Next Article in Journal
Ankle Angle Prediction Using a Footwear Pressure Sensor and a Machine Learning Technique
Previous Article in Journal
QMMAC: Quorum-Based Multichannel MAC Protocol for Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Decision-Making under Uncertainty for the Deployment of Future Hyperconnected Networks: A Survey †

by
Néstor Alzate-Mejía
1,2,*,
Germán Santos-Boada
2,* and
José Roberto de Almeida-Amazonas
2,3
1
Faculty of Engineering, Cooperative University of Colombia, Santiago de Cali 760035, Colombia
2
Department of Computer Architecture, Universitat Politècnica de Catalunya, 08034 Barcelona, Spain
3
Department of Telecommunications and Control Engineering, Escola Politécnica of the University of São Paulo, São Paulo 05508-010, Brazil
*
Authors to whom correspondence should be addressed.
This paper is an extended version of our paper published in “Néstor Alzate Mejía, Germán Santos-Boada, José R. de Almeida Amazonas, Decision-Making Under Uncertainty for the Deployment of Future Networks in IoT Scenarios” 11th EAI International Conference on Broadband Communications, Networks, and Systems, 11–12 December 2020.
Sensors 2021, 21(11), 3791; https://doi.org/10.3390/s21113791
Submission received: 17 April 2021 / Revised: 19 May 2021 / Accepted: 26 May 2021 / Published: 30 May 2021

Abstract

:
Among the several emerging dimensioning, control and deployment of future communication network paradigms stands out the human-centric characteristic that creates an intricate relationship between telematics and human activities. The hard to model dynamics of user behavior introduces new uncertainties into these systems that give rise to difficult network resource management challenges. According to this context, this work reviews several decision-making computational methods under the influence of uncertainties. This work, by means of a systematic literature review, focuses on sensor-based Internet of Things scenarios such as Smart Spaces and Industry 4.0. According to our conclusions, it is mandatory to establish a means for modeling the human behavior context in order to improve resource assignment and management.

1. Introduction

Data communication networks (DCN) provide the digital transmission of data between their hosts under a telecommunications infrastructure in which they share operations, administration, and maintenance. As usual, technological advances have driven the development of new approaches in DCN, giving rise to new challenges in resource management that must be tackled to take into account, for example, the data provided by end users such as in crowdsensing applications.
In traditional DCN management, performance is evaluated according to quantitative technical data, for example, packet delivery rate and throughput, among others, because DCNs were first conceived to provide a reliable and fault-tolerant infrastructure. In this approach, the data are provided by sensors, and mobile and network equipment.
However, the ever-growing interaction between individuals and their devices associated with the activity-tracking capability of such devices transforms individuals from passive to active actors in the context of DCNs [1,2,3]. Accordingly, human activities ascertain network usage profiles. Given this circumstance, the inherent uncertainty of human behavior and perception impacts DCN performance to a large extent. This new perspective is the reason for the change from infrastructure-centric networks to a Human-Centric Network (HCN) approach.
The flourishing DCN-related concept of HCN proposes the optimization of both services and network applications, focusing their decisions on the individual’s welfare. In this case, the network performance is assessed by means of quantitative and qualitative data. Individuals generate qualitative data by several means: (i) posting their opinions on web pages, (ii) using social media platforms, and (iii) logging the interactions between individuals and their devices on different platforms.
Several works have addressed these new phenomena from different points of view.
In [4], decision-making support and knowledge extraction methods that may be implemented by machine-learning techniques guided by the feedback provided by Internet of Things (IoT) and cyber-physical systems combined to cloud and fog computing have been studied.
In [5], a system implementation architecture that facilitates the interaction between entities that act based on observations of their environment called agents, in this case, human agents and machines in the manufacturing sector of the Industry 4.0 context, was described. The proposed architecture has five levels with different challenges to be mastered.
In [6], the authors proposed a logical Markovian network-based online framework for the development of voice-driven home automation systems. The objective was to enhance comfort and autonomy at home, fighting uncertainty by means of context awareness.
In [7], the authors studied the technology in networks that allows for the automation of planning, management, and optimization called Self-Organizing Networks (SON) and described a decision-making framework in which fifth-generation mobile network resources are managed by a set of machine-learning algorithms. The distinguished characteristic of their approach is the adoption of a Software-Defined Network (SDN)/Network Function Virtualization (NFV) architecture as the basis to implement decision-making technologies. The SDN are emerging communications networks that separate the control plane from the data plane to allow for interoperability, programmability, and flexibility to co-exist as features [8], and NFV allows for virtualization of network services in virtual machines, which are generally implemented individually on dedicated hardware for each service, improving scalability and agility in the deployment of new services.
It can be seen that HCN features can be advantageously used in different IoT-based applications domains such as Industry 4.0 and Smart Spaces. In theses cases, interactions between individuals and machines suggest that new computational methods combining concepts from hard and soft disciplines may improve models’ accuracies and performances as decision-making methods when uncertainty is present.
In this work, 200+ journals, conferences articles, and technical reports were thoroughly reviewed according to the guidelines of the methodology called Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) [9] as presented in Figure 1. The peer-reviewed data were sourced from the following primary databases: IEEE, Elsevier, Springer, and MDPI.
This has led us to design a search classification for our literary review, as shown in Figure 2. The inclusion and exclusion criteria were a title and abstract screening followed by a full-text and a second abstract screening process.
Three main categories were identified, namely, Information Extraction, Computational Methods, and Application Domains.
The first category, Information Extraction, has two subcategories, which are Semantic Data Mining and the Computational Tools used for extracting information.
The second category has three subcategories: Multiple Criteria for Decision-Making (MCDM), Optimization, and Machine Learning. In particular, the second subcategory, Optimization, includes developments for decision-making under uncertainty using fuzzy logic, game theory, Bayesian networks, stochastic processes, and support vector machines. On the other hand, the third subcategory contains the most significant works related to managing uncertainty for decision-making using machine learning methods, such as supervised learning, unsupervised learning, reinforcement learning, and deep learning.
The third category comprises the works of application domains that are of interest for this work, which are classified into three subcategories: IoT, Industry 4.0, and Smart Spaces.
The contributions of this work are (i) to present a systematic literature review of information extraction methods and computational methods to address decision-making processes under uncertainty, (ii) to illustrate some scenarios within the IoT application domain in which the presence of uncertainty has a great impact, and (iii) to introduce a new approach to deal with uncertainty. After this Introduction, the rest of the paper is organized according to the scheme presented in Figure 2 as follows: Section 2 reviews several information extraction methods, which represent previous and essential contributions to the decision-making process. In Section 3, a classification of various computational methods to address decision-making under uncertainty is presented. Section 4 assesses several application domains for which the implementation of these concepts is pertinent. Next, Section 6 discusses open problems and future research options. In Section 5, a novel research proposal is presented to address uncertainty. Finally, the conclusions of this work are summarized in Section 7.

2. Information Extraction Methods

Currently, massive Internet use, IoT, and 4G mobile telephony data transmission generate large amounts of data. Although some of these data are produced by individuals, others are produced by sensors, which register everything that happens in their environments in diverse formats, such as text, sound, images, or videos. Regarding data storage, the following options can be considered: (i) location, which may be local or cloud-hosted, and (ii) the organization of stored data, whether structured or non-structured in databases.
These features pose several technological challenges that must be addressed before extracting information from generated data, as this information provides a more comprehensive idea of what takes place. In other words, it provides context awareness, which is a determining factor for making more accurate decisions and contributes to improving decision-making processes related to resource management for HCNs.
Based on its interdisciplinary nature, data mining reviews can be performed from diverse perspectives, including databases, statistics, and machine learning [10]. However, as machine learning approaches and statistics are reviewed in further sections, this section focuses on the use of semantics as a method or procedure for extracting information as well as analyzes a different approach.

2.1. Semantic Data Mining

Data mining is a process used to find significant or lost information stored in large volumes of data [11]. In the information age, these processes become relevant, especially if a symbiosis is sought between human beings and machines. In this case, if both parties are able to understand the data generated by the other party, this symbiosis may prove itself beneficial. At this stage, semantics plays a significant role, wherein one must understand that “semantics is the meaning assigned to concepts and their relationships within the mind. The network of concepts and relationships is used to represent knowledge about the world, which in turn enables the cognition and perception required for the interpretation of daily experiences” [12].
Hence, in the area of semantic data mining, several studies grounded on diverse approaches have been discussed, as presented in Table 1.
IoT is a paradigm based on sensor interconnection, wherein the convergence with semantic data mining has become a popular research area [12,13,17,18,19]. For example, in [14], the authors improved resource management for wireless networks that operate cooperatively based on frameworks where semantic web techniques are applied. Furthermore, another study on the interoperability of communications in IoT systems is described in [15]. Finally, in [16], data mining challenges are assessed for cases where data are provided from different sources.
Another field related to this topic is the Semantic Web. “The Semantic Web is a Web of actionable information, i.e., information derived from data through a semantic theory for the interpreting of symbols” [28]. In this area, studies have described the diverse standpoints and execution of semantic data mining, for example, through the web [20], with association rules mining [21], based on ontology [11,22,23], and from the discovery of knowledge [24,25].
In addition, in terms of Industry 4.0, data extraction aimed at improving business profitability has been studied. For example, in [26], cyberphysical semantic systems were used as support and, in [27], intelligent logistics were applied in electronic commerce.

2.2. Information Economy MetaLanguage

An interesting information extraction proposal is the Information Economy Metalanguage I E M L led by Pierre Levy [29].
In fact, based on evidence of sustained increases in digital storage capacities, the omnipresence of interconnectivity based on diverse kinds of media, and the unparalleled capacity for processing, a possible question is how to take advantage of these abilities to increase our own social cognitive processes to contribute to human development. A possible reply is the collaborative and coordinated construction of a computable metalanguage without ontologies, as proposed in the book Semantic Sphere [30]: “IEML is a formal and natural language, whose semantics is computable. It is designed for use in a digital environment for data categorization, artificial intelligence and man/machine interfaces” [29].
IEML seeks to contribute to the universal identification of concepts based on a semantic coordinated system, which would allow, first, to address meanings and, second, to accurately portray how securities circulate in the general information economy.

3. Computational Methods for Decision-Making under Uncertainty

Decision-making consists of selecting the most adequate alternatives from a set of possible solutions to solve a given problem in the best possible way. An agent makes decisions according to its interaction with the environment. Agents can be persons, robots, and software implemented entities [31]. This work focuses on computational decision-making systems, especially those that handle designs with both a significant degree of process automation and uncertainty. A classification of representative methods described in the literature is shown in Figure 3.

3.1. Multiple Criteria Decision-Making

MCDM methods assess a set of alternatives through several weighted criteria according to their relevance to the issue at hand [32]. The problem to be solved is to define how to assign appropriate weights to each of the criteria. Several MCDM methods have been extensively studied [33,34], as shown in Table 2, which may be classified depending on their academic origins, such as from European, American, and other schools.
From Europe, the following methods are worth mentioning:
  • The Elimination and Choice Expressing Reality (ELECTRE) [52] eliminates non-viable solution alternatives and is usually employed along with another MCDM method in order to optimize execution times [35,36,37].
  • The Preference Ranking Organization Method for Enrichment of Evaluations (PROMETHEE) [53] builds an external classification for various alternatives based on a combination of mathematical and psychological methods developing its own understanding of the problem to help agents choose the option that best serves their purpose. This method has been evaluated by different domains such as infrastructure construction [38], the electric power sector [39,40], and engineering decision-making [41], among others.
The North American school proposes the following:
  • The Analytic Hierarchy Process (AHP) [54] combines conflicting physical and psychological elements based on appraisals and assessments to manage complex decisions. In [42,43], decision-making is handled under uncertainty, while in [44], it is based on subjective product recommendations from consumers.
From other origins, we may cite the following:
  • The Multicriteria Optimization and Compromise Solution (VIKOR) [55] aims at determining the best possible solution when dealing with conflicting options or with different methods of measurement. In [45], VIKOR is combined with other techniques to assess feelings in social media; in [46], group decision-making processes are implemented; and in [47], it is used in the evaluation of airline service quality.
  • The Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) [56] aims at finding an alternative solution using the shortest and longest Euclidean distance from the optimal positive solution and the optimal negative solution, respectively. This method is usually enhanced by additional algorithms, as shown in [48,49,50].
  • The Data Envelopment Analysis (DEA) [57] assesses the relative efficiencies of comparable entity sets by solving a series of mathematical programming models [51].

3.2. Optimization Methods

Optimization methods aim at maximizing profits or minimizing risks in the decision-making process by ascertaining the option that best solves the problem pursuant based on the target function. Consequently, research focused on optimizing and managing decision-making uncertainty is classified as per our literature review findings, as shown in Table 3.

3.2.1. Fuzzy Logic

Fuzzy logic creates a mathematical framework that may be adapted to actual complex problems that add uncertainty to human cognitive processes. Several purposes can be achieved by this capability when using different fuzzy logic computational methods as described below:
Fuzzy Set: In contrast to set theory, where each object has a binary value (member or not member), the values of fuzzy set objects can range from 0 to 1 to reflect inaccurate or uncertain conditions. For this method, several extensions exist, as listed below:
Interval-Valued Fuzzy Sets: This method intuitively addresses uncertainty and inaccuracies whenever there is no accurate knowledge of the function to be assessed, as in [58,59,61,62,71].
Type-1 Fuzzy Set: “A type-1 fuzzy set A is a set function on universe X into 0 , 1 , possibly constrained to belong to a family such as continuous functions, i.e., μ A : X 0 , 1 ” [69].
Type-2 Fuzzy Set: Unlike the Type 1 method, which is a special case of a Type-2 method, this method is regarded as a way to increase the fuzziness of a relation. Based on its characteristics, it is an ideal method for addressing linguistic uncertainty, which may arise since words have different meanings for different people, as described in [45,60,70].
Vague Set: This method estimates the lower and upper probability bounds that determine whether any given element is a member of the set, and it is useful for finding inconsistencies in interval assignments to the Boolean expressions used in sets. Its advantages are listed in [63].
Rough Set: This method is applied when dealing with problems with incomplete information. For these purposes, this method removes irrelevant data from the approximate set without affecting the original system and generates decision rules to complete the remaining values. In addition, References [38,64,65,66] discuss the wide range of fields to which this method may be applied.
Mamdani-type: It is a fuzzy inference method that calculates an output value for an input value, and it is used in cases of information uncertainty, as described in [67,85].

3.2.2. Game Theory

This is a mathematical tool applied to human decision-making. This theory assumes that individuals are rational and have conflicting positions to address how they attempt to maximize their benefits when interacting under defined rules. Consequently, new methods have been proposed to address uncertainty, as described in [72,73,74,75].

3.2.3. Bayesian Networks

Bayesian networks use directed cyclic graphs to distribute probabilities among the corresponding random variables for each node. Their advantage relies on their ability to reduce the number of parameters required to determine a joint probability distribution. However, as nodes are not connected, finding a path from one variable to another may be not feasible. In fact, there are several algorithms that create inferences to learn about Bayesian networks, which may be used to overcome uncertainty in decision-making processes, as in [76,77,78,79,80].

3.2.4. Stochastic Process

Stochastic processes include a set of random variables associated with one another wherein one of these variables usually represents time. Each random variable has its own probability function and variables may be correlated to each other. These random features have been used to cope with uncertainty in different fields, as in [6,81,82].

3.2.5. Support Vector Machine

These are several supervised learning algorithms applied to classification or regression problems. These algorithms usually produce accurate results, at high computational costs, which may even improve if data are scattered. Therefore, this method has been used to treat uncertainty in studies, such as [83,84].

3.3. Machine Learning

Machine learning, a subfield of artificial intelligence, is focused on developing algorithms that provide computers with learning capabilities about their environment, with the purpose of improving and adapting themselves to the challenges faced. At present, due to the large amount of data generated by several fields, such as telecommunications, energy, transportation, finance, and health, among others, this capacity is commonly used whenever data-based solutions are needed [86]. Machine learning algorithms have been classified as supervised, unsupervised, reinforcement, and deep learning methods, as described in Figure 4.

3.3.1. Supervised Learning

In this method, learning takes place through a training process using labeled datasets. This method is commonly used when predicting something that is already known. Table 4 lists the works wherein this decision-making method under uncertainty has been applied.
  • Telecommunications. In this field, supervised learning has been used based on factors such as QoS and automatic configuration. For example, QoS has been used to create resource appraisal and classification models for IoT [87] or for any type of network [88]. It has also been used as a retroactive measure to tailor service selection [89] and for decreasing the time required by virtual machine migration processes through WAN links [90]. In addition, in terms of automatic configuration processes, some studies address 5G networks [7,92] and elastic cloud systems [91].
  • Energy. Several types of problems of this field have been solved by applying the supervised learning method, such as preventive planning of uncertain operations in power systems [93]; by selecting the best maintenance route to minimize operational costs when power grid failures occur [94]; by predicting nuclear power system behavior [95]; and by selecting the best location for wind turbines based on economic, regulatory, and social factors [96].
  • Transport. In this field, several studies focus on process improvement, such as speed and accuracy in lane changing maneuvers when driving on highways [97], driving terrestrial vehicles on rural roads [98], robots learning routes through linguistic decision trees [99], and methods used in biped robot walking processes [100,101].
  • Enhanced decisions. These studies focus on improving the performance of decision-making results by choosing selection mechanisms in complex negotiation scenarios [102], by considering environmental awareness when dealing with critical complex systems processes under supervision [103], by assessing the advantages of combining the learning process with multiple agents and weighted strategies [104], and by suggesting two complementary stages that would exist between machine learning and support vector machines [105].
  • Complex systems. These problems are computationally difficult to model, especially if related to human behavior in cooperative work, as discussed in [106,107,108,109].
  • Optimization problems. When it is not feasible to find an optimal solution for uncertain problems, a solution that satisfies problem constraints may be selected, as described in [84,110,111,112,113,114].

3.3.2. Unsupervised Learning

In this method, non-labeled input data patterns are learned without any corresponding output variables. As unsupervised learning is applied when the target in unknown, its algorithms attempt to model the structure that underlies the data. Table 5 lists the main works related to this method.
  • Transport. When applying this method to this field, research is centered on obstacle management for autonomous driving from various approaches. For example, in terms of the epistemic uncertainty of images [115], semantic segmentation methods achieve high inference classification accuracy in object recognition within interior spaces [116] or in different other additional challenges, as listed in [117].
  • Health. The works proposed in this field are aimed at improving unsupervised learning accuracy and solution times, as denoted in [118], which discusses liver fibrosis diagnoses. Furthermore, in [119], this method was used to customize patient therapy processes and, in [120], it was used to diagnose complex vision pathologies.
  • Business decisions. In this field, research works focus on earning profits by selecting the best decisions, as described in [121], where feeling assessments are combined with share price volatility. In addition, an evaluation of industrial systems in terms of sustainability through hard-to-find indicators was presented in [83]. Another study discussed learning from previous decisions through comparative evaluation processes [122]. This method was also applied in the education sector to assign students to a company depending on their skills [123] and to improve manager actions at universities [124].
  • Dealing with uncertainty. Studies seeking to solve unsupervised learning problems dealing with uncertainty use different approaches, such as in battleground decision-making [125]. In geology, it is used for water- and oil-flow systems [126]; in gambling, its is used for the Khun poker game [127]; and it can be used when merely facing the uncertainty of applying this method to any type of problem, such as in [128,129].

3.3.3. Reinforcement Learning

Reinforced learning is used to train systems based on a sequence of punishments and rewards. Therefore, sample datasets are not used since the system learns based on trial and error. This method was first applied in video games, where the agent can go through all possibilities until the optimal solution is found. At present, it is widely applied to complex fields, such as autonomous driving. Several articles explore using this method in various fields, as listed in Table 6.
  • Telecommunications. Based on this method, several topics have been addressed within this field, such as resource management, particularly regarding power consumption for large-scale IoT applications [130]. In [131], a framework was proposed based on reinforcement learning for the SDN control plane to intelligently manage uncertainty in 5G networks. In routing, as in [132], the authors planned to prevent gateway bottlenecks by identifying the best path for reaching the best gateway through reinforcement learning techniques.
  • Energy. For energy companies, decision-making is complicated due to the high level of uncertainty that exists. For these purposes, there are proposals, as in [133], seeking to balance supply and demand in real time in Smart energy markets, or as in [134], which improves previous energy market negotiations by adapting techniques such as Q-learning.
  • Transport. Based on reinforcement learning, specifically in this field, there are contributions on issues such as autonomous driving [135,136,137,140] and experience management [138,139].
  • Optimization problems. By combining techniques with the reinforcement learning method, applications have been optimized, such as computational costs [141], data noise management [142], scalable solutions in terms of time and scale [143], or the adjustment of evaluation functions [144,145].

3.3.4. Deep Learning

This machine learning method mimics human learning processes. By using an interactive simulation process, this is accomplished with labeled and unstructured data, and ultimately, a statistical output model is developed. In fact, this process can be conducted without requiring supervision from the developer as it facilitates operational work and prevents errors that may have been induced. However, the accuracy of the model relies on the existence of a large amount of data to train the machine, which, in turn, requires high processing capacity for running simulations. Nevertheless, technological advances and their increasing interaction with human beings have fostered particular interest within the scientific community regarding deep learning in certain fields, as described in Table 7.
  • Telecommunications. In this field, research has been conducted on topics such as resource allocation management in portable sensors [146], wireless networks [147], low-power devices [148], and cognitive radio networks [149]. Another important topic is SDN application in Smart cities [150].
  • Human Behavior. On this subject, different research approaches have been used. For example, as a first approach, human behavior prediction models have been developed, either when decision-making is affected by peer pressure or by the inference of human activities based on short videos [151]. The approach ranges from psychological perspectives to assessing decision-making abstraction in human beings, both in regular contexts [152] or with imperfect information [153].
  • Uncertainty. Through deep learning, uncertainty challenges have been studied under different approaches. Some examples are uncertainty problems due to subjective opinions in heterogeneous networks [154]; in military scenarios, the uncertainty in unmanned aerial combat vehicle decisions [155]; uncertainty modeling in real time for the relocation of automatic visual systems [156,162]; issues when dealing with missing data due to the calculation of uncertainty based on the remaining training dataset [157]; and a random estimation method to calculate uncertainty in object detection for applications that require reliable decisions [163]. Another area is decision-making under uncertainty, such as whenever assessing complex structures [158] or emotions are expressed in texts [159]. Finally, the work associated with taking risks under uncertainty has been mentioned, either as analyzed from the perspective of video games, as in [160], or in financial forecasts for customers [161].

4. Internet of Things Application Domain

Internet of Things emerged in the 1990s as a new concept from the possibilities offered by the new communications technologies, for example, the Radio-Frequency Identification (RFID). Kevin Ashton introduced the term IoT at a presentation in 1999 [164]. From then on, the International Telecommunications Union (ITU), the Institute of Electrical and Electronic Engineers (IEEE), the European Telecommunications Standards Institute (ETSI), and the Internet Engineering Task Force (IETF), among others, have been working on its standardization, having yet to reach a universally accepted IoT definition. In our opinion, the definition provided by the EU-funded project Coordination and Support Action for Global RFID-Related Activities and Standardization (CASAGRAS) captures the essential characterisitics of IoT: “A global network infrastructure, linking physical and virtual objects through the exploitation of data capture and communication capabilities. This infrastructure includes existing and evolving Internet and network developments. It will offer specific object-identification, sensor and connection capability as the basis for the development of independent cooperative services and applications. These will be characterized by a high degree of autonomous data capture, event transfer, network connectivity, and interoperability” [165].

4.1. Mobile Wireless Sensor Network

A Mobile Wireless Sensor Network (MWSN) shows how uncertainty is present within an IoT network. Let us consider the case depicted in Figure 5. MWSN resources are limited in terms of processing power, storage capacity, and energy availability. In this scenario, mobile wireless sensors installed on drones monitor and identify intruders in specific neighborhood areas. They can communicate directly with each other without using the infrastructure of a deployed physical network. Figure 5A shows a late-night example, at hours when it is unlikely that people are out in the streets. A sensor detects an intruder, and based on the context of that moment, the only possible route to the sink node is found and an alarm message to the control station is sent.
Nonetheless, the movement of the drones may lead the routes becoming unfeasible because one or more sensors are outside the coverage range. Additionally, hardware failures and lack of processing power may also disrupt the route. Figure 5B exhibits a case in which one of the drones goes offline because the required resources exceed its capacity. This may happen due to a catastrophic occurrence that may compel people to leave a region hurriedly. This example shows the importance of context-based decision-making algorithms in the presence of always possible, although unlikely, uncertain events.

4.2. Smart Spaces

The consulting and IT research company Gartner declared Smart Spaces as one of the top ten technological trends back in 2019. According to Gartner a Smart Space is “a physical or digital environment in which humans and technology-enabled systems interact in increasingly open, connected, coordinated and intelligent ecosystems” [166].
Figure 6 illustrates an assisted living scenario of a healthcare application to monitor daily activities and vital signs of the patient. As health may also be influenced by changes in light, temperature, humidity, and noise, these variables should also be monitored and controlled. In this case, the house is equipped with the necessary sensors and devices to control the environment and to alert a nearby hospital if needed. The application’s objective is to provide immediate assistance either by making a phone call or by sending paramedics. The patient’s social media is also monitored to provide additional data and context-related information to be used alongside those extracted from the sensors. However, some situations may occur for which it is not clear what is going on. For example, let us assume that, because of back pain, the patient decides to lay on the floor and falls sleep. Depending on when the images or videos provided by the cameras are seen or processed, it may appear that the patient has fainted or suffered an accident. If the patient is having a nightmare, their heart rate may be altered. If the images/video cannot be interpreted correctly, the devices may send a false alarm message. This example illustrates once more the importance of uncertainty management by automatic decision-making methods.

4.3. Industry 4.0

Beginning with the first industrial revolution, all disruptive technological advances have marked an industrial evolution. The lives of people, society, and organizations have been transformed by these developments. Nowadays, we are advancing toward the fourth industrial revolution, which originated from the term Industry 4.0 used by the federal German government during the presentation of its Industrie 4.0 initiative in 2011. The Smart symbiosis between machines and human beings is the technological disruption that was intended by Industry 4.0, which is spurred by information and communication technologies [167].
To examine the impact of uncertainty on Industry 4.0, let us consider the case of a call center that provides online customer services for a company in the context of an Industry 4.0 scenario using the resources of a mobile phone company. The objective of these centers is to manage as many customers as possible. As the network resources both in terms of available telephone lines and bandwidth are limited, it is of paramount importance to monitor and control the holding time of user calls. The call center has a Customer Relationship Management (CRM) system to monitor, record, track, and forecast events. Furthermore, the CRM builds up a profile of each user. After receiving an explicit authorization, the system is able to record data extracted from social media databases, cell phones, or any other means. These data can be used as ancillary information to process the user requests received by telephone calls, chats, and emails in a more effective way. Notwithstanding, if the information derived from the raw data is not accurate and contextualized, the actual time spent providing an answer to a call may increase waste of resources in the network infrastructure.
For example, let us consider the scenario where some users have been chosen to respond to a survey with a maximum timeframe to identify their preferences to customize a given product within the context of an Industry 4.0 environment. Users were selected among those that are declared (i) to be highly satisfied with the products of the company sponsoring the survey; (ii) to be young, as it is assumed that they can better handle new technologies; (iii) to have a high income; (iv) to live in urban areas; and (v) to have achieved a minimum academic degree. Surprisingly, some of the users that fulfill the predefined criteria fail to complete the survey within the time limits due to conditions not captured by the extracted data. For example, some of them may undergo some cognitive, hearing, vision, or speech impairment and others may try to answer the survey while performing some other task at the same time.
Industry 4.0 features may lead to deep changes and transformations in terms of labor rights, gender and social inequality, and new business models. However, this new scenario has to be supported by high-quality human-centered networks and computational intelligence able to handle the uncertainty introduced by people behavior. As far as communication networks challenges are concerned, according to the reviewed works, the proposals focus on SDN. Industry 4.0 uses SDNs to implement network virtualization [168], Ethernet network metrics [169], cloud manufacturing [170], cybersecurity [171], or resource allocation and information exchange for IoT or Industry 4.0 [172,173].

5. Radical New Approach to Deal with Uncertainty in HCNs

User-related and generated data (for simplicity referred just as user data) constitute the basis of almost all social applications based on interactive media technologies. However, in many situations of interest, mainly those that can be described as emotionally stressful, user data lack reliability. The reasons for the lack of reliability are manifold, going from simple mistakes when describing a situation to a distorted understanding of reality due to an emotionally impaired perception.
A scenario that accurately exemplifies the long-term vision of this new approach application can be illustrated in disaster management. In a hypothetical event of a car accident on a frequented highway, where many other cars pass by, we can imagine many social media posts describing details about it before any truly reliable information (e.g., the police arriving) is conveyed. In such a case, if the high volume of uncertain quality user-based information is instantly filtered so that a reliable source that, e.g., accurately reports the degree of passenger injury severity, is identified, the timely arrival of an ambulance could have a life-saving impact. Of course, the above is a nontrivial task as it implies mechanisms which are yet non-existent; it is certain though that an interdisciplinary approach is necessary to capture the diverse aspects of methods of human social expressions of perception in terms of data and to model it in a formal way in order to conceptualize such mechanisms and to infer the reliability of the information and knowledge that can be acquired from such data.
Due to this lack of reliability associated to user data, interactive media technologies-based applications that depend on the characterization and prediction of the information and knowledge acquired from such data may be severely impaired and are rarely adopted by the actors involved in real-life scenarios.
We conjecture that psychoanalysis theories may be used to objectively measure the reliability of the user’s discourse. From now on, this new approach is referred to as Psychoanalysis-Driven Computing (PDC).
User data characterization and processing in the form of text and speech are the input of PDC. Apart from traditional user data, such as the aforementioned, PDC considers new and emerging media type issues, such as crowdsourced data that are collected using public participation. In particular, by identifying specific patterns in user data regarding an individual, a group of people, or even a crowd, one can associate the user’s data stream in the context of the structural entities of the Lacanian theory, namely, the Lacanian Discourses. The Four Discourses theory constitutes an attempt of formalization of the different ways people relate to each other and the economy of knowledge and enjoyment in social relationships. The Lacanian framework defines a more complex representation of the roles assumed by two interacting parties, formulating four discrete discourse types [174,175,176]: Discourse of the Master—struggle for mastery/domination/penetration; Discourse of the University—provision and worship of “objective” knowledge, usually in the unacknowledged service of some external master discourse; Discourse of the Hysteric—symptoms embodying and revealing resistance to the prevailing master discourse; and Discourse of the Analyst—deliberate subversion of the prevailing master discourse.
Later, Lacan defined an additional fifth discourse, which is also considered: the discourse of the Capitalist [177], where the subject is commanded to enjoy commodities.
Each discourse is represented by an algorithm, containing four elements distributed in the four places of Lacan’s formal representation of an interaction (Figure 7). It is possible to draw a parallel between the terms of a discourse and the components of a communication process, in such a way that the dynamics of a given discourse, i.e., the internal relations between elements arranged in different places, can serve to characterize the dynamics of a given media process.
Precisely, the idea is that, by distinguishing the discourse type, the “truth” status of an enunciation can be qualified, i.e., it is the formal characteristics of the discourse that inform whether the truth is based on authority, on documented sources, on the needs of the speaker, or on provocation. For instance, in a hysteric discourse, the truth is strictly singular and reflects an individual experience; in a master discourse, the truth has been decreed by authority; in a university discourse, the truth has been documented by elements that act as sources of authority (e.g., objective counting); and finally, in an analyst discourse, the statement is to be heard as a question (or a provocation) in the hope of obtaining a reaction on that point. Nonetheless, mapping of an interaction with the Lacanian Discourses does not happen in an absolute way; instead, percentages of association with each of the discourses are derived, with the sum of all being 100%.
In this work, we propose the reconcilation of two fields that are both exceptional to the scientific discourse today: modern computing theory and psychoanalysis.
Tools coming from fields such as data mining, semantic and linguistics, or machine learning are necessary for analyzing the different kinds of user-generated language. A trained psychoanalyst can detect the above signifiers based on semantical analysis of the language; by using digital analysis of user data, we aim to abstract the methodology of a psychoanalyst in order to identify particularities in the speech signal in a purely computational manner. Given enough annotated data, we envision that, using machine learning, pattern recognition techniques, and games theory, such methodologies can be generalized to other typess of support, such as interactive discussion in social networks.
More specifically, to address implicit, hidden (i.e., unconscious) user expectations, emotions, attitudes, and interpretations of exchanged information, we use a variety of Computer Science (CS) methods such as the following:
  • Text mining and semantic analysis techniques, towards semantically rich representations of exchanged user texts;
  • Graph-based representations of user data and relevant network metrics (such as centrality), towards identifying key user behavior types and patterns;
  • Markovian models (Hidden Markov chains, dynamic graphs processes, information spreading, etc.) [178] to capture inherent dynamics and complex impacts of user data and Partially Observable Markov Decision Process (POMDP) to cope with the inherent uncertainty due to unreliable and/or incomplete information [179];
  • Bayesian Games [180,181,182,183], since in many situations, decision makers are not perfectly informed about the characteristics of others;
  • Non-Markovian models (to capture special dependency on the current state) such as Martingales [184];
  • Key algorithmic methodologies (primarily machine learning and cognitive reasoning) to characterize the user data, their reliability level, and the associated discourse types; and
  • Game theory methods, which can contribute to behavior prediction of rational individuals (and the society as a whole) [185,186,187,188]. It is worth noting that variants of game theory models (including penalties) can even address (and perhaps mitigate) “irrational” behavior, due to, e.g., to hidden, latent, or even unconscious mechanisms in one’s behavior and actions.
It can be argued how the Lacanian Discourse approach can be extended to groups with more than two interacting parties. The answer to this concern comes from recognizing that psychoanalysis is a general framework for the interpretation of situations expressed in any format and by any number of people. Since its development by Freud, it has been stated and shown that it can be used to interpret works of art [189], to analyze social situations [190,191], or to conjecture about the future of civilization [192,193]. These are just a few examples of Freud’s works applying psychoanalysis techniques out of the psychoanalytical setting of a patient and an analyst.
The Lacanian Discourses are a formal framework to apply psychoanalytical concepts to interpret any real-life situation. The aforementioned Freud’s works can be used as a reference model to interpret works of art, social situations, etc.
From the computational perspective, game-theoretic methods are applied to promote rational behavior of people interacting with each other.
Nevertheless, the association of an interaction with one of the discourses is not an easy task and has to be dealt with cautiously. An example that illustrates how a single media phenomenon can be seen from various angles according to discourse theory is provided by [194]: “When Google scans the Internet collecting information from each site, we are in the discourse of university. When it meets our demand providing results, we are in the discourse of hysteria. When we deify it, we are in the discourse of the master. When it computes our data and customizes the results it offers us, as if it knew us, knew our preferences and anticipate what we want, we are in the discourse of capitalism”. Therefore, it is paramount that the context is well defined before proceeding to association, so that the stakeholders of the discourse are clearly identified.
Context depends on the type of application. Kknowledge about the application implies knowledge of the context and establishes the contextual elements to be considered. The method proposed by PDC is general enough to be applied to any context.
To complement the above methodologies, user data are also analyzed independently in terms of coherence, using text mining techniques, which again partly aim to abstract the methodology of a psychoanalyst in a session but, this time, with respect to the theory of primary process mentation.
It will be important to combine the Lacanian Discourse type with the primary process index: it is more specifically in the Master and in the Hysterical Discourses that high primary process scores invalidate the reliability of the information conveyed in the discourse. Repetition in either the University or in the Analyst Discourses does not necessarily need to invalidate the reliability of the information (in the University Discourse, it might simply denote the wish to repeat the same, valid information, while in the analyst discourse, the repeated attempt is used to provoke a reaction). Thus, based on the above, the computational goal and challenge is to define methods to estimate these primary process indexes and to produce an associativity coefficient based solely on user data. By doing so, we acquire a metric that reflects the variance in a user’s language and that can serve as a global score of “stability” in producing data that can be used to acquire reliable information and knowledge.
Therefore, besides the Lacanian Discourses, the α and β concepts introduced by Wilfried R. Bion (1897–1979) [195,196] are used. In short, α -elements may be considered as the quanta of creative thoughts while β -elements are the quanta of useless thoughts. These elements can prove helpful when formalizing the underlying rules of a subject’s relationships with its social context, with the aim of producing quantifiable representations. For instance, the efficacy of a Web Learning Environment was analyzed in [197,198] using Bion’s concepts adapted to a remote learning session.
In summary, PDC proposes the building of a theoretical framework that allows for the characterization of user input in social interactions in terms of reliability in a tangible way by providing corresponding reliability coefficients. This occurs in a systematic and automatized way, starting from various forms of user data as input and by combining quantitative association to the Lacanian Discourses with extracted associativity coefficients, in order to produce a single reliability coefficient. This is undoubtedly a nontrivial task, as currently, there is no theoretical framework for quantitative association to the Lacanian Discourses or for such reliability coefficients. Therefore, during the PDC workflow, we study and develop mathematical models to define the theoretical background to serve as a basis for the above framework, providing methods and methodologies to automatically calculate the aforementioned associations and to produce the desired coefficients. In addition, a corresponding evaluation framework is established to provide quantifiable metrics for estimating the accuracy of the developed tools.
To illustrate how the PDC approach can be applied to evaluate user data reliability, consider the following hypothetical and extremely simple scenario illustrated in Table 8: a car accident scene and two different persons (“users”) witnessing it. the reactions and feelings of the two users are summarized below:
In this simple case, it is easily seen that the data provided by User 2 is most likely much more reliable than those provided by User 1. To arrive objectively at this conclusion, we introduce I m , I u , I h , and I a as indices corresponding to each one of the four basic Lacanian Discourses; their aim is measuring closeness to each discourse type as a result of some piece of data provided by a user. Additionally, let α and β be indices corresponding to the α and β elements in Bion’s theory. An indicative assignment of values to these indices, based on data provided by the users is given in Table 9 (their mean values are also calculated at the end).
The utility function for any Lacanian index I x given by U ( I x ) = 4 ( I x ) 2 + 4 I x is chosen to promote a “balanced” discourse in the sense that both the complete lack of a discourse type and an exaggerated discourse dominance orrespond to an extreme, incoherent discourse. The form of U ( I x ) can be seen in Figure 8.
Furthermore, we assume that utilities of individual indices are additive; thus, a multi-utility function (MUF) formulating closeness to the Lacanian Discourses may be given by the following:
U ( I m , I u , I h , I a ) = 1 4 [ U ( I m ) + U ( I u ) + U ( I h ) + U ( I a ) ]
In a similar manner, we may formulate the associativity coefficient as follows:
C A = 1 n i = 1 n ( α i β i )
where n is the number of pieces of user data.
Applying these formulations to the specific example, we get the following:
  • User 1: C R = 0.255 0.500 = 0.245
  • User 2: C R = 0.46875 + 1 = 1.46875
As we can see, the information acquired from User 2 is much more reliable than the information acquired by User 1.
As mentioned before, this is just a preliminary, indicative derivation aiming to exemplify our approach. Our approach is significantly enriched during the development of the PDC project, when we further study and evaluate different utility functions (potentially context-dependent) and diverse formulas for the two fundamental coefficients (reliability and associativity).

6. Discussion

The increased interweaving of networks and systems with human activities creates new development possibilities within several contexts. However, this brings about several challenges in the triad assessed in this work, such as the integration of decision-making under uncertainty, network resource management, and HCN. At this stage, we describe the main open research problems arising within this context, classified as presented in Figure 9.
  • Concerns in network connectivity. Mobility is one of the main characteristics of modern networks. However, depending on the technology, mobility may face challenges, such as radio spectrum reservations and allocation, bandwidth allocation, transfers, and routings. If communications are between heterogeneous networks, these situations may become quite complicated. Therefore, standardized self-organization mechanisms are required for the infrastructure to adjust to the constant changes caused by mobility and user demands, regardless of technology. However, cloud computing support provides greater availability and possibility for distributed and online processes to be implemented. Remote processes may be managed and monitored in manufacturing, medical care, or surveillance, among others, through their interaction with IoT. Nevertheless, in applications wherein response times are critical, this technology must be correctly assessed to prevent proper operations from being disrupted. Moreover, in contrast to cloud computing, fog computing uses a decentralized infrastructure that adapts to the specific nature of HCNs since devices can be distributed in several regions. Consequently, with fog computing, the data produced by devices is processed closer to the places where they are generated, which means that they are not uploaded over long distances to any cloud, thus improving the performance of the services offered by HCNs while decreasing response and reaction times. However, as fog computing continues to face several new challenges, such as business models, security, privacy, and scalability, further research on these areas may be required [4].
  • Concerns about security and privacy. Security risks can have economic, environmental, and organizational consequences that may be related to personal, social, or industrial environments. Even people’s lives may face some type of risk. Malware that impacts devices connected to networks may reduce DCN performance and may compromise package delivery to such an extent that the whole network may collapse, among other examples. Attacks from malware, such as Mirai, take control over IoT network devices, such as IP cameras, printers, routers, sensors, and others, to carry out a distributed denial of service attack. The Mirai attack was considered the most devastating in history because it affected around 164 countries and blocked Dyn, one of the most important domain name system service providers for worldwide companies. The attack affected application services provided by companies such as WhatsApp, Github, Twitter, PayPal, and Spotify. Another consequence may be the interception or modification of personal or business information. Issues related to cybersecurity, where the authorization and authentication of sensors, devices, and actuators, are critical for securing trust in HCN operations.
  • Elements related to decision-making. It is somewhat challenging to make decisions on cross-cutting issues such as HCN management due to the different types of resources used, such as heterogeneous networks, several types of sensors and devices, and the vast number of data collection sources, among others. Based on these reasons, reaching agreements on standards is a continuous improvement issue [199,200]. Furthermore, integrating decision-making and machine learning is an exciting matter due to the large amount of data, processing capacities, and the range of techniques that must adjust to needs under data uncertainty. In fact, this may even include exploring diverse possible potential integrations between MCDM methods and machine learning for each different phase of the decision-making process [94,201,202]. Another challenge faced is real-time decision-making processing because decisions are effective only if made in real time [203]. This involves several factors that require further research, such as data accuracy, low response times, distributed processing, and security methods [204].
  • Challenges related to sensors and devices. Regarding electronic devices, they take samples and report the behavior of environment variables or of the individuals for whom these variables were created. In both instances, problems arise in terms of access conditions to power grids or communications networks [205,206], and especially for wireless sensors, which, in general, exhibit decreased processing resources, battery autonomy, wireless range or security [207]. These constraints contrast with the demands for resources needed when applying machine learning techniques, which implies that identifying computationally efficient strategies is an essential component. Various device manufacturers are another issue, since each has its own input and output data formats, protocols, and interfaces and this hinders interoperability and smooth operations.
We identify, at least, the following future research directions:
  • IoT massification and the deployment of the 5G network will cause high network densification, which brings about the need to examine new routing protocols that may support constant changes in user contexts. This means that these protocols may use context information whenever moment priorities change, employing the required resources to meet new objectives.
  • The large level of ubiquity and information exchange among users and systems will facilitate security threats sustained by artificial intelligence. Therefore, there is an urgent need to set up policies and measures to protect personal information.
  • HCNs can potentially generate large amounts of data due to the integration and interconnection of individuals and machines as part of their network infrastructure. The availability of data generated by people and machines brings about an opportunity to compile context awareness. In this light, a new information technology paradigm must be proposed to consider the rationality and irrationality of human behavior when managing the resources of underlying infrastructures. For instance, to suppress the data uncertainty that humans add to emerging networks, the structuralist nature of psychoanalysis can be researched to model human uncertainty.

7. Conclusions

It is reasonable to assume that human-centric networks have a great impact on people’s lives. However, the intensive use of HCNs give rise to a huge amount of generated data traffic consuming a large quantity of DCN resources in terms of processing power, storage capacity, and energy. However, these data represent the raw material from which important information is derived to be used by new disruptive applications.
In this work, we presented a quite comprehensive review of decision-making computational methods such as MCDM, optimization algorithms, and machine learning that have been proposed to be used in different applications domains, for example, telecommunications, healthcare, transport and logistics, business and investment decisions, and industrial production planning. It has been shown that all of the proposed methods can be severely impaired by the uncertainty present in extracted data that may corrupt the information derived from them. Uncertainty is very difficult to deal with because of the diversity of sources ranging from electrical noise to human behavior. Clearly, a new multidisciplinary computational paradigm must be developed to assess and address uncertainty factors.
Data security and privacy are of paramount importance to be taken into account due to the implications and consequences of improper use of sensitive personal, technical, and business information. A strong emphasis must be put on promoting the establishment of governance rules to prevent abuse of sensitive data to protect society in all its dimensions. Otherwise, HCN will loose credibility and will not be accepted and adopted by anyone.
A closer look at the emerging concepts as Smart Spaces or Industry 4.0 reveals a worrying lack of worldwide accepted standards, even at the level of the concept definitions, that may jeopardize interoperability of devices, and single- and cross-domain applications.

Author Contributions

Original draft preparation, N.A.-M.; supervision, G.S.-B. and J.R.d.A.-A.; review and editing, G.S.-B. and J.R.d.A.-A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Spanish Ministry of Economy and Competitiveness under contract TEC2017-90034-C2-1-R (ALLIANCE project) that received funding from FEDER. Moreover, it was partially supported by the Spanish Thematic Network under contract RED2018-102585-T (Go2Edge) and by the aid granted by the Sinfoni project INV2733 of the Cooperative University of Colombia.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

In this section you can acknowledge any support given which is not covered by the author contribution or funding sections. This may include administrative and technical support, or donations in kind (e.g., materials used for experiments).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Conti, M.; Passarella, A.; Das, S.K. The Internet of People (IoP): A new wave in pervasive mobile computing. Pervasive Mob. Comput. 2017, 41, 1–27. [Google Scholar] [CrossRef]
  2. Dix, A. Human-computer interaction, foundations and new paradigms. J. Vis. Lang. Comput. 2016, 42, 122–134. [Google Scholar] [CrossRef] [Green Version]
  3. Bellini, E.; Bellini, P.; Cenni, D.; Nesi, P.; Pantaleo, G.; Paoli, I.; Paolucci, M. An IoE and Big Multimedia Data Approach for Urban Transport System Resilience Management in Smart Cities. Sensors 2021, 21, 435. [Google Scholar] [CrossRef]
  4. Fei, X.; Shah, N.; Verba, N.; Chao, K.M.; Sanchez-Anguix, V.; Lewandowski, J.; James, A.; Usman, Z. CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey. Future Gener. Comput. Syst. 2019, 90, 435–450. [Google Scholar] [CrossRef] [Green Version]
  5. Lee, J.; Bagheri, B.; Kao, H.A. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems. Manuf. Lett. 2015, 3, 18–23. [Google Scholar] [CrossRef]
  6. Chahuara, P.; Portet, F.; Vacher, M. Context-aware decision making under uncertainty for voice-based control of smart home. Expert Syst. Appl. 2017, 75, 63–79. [Google Scholar] [CrossRef] [Green Version]
  7. Jiang, W.; Strufe, M.; Schotten, H.D. A SON decision-making framework for intelligent management in 5G mobile networks. In Proceedings of the 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 13–16 December 2017; pp. 1158–1162. [Google Scholar]
  8. Kreutz, D.; Ramos, F.M.V.; Veríssimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-Defined Networking: A Comprehensive Survey. Proc. IEEE 2015, 103, 14–76. [Google Scholar] [CrossRef] [Green Version]
  9. Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372. [Google Scholar] [CrossRef]
  10. Zhou, Z.H. Three perspectives of data mining. Artif. Intell. 2003, 143, 139–146. [Google Scholar] [CrossRef] [Green Version]
  11. Saha, A.; Tasdid, M.N.; Rahman, M.R. Mining Semantic Web Based Ontological Data. In Proceedings of the 21st International Conference of Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 21–23 December 2018; pp. 1–5. [Google Scholar]
  12. Sheth, A. Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing. IEEE Intell. Syst. 2016, 31, 108–112. [Google Scholar] [CrossRef]
  13. Perera, C.; Zaslavsky, A.; Christen, P.; Georgakopoulos, D. Context Aware Computing for The Internet of Things: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 414–454. [Google Scholar] [CrossRef] [Green Version]
  14. Ruta, M.; Scioscia, F.; Pinto, A.; Gramegna, F.; Ieva, S.; Loseto, G.; Sciascio, E.D. Cooperative semantic sensor networks for pervasive computing contexts. In Proceedings of the 7th IEEE International Workshop on Advances in Sensors and Interfaces (IWASI), Vieste, Italy, 15–16 June 2017; pp. 38–43. [Google Scholar]
  15. Alhakbani, N.; Hassan, M.M.; Ykhlef, M.; Fortino, G. An efficient event matching system for semantic smart data in the Internet of Things (IoT) environment. Future Gener. Comput. Syst. 2019, 95, 163–174. [Google Scholar] [CrossRef]
  16. Wang, R.; Ji, W.; Liu, M.; Wang, X.; Weng, J.; Deng, S.; Gao, S.; Yuan, C.A. Review on mining data from multiple data sources. Pattern Recognit. Lett. 2018, 109, 120–128. [Google Scholar] [CrossRef]
  17. Eichstadt, S.; Gruber, M.; Vedurmudi, A.P.; Seeger, B.; Bruns, T.; Kok, G. Toward Smart Traceability for Digital Sensors and the Industrial Internet of Things. Sensors 2021, 21, 19. [Google Scholar] [CrossRef] [PubMed]
  18. Dong, Y.; Wan, K.; Yue, Y. A Semantic-Based Belief Network Construction Approach in IoT. Sensors 2020, 20, 5747. [Google Scholar] [CrossRef] [PubMed]
  19. Cofta, P.; Karatzas, K.; Orłowski, C. A Conceptual Model of Measurement Uncertainty in IoT Sensor Networks. Sensors 2021, 21, 1827. [Google Scholar] [CrossRef]
  20. Kabir, S.; Ripon, S.; Rahman, M.; Rahman, T. Knowledge-based Data Mining Using Semantic Web. IERI Procedia 2014, 7, 113–119. [Google Scholar] [CrossRef] [Green Version]
  21. Shadroo, S.; Rahmani, A.M. Systematic survey of big data and data mining in internet of things. Comput. Netw. 2018, 139, 19–47. [Google Scholar] [CrossRef]
  22. Sharma, S.; Kumar, A.; Rana, V. Ontology Based Informational Retrieval System on the Semantic Web: Semantic Web Mining. In Proceedings of the International Conference on Next Generation Computing and Information Systems (ICNGCIS), Jammu, India, 11–12 December 2017; pp. 35–37. [Google Scholar]
  23. Dou, D.; Wang, H.; Liu, H. Semantic data mining: A survey of ontology-based approaches. In Proceedings of the 9th International Conference on Semantic Computing (ICSC), Anaheim, CA, USA, 7–9 February 2015; pp. 244–251. [Google Scholar]
  24. Ristoski, P.; Paulheim, H. Semantic Web in data mining and knowledge discovery: A comprehensive survey. J. Web Semant. 2016, 36, 1–22. [Google Scholar] [CrossRef] [Green Version]
  25. Safwat, H.; Gruzitis, N.; Davis, B.; Enache, R. Extracting Semantic Knowledge from Unstructured Text Using Embedded Controlled Language. In Proceedings of the IEEE Tenth International Conference on Semantic Computing (ICSC), Laguna Hills, CA, USA, 4–6 February 2016; pp. 87–90. [Google Scholar]
  26. Nagorny, K.; Scholze, S.; Ruhl, M.; Colombo, A.W. Semantical support for a CPS data marketplace to prepare Big Data analytics in smart manufacturing environments. In Proceedings of the IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, Russia, 15–18 May 2018; pp. 206–211. [Google Scholar]
  27. Wang, Y.; Bai, X.; Ou, H. Design and Development of Intelligent Logistics System Based on Semantic Web and Data Mining Technology. In Proceedings of the International Conference on Computer Network, Electronic and Automation (ICCNEA), Xi’an, China, 23–25 September 2017; pp. 231–235. [Google Scholar]
  28. Shadbolt, N.; Berners-Lee, T.; Hall, W. The Semantic Web Revisited. IEEE Intell. Syst. 2006, 21, 96–101. [Google Scholar] [CrossRef] [Green Version]
  29. IEML. Le Métalangage de Léconomie de Línformation. LIVRE BLANC. 2019. Available online: https://www.dropbox.com/s/875vsj0atbcts43/0-00-IEML-Manifesto-2019-fr.pdf?dl=0 (accessed on 18 February 2021). [CrossRef]
  30. Lévy, P. The Semantic Sphere; Addison-Wesley: Reading, MA, USA, 2011. [Google Scholar]
  31. Kochenderfer, M.J.; Amato, C.; Chowdhary, G.; How, J.P.; Reynolds, H.J.D.; Thornton, J.R.; Torres-Carrasquillo, P.A.; Üre, N.K.; Vian, J. Decision Making under Uncertainty: Theory and Application; MIT Lincoln Laboratory Series; The MIT Press: Cambridge, MA, USA, 2015; p. 352. [Google Scholar]
  32. Cables, E.; Lamata, M.; Verdegay, J. RIM-reference ideal method in multicriteria decision making. Inf. Sci. 2016, 337, 1–10. [Google Scholar] [CrossRef]
  33. Asadabadi, M.R. The stratified multi-criteria decision-making method. Knowl. Based Syst. 2018, 162, 115–123. [Google Scholar] [CrossRef]
  34. Ferrara, M.; Rasouli, S.; Khademi, M.; Salimi, M. A robust optimization model for a decision-making problem: An application for stock market. Oper. Res. Perspect. 2017, 4, 136–141. [Google Scholar] [CrossRef]
  35. Chen, S.; Liu, J.; Wang, H.; Augusto, J.C. An evidential reasoning based approach for decision making with partially ordered preference under uncertainty. In Proceedings of the International Conference on Machine Learning and Cybernetics, Tianjin, China, 14–17 July 2013; pp. 1712–1717. [Google Scholar]
  36. Zhang, P.; Yao, H.; Qiu, C.; Liu, Y. Virtual Network Embedding Using Node Multiple Metrics Based on Simplified ELECTRE Method. IEEE Access 2018, 6, 37314–37327. [Google Scholar] [CrossRef]
  37. Dammak, F.; Baccour, L.; Ayed, A.B.; Alimi, A.M. ELECTRE method using interval-valued intuitionistic fuzzy sets and possibility theory for multi-criteria decision making problem resolution. In Proceedings of the IEEE International Conference on Fuzzy Systems, Naples, Italy, 9–12 July 2017; pp. 1–6. [Google Scholar]
  38. Gervasio, H.; Simoes Da Silva, L. A probabilistic decision-making approach for the sustainable assessment of infrastructures. Expert Syst. Appl. 2012, 39, 7121–7131. [Google Scholar] [CrossRef]
  39. Wei, L.; Yuan, Z.; Yan, Y.; Hou, J.; Qin, T. Evaluation of energy saving and emission reduction effect in thermal power plants based on entropy weight and PROMETHEE method. In Proceedings of the Chinese Control and Decision Conference (CCDC), Yinchuan, China, 28–30 May 2016; pp. 143–146. [Google Scholar]
  40. Almeida, A.T.d.; Morais, D.C.; Alencar, L.H.; Clemente, T.R.N.; Krym, E.M.; Barboza, C.Z. A multicriteria decision model for technology readiness assessment for energy based on PROMETHEE method with surrogate weights. In Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, Selangor, Malaysia, 9–12 December 2014; pp. 64–68. [Google Scholar]
  41. Smet, Y.D. About the computation of robust PROMETHEE II rankings: Empirical evidence. In Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Bali, Indonesia, 4–7 December 2016; pp. 1116–1120. [Google Scholar]
  42. Zavadskas, E.K.; Turskis, Z.; Bagočius, V. Multi-criteria selection of a deep-water port in the Eastern Baltic Sea. Appl. Soft Comput. 2015, 26, 180–192. [Google Scholar] [CrossRef]
  43. Mousavi, S.M.; Gitinavard, H.; Siadat, A. A new hesitant fuzzy analytical hierarchy process method for decision-making problems under uncertainty. In Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, Selangor, Malaysia, 9–12 December 2014; pp. 622–626. [Google Scholar]
  44. Kumar, G. A multi-criteria decision making approach for recommending a product using sentiment analysis. In Proceedings of the 12th International Conference on Research Challenges in Information Science (RCIS), Nantes, France, 29–31 May 2018; pp. 1–6. [Google Scholar]
  45. Qin, J.; Liu, X.; Pedrycz, W. An extended VIKOR method based on prospect theory for multiple attribute decision making under interval type-2 fuzzy environment. Knowl. Based Syst. 2015, 86, 116–130. [Google Scholar] [CrossRef]
  46. Morente-Molinera, J.A.; Kou, G.; Samuylov, K.; Ureña, R.; Herrera-Viedma, E. Carrying out consensual Group Decision Making processes under social networks using sentiment analysis over comparative expressions. Knowl. Based Syst. 2019, 165, 335–345. [Google Scholar] [CrossRef]
  47. Perçin, S. Evaluating airline service quality using a combined fuzzy decision-making approach. J. Air Transp. Manag. 2018, 68, 48–60. [Google Scholar] [CrossRef]
  48. Yu, B.; Cai, M.; Li, Q. A λ-rough set model and its applications with TOPSIS method to decision making. Knowl. Based Syst. 2019, 165, 420–431. [Google Scholar] [CrossRef]
  49. Chen, S.M.; Cheng, S.H.; Lan, T.C. A new multicriteria decision making method based on the topsis method and similarity measures between intuitionistic fuzzy sets. In Proceedings of the International Conference on Machine Learning and Cybernetics (ICMLC), Jeju, Korea, 10–13 July 2016; pp. 692–696. [Google Scholar]
  50. Cables, E.H.; Lamata, M.T.; Verdegay, J.L. Ideal Reference Method with Linguistic Labels: A Comparison with LTOPSIS. In Uncertainty Management with Fuzzy and Rough Sets: Recent Advances and Applications; Springer International Publishing: Cham, Switzerland, 2019; pp. 115–126. [Google Scholar]
  51. Khezrimotlagh, D.; Chen, Y. Data envelopment analysis. In International Series in Operations Research and Management Science; Springer: Dordrecht, The Netherlands, 2018; Volume 269, pp. 217–234. [Google Scholar]
  52. Roy, B. Classement et choix en présence de points de vue multiples. Rev. Française d’Informatique Rech. Opérationnelle 1968, 2, 57–75. [Google Scholar] [CrossRef]
  53. Mareschal, B.; Brans, J.P.; Vincke, P. PROMETHEE: A new family of outranking methods in multicriteria analysis. Oper. Res. ORIJ 1984, 84. Available online: https://ideas.repec.org/p/ulb/ulbeco/2013-9305.html (accessed on 18 February 2021).
  54. Saaty, T.L. The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation; McGraw-Hill: New York, USA, 1980; p. 287. [Google Scholar]
  55. Duckstein, L.; Opricovic, S. Multiobjective optimization in river basin development. Water Resour. Res. 1980, 16, 14–20. [Google Scholar] [CrossRef]
  56. Hwang, C.L.; Yoon, K. Methods for Multiple Attribute Decision Making. In Multiple Attribute Decision Making: Methods and Applications A State-of-the-Art Survey; Springer: Berlin/Heidelberg, Germany, 1981; pp. 58–191. [Google Scholar] [CrossRef]
  57. Charnes, A.; Cooper, W.; Rhodes, E. Measuring the efficiency of decision making units. Eur. J. Oper. Res. 1978, 2, 429–444. [Google Scholar] [CrossRef]
  58. Peng, X.; Garg, H. Algorithms for interval-valued fuzzy soft sets in emergency decision making based on WDBA and CODAS with new information measure. Comput. Ind. Eng. 2018, 119, 439–452. [Google Scholar] [CrossRef]
  59. Mokhtarian, M.N.; Sadi-Nezhad, S.; Makui, A. A new flexible and reliable IVF-TOPSIS method based on uncertainty risk reduction in decision making process. Appl. Soft Comput. J. 2014, 23, 509–520. [Google Scholar] [CrossRef]
  60. Madi, E.N.; Garibaldi, J.M.; Wagner, C. Exploring the use of type-2 fuzzy sets in multi-criteria decision making based on TOPSIS. In Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Naples, Italy, 9–12 July 2017; pp. 1–6. [Google Scholar]
  61. Yue, Z.; Jia, Y. An application of soft computing technique in group decision making under interval-valued intuitionistic fuzzy environment. Appl. Soft Comput. J. 2013, 13, 2490–2503. [Google Scholar] [CrossRef]
  62. Shen, L.; Wang, H.; Feng, X. Ranking Methods of Intuitionistic Fuzzy Numbers in Multicriteria Decision Making. In Proceedings of the 3rd International Conference on Information Management, Innovation Management and Industrial Engineering, Kunming, China, 26–28 November 2010; pp. 143–146. [Google Scholar]
  63. Yan, R.; Zheng, J.; Wang, X. Vague set methods of multi-criteria fuzzy decision-making. In Proceedings of the Chinese Control and Decision Conference, Xuzhou, China, 26–28 May 2010; pp. 658–661. [Google Scholar]
  64. Gao, C.; Lai, Z.; Zhou, J.; Zhao, C.; Miao, D. Maximum decision entropy-based attribute reduction in decision-theoretic rough set model. Knowl. Based Syst. 2018, 143, 179–191. [Google Scholar] [CrossRef]
  65. Remesh, K.M.; Nair, L.R. Rough set theory and three way decisions: Refinement of boundary region in the decision making process. In Proceedings of the International Conference on Information Science (ICIS), Kochi, India, 12–13 August 2016; pp. 156–159. [Google Scholar]
  66. Yao, J.; Azam, N. Web-Based Medical Decision Support Systems for Three-Way Medical Decision Making With Game-Theoretic Rough Sets. IEEE Trans. Fuzzy Syst. 2015, 23, 3–15. [Google Scholar] [CrossRef]
  67. Kondratenko, Y.; Kondratenko, G.; Sidenko, I. Multi-criteria Decision Making and Soft Computing for the Selection of Specialized IoT Platform. In Recent Developments in Data Science and Intelligent Analysis of Information; Chertov, O., Mylovanov, T., Kondratenko, Y., Kacprzyk, J., Kreinovich, V., Stefanuk, V., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 71–80. [Google Scholar]
  68. Lamata, M.T.; Pelta, D.A.; Rosete, A.; Verdegay, J.L. Context-Based Decision and Optimization: The Case of the Maximal Coverage Location Problem. In Information Processing and Management of Uncertainty in Knowledge-Based Systems; Medina, J., Ojeda-Aciego, M., Verdegay, J.L., Perfilieva, I., Bouchon-Meunier, B., Yager, R.R., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 330–341. [Google Scholar]
  69. Mendel, J.M. Type-1 Fuzzy Sets and Fuzzy Logic. In Uncertain Rule-Based Fuzzy Systems: Introduction and New Directions, 2nd ed.; Springer International Publishing: Cham, Switzerland, 2017; pp. 25–99. [Google Scholar] [CrossRef]
  70. Keshavarz Ghorabaee, M.; Amiri, M.; Zavadskas, E.K.; Turskis, Z.; Antucheviciene, J. A new multi-criteria model based on interval type-2 fuzzy sets and EDAS method for supplier evaluation and order allocation with environmental considerations. Comput. Ind. Eng. 2017, 112, 156–174. [Google Scholar] [CrossRef]
  71. Matía, F.; Jiménez, V.; Alvarado, B.P.; Haber, R. The fuzzy Kalman filter: Improving its implementation by reformulating uncertainty representation. Fuzzy Sets Syst. 2021, 402, 78–104. [Google Scholar] [CrossRef]
  72. Ma, Z.; Wang, S.; Deng, X.; Jiang, W. An improved approach for adversarial decision making under uncertainty based on simultaneous game. In Proceedings of the Chinese Control And Decision Conference (CCDC), Shenyang, China, 9–11 June 2018; pp. 2499–2503. [Google Scholar]
  73. Giraldo, F.A.; Gomez, J. The evolution of neural networks for decision making in non-cooperative repetitive games. In Proceedings of the 8th Computing Colombian Conference (8CCC), Armenia, Colombia, 21–23 August 2013; pp. 1–6. [Google Scholar]
  74. Chen, Y.; Jiang, C.; Wang, C.Y.; Gao, Y.; Liu, K.R. Decision Learning: Data analytic learning with strategic decision making. IEEE Signal Process. Mag. 2016, 33, 37–56. [Google Scholar] [CrossRef]
  75. Vamvakas, P.; Tsiropoulou, E.E.; Papavassiliou, S. Risk-Aware Resource Management in Public Safety Networks. Sensors 2019, 19, 3853. [Google Scholar] [CrossRef] [Green Version]
  76. Bin, Z.; Ming-jun, L.; Kai-ying, W.; Lin, W. Hybrid interval uncertain multi-attribute decision making based on set pair analysis. In Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer (MEC), Jilin, China, 19–22 August 2011; pp. 938–941. [Google Scholar]
  77. Du, P.; Liu, H. Study on air combat tactics decision-making based on bayesian networks. In Proceedings of the 2nd IEEE International Conference on Information Management and Engineering, Chengdu, China, 16–18 April 2010; pp. 252–256. [Google Scholar]
  78. Mushtaq, S.A.; Sajjadand, A.; Razzaq, S. Decision making framework with stochastic dynamicity: A step forward towards SDN. Procedia Comput. Sci. 2014, 34, 188–195. [Google Scholar] [CrossRef] [Green Version]
  79. Belzner, L.; Gabor, T. Bayesian Verification under Model Uncertainty. In Proceedings of the IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), Buenos Aires, Argentina, 21 May 2017; pp. 10–13. [Google Scholar]
  80. Carrera, A.; Alonso, E.; Iglesias, C.A. A Bayesian Argumentation Framework for Distributed Fault Diagnosis in Telecommunication Networks. Sensors 2019, 19, 3408. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  81. Kim, Y.J.; Ahn, K.U.; Park, C.S. Decision making of HVAC system using Bayesian Markov chain Monte Carlo method. Energy Build. 2014, 72, 112–121. [Google Scholar] [CrossRef]
  82. Cámara, J.; Peng, W.; Garlan, D.; Schmerl, B. Reasoning about sensing uncertainty and its reduction in decision-making for self-adaptation. Sci. Comput. Program. 2018, 167, 51–69. [Google Scholar] [CrossRef]
  83. Mukherjee, R. Selection of Sustainable Process and Essential Indicators for Decision Making Using Machine Learning Algorithms. Process Integr. Optim. Sustain. 2017, 1, 153–163. [Google Scholar] [CrossRef]
  84. de Medeiros, T.H.; Rocha, H.P.; Torres, F.S.; Takahashi, R.H.C.; Braga, A.P. Multi-objective Decision in Machine Learning. J. Control. Autom. Electr. Syst. 2017, 28, 217–227. [Google Scholar] [CrossRef]
  85. Kondratenko, Y.P.; Kozlov, O.V.; Korobko, O.V. Two Modifications of the Automatic Rule Base Synthesis for Fuzzy Control and Decision Making Systems. In Information Processing and Management of Uncertainty in Knowledge-Based Systems. Theory and Foundations; Medina, J., Ojeda-Aciego, M., Verdegay, J.L., Pelta, D.A., Cabrera, I.P., Bouchon-Meunier, B., Yager, R.R., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 570–582. [Google Scholar]
  86. Pynadath, D.V.; Barnes, M.J.; Wang, N.; Chen, J.Y.C. Transparency Communication for Machine Learning in Human-Automation Interaction. In Human and Machine Learning: Visible, Explainable, Trustworthy and Transparent; Springer International Publishing: Cham, Switzerland, 2018; pp. 75–90. [Google Scholar]
  87. Dilli, R.; Argou, A.; Reiser, R.; Yamin, A. IoT Resources Ranking: Decision Making Under Uncertainty Combining Machine Learning and Fuzzy Logic. In Communications in Computer and Information Science; Springer: Cham, Switzerland, 2018; Volume 831, pp. 119–131. [Google Scholar]
  88. Cao, K.; Wang, G.; Han, D.; Ning, J.; Zhang, X. Classification of Uncertain Data Streams Based on Extreme Learning Machine. Cogn. Comput. 2015, 7, 150–160. [Google Scholar] [CrossRef]
  89. Saleem, M.S.; Ding, C.; Liu, X.; Chi, C.H. Personalized Decision Making for QoS-Based Service Selection. In Proceedings of the IEEE International Conference on Web Services, Anchorage, AK, USA, 27 June–2 July 2014; pp. 17–24. [Google Scholar]
  90. Arif, M.; Kiani, A.K.; Qadir, J. Machine learning based optimized live virtual machine migration over WAN links. Telecommun. Syst. 2017, 64, 245–257. [Google Scholar] [CrossRef] [Green Version]
  91. Jamshidi, P.; Pahl, C.; Mendonca, N.C. Managing Uncertainty in Autonomic Cloud Elasticity Controllers. IEEE Cloud Comput. 2016, 3, 50–60. [Google Scholar] [CrossRef]
  92. Klus, R.; Klus, L.; Solomitckii, D.; Talvitie, J.; Valkama, M. Deep Learning-Based Cell-Level and Beam-Level Mobility Management System. Sensors 2020, 20, 7124. [Google Scholar] [CrossRef] [PubMed]
  93. Duchesne, L.; Karangelos, E.; Wehenkel, L. Machine learning of real-time power systems reliability management response. In Proceedings of the IEEE Manchester PowerTech, Manchester, UK, 18–22 June 2017; pp. 1–6. [Google Scholar]
  94. Tulabandhula, T.; Rudin, C. On combining machine learning with decision making. Mach. Learn. 2014, 97, 33–64. [Google Scholar] [CrossRef]
  95. Gomez Fernandez, M.; Tokuhiro, A.; Welter, K.; Wu, Q. Nuclear energy systems behavior and decision making using machine learning. Nucl. Eng. Des. 2017, 324, 27–34. [Google Scholar] [CrossRef]
  96. Luck, L.; Moser, A. Combining Machine Learning and Multi Criteria Decision Analysis Modeling Regulatory, Economic and Social Influences on Wind Turbine Allocation. In Proceedings of the 15th International Conference on the European Energy Market (EEM), Lodz, Poland, 27–29 June 2018; pp. 1–5. [Google Scholar]
  97. Cheng, S.; Xu, Y.; Zong, R.; Wang, C. A fast decision making method for mandatory lane change using kernel extreme learning machine. Int. J. Mach. Learn. Cybern. 2019, 10, 3363–3369. [Google Scholar] [CrossRef]
  98. Wu, X.; Xu, X.; Li, X.; Li, K.; Jiang, B. A kernel-based extreme learning modeling method for speed decision making of autonomous land vehicles. In Proceedings of the 6th Data Driven Control and Learning Systems (DDCLS), Chongqing, China, 26–27 May 2017; pp. 769–775. [Google Scholar]
  99. Hongmei, H.; McGinnity, T.M.; Coleman, S.; Gardiner, B. Linguistic Decision Making for Robot Route Learning. IEEE Trans. Neural Networks Learn. Syst. 2014, 25, 203–215. [Google Scholar]
  100. Kouppas, C.; Meng, Q.; King, M.; Majoe, D. Machine learning comparison for step decision making of a bipedal robot. In Proceedings of the 3rd International Conference on Control and Robotics Engineering (ICCRE), Nagoya, Japan, 20–23 April 2018; pp. 21–25. [Google Scholar]
  101. Samadi Gharajeh, M.; Jond, H.B. Speed Control for Leader-Follower Robot Formation Using Fuzzy System and Supervised Machine Learning. Sensors 2021, 21, 3433. [Google Scholar] [CrossRef]
  102. Aydoğan, R.; Marsa-Maestre, I.; Klein, M.; Jonker, C.M. A Machine Learning Approach for Mechanism Selection in Complex Negotiations. J. Syst. Sci. Syst. Eng. 2018, 27, 134–155. [Google Scholar] [CrossRef] [Green Version]
  103. Gross, K.C.; Baclawski, K.; Chan, E.S.; Gawlick, D.; Ghoneimy, A.; Liu, Z.H. A supervisory control loop with Prognostics for human-in-the-loop decision support and control applications. In Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Savannah, GA, USA, 27–31 March 2017; pp. 1–7. [Google Scholar]
  104. Vidhate, D.A.; Kulkarni, P. Improved decision making in multiagent system for diagnostic application using cooperative learning algorithms. Int. J. Inf. Technol. 2018, 10, 201–209. [Google Scholar] [CrossRef]
  105. Bhat, M.; Shumaiev, K.; Biesdorf, A.; Hohenstein, U.; Matthes, F. Automatic extraction of design decisions from issue management systems: A machine learning based approach. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2017; Volume 10475, pp. 138–154. [Google Scholar]
  106. Lombardi, M.; Milano, M.; Bartolini, A. Empirical decision model learning. Artif. Intell. 2017, 244, 343–367. [Google Scholar] [CrossRef]
  107. Ramchandani, P.; Paich, M.; Rao, A. Incorporating Learning into Decision Making in Agent Based Models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2017; Volume 10423, pp. 789–800. [Google Scholar]
  108. Vidhate, D.A.; Kulkarni, P. Performance enhancement of cooperative learning algorithms by improved decision making for context based application. In Proceedings of the International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, India, 9–10 September 2016; pp. 246–252. [Google Scholar]
  109. Di Capua, M.; Petrosino, A. A Deep Learning Approach to Deal with Data Uncertainty in Sentiment Analysis. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2017; Volume 10147, pp. 172–184. [Google Scholar]
  110. Es-Soufi, W.; Yahia, E.; Roucoules, L. On the Use of Process Mining and Machine Learning to Support Decision Making in Systems Design. In IFIP Advances in Information and Communication Technology; Springer: Cham, Switzerland, 2016; Volume 492, pp. 56–66. [Google Scholar]
  111. Cook, A.; Wu, P.; Mengersen, K. Machine Learning and Visual Analytics for Consulting Business Decision Support. In Proceedings of the Big Data Visual Analytics (BDVA), Hobart, TAS, Australia, 22–25 September 2015; pp. 1–2. [Google Scholar]
  112. Lyubchyk, L.; Grinberg, G. Pairwise kernel-based preference learning for multiple criteria decision making. In Proceedings of the IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), Kyiv, UKraine, 29 May–2 June 2017; pp. 818–821. [Google Scholar]
  113. Spychalski, P.; Arendt, R. Machine Learning in Multi-Agent Systems using Associative Arrays. Parallel Comput. 2018, 75, 88–99. [Google Scholar] [CrossRef]
  114. Czarnecki, W.M.; Podolak, I.T. Machine Learning with Known Input Data Uncertainty Measure. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2013; Volume 8104, pp. 379–388. [Google Scholar]
  115. Feng, D.; Rosenbaum, L.; Dietmayer, K. Towards Safe Autonomous Driving: Capture Uncertainty in the Deep Neural Network For Lidar 3D Vehicle Detection. In Proceedings of the 21st International Conference on Intelligent Transportation Systems (ITSC), Maui, HI, USA, 4–7 November 2018; pp. 3266–3273. [Google Scholar]
  116. Isobe, S.; Arai, S. Inference with model uncertainty on indoor scene for semantic segmentation. In Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP), Montreal, QC, Canada, 14–16 November 2017; pp. 1170–1174. [Google Scholar]
  117. Shafaei, S.; Kugele, S.; Osman, M.H.; Knoll, A. Uncertainty in machine learning: A safety perspective on autonomous driving. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2018; Volume 11094, pp. 458–464. [Google Scholar]
  118. Ayeldeen, H.; Shaker, O.; Ayeldeen, G.; Anwar, K.M. Prediction of liver fibrosis stages by machine learning model: A decision tree approach. In Proceedings of the Third World Conference on Complex Systems (WCCS), Marrakech, Morocco, 23–25 November 2015; pp. 1–6. [Google Scholar]
  119. Donsa, K.; Spat, S.; Beck, P.; Pieber, T.R.; Holzinger, A. Towards Personalization of Diabetes Therapy Using Computerized Decision Support and Machine Learning: Some Open Problems and Challenges. In Smart Health: Open Problems and Future Challenges; Springer International Publishing: Cham, Switzerland, 2015; pp. 237–260. [Google Scholar]
  120. Eremeev, A.; Ivliev, S.; Vagin, V. Using Nosql Databases and Machine Learning for Implementation of Intelligent Decision System in Complex Vision Patalogies. In Proceedings of the 3rd Russian-Pacific Conference on Computer Technology and Applications (RPC), Vladivostok, Russia, 18–25 August 2018; pp. 1–4. [Google Scholar]
  121. Wu, D.D.; Zheng, L.; Olson, D.L. A Decision Support Approach for Online Stock Forum Sentiment Analysis. IEEE Trans. Syst. Man, Cybern. Syst. 2014, 44, 1077–1087. [Google Scholar] [CrossRef]
  122. Swierczyska, D.; Stach, T.; Pelc, M. Toward a Framework for Evaluation of Cache-Based Decision Making Process. In Proceedings of the 23rd International Conference on Methods & Models in Automation & Robotics (MMAR), Miedzyzdroje, Poland, 27–30 August 2018; pp. 855–858. [Google Scholar]
  123. Thangavel, S.K.; Bkaratki, P.D.; Sankar, A. Student placement analyzer: A recommendation system using machine learning. In Proceedings of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–5. [Google Scholar]
  124. Nieto, Y.; García-Díaz, V.; Montenegro, C.; Crespo, R.G. Supporting academic decision making at higher educational institutions using machine learning-based algorithms. Soft Comput. 2018, 23, 4145–4153. [Google Scholar] [CrossRef]
  125. Jin, X. Research on Command Decision Support System AI Problem Decomposition. In Proceedings of the 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), Hangzhou, China, 25–26 August 2018; Volume 2, pp. 96–100. [Google Scholar]
  126. Trehan, S.; Durlofsky, L.J. Machine-learning-based modeling of coarse-scale error, with application to uncertainty quantification. Comput. Geosci. 2018, 22, 1093–1113. [Google Scholar] [CrossRef]
  127. Shi, L.; Liu, S.; Hao, J.; Koh, J.Y.; Hou, Z.; Dong, J.S. Towards Solving Decision Making Problems Using Probabilistic Model Checking. In Proceedings of the 22nd International Conference on Engineering of Complex Computer Systems (ICECCS), Fukuoka, Japan, 5–8 November 2017; pp. 150–153. [Google Scholar]
  128. Zhou, Q.; Huang, Z. A Decision-Making Method Using Knowledge-Based Machine Learning. In Proceedings of the International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, China, 23–25 March 2012; Volume 3, pp. 616–620. [Google Scholar]
  129. Haldenwang, N.; Ihler, K.; Kniephoff, J.; Vornberger, O. A comparative study of uncertainty based active learning strategies for general purpose twitter sentiment analysis with deep neural networks. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2018; Volume 10713, pp. 208–215. [Google Scholar]
  130. Chowdhury, A.; Raut, S.A.; Narman, H.S. DA-DRLS: Drift adaptive deep reinforcement learning based scheduling for IoT resource management. J. Netw. Comput. Appl. 2019, 138, 51–65. [Google Scholar] [CrossRef]
  131. Mazied, E.A.; ElNainay, M.Y.; Abdel-Rahman, M.J.; Midkiff, S.F.; Rizk, M.R.M.; Rakha, H.A.; MacKenzie, A.B. The wireless control plane: An overview and directions for future research. J. Netw. Comput. Appl. 2019, 126, 104–122. [Google Scholar] [CrossRef] [Green Version]
  132. Boushaba, M.; Hafid, A.; Gendreau, M. Node stability-based routing in Wireless Mesh Networks. J. Netw. Comput. Appl. 2017, 93, 1–12. [Google Scholar] [CrossRef]
  133. Peters, M.; Ketter, W.; Saar-Tsechansky, M.; Collins, J. A reinforcement learning approach to autonomous decision-making in smart electricity markets. Mach. Learn. 2013, 92, 5–39. [Google Scholar] [CrossRef]
  134. Rodriguez-Fernandez, J.; Pinto, T.; Silva, F.; Praça, I.; Vale, Z.; Corchado, J. Context aware Q-Learning-based model for decision support in the negotiation of energy contracts. Int. J. Electr. Power Energy Syst. 2019, 104, 489–501. [Google Scholar] [CrossRef]
  135. Zheng, R.; Liu, C.; Guo, Q. A decision-making method for autonomous vehicles based on simulation and reinforcement learning. In Proceedings of the International Conference on Machine Learning and Cybernetics, Tianjin, China, 14–17 July 2013; pp. 362–369. [Google Scholar]
  136. Mirchevska, B.; Pek, C.; Werling, M.; Althoff, M.; Boedecker, J. High-level Decision Making for Safe and Reasonable Autonomous Lane Changing using Reinforcement Learning. In Proceedings of the 21st International Conference on Intelligent Transportation Systems (ITSC), Maui, HI, USA, 4–7 November 2018; pp. 2156–2162. [Google Scholar]
  137. Leonetti, M.; Iocchi, L.; Stone, P. A synthesis of automated planning and reinforcement learning for efficient, robust decision-making. Artif. Intell. 2016, 241, 103–130. [Google Scholar] [CrossRef] [Green Version]
  138. Liang, H.; Yang, L.; Cheng, H.; Tu, W.; Xu, M. Human-in-the-loop reinforcement learning. In Proceedings of the Chinese Automation Congress (CAC), Jinan, China, 20–22 October 2017; pp. 4511–4518. [Google Scholar]
  139. Khayut, B.; Fabri, L.; Avikhana, M. Modeling of computational perception of reality, situational awareness, cognition and machine learning under uncertainty. In Proceedings of the Intelligent Systems Conference (IntelliSys), London, UK, 7–8 September 2017; pp. 331–340. [Google Scholar]
  140. Castaño, F.; Strzelczak, S.; Villalonga, A.; Haber, R.E.; Kossakowska, J. Sensor Reliability in Cyber-Physical Systems Using Internet-of-Things Data: A Review and Case Study. Remote Sens. 2019, 11, 2252. [Google Scholar] [CrossRef] [Green Version]
  141. Gavirangaswamy, V.B.; Gupta, A.A.; Gupta, A.A. A parallel implementation of reinforced learning model used in analyzing risky decision making. In Proceedings of the International Conference on High Performance Computing & Simulation (HPCS), Innsbruck, Austria, 18–22 July 2016; pp. 940–946. [Google Scholar]
  142. Doltsinis, S.; Ferreira, P.; Lohse, N. A Symbiotic Human-Machine Learning Approach for Production Ramp-up. IEEE Trans. Hum. Mach. Syst. 2018, 48, 229–240. [Google Scholar] [CrossRef] [Green Version]
  143. Shin, J.; Lee, J.H. Multi-timescale, multi-period decision-making model development by combining reinforcement learning and mathematical programming. Comput. Chem. Eng. 2019, 121, 556–573. [Google Scholar] [CrossRef]
  144. Akiyama, H.; Tsuji, M.; Aramaki, S. Learning Evaluation Function for Decision Making of Soccer Agents Using Learning to Rank. In Proceedings of the Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), Sapporo, Japan, 25–28 August 2016; pp. 239–242. [Google Scholar]
  145. Villalonga, A.; Beruvides, G.; Castaño, F.; Haber, R.E. Cloud-Based Industrial Cyber–Physical System for Data-Driven Reasoning: A Review and Use Case on an Industry 4.0 Pilot Line. IEEE Trans. Ind. Inform. 2020, 16, 5975–5984. [Google Scholar] [CrossRef]
  146. Ravì, D.; Wong, C.; Lo, B.; Yang, G. A Deep Learning Approach to on-Node Sensor Data Analytics for Mobile or Wearable Devices. IEEE J. Biomed. Health Inform. 2017, 21, 56–64. [Google Scholar] [CrossRef] [Green Version]
  147. Sun, H.; Chen, X.; Shi, Q.; Hong, M.; Fu, X.; Sidiropoulos, N.D. Learning to optimize: Training deep neural networks for wireless resource management. In Proceedings of the IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2017; pp. 1–6. [Google Scholar]
  148. Ravi, D.; Wong, C.; Lo, B.; Yang, G. Deep learning for human activity recognition: A resource efficient implementation on low-power devices. In Proceedings of the IEEE 13th International Conference on Wearable and Implantable Body Sensor Networks (BSN), San Francisco, CA, USA, 14–17 June 2016; pp. 71–76. [Google Scholar]
  149. Liu, M.; Song, T.; Hu, J.; Yang, J.; Gui, G. Deep Learning-Inspired Message Passing Algorithm for Efficient Resource Allocation in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 2019, 68, 641–653. [Google Scholar] [CrossRef]
  150. He, Y.; Yu, F.R.; Zhao, N.; Leung, V.C.M.; Yin, H. Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach. IEEE Commun. Mag. 2017, 55, 31–37. [Google Scholar] [CrossRef]
  151. Ziaeefard, M.; Bergevin, R.; Lalonde, J.F. Deep Uncertainty Interpretation in Dyadic Human Activity Prediction. In Proceedings of the 16th IEEE International Conference on Machine Learning and Applications (ICMLA), Cancun, Mexico, 18–21 December 2017; pp. 822–825. [Google Scholar]
  152. Zheng, R.; Greenberg, K. Effective Design in Human and Machine Learning: A Cognitive Perspective. In Human and Machine Learning: Visible, Explainable, Trustworthy and Transparent; Springer: Cham, Switzerland, 2018; pp. 55–74. [Google Scholar]
  153. Wakatsuki, M.; Fujimura, M.; Nishino, T. A Decision Making Method Based on Society of Mind Theory in Multi-player Imperfect Information Games. In Proceedings of the 3rd International Conference on Applied Computing and Information Technology/2nd International Conference on Computational Science and Intelligence, Okayama, Japan, 12–16 July 2015; pp. 67–72. [Google Scholar]
  154. Zhao, X.; Chen, F.; Cho, J.H. Deep Learning Based Scalable Inference of Uncertain Opinions. In Proceedings of the IEEE International Conference on Data Mining (ICDM), Singapore, 17–20 November 2018; pp. 807–816. [Google Scholar]
  155. Zhang, Y.; Zu, W.; Gao, Y.; Chang, H. Research on autonomous maneuvering decision of UCAV based on deep reinforcement learning. In Proceedings of the Chinese Control And Decision Conference (CCDC), Shenyang, China, 9–11 June 2018; pp. 230–235. [Google Scholar]
  156. Kendall, A.; Cipolla, R. Modelling uncertainty in deep learning for camera relocalization. In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA), Stockholm, Sweden, 16–21 May 2016; pp. 4762–4769. [Google Scholar]
  157. Hoblitzell, A.; Babbar-Sebens, M.; Mukhopadhyay, S. Uncertainty-Based Deep Learning Networks for Limited Data Wetland User Models. In Proceedings of the IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR), Taichung, Taiwan, 10–12 December 2018; pp. 19–26. [Google Scholar]
  158. Pan, H.; Gui, G.; Lin, Z.; Yan, C. Deep BBN Learning for Health Assessment toward Decision-Making on Structures under Uncertainties. KSCE J. Civ. Eng. 2018, 22, 928–940. [Google Scholar] [CrossRef]
  159. Kratzwald, B.; Ilić, S.; Kraus, M.; Feuerriegel, S.; Prendinger, H. Deep learning for affective computing: Text-based emotion recognition in decision support. Decis. Support Syst. 2018, 115, 24–35. [Google Scholar] [CrossRef] [Green Version]
  160. Dilokthanakul, N.; Shanahan, M. Deep Reinforcement Learning with Risk-Seeking Exploration. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Cham, Switzerland, 2018; Volume 10994, pp. 201–211. [Google Scholar]
  161. Brando, A.; Rodríguez-Serrano, J.A.; Ciprian, M.; Maestre, R.; Vitrià, J. Uncertainty Modelling in Deep Networks: Forecasting Short and Noisy Series. In Machine Learning and Knowledge Discovery in Databases; Springer International Publishing: Cham, Switzerland, 2019; pp. 325–340. [Google Scholar]
  162. Cho, C.; Choi, W.; Kim, T. Leveraging Uncertainties in Softmax Decision-Making Models for Low-Power IoT Devices. Sensors 2020, 20, 4603. [Google Scholar] [CrossRef]
  163. Le, M.T.; Diehl, F.; Brunner, T.; Knol, A. Uncertainty Estimation for Deep Neural Object Detectors in Safety-Critical Applications. In Proceedings of the 21st International Conference on Intelligent Transportation Systems (ITSC), Maui, HI, USA, 4–7 November 2018; pp. 3873–3878. [Google Scholar]
  164. Ashton, K. That ’Internet of Things’ thing in the real world, things matter more than ideas. RFID J. 2009, 22, 97–114. [Google Scholar]
  165. Ken, S.A.F.; Eldor, S.R.M.; Guillemin, W.C.H.; Paul, Y.W.K.; Armstrong, C.D.; Smith, I.G.; Kim, Y.-W.; Chartier, C.P.; Armstrong, L.D. RFID and the Inclusive Model for the Internet of Things. Available online: https://docbox.etsi.org/zArchive/TISPAN/Open/IoT/low%20resolution/www.rfidglobal.eu%20CASAGRAS%20IoT%20Final%20Report%20low%20resolution.pdf (accessed on 6 January 2021).
  166. Cearley, D.; Burke, B.; Furlonger, D.; Kandaswamy, R.; Litan, A. Top 10 Strategic Technology Trends for 2019; Technical Report March 2019; Gartner: Stamford, USA, 2019. [Google Scholar]
  167. Gorecky, D.; Schmitt, M.; Loskyll, M.; Zuhlke, D. Human-machine-interaction in the industry 4.0 era. In Proceedings of the 12th IEEE International Conference on Industrial Informatics (INDIN), Porto Alegre, Brazil, 27–30 July 2014; pp. 289–294. [Google Scholar]
  168. Ma, Y.W.; Chen, Y.C.; Chen, J.L. SDN-enabled network virtualization for industry 4.0 based on IoTs and cloud computing. In Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, South Korea, 19–22 February 2017; pp. 199–202. [Google Scholar]
  169. Zeng, P.; Wang, Z.; Jia, Z.; Kong, L.; Li, D.; Jin, X. Time-slotted software-defined Industrial Ethernet for real-time Quality of Service in Industry 4.0. Future Gener. Comput. Syst. 2019, 99, 1–10. [Google Scholar] [CrossRef]
  170. Thames, L.; Schaefer, D. Software-defined Cloud Manufacturing for Industry 4.0. Procedia CIRP 2016, 52, 12–17. [Google Scholar] [CrossRef] [Green Version]
  171. Fraile, F.; Flores, J.L.; Poler, R.; Saiz, E. Software-Defined Networking to Improve Cybersecurity in Manufacturing Oriented Interoperability Ecosystems. In Enterprise Interoperability VIII; Springer: Berlin, Germany, 19–23 March 2018; pp. 31–41. [Google Scholar]
  172. Wan, J.; Tang, S.; Shu, Z.; Li, D.; Wang, S.; Imran, M.; Vasilakos, A. Software-Defined Industrial Internet of Things in the Context of Industry 4.0. IEEE Sens. J. 2016, 16, 7373–7380. [Google Scholar] [CrossRef]
  173. Villalonga, A.; Negri, E.; Biscardo, G.; Castano, F.; Haber, R.E.; Fumagalli, L.; Macchi, M. A decision-making framework for dynamic scheduling of cyber-physical production systems based on digital twins. Annu. Rev. Control. 2021. [Google Scholar] [CrossRef]
  174. Lacan, J. Seminaire 20: Encore. 1972–1973. Available online: http://staferla.free.fr/S20/S20/20ENCORE.pdf (accessed on 22 April 2021).
  175. Lacan, J. Seminaire 22: R. S. I. 1974–1975. Available online: http://staferla.free.fr/S22/S22/20R.S.I..pdf (accessed on 24 April 2021).
  176. Bailly, L. Lacan: A Beginner’s Guide; Oneworld Publications: London, UK, 2009. [Google Scholar]
  177. Contri, G.B. (Ed.) Lacan in Italia 1953–1978; Chapter Du Discours Psychanalytique; Available online: https://www.praxislacaniana.it/wordpress/download/lacan_in_italia.pdf (accessed on 25 April 2021).
  178. Norris, J.R. Markov Chains; Cambridge Series on Statistical & Probabilistic Mathematics; Cambridge University Press: Cambridge, UK, 1997. [Google Scholar]
  179. Krishnamurthy, V. Partially Observed Markov Decision Processes; Cambridge University Press: Cambridge, UK, 2016. [Google Scholar]
  180. Harsanyi, J. Games with Incomplete Information Played by Bayesian Players—Part I. Manag. Sci. 1967, 14, 159–183. [Google Scholar] [CrossRef]
  181. Harsanyi, J. Games with Incomplete Information Played by Bayesian Players—Part II. Manag. Sci. 1968, 14, 320–334. [Google Scholar] [CrossRef]
  182. Harsanyi, J. Games with Incomplete Information Played by Bayesian Players—Part III. Manag. Sci. 1968, 14, 486–502. [Google Scholar] [CrossRef]
  183. Osborne, M.J.; Rubinstein, A. A Course in Game Theory; MIT Press: Cambridge, MA, USA, 1994; ISBN 0-262-65040-1. [Google Scholar]
  184. Williams, D. Probability with Martingales; Cambridge University Press: Cambridge, UK, 1991. [Google Scholar]
  185. Deligkas, A.; Fearnley, J.; Savani, R.; Spirakis, P. Computing Approximate Nash Equilibria in Polymatrix Games. Algorithmica 2017, 72, 487–514. [Google Scholar] [CrossRef] [Green Version]
  186. Fotakis, D.; Gkatzelis, V.; Kaporis, A.; Spirakis, P. The Impact of Social Ignorance on Weighted Congestion Games. In Theory of Computing Systems; Springer: Berlin, Germany, 2012; pp. 559–578. [Google Scholar]
  187. Fotakis, D.; Kaporis, A.C.; Lianeas, T.; Spirakis, P.G. Resolving Braess’s Paradox in Random Networks. Algorithmica 2017, 78, 788–818. [Google Scholar] [CrossRef]
  188. Nikoletseas, S.; Panagopoulou, P.; Raptopoulos, C.; Spirakis, P. On the Structure of Equilibria in Basic Network Formation. Theor. Comput. Sci. 2015, 590, 96–105. [Google Scholar] [CrossRef]
  189. Freud, S. The Moses of Michelangelo. In The Standard Edition of the Complete Psychological Works of Sigmund Freud; Strachey, J., Ed.; Hogarth Press: London, UK, 1914; Volume XIV, pp. 211–238. [Google Scholar]
  190. Freud, S. Group Psychology and the Analysis of the Ego. In The Standard Edition of the Complete Psychological Works of Sigmund Freud; Strachey, J., Ed.; Hogarth Press: London, UK, 1921; Volume XVIII, pp. 67–143. [Google Scholar]
  191. Freud, S. Why War? In The Standard Edition of the Complete Psychological Works of Sigmund Freud; Strachey, J., Ed.; Hogarth Press: London, UK, 1933; Volume XXII, pp. 197–215. [Google Scholar]
  192. Freud, S. The Future of an Illusion. In The Standard Edition of the Complete Psychological Works of Sigmund Freud; Strachey, J., Ed.; Hogarth Press: London, UK, 1927; Volume XXI, pp. 3–56. [Google Scholar]
  193. Freud, S. Civilization and its Discontents. In The Standard Edition of the Complete Psychological Works of Sigmund Freud; Strachey, J., Ed.; Hogarth Press: London, UK, 1930; Volume XXI, pp. 59–145. [Google Scholar]
  194. Castro, J.C.L.D. Applications of the Lacanian theory of discourses in the field of Communication. Intercom Rev. Bras. Cienc. Comun. 2016, 39, 99–113. [Google Scholar] [CrossRef] [Green Version]
  195. Bion, W.R. Elements of Psychoanalysis; Maresfield Library, Ed.; Karnac: London, UK, 1984. [Google Scholar]
  196. Bion, W.R. Learning from Experience; Maresfield Library, Ed.; Karnac: London, UK, 1994. [Google Scholar]
  197. Amazonas, J.R.A. From Thinking the Thought Towards Teach the Teaching. In Proceedings of the World Congress on Engineering and Technology Education, Guarujá and Santos, Brazil, 14–17 March 2004; pp. 121–123. [Google Scholar]
  198. Amazonas, J.R.A. Alpha-elements generation modelling in Web learning environments. In Proceedings of the GCETE’2005—Global Congress on Engineering and Technology Education, São Paulo, Brazil, 13–16 March 2005; pp. 100–103. [Google Scholar]
  199. Reddy, R.R.G.; Mamatha, C.; Reddy, R.R.G. A Review on Machine Learning Trends, Application and Challenges in Internet of Things. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, India, 19–22 September 2018; pp. 2389–2397. [Google Scholar]
  200. Djorgovski, S.G.; Mahabal, A.; Donalek, C.; Graham, M.; Drake, A.; Turmon, M.; Fuchs, T. Automated Real-Time Classification and Decision Making in Massive Data Streams from Synoptic Sky Surveys. In Proceedings of the IEEE 10th International Conference on e-Science, Sao Paulo, Brazil, 20–24 October 2014; pp. 204–211. [Google Scholar]
  201. Kartal, H.; Oztekin, A.; Gunasekaran, A.; Cebi, F. An integrated decision analytic framework of machine learning with multi-criteria decision making for multi-attribute inventory classification. Comput. Ind. Eng. 2016, 101, 599–613. [Google Scholar] [CrossRef]
  202. Lamata, M.T.; Pelta, D.A.; Verdegay, J.L. Fuzzy Information and Contexts for Designing Automatic Decision-Making Systems. In Advances in Artificial Intelligence; Springer International Publishing: Cham, Switzerland, 2018; pp. 174–183. [Google Scholar]
  203. Eremeev, A.P.; Kozhukhov, A.A. About the Integration of Learning and Decision-Making Models in Intelligent Systems of Real-Time. In Proceedings of the Third International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’18), Cham, Switzerland, 17–21 September 2018; pp. 181–189. [Google Scholar]
  204. Tien, J.M. Internet of Things, Real-Time Decision Making, and Artificial Intelligence. Ann. Data Sci. 2017, 4, 149–178. [Google Scholar] [CrossRef]
  205. Cui, L.; Yang, S.; Chen, F.; Ming, Z.; Lu, N.; Qin, J. A survey on application of machine learning for Internet of Things. Int. J. Mach. Learn. Cybern. 2018, 9, 1399–1417. [Google Scholar] [CrossRef]
  206. Mahdavinejad, M.S.; Rezvan, M.; Barekatain, M.; Adibi, P.; Barnaghi, P.; Sheth, A.P. Machine learning for internet of things data analysis: A survey. Digit. Commun. Netw. 2018, 4, 161–175. [Google Scholar] [CrossRef]
  207. Shaukat, H.R.; Hashim, F.; Shaukat, M.A.; Ali Alezabi, K. Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN). Sensors 2020, 20, 2283. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Prisma diagram.
Figure 1. Prisma diagram.
Sensors 21 03791 g001
Figure 2. Literary review structure.
Figure 2. Literary review structure.
Sensors 21 03791 g002
Figure 3. Classification of computational methods for decision-making.
Figure 3. Classification of computational methods for decision-making.
Sensors 21 03791 g003
Figure 4. Classification of machine-learning methods.
Figure 4. Classification of machine-learning methods.
Sensors 21 03791 g004
Figure 5. A MWSN scenario. (A) Illustration depicting a scenario without uncertainty, (B) system failure due to introduction of human uncertainty.
Figure 5. A MWSN scenario. (A) Illustration depicting a scenario without uncertainty, (B) system failure due to introduction of human uncertainty.
Sensors 21 03791 g005
Figure 6. A Smart Space scenario.
Figure 6. A Smart Space scenario.
Sensors 21 03791 g006
Figure 7. The four places of the discourse: the “agent”, the giver of the discourse; the “other”, the one to whom the discourse is addressed; under the message of the agent is hidden the “truth”, which is masked by the official statement; and hidden under the other is the “production”, or what the agent gets out of the relationship.
Figure 7. The four places of the discourse: the “agent”, the giver of the discourse; the “other”, the one to whom the discourse is addressed; under the message of the agent is hidden the “truth”, which is masked by the official statement; and hidden under the other is the “production”, or what the agent gets out of the relationship.
Sensors 21 03791 g007
Figure 8. Adopted utility function for any Lacanian index.
Figure 8. Adopted utility function for any Lacanian index.
Sensors 21 03791 g008
Figure 9. Open problem categories.
Figure 9. Open problem categories.
Sensors 21 03791 g009
Table 1. Grouping of semantic data-mining work.
Table 1. Grouping of semantic data-mining work.
Work AreaRelated WorkKey Points
IoT[12,13,14,15,16,17,18,19]Interoperability
Data sources
Semantic Web[11,20,21,22,23,24,25]Association rules mining
Ontological data
Recommender systems
Knowledge extraction
Industry 4.0[26,27]Data marketplace
Logistics infrastructure
Table 2. MCDM method review.
Table 2. MCDM method review.
MethodRelated WorkKey Points
ELECTRE[35,36,37]Execution time optimization
PROMETHEE[38,39,40,41]Infrastructure construction
Energy sector
Engineering decision problems
AHP[42,43,44]Decision-making under uncertainty
Recommendation systems
VIKOR[45,46,47]Sentiment analysis in social networks
Performance evaluations
TOPSIS[48,49,50]Several combinations of methods
DEA[51]Evaluate relative efficiency
Table 3. Review of optimization methods.
Table 3. Review of optimization methods.
MethodRelated WorkKey Points
Fuzzy logic[38,45,58,59,60,61,62,63,64,65,66,67,68,69,70,71]They handle diverse types of uncertainties
Game theory[72,73,74,75]Decision learning
Decision-making
Bayesian networks[76,77,78,79,80]Decision-making under uncertainty
Stochastic process[6,81,82]Adaptive systems
Context-aware decision process
Support vector machine[83,84]Sustainability indicators
Table 4. Works that apply supervised learning.
Table 4. Works that apply supervised learning.
Work AreaRelated WorkKey Points
Telecommunications[7,87,88,89,90,91,92]Self-Organizing Network
Improve QoS
Virtual machine migration over WAN links
5G auto-configuration
Energy[93,94,95,96]Operations planning
Behaviors nuclear energy system
Power grid
Transport[97,98,99,100,101]Lane change
Driving on rough terrains
Robot mobility
Enhance decisions[102,103,104,105]Complex negotiations
Combination of techniques
Support for human decisions
Complex systems[106,107,108,109]Human behavior
Optimization problems[84,110,111,112,113,114]Deal with uncertainty
Table 5. Works supported by unsupervised learning.
Table 5. Works supported by unsupervised learning.
Work AreaRelated WorkKey Points
Transport[115,116,117]Overcoming obstacles
Health[118,119,120]Improve diagnostic accuracy
Decrease diagnostic times
Business decisions[83,121,122,123,124]Improve profits
Deal with uncertainty[125,126,127,128,129]Battlefield decision-making
Geology decisions
Gambling
Table 6. Studies supported by reinforcement learning.
Table 6. Studies supported by reinforcement learning.
Work AreaRealted WorkKey Points
Telecommunications[130,131,132]Resource management
5G
Routing
Energy[133,134]Supply and demand balance
Transport[135,136,137,138,139,140]Autonomous driving
Driving experience
Optimization problems[141,142,143,144,145]Noisy data
Scalable solutions
Data fitting
Computational costs
Table 7. Studies supported by deep learning.
Table 7. Studies supported by deep learning.
Work AreaRealted WorkKey Points
Telecommunications[146,147,148,149,150]Resource allocation
SDN
Human behavior[151,152,153]Behavior modeling
Decision-making from psychology
Uncertainty[154,155,156,157,158,159,160,161,162]Noisy or incomplete data
Decision-making under uncertainty
Table 8. Car accident scenario.
Table 8. Car accident scenario.
User 1User 2
  • I’m in the middle of an accident
  • Everyone is dead
  • Photo: Selfie
  • I should have been in the shopping mall, not here
  • There has been an accident
  • There are many injured people
  • Photo: showing several cars in the accident
  • Please send some help
Table 9. Example of Lacan’s and Bion’s indices assignment.
Table 9. Example of Lacan’s and Bion’s indices assignment.
User 1User 2
Piece of user data I m I u I h I a α β I m I u I h I a α β
10.50.00.50.0100.00.50.50.010
20.10.00.90.0010.00.30.70.010
30.00.01.00.0010.00.50.50.010
40.00.01.00.0010.00.20.80.010
mean E0.150.00.850.00.250.750.00.3750.6250.010
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Alzate-Mejía, N.; Santos-Boada, G.; de Almeida-Amazonas, J.R. Decision-Making under Uncertainty for the Deployment of Future Hyperconnected Networks: A Survey. Sensors 2021, 21, 3791. https://doi.org/10.3390/s21113791

AMA Style

Alzate-Mejía N, Santos-Boada G, de Almeida-Amazonas JR. Decision-Making under Uncertainty for the Deployment of Future Hyperconnected Networks: A Survey. Sensors. 2021; 21(11):3791. https://doi.org/10.3390/s21113791

Chicago/Turabian Style

Alzate-Mejía, Néstor, Germán Santos-Boada, and José Roberto de Almeida-Amazonas. 2021. "Decision-Making under Uncertainty for the Deployment of Future Hyperconnected Networks: A Survey" Sensors 21, no. 11: 3791. https://doi.org/10.3390/s21113791

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop