Skip to main content
Log in

A security risk plan search assistant decision algorithm using deep neural network combined with two-stage similarity calculation

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

In view of the nonlinearity and uncertainty of safety accident risk assessment, firstly, based on the deep neural network, the training criterion of the network is changed, and the triplet convolutional neural network with the similarity measure as the cost function is proposed. The inactive multi-scale set features are extracted from them, so that the semantic features obtained by learning are suitable for security risk image retrieval. In the image retrieval application, the training samples of the retrieved data set are not enough to train a large network, and the innovative application of migration learning to security risk image retrieval proposes to train the network with data sets similar to the retrieved data sets. Then based on the traditional nearest neighbor algorithm, this paper proposes a case similarity calculation method based on two-dimensional structure of structural similarity and attribute similarity, input the characteristic attribute value of the current emergency event, and conduct similar case retrieval. The final calculation returns the historical case and its solution that the user is most similar to the currently entered incident feature. The experiment proves that the maximum relative error between the output of the network and the expected output value is 5.17%, and the minimum relative error is 1.38%, which has high accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Silva C, Vasconcelos G, Barros H et al (2015 ) Case-based reasoning combined with neural networks for credit risk analysis. International Joint Conference on Neural Networks

  2. Sharma R, Aiken A (2016) From invariant checking to invariant inference using randomized search. Formal Methods in System Design 48(3):235–256

    Article  MATH  Google Scholar 

  3. Yu Q, Tang H, Tan KC, Yu H (2014) A brain-inspired spiking neural network model with temporal encoding and learning. Neurocomputing 138(11):3–13

    Article  Google Scholar 

  4. Gharavian D, Bejani M, Sheikhan M (2017) Audio-visual emotion recognition using FCBF feature selection method and particle swarm optimization for fuzzy ARTMAP neural networks. Multimed Tools Appl 76(2):2331–2352

    Article  Google Scholar 

  5. Hamm RM, Beasley WH, Johnson WJ (2014) A balance beam aid for instruction in clinical diagnostic reasoning. Medical Decision Making An International Journal of the Society for Medical Decision Making 34(7):854–862

    Article  Google Scholar 

  6. Hahn GJ, Sens T, Decouttere C, Vandaele NJ (2016) A multi-criteria approach to robust outsourcing decision-making in stochastic manufacturing systems. Comput Ind Eng 98:275–288

    Article  Google Scholar 

  7. Viduto V, Maple C, Huang W et al (2012) A multi-objective genetic algorithm for minimising network security risk and cost. International Conference on High Performance Computing & Simulation. IEEE

  8. Xinlan Z X Z, Zhifang H Z H, Guangfu W G W et al (2011) Information security risk assessment methodology research: group decision making and analytic hierarchy process. Second World Congress on Software Engineering. IEEE

  9. Rees LP, Deane JK, Rakes TR, Baker WH (2011) Decision support for cybersecurity risk planning[J]. Decis Support Syst 51(3):493–505

    Article  Google Scholar 

  10. Mandal M (2014) Risk analysis using FMEA: fuzzy similarity value and possibility theory based approach. Expert Syst Appl 41(7):3527–3537

    Article  Google Scholar 

  11. Pham C, Estrada Z, Cao P et al (2014) Reliability and security monitoring of virtual machines using hardware architectural invariants. IEEE/IFIP International Conference on Dependable Systems & Networks

  12. Long NC, Meesad P, Unger H (2015) A highly accurate firefly based algorithm for heart disease prediction[J]. Expert Syst Appl 42(21):8221–8231

    Article  Google Scholar 

  13. Chai J, Liu JNK (2014) A novel believable rough set approach for supplier selection. Expert Syst Appl 41(1):92–104

    Article  Google Scholar 

  14. Wang P, Wu Q, Shen C et al (2015) Explicit knowledge-based reasoning for visual question answering. Comput Therm Sci

  15. Papatheou E, Manson G, Barthorpe RJ, Worden K (2014) The use of pseudo-faults for damage location in SHM: an experimental investigation on a Piper Tomahawk aircraft wing. J Sound Vib 333(3):971–990

    Article  Google Scholar 

  16. Kulkarni SU, Shetty BS (2015) Data mining using modified GFMM neural network. Int J Comput Appl 116(15):18–22

    Google Scholar 

  17. Lu W, Wang X, Yang C et al (2015) A novel feature extraction method using deep neural network for rolling bearing fault diagnosis. Control & Decision Conference

  18. Thanda A, Venkatesan SM (2016) Audio visual speech recognition using deep recurrent neural networks. Iapr Workshop on Multimodal Pattern Recognition of Social Signals in Human-Computer Interaction

  19. Woo S, Lee C (2017) Feature extraction for deep neural networks based on decision boundaries. Spie Defense + Security

  20. Yadav P (2015) Case retrieval algorithm using similarity measure and adaptive fractional brain storm optimization for health Informaticians[J]. Arab J Sci Eng 41(3):1–12

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Hu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hu, J., Fang, J., Du, Y. et al. A security risk plan search assistant decision algorithm using deep neural network combined with two-stage similarity calculation. Pers Ubiquit Comput 23, 541–552 (2019). https://doi.org/10.1007/s00779-019-01236-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-019-01236-x

Keywords

Navigation