The Sin and Logistic maps are used to regeneratively affect each other's output, as such dynamically changing the key parameters. The experimental analysis demonstrates that IEFHAC shows better results like NPCR ranging from 99.66 to 100%, UACI of 37.39%, lesser computational time of 0.36 s, and is more robust to statistical attacks.
Collapse
Affiliation(s)
- Aiman Jan
- Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India
| | - Shabir A. Parah
- Department of Electronics and Instrumentation Technology, University of Kashmir, Srinagar, India
| | - Bilal A. Malik
- Department of Electronics and Communication Engineering, Institute of Technology, University of Kashmir Zakoora, Srinagar, India
| |
Collapse
|
10
|
Double layer security using crypto-stego techniques: a comprehensive review. HEALTH AND TECHNOLOGY 2021; 12:9-31. [PMID: 34660167 PMCID: PMC8512592 DOI: 10.1007/s12553-021-00602-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/03/2021] [Accepted: 09/20/2021] [Indexed: 11/29/2022]
Abstract
Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems.
Collapse
|
11
|
Bu M. Performance Evaluation of Enterprise Supply Chain Management Based on the Discrete Hopfield Neural Network. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2021; 2021:3250700. [PMID: 34504521 PMCID: PMC8423561 DOI: 10.1155/2021/3250700] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 08/16/2021] [Accepted: 08/17/2021] [Indexed: 12/03/2022]
Abstract
In order to make up for the shortcomings of current performance evaluation methods, this paper proposes a new method of enterprise performance evaluation, discusses the construction principle of the evaluation index, and proposes a method of enterprise supply chain overall performance evaluation based on the discrete Hopfield neural network (DHNN) algorithm. Enterprise supply chain (SC) is an important way for enterprises to conduct business with other strategic partners in the market, and the improvement of SC performance is an important way to improve the core competitiveness of enterprises, so it is of great value to study the performance evaluation and index design of the enterprise SC. This method calculates the level value of the overall performance of the SC. This level value is a value between 0 and 1. The higher the value, the higher the overall performance level of the SC. Therefore, when evaluating the overall performance of the SC, appropriate index weights must be selected according to the characteristics of the industry, which helps to objectively evaluate the overall performance of the SC.
Collapse
Affiliation(s)
- Miaoling Bu
- School of Business, Shanxi Technology and Business College, Taiyuan, Shanxi 030032, China
| |
Collapse
|
12
|
Multistability and circuit implementation of tabu learning two-neuron model: application to secure biomedical images in IoMT. Neural Comput Appl 2021; 33:14945-14973. [PMID: 34149189 PMCID: PMC8199851 DOI: 10.1007/s00521-021-06130-3] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/01/2020] [Accepted: 05/15/2021] [Indexed: 02/08/2023]
Abstract
In this paper, the dynamics of a non-autonomous tabu learning two-neuron model is investigated. The model is obtained by building a tabu learning two-neuron (TLTN) model with a composite hyperbolic tangent function consisting of three hyperbolic tangent functions with different offsets. The possibility to adjust the compound activation function is exploited to report the sensitivity of non-trivial equilibrium points with respect to the parameters. Analysis tools like bifurcation diagram, Lyapunov exponents, phase portraits, and basin of attraction are used to explore various windows in which the neuron model under the consideration displays the uncovered phenomenon of the coexistence of up to six disconnected stable states for the same set of system parameters in a TLTN. In addition to the multistability, nonlinear phenomena such as period-doubling bifurcation, hysteretic dynamics, and parallel bifurcation branches are found when the control parameter is tuned. The analog circuit is built in PSPICE environment, and simulations are performed to validate the obtained results as well as the correctness of the numerical methods. Finally, an encryption/decryption algorithm is designed based on a modified Julia set and confusion-diffusion operations with the sequences of the proposed TLTN model. The security performances of the built cryptosystem are analyzed in terms of computational time (CT = 1.82), encryption throughput (ET = 151.82 MBps), number of cycles (NC = 15.80), NPCR = 99.6256, UACI = 33.6512, χ 2-values = 243.7786, global entropy = 7.9992, and local entropy = 7.9083. Note that the presented values are the optimal results. These results demonstrate that the algorithm is highly secured compared to some fastest neuron chaos-based cryptosystems and is suitable for a sensitive field like IoMT security.
Collapse
|
13
|
Mohd Jamaludin SZ, Mohd Kasihmuddin MS, Md Ismail AI, Mansor MA, Md Basir MF. Energy Based Logic Mining Analysis with Hopfield Neural Network for Recruitment Evaluation. ENTROPY 2020; 23:e23010040. [PMID: 33396577 PMCID: PMC7824277 DOI: 10.3390/e23010040] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/20/2020] [Revised: 11/19/2020] [Accepted: 11/19/2020] [Indexed: 01/27/2023]
Abstract
An effective recruitment evaluation plays an important role in the success of companies, industries and institutions. In order to obtain insight on the relationship between factors contributing to systematic recruitment, the artificial neural network and logic mining approach can be adopted as a data extraction model. In this work, an energy based k satisfiability reverse analysis incorporating a Hopfield neural network is proposed to extract the relationship between the factors in an electronic (E) recruitment data set. The attributes of E recruitment data set are represented in the form of k satisfiability logical representation. We proposed the logical representation to 2-satisfiability and 3-satisfiability representation, which are regarded as a systematic logical representation. The E recruitment data set is obtained from an insurance agency in Malaysia, with the aim of extracting the relationship of dominant attributes that contribute to positive recruitment among the potential candidates. Thus, our approach is evaluated according to correctness, robustness and accuracy of the induced logic obtained, corresponding to the E recruitment data. According to the experimental simulations with different number of neurons, the findings indicated the effectiveness and robustness of energy based k satisfiability reverse analysis with Hopfield neural network in extracting the dominant attributes toward positive recruitment in the insurance agency in Malaysia.
Collapse
Affiliation(s)
- Siti Zulaikha Mohd Jamaludin
- School of Mathematical Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia; (S.Z.M.J.); (M.S.M.K.); (A.I.M.I.)
| | | | - Ahmad Izani Md Ismail
- School of Mathematical Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia; (S.Z.M.J.); (M.S.M.K.); (A.I.M.I.)
| | - Mohd. Asyraf Mansor
- School of Distance Education, Universiti Sains Malaysia, Penang 11800, Malaysia
- Correspondence: ; Tel.: +60-4-653-3935
| | - Md Faisal Md Basir
- Department of Mathematical Sciences, Faculty of Science, Universiti Teknologi Malaysia, Bahru, Johor 81310, Malaysia;
| |
Collapse
|