A framework that integrates planning, monitoring and replanning techniques is proposed. It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of abnormity on the plan execution. The framework consists of three parts: the hierarchical task network (HTN) planner based on Monte Carlo tree search (MCTS), hybrid plan monitoring based on forward and backward and norm-based replanning method selection. The HTN planner based on MCTS selects the optimal method for HTN compound task through pre-exploration. Based on specific objectives, it can identify the best solution to the current problem. The hybrid plan monitoring has the capability to detect the influence of abnormity on the effect of an executed action and the premise of an unexecuted action, thus trigger the replanning. The norm-based replanning selection method can measure the difference between the expected state and the actual state, and then select the best replanning algorithm. The experimental results reveal that our method can effectively deal with the influence of abnormity on the implementation of the plan and achieve the target task in an optimal way.
In the aircraft control system, sensor networks are used to sample the attitude and environmental data. As a result of the external and internal factors (e.g., environmental and task complexity, inaccurate sensing and complex structure), the aircraft control system contains several uncertainties, such as imprecision, incompleteness, redundancy and randomness. The information fusion technology is usually used to solve the uncertainty issue, thus improving the sampled data reliability, which can further effectively increase the performance of the fault diagnosis decision-making in the aircraft control system. In this work, we first analyze the uncertainties in the aircraft control system, and also compare different uncertainty quantitative methods. Since the information fusion can eliminate the effects of the uncertainties, it is widely used in the fault diagnosis. Thus, this paper summarizes the recent work in this aera. Furthermore, we analyze the application of information fusion methods in the fault diagnosis of the aircraft control system. Finally, this work identifies existing problems in the use of information fusion for diagnosis and outlines future trends.
A new approach is proposed in this study for accountable capability improvement based on interpretable capability evaluation using the belief rule base (BRB). Firstly, a capability evaluation model is constructed and optimized. Then, the key sub-capabilities are identified by quantitatively calculating the contributions made by each sub-capability to the overall capability. Finally, the overall capability is improved by optimizing the identified key sub-capabilities. The theoretical contributions of the proposed approach are as follows. (i) An interpretable capability evaluation model is constructed by employing BRB which can provide complete access to decision-makers. (ii) Key sub-capabilities are identified according to the quantitative contribution analysis results. (iii) Accountable capability improvement is carried out by only optimizing the identified key sub-capabilities. Case study results show that “Surveillance”, “Positioning”, and “Identification” are identified as key sub-capabilities with a summed contribution of 75.55% in an analytical and deducible fashion based on the interpretable capability evaluation model. As a result, the overall capability is improved by optimizing only the identified key sub-capabilities. The overall capability can be greatly improved from 59.20% to 81.80% with a minimum cost of 397. Furthermore, this paper also investigates how optimizing the BRB with more collected data would affect the evaluation results: only optimizing “Surveillance” and “Positioning” can also improve the overall capability to 81.34% with a cost of 370, which thus validates the efficiency of the proposed approach.
Discrete event system (DES) models promote system engineering, including system design, verification, and assessment. The advancement in manufacturing technology has endowed us to fabricate complex industrial systems. Consequently, the adoption of advanced modeling methodologies adept at handling complexity and scalability is imperative. Moreover, industrial systems are no longer quiescent, thus the intelligent operations of the systems should be dynamically specified in the model. In this paper, the composition of the subsystem behaviors is studied to generate the complexity and scalability of the global system model, and a Boolean semantic specifying algorithm is proposed for generating dynamic intelligent operations in the model. In traditional modeling approaches, the change or addition of specifications always necessitates the complete resubmission of the system model, a resource-consuming and error-prone process. Compared with traditional approaches, our approach has three remarkable advantages: (i) an established Boolean semantic can be fitful for all kinds of systems; (ii) there is no need to resubmit the system model whenever there is a change or addition of the operations; (iii) multiple specifying tasks can be easily achieved by continuously adding a new semantic. Thus, this general modeling approach has wide potential for future complex and intelligent industrial systems.
Remote sensing data plays an important role in natural disaster management. However, with the increase of the variety and quantity of remote sensors, the problem of “knowledge barriers” arises when data users in disaster field retrieve remote sensing data. To improve this problem, this paper proposes an ontology and rule based retrieval (ORR) method to retrieve disaster remote sensing data, and this method introduces ontology technology to express earthquake disaster and remote sensing knowledge, on this basis, and realizes the task suitability reasoning of earthquake disaster remote sensing data, mining the semantic relationship between remote sensing metadata and disasters. The prototype system is built according to the ORR method, which is compared with the traditional method, using the ORR method to retrieve disaster remote sensing data can reduce the knowledge requirements of data users in the retrieval process and improve data retrieval efficiency.
To address the current problems of poor generality, low real-time, and imperfect information transmission of the battlefield target intelligence system, this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare. First, an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling, which reduces the difficulty of the planning and design process. The method introduces the Department of Defense architecture framework (DoDAF) modeling method, the multi-living agent (MLA) theory modeling method, and other combinations for planning and modeling. A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed. Further, the liveness analysis of the battlefield target intelligence system is carried out, and the problems of the existing system are presented from several aspects. And the technical prediction of the development and construction is given, which provides directional ideas for the subsequent research and development of the battlefield target intelligence system. In the end, the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets (CPN) simulation software. The analysis demonstrates the reasonable integrity of its logic.
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology, the new cloud manufacturing system (NCMS) built on the connotation of cloud manufacturing 3.0 presents a new business model of “Internet of everything, intelligent leading, data driving, shared services, cross-border integration, and universal innovation”. The network boundaries are becoming increasingly blurred, NCMS is facing security risks such as equipment unauthorized use, account theft, static and extensive access control policies, unauthorized access, supply chain attacks, sensitive data leaks, and industrial control vulnerability attacks. Traditional security architectures mainly use information security technology, which cannot meet the active security protection requirements of NCMS. In order to solve the above problems, this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS. It adopts the zero trust concept and effectively integrates multiple security capabilities such as network, equipment, cloud computing environment, application, identity, and data. It adopts a new access control mode of “continuous verification + dynamic authorization”, classified access control mechanisms such as attribute-based access control, role-based access control, policy-based access control, and a new data security protection system based on blockchain, achieving “trustworthy subject identity, controllable access behavior, and effective protection of subject and object resources”. This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises, and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
With the continuous development of network functions virtualization (NFV) and software-defined networking (SDN) technologies and the explosive growth of network traffic, the requirement for computing resources in the network has risen sharply. Due to the high cost of edge computing resources, coordinating the cloud and edge computing resources to improve the utilization efficiency of edge computing resources is still a considerable challenge. In this paper, we focus on optimizing the placement of network services in cloud-edge environments to maximize the efficiency. It is first proved that, in cloud-edge environments, placing one service function chain (SFC) integrally in the cloud or at the edge can improve the utilization efficiency of edge resources. Then a virtual network function (VNF) performance-resource (P-R) function is proposed to represent the relationship between the VNF instance computing performance and the allocated computing resource. To select the SFCs that are most suitable to deploy at the edge, a VNF placement and resource allocation model is built to configure each VNF with its particular P-R function. Moreover, a heuristic recursive algorithm is designed called the recursive algorithm for max edge throughput (RMET) to solve the model. Through simulations on two scenarios, it is verified that RMET can improve the utilization efficiency of edge computing resources.
To maintain the stability of the inter-satellite link for gravitational wave detection, an intelligent learning monitoring and fast warning method of the inter-satellite link control system failure is proposed. Different from the traditional fault diagnosis optimization algorithms, the fault intelligent learning method proposed in this paper is able to quickly identify the faults of inter-satellite link control system despite the existence of strong coupling nonlinearity. By constructing a two-layer learning network, the method enables efficient joint diagnosis of fault areas and fault parameters. The simulation results show that the average identification time of the system fault area and fault parameters is 0.27 s, and the fault diagnosis efficiency is improved by 99.8% compared with the traditional algorithm.
As the unmanned weap system-of systems (UWSoS) becomes complex, the inevitable uncertain interference gradually increases, which leads to a strong emphasis on the resilience of UWSoS. Hence, this paper presents a resilience-driven cooperative reconfiguration strategy to enhance the resilience of UWSoS. First, a unified resilience-driven cooperative reconfiguration strategy framework is designed to guide the UWSoS resilience enhancement. Subsequently, a cooperative reconfiguration strategy algorithm is proposed to identify the optimal cooperative reconfiguration sequence, combining the cooperative pair resilience contribution index (CPRCI) and cooperative pair importance index (CPII). At last, the effectiveness and superiority of the proposed algorithm are demonstrated through various attack scenario simulations that include different attack modes and intensities. The analysis results can provide a reference for decision-makers to manage UWSoS.
Today’s air combat has reached a high level of uncertainty where continuous or discrete variables with crisp values cannot be properly represented using fuzzy sets. With a set of membership functions, fuzzy logic is well-suited to tackle such complex states and actions. However, it is not necessary to fuzzify the variables that have definite discrete semantics. Hence, the aim of this study is to improve the level of model abstraction by proposing multiple levels of cascaded hierarchical structures from the perspective of function, namely, the functional decision tree. This method is developed to represent behavioral modeling of air combat systems, and its metamodel, execution mechanism, and code generation can provide a sound basis for function-based behavioral modeling. As a proof of concept, an air combat simulation is developed to validate this method and the results show that the fighter Alpha built using the proposed framework provides better performance than that using default scripts.
To solve the problem that the existing situation awareness research focuses on multi-sensor data fusion, but the expert knowledge is not fully utilized, a heterogeneous information fusion recognition method based on belief rule structure is proposed. By defining the continuous probabilistic hesitation fuzzy linguistic term sets (CPHFLTS) and establishing CPHFLTS distance measure, the belief rule base of the relationship between feature space and category space is constructed through information integration, and the evidence reasoning of the input samples is carried out. The experimental results show that the proposed method can make full use of sensor data and expert knowledge for recognition. Compared with the other methods, the proposed method has a higher correct recognition rate under different noise levels.
Evolutionary algorithms (EAs) have been used in high utility itemset mining (HUIM) to address the problem of discovering high utility itemsets (HUIs) in the exponential search space. EAs have good running and mining performance, but they still require huge computational resource and may miss many HUIs. Due to the good combination of EA and graphics processing unit (GPU), we propose a parallel genetic algorithm (GA) based on the platform of GPU for mining HUIM (PHUI-GA). The evolution steps with improvements are performed in central processing unit (CPU) and the CPU intensive steps are sent to GPU to evaluate with multi-threaded processors. Experiments show that the mining performance of PHUI-GA outperforms the existing EAs. When mining 90% HUIs, the PHUI-GA is up to 188 times better than the existing EAs and up to 36 times better than the CPU parallel approach.
Survivability is used to evaluate the ability of the satellite to complete the mission after failure, while the duration of maintaining performance is often ignored. An effective backup strategy can restore the constellation performance timely, and maintain good network communication performance in case of satellite failure. From the perspective of network utility, the low Earth orbit (LEO) satellite constellation survivable graphical evaluation and review technology (GERT) network with backup satellites is constructed. A network utility transfer function algorithm based on moment generating function and Mason formula is proposed, the network survivability evaluation models of on-orbit backup strategy and ground backup strategy are established. The survivable GERT model can deduce the expected maintenance time of LEO satellite constellation under different fault states and the network utility generated during the state maintenance period. The case analysis shows that the proposed survivable GERT model can consider the satellite failure rate, backup satellite replacement rate, maneuver control replacement ability and life requirement, and effectively determine the optimal survivable backup strategy for LEO satellite constellation with limited resources according to the expected network utility.
This paper systematically introduces and reviews a scientific exploration of reliability called the belief reliability. Beginning with the origin of reliability engineering, the problems of present theories for reliability engineering are summarized as a query, a dilemma, and a puzzle. Then, through philosophical reflection, we introduce the theoretical solutions given by belief reliability theory, including scientific principles, basic equations, reliability science experiments, and mathematical measures. The basic methods and technologies of belief reliability, namely, belief reliability analysis, function-oriented belief reliability design, belief reliability evaluation, and several newly developed methods and technologies are sequentially elaborated and overviewed. Based on the above investigations, we summarize the significance of belief reliability theory and make some prospects about future research, aiming to promote the development of reliability science and engineering.
Autonomous umanned aerial vehicle (UAV) manipulation is necessary for the defense department to execute tactical missions given by commanders in the future unmanned battlefield. A large amount of research has been devoted to improving the autonomous decision-making ability of UAV in an interactive environment, where finding the optimal maneuvering decision-making policy became one of the key issues for enabling the intelligence of UAV. In this paper, we propose a maneuvering decision-making algorithm for autonomous air-delivery based on deep reinforcement learning under the guidance of expert experience. Specifically, we refine the guidance towards area and guidance towards specific point tasks for the air-delivery process based on the traditional air-to-surface fire control methods. Moreover, we construct the UAV maneuvering decision-making model based on Markov decision processes (MDPs). Specifically, we present a reward shaping method for the guidance towards area and guidance towards specific point tasks using potential-based function and expert-guided advice. The proposed algorithm could accelerate the convergence of the maneuvering decision-making policy and increase the stability of the policy in terms of the output during the later stage of training process. The effectiveness of the proposed maneuvering decision-making policy is illustrated by the curves of training parameters and extensive experimental results for testing the trained policy.
Natural events have had a significant impact on overall flight activity, and the aviation industry plays a vital role in helping society cope with the impact of these events. As one of the most impactful weather typhoon seasons appears and continues, airlines operating in threatened areas and passengers having travel plans during this time period will pay close attention to the development of tropical storms. This paper proposes a deep multimodal fusion and multitasking trajectory prediction model that can improve the reliability of typhoon trajectory prediction and reduce the quantity of flight scheduling cancellation. The deep multimodal fusion module is formed by deep fusion of the feature output by multiple submodal fusion modules, and the multitask generation module uses longitude and latitude as two related tasks for simultaneous prediction. With more dependable data accuracy, problems can be analysed rapidly and more efficiently, enabling better decision-making with a proactive versus reactive posture. When multiple modalities coexist, features can be extracted from them simultaneously to supplement each other’s information. An actual case study, the typhoon Lichma that swept China in 2019, has demonstrated that the algorithm can effectively reduce the number of unnecessary flight cancellations compared to existing flight scheduling and assist the new generation of flight scheduling systems under extreme weather.
In the context of big data, many large-scale knowledge graphs have emerged to effectively organize the explosive growth of web data on the Internet. To select suitable knowledge graphs for use from many knowledge graphs, quality assessment is particularly important. As an important thing of quality assessment, completeness assessment generally refers to the ratio of the current data volume to the total data volume. When evaluating the completeness of a knowledge graph, it is often necessary to refine the completeness dimension by setting different completeness metrics to produce more complete and understandable evaluation results for the knowledge graph. However, lack of awareness of requirements is the most problematic quality issue. In the actual evaluation process, the existing completeness metrics need to consider the actual application. Therefore, to accurately recommend suitable knowledge graphs to many users, it is particularly important to develop relevant measurement metrics and formulate measurement schemes for completeness. In this paper, we will first clarify the concept of completeness, establish each metric of completeness, and finally design a measurement proposal for the completeness of knowledge graphs.
To solve the problem of risk identification and quantitative assessment for human-computer interaction (HCI) in complex avionics systems, an HCI safety analysis framework based on system-theoretical process analysis (STPA) and cognitive reliability and error analysis method (CREAM) is proposed. STPA-CREAM can identify unsafe control actions and find the causal path during the interaction of avionics systems and pilot with the help of formal verification tools automatically. The common performance conditions (CPC) of avionics systems in the aviation environment is established and a quantitative analysis of human failure is carried out. Taking the head-up display (HUD) system interaction process as an example, a case analysis is carried out, the layered safety control structure and formal model of the HUD interaction process are established. For the interactive behavior “Pilots approaching with HUD”, four unsafe control actions and 35 causal scenarios are identified and the impact of common performance conditions at different levels on the pilot decision model are analyzed. The results show that HUD’s HCI level gradually improves as the scores of CPC increase, and the quality of crew member cooperation and time sufficiency of the task is the key to its HCI. Through case analysis, it is shown that STPA-CREAM can quantitatively assess the hazards in HCI and identify the key factors that impact safety.
As the “engine” of equipment continuous operation and repeated operation, equipment maintenance support plays a more prominent role in the confrontation of symmetrical combat systems. As the basis and guide for the planning and implementation of equipment maintenance tasks, the equipment damage measurement is an important guarantee for the effective implementation of maintenance support. Firstly,this article comprehensively analyses the influence factors to damage measurement from the enemy’s attributes, our attributes and the battlefield environment starting from the basic problem of wartime equipment damage measurement. Secondly, this article determines the key factors based on fuzzy comprehensive evaluation (FCE) and performed principal component analysis (PCA) on the key factors. Finally, the principal components representing more than 85% of the data features are taken as the input and the equipment damage quantity is taken as the output. The data are trained and tested by artificial neural network (ANN) and random forest (RF). In a word, FCE-PCA-RF can be used as a reference for the research of equipment damage estimation in wartime.
Based on the wave attack task planning method in static complex environment and the rolling optimization framework, an online task planning method in dynamic complex environment based on rolling optimization is proposed. In the process of online task planning in dynamic complex environment, online task planning is based on event triggering including target information update event, new target addition event, target failure event, weapon failure event, etc., and the methods include defense area reanalysis, parameter space update, and mission re-planning. Simulation is conducted for different events and the result shows that the index value of the attack scenario after re-planning is better than that before re-planning and according to the probability distribution of statistical simulation method, the index value distribution after re-planning is obviously in the region of high index value, and the index value gap before and after re-planning is related to the degree of posture change.
Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties in dealing with high dimensional time series target data, a threat assessment method based on self-attention mechanism and gated recurrent unit (SA-GRU) is proposed. Firstly, a threat feature system including air combat situations and capability features is established. Moreover, a data augmentation process based on fractional Fourier transform (FRFT) is applied to extract more valuable information from time series situation features. Furthermore, aiming to capture key characteristics of battlefield evolution, a bidirectional GRU and SA mechanisms are designed for enhanced features. Subsequently, after the concatenation of the processed air combat situation and capability features, the target threat level will be predicted by fully connected neural layers and the softmax classifier. Finally, in order to validate this model, an air combat dataset generated by a combat simulation system is introduced for model training and testing. The comparison experiments show the proposed model has structural rationality and can perform threat assessment faster and more accurately than the other existing models based on deep learning.
To address the shortcomings of single-step decision making in the existing deep reinforcement learning based unmanned aerial vehicle (UAV) real-time path planning problem, a real-time UAV path planning algorithm based on long short-term memory (RPP-LSTM) network is proposed, which combines the memory characteristics of recurrent neural network (RNN) and the deep reinforcement learning algorithm. LSTM networks are used in this algorithm as Q-value networks for the deep Q network (DQN) algorithm, which makes the decision of the Q-value network has some memory. Thanks to LSTM network, the Q-value network can use the previous environmental information and action information which effectively avoids the problem of single-step decision considering only the current environment. Besides, the algorithm proposes a hierarchical reward and punishment function for the specific problem of UAV real-time path planning, so that the UAV can more reasonably perform path planning. Simulation verification shows that compared with the traditional feed-forward neural network (FNN) based UAV autonomous path planning algorithm, the RPP-LSTM proposed in this paper can adapt to more complex environments and has significantly improved robustness and accuracy when performing UAV real-time path planning.
The weapon and equipment operational requirement analysis (WEORA) is a necessary condition to win a future war, among which the acquisition of knowledge about weapons and equipment is a great challenge. The main challenge is that the existing weapons and equipment data fails to carry out structured knowledge representation, and knowledge navigation based on natural language cannot efficiently support the WEORA. To solve above problem, this research proposes a method based on question answering (QA) of weapons and equipment knowledge graph (WEKG) to construct and navigate the knowledge related to weapons and equipment in the WEORA. This method firstly constructs the WEKG, and builds a neutral network-based QA system over the WEKG by means of semantic parsing for knowledge navigation. Finally, the method is evaluated and a chatbot on the QA system is developed for the WEORA. Our proposed method has good performance in the accuracy and efficiency of searching target knowledge, and can well assist the WEORA.
Aviation accidents are currently one of the leading causes of significant injuries and deaths worldwide. This entices researchers to investigate aircraft safety using data analysis approaches based on an advanced machine learning algorithm. To assess aviation safety and identify the causes of incidents, a classification model with light gradient boosting machine (LGBM) based on the aviation safety reporting system (ASRS) has been developed. It is improved by k-fold cross-validation with hybrid sampling model (HSCV), which may boost classification performance and maintain data balance. The results show that employing the LGBM-HSCV model can significantly improve accuracy while alleviating data imbalance. Vertical comparison with other cross-validation (CV) methods and lateral comparison with different fold times comprise the comparative approach. Aside from the comparison, two further CV approaches based on the improved method in this study are discussed: one with a different sampling and folding order, and the other with more CV. According to the assessment indices with different methods, the LGBM-HSCV model proposed here is effective at detecting incident causes. The improved model for imbalanced data categorization proposed may serve as a point of reference for similar data processing, and the model’s accurate identification of civil aviation incident causes can assist to improve civil aviation safety.
How to mine valuable information from massive multi-source heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the long-term dependence of air target intention recognition, this paper deeply explores the potential attribute features from the spatiotemporal sequence data of the target. First, we build an intelligent dynamic intention recognition framework, including a series of specific processes such as data source, data preprocessing, target space-time, convolutional neural networks-bidirectional gated recurrent unit-atteneion (CBA) model and intention recognition. Then, we analyze and reason the designed CBA model in detail. Finally, through comparison and analysis with other recognition model experiments, our proposed method can effectively improve the accuracy of air target intention recognition, and is of significance to the commanders’ operational command and situation prediction.
The rapid development of unmanned aerial vehicle (UAV) swarm, a new type of aerial threat target, has brought great pressure to the air defense early warning system. At present, most of the track correlation algorithms only use part of the target location, speed, and other information for correlation. In this paper, the artificial neural network method is used to establish the corresponding intelligent track correlation model and method according to the characteristics of swarm targets. Precisely, a route correlation method based on convolutional neural networks (CNN) and long short-term memory (LSTM) Neural network is designed. In this model, the CNN is used to extract the formation characteristics of UAV swarm and the spatial position characteristics of single UAV track in the formation, while the LSTM is used to extract the time characteristics of UAV swarm. Experimental results show that compared with the traditional algorithms, the algorithm based on CNN-LSTM neural network can make full use of multiple feature information of the target, and has better robustness and accuracy for swarm targets.
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence, surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing, decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
Based on the characteristics of high-end products, crowd-sourcing user stories can be seen as an effective means of gathering requirements, involving a large user base and generating a substantial amount of unstructured feedback. The key challenge lies in transforming abstract user needs into specific ones, requiring integration and analysis. Therefore, we propose a topic mining-based approach to categorize, summarize, and rank product requirements from user stories. Specifically, after determining the number of story categories based on pyLDAvis, we initially classify “I want to” phrases within user stories. Subsequently, classic topic models are applied to each category to generate their names, defining each post-classification user story category as a requirement. Furthermore, a weighted ranking function is devised to calculate the importance of each requirement. Finally, we validate the effectiveness and feasibility of the proposed method using 2 966 crowd-sourced user stories related to smart home systems.
With the development of information technology, a large number of product quality data in the entire manufacturing process is accumulated, but it is not explored and used effectively. The traditional product quality prediction models have many disadvantages, such as high complexity and low accuracy. To overcome the above problems, we propose an optimized data equalization method to pre-process dataset and design a simple but effective product quality prediction model: radial basis function model optimized by the firefly algorithm with Levy flight mechanism (RBFFALM). First, the new data equalization method is introduced to pre-process the dataset, which reduces the dimension of the data, removes redundant features, and improves the data distribution. Then the RBFFALFM is used to predict product quality. Comprehensive experiments conducted on real-world product quality datasets validate that the new model RBFFALFM combining with the new data pre-processing method outperforms other previous methods on predicting pro-duct quality.