Skip to main content
Top

2020 | Book

Transactions on Computational Collective Intelligence XXXV

Editors: Ngoc Thanh Nguyen, Ryszard Kowalczyk, Jacek Mercik, Anna Motylska-Kuźma

Publisher: Springer Berlin Heidelberg

Book Series : Lecture Notes in Computer Science

insite
SEARCH

About this book

These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning. This thirty-fifth issue contains 10 selected papers which present new findings and innovative methodologies as well as discuss issues and challenges in the field of collective intelligence from big data and networking paradigms while addressing security, privacy, reliability and optimality to achieve QoS to the benefit of final users.

Table of Contents

Frontmatter
More Security or More Freedom? A Comparative Analysis of the Equilibrium in European Democratic Regimes
Abstract
In this article we analyze the relationship between security and freedom, accounting the choices that governments made and the threats that they recently had to face to maintain these two essential facets of democracy. We test, using a broad set of data and empirical tests if, within European democratic political regimes, security and freedom tend to be inversely related. Furthermore, we study if it is possible to reach at the same time a high level for both parameters. To test our hypotheses, we measured the variation in the values of the two variables over very large data sets in Germany, United Kingdom, Italy, France, Spain and Poland, the six largest countries in Europe by population, which are in different stages of democratic consolidation. The start year for our research is 1992 and the end year is 2013.
Chiara De Micheli, Vito Fragnelli
Trials of Characterizations of Anti-manipulation Method
Abstract
This paper studies the anti-manipulation voting method introduced in [8]. We show that the method does not satisfy the consistency condition. The consistency condition characterizes scoring functions. Thus, the method is not a scoring function. Also, the method is not any from a family of not scoring functions comprising Copeland method, instant-runoff voting, majority judgment, minimax, ranked pairs, Schulze method. The paper also shows that the choice of a metric, used by the anti-manipulation method, may imply the winner of the voting.
Michał Ramsza, Honorata Sosnowska
Pairwise Voting Rules in Restricted Domains: The Disappearance and Persistence of Some Monotonicity Paradoxes
Abstract
The property of participation is satisfied by a voting rule if under no circumstances it is to the benefit of a voter to abstain rather than vote according to his/her preferences. By Moulin’s result of 1988 all voting rules that always elect a Condorcet winner when one exists fail on the property of participation [16]. Focusing on preference profiles that are restricted to those having a Condorcet winner we ask whether Moulin’s result holds under these preference profiles. It turns out that while some types of monotonicity paradoxes vanish in the Condorcet domains, others persist.
Hannu Nurmi
Group Decision Making Based on Constructing a Short List
Abstract
This article considers several aspects of a multi-person household making an important consumer decision, e.g. buying a new flat. In such situations, normally several members of the household have input in the decision making process. Also, when there are a large number of offers, search can be facilitated via the use of the Internet. Basic information about offers, e.g. price, location, number of rooms and size, can be found on the Internet at very little cost. However, in order to make a final decision, members of the household should physically view a number of offers. The costs involved at this stage of the search process are much higher. In such scenarios, search based on the short list heuristic are efficient. Search via the Internet is used to find a relatively small number of promising offers from a large number of propositions. These promising offers are then more closely inspected, before a final decision is made. Results from simulations indicate that group decision procedures based on each decision maker ranking offers and the short list heuristic can be highly effective and robust.
David M. Ramsey
A Note on Equal Treatment and Symmetry of Values
Abstract
We investigate under what conditions equal treatment property and symmetry of a value for cooperative games are equivalent. For additive values, null player property or efficiency is sufficient for the equivalence. When additivity is replaced by fairness, both equivalences cease to be true. But the marginal contributions condition ensures the equivalence without any additional assumptions.
Marcin Malawski
Decision-Driven Model for Building IoT Architecture in Environmental Engineering
Abstract
The subject of the article is the presentation of building the model of the Internet of Things (IoT) architecture in environmental engineering. The starting point is the existing four-stage IoT architecture models. The article suggests adding the fifth stage - managing the IoT system construction process, including the creation of three additional layers. The approach proposed in this article was verified in the construction of the air quality assessment system in Gdańsk in which the system architecture integrates the management stage. The developed model is the basis for the ontological model of IoT architecture developed by the authors and presented in this article, easy to implement in the construction of system architectures in environmental engineering.
Cezary Orłowski, Adam Czarnecki, Tomasz Sitek, Artur Ziółkowski
The Equity Crowdfunding and Family Firms – A Fuzzy Linguistic Approach
Abstract
The purpose of the work is to examine how the equity crowdfunding meets the needs of family firms. For many reasons, the probabilistic approach can be considered inappropriate and too simplistic when explaining the choice of financing source, especially in family businesses which are very heterogeneous. Based on the results of previous research and using the fuzzy linguistic approach, there were assessed the factors influencing the financial decisions and compared the equity crowdfunding to the traditional IPO/issuing shares. The main feature shows that crowdfunding fulfils well the core need of family businesses and using their basic characteristics it minimalizes the weaknesses of social funding.
Anna Motylska-Kuźma
Some Propositions of Approaches for Measuring Indirect Control Power of Firms and Mutual Connections in Corporate Shareholding Structures
Abstract
This paper discusses some game-theoretical methods that use power indices for measuring the indirect control power of firms and mutual connections in complex corporate shareholding networks. Only a few of the methods considered in the literature so far measure the control power of all firms involved in shareholding networks; meanwhile, none of them regard measuring the importance of linkages. The intention of this article is first to propose a modification of the Mercik-Łobos and Mercik-Stach methods using the Banzhaf index to measure the direct and indirect control of investors and stock companies. Second, having already estimated the control power of nodes (firms) in a network, we consider the relationship of this power to the power of the linkages that connect the companies in directed networks. Then, we present our own idea of how such link’s power can be measured. We regard to the power of the link in relation to the firms as well as (more significantly) in relation to the entire corporate network.
Izabella Stach, Jacek Mercik, Cesarino Bertini
Some Strategic Decision Problems in Networks
Abstract
The following analysis demonstrates that network efficiency is a very delicate matter. Neither the restriction to suitable core-subnets, nor intelligent enlargements guarantee efficient results in any case. For instance, the numerical example in Myerson (1977) contains a prisoners’ dilemma situation for some agents in the network. Of course, the outcome is inefficient from the perspective of these players – but not for the unrestricted network. Breass’ paradox shows that the enlargement of a network can lead to an inefficient outcome in the Nash equilibrium even if all players are taken into consideration. Restricting the network can create a Pareto efficient outcome. A third model discusses the strategic problem of a cyber network attack in the form of an inspection game. From the defender’s point of view, the question arises which nodes of the network are essential attack targets and thus need special security attention. In principle two types of nodes are critical: important ones and unimportant ones. Important nodes, as they connect to many other essential nodes and are therefore suitable multipliers for network malware and information capture, and unimportant nodes, from the attacker’s point of view, which are, in general, not in the focus of security attention, such that infiltration via them may be undetected for a long time.
Manfred J. Holler, Florian Rupp
An IoT Virtual eLearning Space
Abstract
This paper presents the Virtual eLearning Space implemented as an Internet of Things ecosystem. The components of the space inhabit three layers – a sensing layer, an operative and analytical layer, and a cognitive layer, which are described in more detail. One of the advantages of the space is that integrating the virtual world with the physical world of the university campus provides effective support to disabled students. This new opportunity is demonstrated by an example scenario. At the same time, VeLS is enhanced to be a reference architecture that can be adapted for new IoT applications. In the reference architecture, virtualization of “things” is supported by three formal tools – AmbiNet, TNet, and ENet. Future directions are also briefly discussed.
Emil Doychev, Asya Stoyanova-Doycheva, Stanimir Stoyanov, Todorka Glushkova, Vanya Ivanova
Backmatter
Metadata
Title
Transactions on Computational Collective Intelligence XXXV
Editors
Ngoc Thanh Nguyen
Ryszard Kowalczyk
Jacek Mercik
Anna Motylska-Kuźma
Copyright Year
2020
Publisher
Springer Berlin Heidelberg
Electronic ISBN
978-3-662-62245-2
Print ISBN
978-3-662-62244-5
DOI
https://doi.org/10.1007/978-3-662-62245-2

Premium Partner