Javascript must be enabled to continue!
Financial Risk Assessment Model Based on Fuzzy Logic
View through CrossRef
In the rapidly evolving landscape of business operations, establishing a robust security domain prevention system in the Middle Office is of utmost importance. To achieve this, the integration of Choquet expectation-based methodologies offers a powerful approach. The Middle Office acts as a critical hub for various business processes, including risk management, compliance, and data protection. With the implementation of Choquet expectation theory, which encompasses the combination of multiple criteria and preferences, businesses can effectively assess and optimize their security domain prevention system. The establishment and optimization of a security domain prevention system based on Choquet’s expectations provide businesses with a comprehensive and tailored approach to protect their critical assets, maintain operational continuity, and safeguard sensitive data from emerging threats in the Middle Office environment. This paper constructed a Fuzzy Optimization Membership Estimation (FOME) for the computation of the feature vector. The proposed FOME model uses the Flemingo Optimization model for the evaluation of the feature vector in the business middle office. The FOME model effectively computes the Choquet expectation features for the analysis of the risk management of the feature vector in the middle office. Through the membership estimation with the FOME model, the model significantly computes the different attacks in the middle office. The analysis of the proposed FOME is evaluated for the conventional CICIDS dataset for the attack analysis. The simulation analysis stated that the proposed FOME model achieves a higher classification accuracy of 99.89% for attack detection.
Title: Financial Risk Assessment Model Based on Fuzzy Logic
Description:
In the rapidly evolving landscape of business operations, establishing a robust security domain prevention system in the Middle Office is of utmost importance.
To achieve this, the integration of Choquet expectation-based methodologies offers a powerful approach.
The Middle Office acts as a critical hub for various business processes, including risk management, compliance, and data protection.
With the implementation of Choquet expectation theory, which encompasses the combination of multiple criteria and preferences, businesses can effectively assess and optimize their security domain prevention system.
The establishment and optimization of a security domain prevention system based on Choquet’s expectations provide businesses with a comprehensive and tailored approach to protect their critical assets, maintain operational continuity, and safeguard sensitive data from emerging threats in the Middle Office environment.
This paper constructed a Fuzzy Optimization Membership Estimation (FOME) for the computation of the feature vector.
The proposed FOME model uses the Flemingo Optimization model for the evaluation of the feature vector in the business middle office.
The FOME model effectively computes the Choquet expectation features for the analysis of the risk management of the feature vector in the middle office.
Through the membership estimation with the FOME model, the model significantly computes the different attacks in the middle office.
The analysis of the proposed FOME is evaluated for the conventional CICIDS dataset for the attack analysis.
The simulation analysis stated that the proposed FOME model achieves a higher classification accuracy of 99.
89% for attack detection.
Related Results
Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Konstruksi Sistem Inferensi Fuzzy Menggunakan Subtractive Fuzzy C-Means pada Data Parkinson
Abstract. Fuzzy Inference System requires several stages to get the output, 1) formation of fuzzy sets, 2) formation of rules, 3) application of implication functions, 4) compositi...
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Generated Fuzzy Quasi-ideals in Ternary Semigroups
Here in this paper, we provide characterizations of fuzzy quasi-ideal in terms of level and strong level subsets. Along with it, we provide expression for the generated fuzzy quasi...
ω – SUBSEMIRING FUZZY
ω – SUBSEMIRING FUZZY
Mapping ρ is called a fuzzy subset of an empty set of S if ρ is the mapping from S to the closed interval [0,1]. A fuzzy subset ρ introduced into this paper is a fuzzy subset of se...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
New Approaches of Generalised Fuzzy Soft sets on fuzzy Codes and Its Properties on Decision-Makings
Background Several scholars defined the concepts of fuzzy soft set theory and their application on decision-making problem. Based on this concept, researchers defined the generalis...
Benchmarking Industry 4.0 readiness evaluation using fuzzy approaches
Benchmarking Industry 4.0 readiness evaluation using fuzzy approaches
PurposeThe purpose is to assess Industry 4.0 (I4.0) readiness index using fuzzy logic and multi-grade fuzzy approaches in an automotive component manufacturing organization.Design/...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
FUZZY‐FUZZY AUTOMATA
FUZZY‐FUZZY AUTOMATA
Based on the concept of fuzzy sets of type 2 (or fuzzy‐fuzzy sets) defined by L. A. Zadeh, fuzzy‐fuzzy automata ate newly formulated and some properties of these automata are inves...

