Skip to main content
Log in

Systemic financial risk based on analytic hierarchy model and artificial intelligence system

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In the context of big data, data acquisition methods are more diverse, the amount of data is larger, and the types of data are more diverse. At the same time, the speed of data processing by big data technology will also be greatly improved. Therefore, using big data technology and data mining methods to conduct early warning research on my country's systemic financial risks will eventually become a trend. Based on the analytic hierarchy model and artificial intelligence technology, this paper constructs a systemic financial risk identification model and establishes a practical analytic hierarchy model. Moreover, this paper organically combines the more prominent influencing factors such as swing curve, network structure and unit parameters, and determines the main parameters of the model according to the strength of the influence of each factor on coherence. In addition, this paper proposes a practical coherence recognition method that takes the network topology and unit parameters as considerations and uses the programming program to realize the reading of BPA data, and based on this, analyzes the topology similarity and parameter similarity of the unit. Finally, this paper deeply analyzes the specificity of the equivalence process of the main grid. Through experimental research, we can see that the model constructed in this paper has certain effects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Ahmad K, Mohammad O, Atieh M et al (2018) Iot: architecture, challenges, and solutions using fog network and application classification. In: 2018 international Arab conference on information technology (ACIT). IEEE, pp 1–7

  • Bull P, Austin R, Popov E et al (2016) Flow based security for IoT devices using an SDN gateway. In: 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud). IEEE, pp 157–163

  • Chen J, Tian Z, Cui X, Yin L, Wang X (2019) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Humaniz Comput 10(8):3099–3107. https://doi.org/10.1007/s12652-018-0887-z

    Article  Google Scholar 

  • El Jaouhari S (2018) A secure design of WoT services for smart cities. Ph.D. Thesis, Ecole nationale supérieure Mines-Télécom Atlantique

  • Ferraiolo D, Kuhn DR, Chandramouli R (2003) Role-based access control. Artech House

  • Goyal M, Oakley A, Bansal P et al (2019) Automatic lesion boundary segmentation in dermoscopic images with ensemble deep learning methods. arXiv:1902.00809

  • Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743. https://doi.org/10.1109/ACCESS.2019.2924045 ((ISSN:2169-3536))

    Article  Google Scholar 

  • Huang GB, Zhou H, Ding X, Zhang R (2011) Extreme learning machine for regression and multiclass classification. IEEE Trans Syst Man Cybern B 42(2):513–529

    Article  Google Scholar 

  • ITU (2012) Y.2060: overview of the Internet of things. https://www.itu.int/rec/T-REC-Y.2060-201206-I. Accessed 16 Oct 2020

  • Jararweh Y, Al-Ayyoub M, Darabseh A, Benkhelifa E, Vouk MA, Rindos A (2015) SDIoT: a software defined based internet of things framework. J Ambient Intell Humaniz Comput 6(4):453–461. https://doi.org/10.1007/s12652-015-0290-y

    Article  Google Scholar 

  • Kaur R, Kaur G (2013) Skin cancer–melanoma detection in skin images using local binary pattern (LBP) and GLCM. Int J Sci Res IJSR) 4(7):134–139

    Google Scholar 

  • Khan R, Khan SU, Zaheer R et al (2012) Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology. IEEE, pp 257–260

  • Li XL, Li Y, Wang ZF (2016) Research on remote sensing image matching based on sift algorithm. Telev Technol 40(9):108

    Google Scholar 

  • Lim KLA (2012) Computer security event management system. US Patent 8,245,297

  • Mendonça T, Ferreira PM, Marques JS et al (2013) PH 2-A dermoscopic image database for research and benchmarking. In: 2013 35th annual international conference of the IEEE engineering in medicine and biology society (EMBC). IEEE, pp 5437–5440

  • OneM2M (2020) OneM2M: standards for m2m and the internet of things. http://www.onem2m.org/. Accessed 16 Oct 2020

  • Pathan S, Prabhu KG, Siddalingaswamy PC (2018) A methodological approach to classify typical and atypical pigment network patterns for melanoma diagnosis. Biomed Signal Process 44:25–37

    Article  Google Scholar 

  • Razmjooy N, Mousavi BS, Soleymani F (2012) A real-time mathematical computer method for potato inspection using machine vision. Comput Math Appl 63:268–279

    Article  Google Scholar 

  • Siegel RL, Miller KD, Jemal A (2019) Cancer statistics. CA Cancer J Clin 66:7–30

    Article  Google Scholar 

  • Waheed Z, Waheed A, Zafar M et al (2017) An efficient machine learning approach for the detection of melanoma using dermoscopic images. In: 2017 international conference on communication, computing and digital systems (C-CODE). IEEE, pp 316–319

  • Yu P, Qin AK, Clausi DA (2011) Unsupervised polarimetric SAR image segmentation and classification using region growing with edge penalty. IEEE Trans Geosci Remote Sens 50(4):1302–1317

    Article  Google Scholar 

  • Zahia S, Sierra-Sosa D, Garcia-Zapirain B, Elmaghraby A (2018) Tissue classification and segmentation of pressure injuries using convolutional neural networks. Comput Method Program Biomed 159:51–58

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Zhou.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, W. Systemic financial risk based on analytic hierarchy model and artificial intelligence system. J Ambient Intell Human Comput (2021). https://doi.org/10.1007/s12652-021-03037-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-021-03037-8

Keywords

Navigation