Javascript must be enabled to continue!
An Adaptive Designer Network Model and Its Robustness Research
View through CrossRef
The designer network is the carrier for designers to carry out product design tasks, and the study of its evolution helps to accurately identify the designer team. The uncertainty of whether the designer chooses to keep in touch with other members of the network, its nonlinearity on the overall performance of the network and the external interference of the network, etc., increase the complexity of the designer network, which is not conducive to the development of product design tasks. Therefore, it is very interesting and important to study the co-evolution mechanism of the designer’s network structure and the designer’s opinion. This paper analyzes the Deffuant opinion dynamics model, considers the asymmetry of nodes in the network caused by the designer’s unequal relationship (the number of node links is different), and the difference in the degree of acceptance of other people’s opinions by different individuals, and improves the Deffuant model. Then combining the improved Deffuant model with the BA (Barabasi–Albert) model, a DBA (Deffuant and BA Adaptive) model was proposed that integrates opinion update, broken edge and reconnection, and opinion changes. On this basis, this paper designs a virtual network through the crowdsourcing of a certain product. The adjacency matrix of this network is symmetric, and corresponding comparative experiments are carried out on this network. The analysis of test results shows that under six different deliberate attacks, the DBA model is more robust than the BA model. In addition, the average shortest path of the DBA network will vary with the parameters. The proposed integrated DBA model has important guiding significance for building a robust designer network.
Title: An Adaptive Designer Network Model and Its Robustness Research
Description:
The designer network is the carrier for designers to carry out product design tasks, and the study of its evolution helps to accurately identify the designer team.
The uncertainty of whether the designer chooses to keep in touch with other members of the network, its nonlinearity on the overall performance of the network and the external interference of the network, etc.
, increase the complexity of the designer network, which is not conducive to the development of product design tasks.
Therefore, it is very interesting and important to study the co-evolution mechanism of the designer’s network structure and the designer’s opinion.
This paper analyzes the Deffuant opinion dynamics model, considers the asymmetry of nodes in the network caused by the designer’s unequal relationship (the number of node links is different), and the difference in the degree of acceptance of other people’s opinions by different individuals, and improves the Deffuant model.
Then combining the improved Deffuant model with the BA (Barabasi–Albert) model, a DBA (Deffuant and BA Adaptive) model was proposed that integrates opinion update, broken edge and reconnection, and opinion changes.
On this basis, this paper designs a virtual network through the crowdsourcing of a certain product.
The adjacency matrix of this network is symmetric, and corresponding comparative experiments are carried out on this network.
The analysis of test results shows that under six different deliberate attacks, the DBA model is more robust than the BA model.
In addition, the average shortest path of the DBA network will vary with the parameters.
The proposed integrated DBA model has important guiding significance for building a robust designer network.
Related Results
Optimizing efficiency‐robustness trade‐offs in supply chain design under uncertainty due to disruptions
Optimizing efficiency‐robustness trade‐offs in supply chain design under uncertainty due to disruptions
PurposeSupply chain network design is an important strategic decision that firms make considering both the short‐ and long‐term consequences of the network's performance. The typic...
Establishment and Application of the Multi-Peak Forecasting Model
Establishment and Application of the Multi-Peak Forecasting Model
Abstract
After the development of the oil field, it is an important task to predict the production and the recoverable reserve opportunely by the production data....
Correlates of adaptive behavior profiles in a large cohort of children with autism: The autism speaks Autism Treatment Network registry data
Correlates of adaptive behavior profiles in a large cohort of children with autism: The autism speaks Autism Treatment Network registry data
Children with autism spectrum disorder have deficits in adaptive functioning. This study examines the adaptive behavior, its association with cognitive ability, gender, age, and sy...
The synergistic effect of ego-network stability and whole network position: a perspective of transnational coopetition network
The synergistic effect of ego-network stability and whole network position: a perspective of transnational coopetition network
PurposeThe authors selected global automobile manufacturing firms whose sales ranked within 100 in the five years from 2014 to 2018 in the Factiva database to examine how the chara...
Inversion using adaptive physics‐based neural network: Application to magnetotelluric inversion
Inversion using adaptive physics‐based neural network: Application to magnetotelluric inversion
ABSTRACTA new trend to solve geophysical problems aims to combine the advantages of deterministic inversion with neural network inversion. The neural networks applied to geophysica...
Research on Network Similarity Comparison Method Based on Higher-Order Information
Research on Network Similarity Comparison Method Based on Higher-Order Information
Quantifying structural similarity between complex networks presents a fundamental and formidable challenge in network science, which plays a crucial role in various fields, such as...
DT-DFRS: Enhanced Data-Free Robustness Stealing via Dual Teacher Guidance in Black-Box Settings
DT-DFRS: Enhanced Data-Free Robustness Stealing via Dual Teacher Guidance in Black-Box Settings
Abstract
Model Stealing Attacks (MSAs) are identified as a significant privacy threat to Machine Learning as a Service (MLaaS). MSAs aim to craft a substitute model that ha...
Adaptive hybrid potential evapotranspiration (PET) prediction method based on automatic machine learning
Adaptive hybrid potential evapotranspiration (PET) prediction method based on automatic machine learning
Abstract
In arid areas, estimation of crop water demand through potential evapotranspiration (PET) forecast has a guiding effect on water-saving irrigation, to cope with th...

