101
|
Wang Y, Xie C, Liang C, Zhou P, Lu L. Association of artificial intelligence use and the retention of elderly caregivers: A cross-sectional study based on empowerment theory. J Nurs Manag 2022; 30:3827-3837. [PMID: 36177709 DOI: 10.1111/jonm.13823] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2022] [Revised: 09/05/2022] [Accepted: 09/24/2022] [Indexed: 12/30/2022]
Abstract
AIM The purpose of this study is to investigate how the use of artificial intelligence is associated with the retention of elderly caregivers. BACKGROUND The turnover of elderly caregivers is high and increasing. Elderly care institutions are beginning to use artificial intelligence to support caregivers in their work, and the use of technology is critical to staff retention. Empowerment of elderly caregivers has been neglected by managers and researchers. METHODS This cross-sectional study involved 511 elderly caregivers in 25 elderly institutions. Six validated standardized scales were used for data collection, and the software SPSS and SmartPLS were used for data analysis. RESULTS The quality of artificial intelligence has a significant positive effect on empowerment. Artificial intelligence psychological empowerment (β = .355, p < .001) and artificial intelligence structural empowerment (β = .375, p < .001) both had positive effects on retention intention, and the jointly explained variance (R2 ) was 42.6%. CONCLUSIONS The results show that a significant relationship exists between artificial intelligence empowerment and retention intention. Elderly caregivers with more structural empowerment have higher retention intention. IMPLICATIONS FOR NURSING MANAGEMENT Artificial intelligence suppliers need to pay attention to the role of product quality in elderly care services, continuously improve artificial intelligence quality, and strengthen the application and routine maintenance of artificial intelligence technologies. Elderly care institution managers should pay special attention to artificial intelligence structural empowerment (such as artificial intelligence-related education and training, learning and development opportunities, and resource support).
Collapse
Affiliation(s)
- Ying Wang
- The School of Management, Hefei University of Technology, Hefei, China
| | - Chenze Xie
- The School of Management, Hefei University of Technology, Hefei, China
| | - Changyong Liang
- The School of Management, Hefei University of Technology, Hefei, China
| | - Peiyu Zhou
- The School of Management, Hefei University of Technology, Hefei, China
| | - Liyan Lu
- The School of Management, Hefei University of Technology, Hefei, China
| |
Collapse
|
102
|
Mi JX, Wang XD, Zhou LF, Cheng K. Adversarial Examples based on Object Detection tasks: A Survey. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.10.046] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
103
|
Hamamoto R, Koyama T, Kouno N, Yasuda T, Yui S, Sudo K, Hirata M, Sunami K, Kubo T, Takasawa K, Takahashi S, Machino H, Kobayashi K, Asada K, Komatsu M, Kaneko S, Yatabe Y, Yamamoto N. Introducing AI to the molecular tumor board: one direction toward the establishment of precision medicine using large-scale cancer clinical and biological information. Exp Hematol Oncol 2022; 11:82. [PMID: 36316731 PMCID: PMC9620610 DOI: 10.1186/s40164-022-00333-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/31/2022] [Accepted: 10/05/2022] [Indexed: 11/10/2022] Open
Abstract
Since U.S. President Barack Obama announced the Precision Medicine Initiative in his New Year's State of the Union address in 2015, the establishment of a precision medicine system has been emphasized worldwide, particularly in the field of oncology. With the advent of next-generation sequencers specifically, genome analysis technology has made remarkable progress, and there are active efforts to apply genome information to diagnosis and treatment. Generally, in the process of feeding back the results of next-generation sequencing analysis to patients, a molecular tumor board (MTB), consisting of experts in clinical oncology, genetic medicine, etc., is established to discuss the results. On the other hand, an MTB currently involves a large amount of work, with humans searching through vast databases and literature, selecting the best drug candidates, and manually confirming the status of available clinical trials. In addition, as personalized medicine advances, the burden on MTB members is expected to increase in the future. Under these circumstances, introducing cutting-edge artificial intelligence (AI) technology and information and communication technology to MTBs while reducing the burden on MTB members and building a platform that enables more accurate and personalized medical care would be of great benefit to patients. In this review, we introduced the latest status of elemental technologies that have potential for AI utilization in MTB, and discussed issues that may arise in the future as we progress with AI implementation.
Collapse
Affiliation(s)
- Ryuji Hamamoto
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Takafumi Koyama
- grid.272242.30000 0001 2168 5385Department of Experimental Therapeutics, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan
| | - Nobuji Kouno
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.258799.80000 0004 0372 2033Department of Surgery, Graduate School of Medicine, Kyoto University, Yoshida-konoe-cho, Sakyo-ku, Kyoto, 606-8303 Japan
| | - Tomohiro Yasuda
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.417547.40000 0004 1763 9564Research and Development Group, Hitachi, Ltd., 1-280 Higashi-koigakubo, Kokubunji, Tokyo, 185-8601 Japan
| | - Shuntaro Yui
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.417547.40000 0004 1763 9564Research and Development Group, Hitachi, Ltd., 1-280 Higashi-koigakubo, Kokubunji, Tokyo, 185-8601 Japan
| | - Kazuki Sudo
- grid.272242.30000 0001 2168 5385Department of Experimental Therapeutics, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.272242.30000 0001 2168 5385Department of Medical Oncology, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan
| | - Makoto Hirata
- grid.272242.30000 0001 2168 5385Department of Genetic Medicine and Services, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan
| | - Kuniko Sunami
- grid.272242.30000 0001 2168 5385Department of Laboratory Medicine, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan
| | - Takashi Kubo
- grid.272242.30000 0001 2168 5385Department of Laboratory Medicine, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan
| | - Ken Takasawa
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Satoshi Takahashi
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Hidenori Machino
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Kazuma Kobayashi
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Ken Asada
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Masaaki Komatsu
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Syuzo Kaneko
- grid.272242.30000 0001 2168 5385Division of Medical AI Research and Development, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.509456.bCancer Translational Research Team, RIKEN Center for Advanced Intelligence Project, 1-4-1 Nihonbashi, Chuo-ku, Tokyo, 103-0027 Japan
| | - Yasushi Yatabe
- grid.272242.30000 0001 2168 5385Department of Diagnostic Pathology, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan ,grid.272242.30000 0001 2168 5385Division of Molecular Pathology, National Cancer Center Research Institute, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan
| | - Noboru Yamamoto
- grid.272242.30000 0001 2168 5385Department of Experimental Therapeutics, National Cancer Center Hospital, 5-1-1 Tsukiji, Chuo-ku, Tokyo, 104-0045 Japan
| |
Collapse
|
104
|
Wang R, Wang H, Shi L, Han C, Che Y. Epileptic Seizure Detection Using Geometric Features Extracted from SODP Shape of EEG Signals and AsyLnCPSO-GA. ENTROPY (BASEL, SWITZERLAND) 2022; 24:1540. [PMID: 36359630 PMCID: PMC9689850 DOI: 10.3390/e24111540] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/30/2022] [Revised: 10/21/2022] [Accepted: 10/24/2022] [Indexed: 06/16/2023]
Abstract
Epilepsy is a neurological disorder that is characterized by transient and unexpected electrical disturbance of the brain. Seizure detection by electroencephalogram (EEG) is associated with the primary interest of the evaluation and auxiliary diagnosis of epileptic patients. The aim of this study is to establish a hybrid model with improved particle swarm optimization (PSO) and a genetic algorithm (GA) to determine the optimal combination of features for epileptic seizure detection. First, the second-order difference plot (SODP) method was applied, and ten geometric features of epileptic EEG signals were derived in each frequency band (δ, θ, α and β), forming a high-dimensional feature vector. Secondly, an optimization algorithm, AsyLnCPSO-GA, combining a modified PSO with asynchronous learning factor (AsyLnCPSO) and the genetic algorithm (GA) was proposed for feature selection. Finally, the feature combinations were fed to a naïve Bayesian classifier for epileptic seizure and seizure-free identification. The method proposed in this paper achieved 95.35% classification accuracy with a tenfold cross-validation strategy when the interfrequency bands were crossed, serving as an effective method for epilepsy detection, which could help clinicians to expeditiously diagnose epilepsy based on SODP analysis and an optimization algorithm for feature selection.
Collapse
Affiliation(s)
- Ruofan Wang
- School of Information Technology Engineering, Tianjin University of Technology and Education, Tianjin 300222, China
| | - Haodong Wang
- School of Information Technology Engineering, Tianjin University of Technology and Education, Tianjin 300222, China
| | - Lianshuan Shi
- School of Information Technology Engineering, Tianjin University of Technology and Education, Tianjin 300222, China
| | - Chunxiao Han
- Tianjin Key Laboratory of Information Sensing & Intelligent Control, School of Automation and Electrical Engineering, Tianjin University of Technology and Education, Tianjin 300222, China
| | - Yanqiu Che
- Tianjin Key Laboratory of Information Sensing & Intelligent Control, School of Automation and Electrical Engineering, Tianjin University of Technology and Education, Tianjin 300222, China
| |
Collapse
|
105
|
Abdusalomov AB, Safarov F, Rakhimov M, Turaev B, Whangbo TK. Improved Feature Parameter Extraction from Speech Signals Using Machine Learning Algorithm. SENSORS (BASEL, SWITZERLAND) 2022; 22:8122. [PMID: 36365819 PMCID: PMC9654697 DOI: 10.3390/s22218122] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/27/2022] [Revised: 10/14/2022] [Accepted: 10/20/2022] [Indexed: 06/16/2023]
Abstract
Speech recognition refers to the capability of software or hardware to receive a speech signal, identify the speaker's features in the speech signal, and recognize the speaker thereafter. In general, the speech recognition process involves three main steps: acoustic processing, feature extraction, and classification/recognition. The purpose of feature extraction is to illustrate a speech signal using a predetermined number of signal components. This is because all information in the acoustic signal is excessively cumbersome to handle, and some information is irrelevant in the identification task. This study proposes a machine learning-based approach that performs feature parameter extraction from speech signals to improve the performance of speech recognition applications in real-time smart city environments. Moreover, the principle of mapping a block of main memory to the cache is used efficiently to reduce computing time. The block size of cache memory is a parameter that strongly affects the cache performance. In particular, the implementation of such processes in real-time systems requires a high computation speed. Processing speed plays an important role in speech recognition in real-time systems. It requires the use of modern technologies and fast algorithms that increase the acceleration in extracting the feature parameters from speech signals. Problems with overclocking during the digital processing of speech signals have yet to be completely resolved. The experimental results demonstrate that the proposed method successfully extracts the signal features and achieves seamless classification performance compared to other conventional speech recognition algorithms.
Collapse
Affiliation(s)
| | - Furkat Safarov
- Department of Computer Engineering, Gachon University, Sujeong-gu, Seongnam-si 461-701, Gyeonggi-do, Korea
| | - Mekhriddin Rakhimov
- Department of Artificial Intelligence, Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi, Tashkent 100200, Uzbekistan
| | - Boburkhon Turaev
- Department of Artificial Intelligence, Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi, Tashkent 100200, Uzbekistan
| | - Taeg Keun Whangbo
- Department of Computer Engineering, Gachon University, Sujeong-gu, Seongnam-si 461-701, Gyeonggi-do, Korea
| |
Collapse
|
106
|
Hakemi S, Houshmand M, KheirKhah E, Hosseini SA. A review of recent advances in quantum-inspired metaheuristics. EVOLUTIONARY INTELLIGENCE 2022:1-16. [PMID: 36312203 PMCID: PMC9589576 DOI: 10.1007/s12065-022-00783-2] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/06/2022] [Revised: 09/21/2022] [Accepted: 10/02/2022] [Indexed: 11/04/2022]
Abstract
Quantum-inspired metaheuristics emerged by combining the quantum mechanics principles with the metaheuristic algorithms concepts. These algorithms extend the diversity of the population, which is a primary key to proper global search and is guaranteed using the quantum bits' probabilistic representation. In this work, we aim to review recent quantum-inspired metaheuristics and to cover the merits of linking the quantum mechanics notions with optimization techniques and its multiplicity of applications in real-world problems and industry. Moreover, we reported the improvements and modifications of proposed algorithms and identified the scope's challenges. We gathered proposed algorithms of this scope between 2017 and 2022 and classified them based on the sources of inspiration. The source of inspiration for most quantum-inspired metaheuristics are the Genetic and Evolutionary algorithms, followed by swarm-based algorithms, and applications range from image processing to computer networks and even multidisciplinary fields such as flight control and structural design. The promising results of quantum-inspired metaheuristics give hope that more conventional algorithms can be combined with quantum mechanics principles in the future to tackle optimization problems in numerous disciplines.
Collapse
Affiliation(s)
- Shahin Hakemi
- Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
| | - Mahboobeh Houshmand
- Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
| | - Esmaeil KheirKhah
- Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
| | - Seyyed Abed Hosseini
- Department of Electrical Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran
| |
Collapse
|
107
|
Albahli S. Twitter sentiment analysis: An Arabic text mining approach based on COVID-19. Front Public Health 2022; 10:966779. [PMID: 36299761 PMCID: PMC9589219 DOI: 10.3389/fpubh.2022.966779] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/11/2022] [Accepted: 07/29/2022] [Indexed: 01/24/2023] Open
Abstract
The 21st century has seen a lot of innovations, among which included the advancement of social media platforms. These platforms brought about interactions between people and changed how news is transmitted, with people now able to voice their opinion as opposed to before where only the reporters were speaking. Social media has become the most influential source of speech freedom and emotions on their platforms. Anyone can express emotions using social media platforms like Facebook, Twitter, Instagram, and YouTube. The raw data is increasing daily for every culture and field of life, so there is a need to process this raw data to get meaningful information. If any nation or country wants to know their people's needs, there should be mined data showing the actual meaning of the people's emotions. The COVID-19 pandemic came with many problems going beyond the virus itself, as there was mass hysteria and the spread of wrong information on social media. This problem put the whole world into turmoil and research was done to find a way to mitigate the spread of incorrect news. In this research study, we have proposed a model of detecting genuine news related to the COVID-19 pandemic in Arabic Text using sentiment-based data from Twitter for Gulf countries. The proposed sentiment analysis model uses Machine Learning and SMOTE for imbalanced dataset handling. The result showed the people in Gulf countries had a negative sentiment during COVID-19 pandemic. This work was done so government authorities can easily learn directly from people all across the world about the spread of COVID-19 and take appropriate actions in efforts to control it.
Collapse
|
108
|
Sharma N, Bhatt R. Source location privacy preservation in IoT-enabled event-driven WSNs. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2022. [DOI: 10.1108/ijpcc-05-2022-0214] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
Privacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven system is essential if events do not happen. When events occur, IoT-enabled sensor network is required to deal with enormous traffic from the concentration of demand data delivery. This paper aims to explore an effective framework for safeguarding privacy at source in event-driven WSNs.
Design/methodology/approach
This paper discusses three algorithms in IoT-enabled event-driven WSNs: source location privacy for event detection (SLP_ED), chessboard alteration pattern (SLP_ED_CBA) and grid-based source location privacy (GB_SLP). Performance evaluation is done using simulation results and security analysis of the proposed scheme.
Findings
The sensors observe bound events or sensitive items within the network area in the field of interest. The open wireless channel lets an opponent search traffic designs, trace back and reach the start node or the event-detecting node. SLP_ED and SLP_ED_CBA provide better safety level results than dynamic shortest path scheme and energy-efficient source location privacy protection schemes. This paper discusses security analysis for the GB_SLP. Comparative analysis shows that the proposed scheme is more efficient on safety level than existing techniques.
Originality/value
The authors develop the privacy protection scheme in IoT-enabled event-driven WSNs. There are two categories of occurrences: nominal events and critical events. The choice of the route from source to sink relies on the two types of events: nominal or critical; the privacy level required for an event; and the energy consumption needed for the event. In addition, phantom node selection scheme is designed for source location privacy.
Collapse
|
109
|
Clustered design-model generation from a program source code using chaos-based metaheuristic algorithms. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07781-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/10/2022]
|
110
|
Abed-alguni BH, Alawad NA, Al-Betar MA, Paul D. Opposition-based sine cosine optimizer utilizing refraction learning and variable neighborhood search for feature selection. APPL INTELL 2022; 53:13224-13260. [PMID: 36247211 PMCID: PMC9547101 DOI: 10.1007/s10489-022-04201-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 09/21/2022] [Indexed: 12/03/2022]
Abstract
This paper proposes new improved binary versions of the Sine Cosine Algorithm (SCA) for the Feature Selection (FS) problem. FS is an essential machine learning and data mining task of choosing a subset of highly discriminating features from noisy, irrelevant, high-dimensional, and redundant features to best represent a dataset. SCA is a recent metaheuristic algorithm established to emulate a model based on sine and cosine trigonometric functions. It was initially proposed to tackle problems in the continuous domain. The SCA has been modified to Binary SCA (BSCA) to deal with the binary domain of the FS problem. To improve the performance of BSCA, three accumulative improved variations are proposed (i.e., IBSCA1, IBSCA2, and IBSCA3) where the last version has the best performance. IBSCA1 employs Opposition Based Learning (OBL) to help ensure a diverse population of candidate solutions. IBSCA2 improves IBSCA1 by adding Variable Neighborhood Search (VNS) and Laplace distribution to support several mutation methods. IBSCA3 improves IBSCA2 by optimizing the best candidate solution using Refraction Learning (RL), a novel OBL approach based on light refraction. For performance evaluation, 19 real-wold datasets, including a COVID-19 dataset, were selected with different numbers of features, classes, and instances. Three performance measurements have been used to test the IBSCA versions: classification accuracy, number of features, and fitness values. Furthermore, the performance of the last variation of IBSCA3 is compared against 28 existing popular algorithms. Interestingly, IBCSA3 outperformed almost all comparative methods in terms of classification accuracy and fitness values. At the same time, it was ranked 15 out of 19 in terms of number of features. The overall simulation and statistical results indicate that IBSCA3 performs better than the other algorithms.
Collapse
Affiliation(s)
| | | | - Mohammed Azmi Al-Betar
- Artificial Intelligence Research Center (AIRC), College of Engineering and Information Technology, Ajman University, Ajman, United Arab Emirates
| | - David Paul
- School of Science and Technology, University of New England, Armidale, Australia
| |
Collapse
|
111
|
Song L, Wang H, Shi Z. A Literature Review Research on Monitoring Conditions of Mechanical Equipment Based on Edge Computing. Appl Bionics Biomech 2022; 2022:9489306. [PMID: 36254227 PMCID: PMC9569220 DOI: 10.1155/2022/9489306] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/24/2022] [Revised: 09/01/2022] [Accepted: 09/05/2022] [Indexed: 11/25/2022] Open
Abstract
The motivation of this research is to review all methods used in data compression of collected data in monitoring the condition of equipment based on the framework of edge computing. Since a large amount of signal data is collected when monitoring conditions of mechanical equipment, namely, signals of running machines are continuously transmitted to be crunched, compressed data should be handled effectively. However, this process occupies resources since data transmission requires the allocation of a large capacity. To resolve this problem, this article examines the monitoring conditions of equipment based on edge computing. First, the signal is pre-processed by edge computing, so that the fault characteristics can be identified quickly. Second, signals with difficult-to-identify fault characteristics need to be compressed to save transmission resources. Then, different types of signal data collected in mechanical equipment conditions are compressed by various compression methods and uploaded to the cloud. Finally, the cloud platform, which has powerful processing capability, is processed to improve the volume of the data transmission. By examining and analyzing the monitoring conditions and signal compression methods of mechanical equipment, the future development trend is elaborated to provide references and ideas for the contemporary research of data monitoring and data compression algorithms. Consequently, the manuscript presents different compression methods in detail and clarifies the data compression methods used for the signal compression of equipment based on edge computing.
Collapse
Affiliation(s)
- Liqiang Song
- Department of Vehicle and Electrical Engineering, Shijiazhuang Campus, Army Engineering University of PLA, Shijiazhuang 050003, China
| | - Huaiguang Wang
- Department of Vehicle and Electrical Engineering, Shijiazhuang Campus, Army Engineering University of PLA, Shijiazhuang 050003, China
| | - Zhiyong Shi
- Department of Vehicle and Electrical Engineering, Shijiazhuang Campus, Army Engineering University of PLA, Shijiazhuang 050003, China
| |
Collapse
|
112
|
An Overview of the Application of Harmony Search for Chemical Engineering Optimization. INTERNATIONAL JOURNAL OF CHEMICAL ENGINEERING 2022. [DOI: 10.1155/2022/1928343] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Harmony search algorithm and its variants have been used in several applications in medicine, telecommunications, computer science, and engineering. This article reviews the global and multi-objective optimization for chemical engineering using harmony search. The main features of the HS method and several of its popular variants and hybrid versions including their relevant algorithm characteristics are described and discussed. A variety of global and multi-objective optimization problems from chemical engineering and their resolution using HS-based methods are also included. These problems involve thermodynamic calculations (phase stability analysis, phase equilibrium calculations, parameter estimation, and azeotrope calculation), heat exchanger design, distillation simulation, life cycle analysis, and water distribution systems, among others. Remarks on future developments of HS and its related algorithms for global and multi-objective optimization in chemical engineering are also provided in this review. HS is a reliable and promising stochastic optimizer to resolve challenging global and multi-objective optimization problems for process systems engineering.
Collapse
|
113
|
Kumar A, Bhatiya S, Khosravi MR, Mashat A, Agarwal P. Semantic and Context understanding for sentiment analysis in Hindi Handwritten Character Recognition Using a Multiresolution Technique. ACM T ASIAN LOW-RESO 2022. [DOI: 10.1145/3557895] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Abstract
The rapid growth of Web 2.0, which enables people to generate, communicate, and share information, has resulted in an increase in the total number of users. In developing countries, online users’ sentiment influences decision-making, social views, individual consumption decisions, and entity quality monitoring. As a result, more accurate sentiment analysis, particularly in their native language such as Hindi, is preferred over crude binary categorization. Because of the abundance of web-based data in Indian languages such as Hindi, Marathi, Kannada, Tamil, and so on. Analyzing this data and recovering valuable and relevant information from handwritten text has become extremely important. Despite years of research and development, no optical writing recognition (OCR) system has ever been certified as completely reliable. The first step in any pattern recognition system is feature selection. In many fields, feature selection is studied as a combinatorial optimization problem. The primary goal of feature selection is to reduce the number of redundant and ineffective traits in the recognition system. This feature selection is used to maintain or improve the performance of the classifier used by the recognition system: A support vector machine (SVM) technique could be used to solve this character recognition problem. The Hindi character recognition system recognizes Hindi characters by employing morphological operations, edge detection, HOG feature extraction, and an SVM-based classifier. The proposed model outperformed the current state-of-the-art method, achieving an accuracy of 96.77 %.
Collapse
|
114
|
Pramanik R, Sarkar S, Sarkar R. An adaptive and altruistic PSO-based deep feature selection method for Pneumonia detection from Chest X-rays. Appl Soft Comput 2022; 128:109464. [PMID: 35966452 PMCID: PMC9364947 DOI: 10.1016/j.asoc.2022.109464] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/29/2022] [Revised: 07/11/2022] [Accepted: 07/29/2022] [Indexed: 12/23/2022]
Abstract
Pneumonia is one of the major reasons for child mortality especially in income-deprived regions of the world. Although it can be detected and treated with very less sophisticated instruments and medication, Pneumonia detection still remains a major concern in developing countries. Computer-aided based diagnosis (CAD) systems can be used in such countries due to their lower operating costs than professional medical experts. In this paper, we propose a CAD system for Pneumonia detection from Chest X-rays, using the concepts of deep learning and a meta-heuristic algorithm. We first extract deep features from the pre-trained ResNet50, fine-tuned on a target Pneumonia dataset. Then, we propose a feature selection technique based on particle swarm optimization (PSO), which is modified using a memory-based adaptation parameter, and enriched by incorporating an altruistic behavior into the agents. We name our feature selection method as adaptive and altruistic PSO (AAPSO). The proposed method successfully eliminates non-informative features obtained from the ResNet50 model, thereby improving the Pneumonia detection ability of the overall framework. Extensive experimentation and thorough analysis on a publicly available Pneumonia dataset establish the superiority of the proposed method over several other frameworks used for Pneumonia detection. Apart from Pneumonia detection, AAPSO is further evaluated on some standard UCI datasets, gene expression datasets for cancer prediction and a COVID-19 prediction dataset. The overall results are satisfactory, thereby confirming the usefulness of AAPSO in dealing with varied real-life problems. The supporting source codes of this work can be found at https://github.com/rishavpramanik/AAPSO.
Collapse
Affiliation(s)
- Rishav Pramanik
- Department of Computer Science and Engineering, Jadavpur University, Kolkata, 700032, India
| | - Sourodip Sarkar
- Department of Electronics and Communication Engineering, Heritage Institute of Technology, Kolkata, 700107, India
| | - Ram Sarkar
- Department of Computer Science and Engineering, Jadavpur University, Kolkata, 700032, India
| |
Collapse
|
115
|
Huerta Barrientos A, Nila Luevano A. A State-of-the-Art Survey on Various Domains of Multi-Agent Systems and Machine Learning. ARTIF INTELL 2022. [DOI: 10.5772/intechopen.107109] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Abstract
Multi-agent systems (MASs) are defined as a group of interacting entities or agents sharing a common environment that changes over time, with capabilities of perception and action, and the mechanisms for their coordination provide a modern perspective on systems that traditionally were regarded as centralized. The main characteristics of agents are learning and adaptation. In the last few years, MASs have received tremendous attention from scholars in different fields. However, there are still challenges faced by MASs and their integration with machine learning (ML) methods. The primary goal of the study is to provide a broad review of the current developments in the field of MASs combined with ML methods. First, we present features of MASs considering the ML perspective. Second, we provide a classification of applications of MASs combined with ML methods. Third, we present a density map of applications in E-learning, manufacturing, and commerce. We expect this study to serve as a comprehensive resource for researchers and practitioners in the area.
Collapse
|
116
|
Wang R, Zhan X, Bai H, Dong E, Cheng Z, Jia X. A Review of Fault Diagnosis Methods for Rotating Machinery Using Infrared Thermography. MICROMACHINES 2022; 13:1644. [PMID: 36295997 PMCID: PMC9611809 DOI: 10.3390/mi13101644] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/06/2022] [Revised: 09/27/2022] [Accepted: 09/27/2022] [Indexed: 06/16/2023]
Abstract
At present, rotating machinery is widely used in all walks of life and has become the key equipment in many production processes. It is of great significance to strengthen the condition monitoring of rotating machinery, timely diagnose and eliminate faults to ensure the safe and efficient operation of rotating machinery and improve the economic benefits of enterprises. When the state of a rotating machine deteriorates, the thermal energy that is much more than its normal operation will be generated due to the increase in the friction between the components or other factors. Therefore, using the infrared thermal camera to collect the infrared thermal images of rotating machinery and judge the health status of rotating machinery by observing the temperature distribution in the thermal images is often more rapid and effective than other technologies. Nevertheless, after decades of development, the research achievements of infrared thermography (IRT) and its application in various industrial fields are numerous and complex, and there is a lack of systematic sorting and summary of the achievements in this field. Accordingly, this paper summarizes the development and application of IRT as a non-contact and non-invasive tool for equipment condition monitoring and fault diagnosis, and introduces the basic theory of IRT, image processing technology and fault diagnosis methods of rotating machinery in detail. Finally, the review is summarized and some future potential topics are proposed, which will make the subject easier for beginners and non-experts to understand.
Collapse
Affiliation(s)
| | | | | | | | | | - Xisheng Jia
- Shijiazhuang Campus of Army Engineering University of PLA, Shijiazhuang 050003, China
| |
Collapse
|
117
|
Souidi MEH, Haouassi H, Ledmi M, Maarouk TM, Ledmi A. A discrete particle swarm optimization coalition formation algorithm for multi-pursuer multi-evader game. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2022. [DOI: 10.3233/jifs-221767] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Abstract
Multi-Pursuers Multi-Evader Game (MPMEG) is considered as a multi-agent complex problem in which the pursuers must perform the capture of the detected evaders according to the temporal constraints. In this paper, we propose a metaheuristic approach based on a Discrete Particle Swarm Optimization in order to allow a dynamic coalition formation of the pursuers during the pursuit game. A pursuit coalition can be considered as the role definition of each pursuer during the game. In this work, each possible coalition is represented by a feasible particle’s position, which changes the concerned coalition according to its velocity during the pursuit game. With the aim of showcasing the performance of the new approach, we propose a comparison study in relation to recent approaches processing the MPMEG in term of capturing time and payoff acquisition. Moreover, we have studied the pursuit capturing time according to the number of used particles as well as the dynamism of the pursuit coalitions formed during the game. The obtained results note that the proposed approach outperforms the compared approaches in relation to the capturing time by only using eight particles. Moreover, this approach improves the pursuers’ payoff acquisition, which represents the pursuers’ learning rate during the task execution.
Collapse
Affiliation(s)
| | - Hichem Haouassi
- Department of Computer Science, ICOSI Lab, University of Khenchela, Khenchela, Algeria
| | - Makhlouf Ledmi
- Department of Computer Science, ICOSI Lab, University of Khenchela, Khenchela, Algeria
| | | | - Abdeldjalil Ledmi
- Department of Computer Science, ICOSI Lab, University of Khenchela, Khenchela, Algeria
| |
Collapse
|
118
|
Lee C, Lee S, Park E, Hong J, Shin DY, Byun JM, Yun H, Koh Y, Yoon SS. Transcriptional signatures of the BCL2 family for individualized acute myeloid leukaemia treatment. Genome Med 2022; 14:111. [PMID: 36171613 PMCID: PMC9520894 DOI: 10.1186/s13073-022-01115-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/04/2022] [Accepted: 09/20/2022] [Indexed: 11/10/2022] Open
Abstract
Background Although anti-apoptotic proteins of the B-cell lymphoma-2 (BCL2) family have been utilized as therapeutic targets in acute myeloid leukaemia (AML), their complicated regulatory networks make individualized therapy difficult. This study aimed to discover the transcriptional signatures of BCL2 family genes that reflect regulatory dynamics, which can guide individualized therapeutic strategies. Methods From three AML RNA-seq cohorts (BeatAML, LeuceGene, and TCGA; n = 451, 437, and 179, respectively), we constructed the BCL2 family signatures (BFSigs) by applying an innovative gene-set selection method reflecting biological knowledge followed by non-negative matrix factorization (NMF). To demonstrate the significance of the BFSigs, we conducted modelling to predict response to BCL2 family inhibitors, clustering, and functional enrichment analysis. Cross-platform validity of BFSigs was also confirmed using NanoString technology in a separate cohort of 47 patients. Results We established BFSigs labeled as the BCL2, MCL1/BCL2, and BFL1/MCL1 signatures that identify key anti-apoptotic proteins. Unsupervised clustering based on BFSig information consistently classified AML patients into three robust subtypes across different AML cohorts, implying the existence of biological entities revealed by the BFSig approach. Interestingly, each subtype has distinct enrichment patterns of major cancer pathways, including MAPK and mTORC1, which propose subtype-specific combination treatment with apoptosis modulating drugs. The BFSig-based classifier also predicted response to venetoclax with remarkable performance (area under the ROC curve, AUROC = 0.874), which was well-validated in an independent cohort (AUROC = 0.950). Lastly, we successfully confirmed the validity of BFSigs using NanoString technology. Conclusions This study proposes BFSigs as a biomarker for the effective selection of apoptosis targeting treatments and cancer pathways to co-target in AML. Supplementary Information The online version contains supplementary material available at 10.1186/s13073-022-01115-w.
Collapse
Affiliation(s)
- Chansub Lee
- Cancer Research Institute, Seoul National University College of Medicine, Seoul, Republic of Korea.,Center for Medical Innovation, Seoul National University Hospital, Seoul, Republic of Korea
| | - Sungyoung Lee
- Department of Genomic Medicine, Seoul National University Hospital, Seoul, Republic of Korea.,Center for Precision Medicine, Seoul National University Hospital, Seoul, Republic of Korea
| | - Eunchae Park
- Cancer Research Institute, Seoul National University College of Medicine, Seoul, Republic of Korea.,Center for Medical Innovation, Seoul National University Hospital, Seoul, Republic of Korea
| | - Junshik Hong
- Cancer Research Institute, Seoul National University College of Medicine, Seoul, Republic of Korea.,Center for Medical Innovation, Seoul National University Hospital, Seoul, Republic of Korea.,Division of Hematology and Medical Oncology, Department of Internal Medicine, Seoul National University Hospital, Seoul, Republic of Korea
| | - Dong-Yeop Shin
- Cancer Research Institute, Seoul National University College of Medicine, Seoul, Republic of Korea.,Center for Medical Innovation, Seoul National University Hospital, Seoul, Republic of Korea.,Division of Hematology and Medical Oncology, Department of Internal Medicine, Seoul National University Hospital, Seoul, Republic of Korea
| | - Ja Min Byun
- Cancer Research Institute, Seoul National University College of Medicine, Seoul, Republic of Korea.,Center for Medical Innovation, Seoul National University Hospital, Seoul, Republic of Korea.,Division of Hematology and Medical Oncology, Department of Internal Medicine, Seoul National University Hospital, Seoul, Republic of Korea
| | - Hongseok Yun
- Department of Genomic Medicine, Seoul National University Hospital, Seoul, Republic of Korea. .,Center for Precision Medicine, Seoul National University Hospital, Seoul, Republic of Korea.
| | - Youngil Koh
- Cancer Research Institute, Seoul National University College of Medicine, Seoul, Republic of Korea. .,Center for Medical Innovation, Seoul National University Hospital, Seoul, Republic of Korea. .,Division of Hematology and Medical Oncology, Department of Internal Medicine, Seoul National University Hospital, Seoul, Republic of Korea.
| | - Sung-Soo Yoon
- Cancer Research Institute, Seoul National University College of Medicine, Seoul, Republic of Korea. .,Center for Medical Innovation, Seoul National University Hospital, Seoul, Republic of Korea. .,Division of Hematology and Medical Oncology, Department of Internal Medicine, Seoul National University Hospital, Seoul, Republic of Korea.
| |
Collapse
|
119
|
Emergency Decision-making Method of Unconventional Emergencies in Higher Education Based on Intensive Learning. JOURNAL OF ENVIRONMENTAL AND PUBLIC HEALTH 2022; 2022:4317697. [PMID: 36213041 PMCID: PMC9534682 DOI: 10.1155/2022/4317697] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/19/2022] [Revised: 08/03/2022] [Accepted: 08/20/2022] [Indexed: 11/18/2022]
Abstract
In order to improve the emergency decision-making and management ability of unconventional emergencies in Colleges and universities, an emergency decision-making method for unconventional emergencies in Colleges and Universities based on reinforcement learning is proposed. The function of the emergency decision-making model of unconventional emergencies in Colleges and universities is constructed, and the optimal control of the emergency decision-making process of unconventional emergencies in Colleges and universities is realized by using the queuing theory model. Based on the sub-sequence decomposition method, the reinforcement learning function is optimized. Combined with big data scheduling and the empirical mode decomposition method, the effective probability density function of emergency decision-making for unconventional emergencies in higher education is calculated, and the optimal solution vector analysis of emergency management and scheduling decision-making for unconventional emergencies in Colleges and universities is realized according to parameter estimation and quantitative optimization results. The test results show that this method has a good ability to optimize and schedule the emergency decision-making of unconventional emergencies in higher education, and has strong convergence. This method improves the emergency response-ability, and the time cost is short.
Collapse
|
120
|
Zanoli SM, Pepe C, Moscoloni E, Astolfi G. Data Analysis and Modelling of Billets Features in Steel Industry. SENSORS (BASEL, SWITZERLAND) 2022; 22:s22197333. [PMID: 36236432 PMCID: PMC9572753 DOI: 10.3390/s22197333] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/06/2022] [Revised: 09/20/2022] [Accepted: 09/20/2022] [Indexed: 05/14/2023]
Abstract
This study proposes a data analysis and modelization method for the rolling mill process of billets in steel plants. By exploiting rolling mill signals and advanced data processing algorithms, a reliable billet tracking system is designed, which tracks each workpiece from the furnace entrance to the rolling mill stands' exit area. Based on the stored information, two problems are addressed: the data analysis of the temperature sensors (a thermal imaging camera and pyrometers) and the current that is related to the rolling mill stands' absorption, and subsequently, a mathematical modelization of the billets' temperature along their path in the rolling mill is produced. The data analysis suggested that we should perform hardware modifications: the thermal imaging camera was repositioned to avoid the effect of scale formation on the temperature measurements. The modelization phase provided the basis for future control and/or diagnosis applications that will exploit a temperature decay model.
Collapse
Affiliation(s)
- Silvia Maria Zanoli
- Dipartimento di Ingegneria dell’Informazione, Università Politecnica delle Marche, Via Brecce Bianche 12, 60131 Ancona, Italy
- Correspondence:
| | - Crescenzo Pepe
- Dipartimento di Ingegneria dell’Informazione, Università Politecnica delle Marche, Via Brecce Bianche 12, 60131 Ancona, Italy
| | | | | |
Collapse
|
121
|
Prediction of Outlet Pressure for the Sulfur Dioxide Blower Based on Conv1D-BiGRU Model and Genetic Algorithm. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:6297746. [PMID: 36203720 PMCID: PMC9532073 DOI: 10.1155/2022/6297746] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/08/2022] [Revised: 08/15/2022] [Accepted: 09/05/2022] [Indexed: 11/17/2022]
Abstract
The sulfur dioxide blower is a centrifugal blower that transports various gases in the process of acid production with flue gas. Accurate prediction of the outlet pressure of the sulfur dioxide blower is quite significant for the process of acid production with flue gas. Due to the internal structure of the sulfur dioxide blower being complex, its mechanism model is difficult to establish. A novel method combining one-dimensional convolution (Conv1D) and bidirectional gated recurrent unit (BiGRU) is proposed for short-term prediction of the outlet pressure of sulfur dioxide blower. Considering the external factors such as inlet pressure and inlet flow rate of the blower, the proposed method first uses Conv1D to extract periodic and local correlation features of these external factors and the blower’s outlet pressure data. Then, BiGRU is used to overcome the complexity and nonlinearity in prediction. More importantly, genetic algorithm (GA) is used to optimize the important hyperparameters of the model. Experimental results show that the combined model of Conv1D and BiGRU optimized by GA can predict the outlet pressure of sulfur dioxide blower accurately in the short term, in which the root mean square error (RMSE) is 0.504, the mean absolute error (MAE) is 0.406, and R-square (R2) is 0.993. Also, the proposed method is superior to LSTM, GRU, BiLSTM, BiGRU, and Conv1D-BiLSTM.
Collapse
|
122
|
Purushothaman R, Selvakumar S, Rajagopalan SP. Hybrid Grasshopper and Chameleon Swarm Optimization Algorithm for Text Feature Selection with Density Peaks Clustering. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS 2022. [DOI: 10.1142/s1469026822500183] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Abstract
Clustering consists of various applications on machine learning, image segmentation, data mining and pattern recognition. The proper selection of clustering is significant in feature selection. Therefore, in this paper, a Text Feature Selection (FS) and Clustering using Grasshopper–Chameleon Swarm Optimization with Density Peaks Clustering algorithm (TFSC-G-CSOA-DPCA) is proposed. Initially, the input features are pre-processed for converting text into numerical form. These preprocessed text features are given to Grasshopper–Chameleon Swarm Optimization Algorithm, which selects important text features. In Grasshopper–Chameleon Swarm Optimization Algorithm, the Grasshopper Optimization Algorithm selects local feature from text document and Chameleon Swarm Optimization Algorithm selects the best global feature from local feature. These important features are tested using density peaks clustering algorithm to maximize the reliability and minimize the computational time cost. The performance of Grasshopper–Chameleon Swarm Optimization Algorithm is analyzed with 20 News groups dataset. Moreover, the performance metrics, like accuracy, precision, sensitivity, specificity, execution time and memory usage are analyzed. The simulation process shows that the proposed TFSC-G-CSOA-DPCA method provides better accuracy of 97.36%, 95.14%, 94.67% and 91.91% and maximum sensitivity of 96.25%, 87.25%, 93.96% and 92.59% compared to the existing methods such as TFSC-BBA-MCL, TFSC-MVO-K-Means C, TFSC-GWO-GOA-FCM and TFSC-WM-K-Means C, respectively.
Collapse
Affiliation(s)
- R. Purushothaman
- Department of Computer Science and Engineering, GKM College of Engineering and Technology, New Perungalathur, Chennai 600063, Tamil Nadu, India
| | - S. Selvakumar
- Department of Computer Science and Engineering, GKM College of Engineering and Technology, New Perungalathur, Chennai 600063, Tamil Nadu, India
| | - S. P. Rajagopalan
- Department of Computer Science and Engineering, GKM College of Engineering and Technology, New Perungalathur, Chennai 600063, Tamil Nadu, India
| |
Collapse
|
123
|
Fowdur TP, Babooram L. Performance analysis of a cloud-based network analytics system with multiple-source data aggregation. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2022. [DOI: 10.1108/ijpcc-06-2022-0244] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
The purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to classify network traffic into different classes and predict network traffic parameters.
Design/methodology/approach
The classifier models include k-nearest neighbour (KNN), multilayer perceptron (MLP) and support vector machine (SVM), while the regression models studied are multiple linear regression (MLR) as well as MLP. The analytics were performed on both a local server and a servlet hosted on the international business machines cloud. Moreover, the local server could aggregate data from multiple devices on the network and perform collaborative ML to predict network parameters. With optimised hyperparameters, analytical models were incorporated in the cloud hosted Java servlets that operate on a client–server basis where the back-end communicates with Cloudant databases.
Findings
Regarding classification, it was found that KNN performs significantly better than MLP and SVM with a comparative precision gain of approximately 7%, when classifying both Wi-Fi and long term evolution (LTE) traffic.
Originality/value
Collaborative regression models using traffic collected from two devices were experimented and resulted in an increased average accuracy of 0.50% for all variables, with a multivariate MLP model.
Collapse
|
124
|
Hadi SM, Alsaeedi AH, Al‐Shammary D, Alkareem Alyasseri ZA, Mohammed MA, Abdulkareem KH, Nuiaa RR, Jaber MM. Trigonometric words ranking model for spam message classification. IET NETWORKS 2022. [DOI: 10.1049/ntw2.12063] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
Affiliation(s)
- Suha Mohammed Hadi
- Informatics Institute for Postgraduate Studies Iraqi Commission for Computer and Informatics Baghdad Iraq
| | - Ali Hakem Alsaeedi
- College of Computer Science and Information Technology University of Al‐Qadisiyah Al‐Qadisiyah Iraq
| | - Dhiah Al‐Shammary
- College of Computer Science and Information Technology University of Al‐Qadisiyah Al‐Qadisiyah Iraq
| | - Zaid Abdi Alkareem Alyasseri
- ECE Department Faculty of Engineering University of Kufa Najaf Iraq
- Information Technology Research and Development Center (ITRDC) University of Kufa Najaf Iraq
- College of Engineering University of Warith Al‐Anbiyaa Karbala Iraq
| | - Mazin Abed Mohammed
- College of Computer Science and Information Technology University of Anbar Ramadi Iraq
| | | | - Riyadh Rahef Nuiaa
- National Advanced IPv6 Centre (NAv6) University Sains Malaysia Minden Malaysia
| | - Mustafa Musa Jaber
- Department of Computer Science Dijlah University College Baghdad Iraq
- Department of Computer Science Al‐Turath University College Baghdad Iraq
| |
Collapse
|
125
|
Liu Y. Construction of talent training mechanism for innovation and entrepreneurship education in colleges and universities based on data fusion algorithm. Front Psychol 2022; 13:968023. [PMID: 36211907 PMCID: PMC9537772 DOI: 10.3389/fpsyg.2022.968023] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/13/2022] [Accepted: 09/01/2022] [Indexed: 11/23/2022] Open
Abstract
Nowadays, innovation and entrepreneurship courses occupy a very important place in universities and colleges and have also become an important teaching position in the process of building a new science. Colleges and universities actively respond to the challenge of “mass entrepreneurship and innovation” and define the goals and specifications of the talent training mechanism based on data fusion algorithms to cultivate as much high-quality applied talent as possible. In view of some shortcomings and problems in the current talent training mechanism in universities and colleges, this paper proposes a data fusion algorithm based on information fusion theory and proof theory. The aim is to verify the feasibility of establishing a talent training mechanism for innovation and entrepreneurship education in universities and colleges. And this paper analyzes and explores the data fusion algorithm and the elements of innovation and entrepreneurial talent training, and forms an operating mechanism for entrepreneurial talent training according to social needs. Among them, the efficiency of the data fusion algorithm used by the GM(1,1) model plays a significant role in the final result, and the minimum relative error value is 3.2%. Finally, it is concluded that we should focus on establishing a perfect talent training system for college students’ innovation and entrepreneurship education to improve students’ own comprehensive quality and various abilities, and to solve some social problems that are difficult to find employment in essence.
Collapse
|
126
|
Zhan K, Li Y, Osmani R, Wang X, Cao B. Data Exploration and Classification of News Article Reliability: Deep Learning Study. JMIR INFODEMIOLOGY 2022; 2:e38839. [PMID: 36193330 PMCID: PMC9516811 DOI: 10.2196/38839] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/19/2022] [Revised: 08/25/2022] [Accepted: 09/10/2022] [Indexed: 11/26/2022]
Abstract
Background During the ongoing COVID-19 pandemic, we are being exposed to large amounts of information each day. This “infodemic” is defined by the World Health Organization as the mass spread of misleading or false information during a pandemic. This spread of misinformation during the infodemic ultimately leads to misunderstandings of public health orders or direct opposition against public policies. Although there have been efforts to combat misinformation spread, current manual fact-checking methods are insufficient to combat the infodemic. Objective We propose the use of natural language processing (NLP) and machine learning (ML) techniques to build a model that can be used to identify unreliable news articles online. Methods First, we preprocessed the ReCOVery data set to obtain 2029 English news articles tagged with COVID-19 keywords from January to May 2020, which are labeled as reliable or unreliable. Data exploration was conducted to determine major differences between reliable and unreliable articles. We built an ensemble deep learning model using the body text, as well as features, such as sentiment, Empath-derived lexical categories, and readability, to classify the reliability. Results We found that reliable news articles have a higher proportion of neutral sentiment, while unreliable articles have a higher proportion of negative sentiment. Additionally, our analysis demonstrated that reliable articles are easier to read than unreliable articles, in addition to having different lexical categories and keywords. Our new model was evaluated to achieve the following performance metrics: 0.906 area under the curve (AUC), 0.835 specificity, and 0.945 sensitivity. These values are above the baseline performance of the original ReCOVery model. Conclusions This paper identified novel differences between reliable and unreliable news articles; moreover, the model was trained using state-of-the-art deep learning techniques. We aim to be able to use our findings to help researchers and the public audience more easily identify false information and unreliable media in their everyday lives.
Collapse
Affiliation(s)
- Kevin Zhan
- Department of Psychiatry University of Alberta Edmonton, AB Canada
| | - Yutong Li
- Department of Psychiatry University of Alberta Edmonton, AB Canada
| | - Rafay Osmani
- Department of Cell Biology University of Alberta Edmonton, AB Canada
| | - Xiaoyu Wang
- Department of Computing Science University of Alberta Edmonton, AB Canada
| | - Bo Cao
- Department of Psychiatry University of Alberta Edmonton, AB Canada
| |
Collapse
|
127
|
The Evaluation on the Credit Risk of Enterprises with the CNN-LSTM-ATT Model. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:6826573. [PMID: 36188679 PMCID: PMC9522511 DOI: 10.1155/2022/6826573] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/26/2022] [Revised: 09/04/2022] [Accepted: 09/08/2022] [Indexed: 11/23/2022]
Abstract
Credit evaluation is a difficult problem in the process of financing and loan for small and medium-sized enterprises. Due to the high dimension and nonlinearity of enterprise behavior data, traditional logistic regression (LR), random forest (RF), and other methods, when the feature space is very large, it is easy to show low accuracy and lack of robustness. However, recurrent neural network (RNN) will have a serious gradient disappearance problem under long sequence training. This paper proposes a compound neural network model based on the attention mechanism to meet the needs of enterprise credit evaluation. The convolutional neural network (CNN) and the long short-term memory (LSTM) network were used to establish the model, using soft attention, the gradient propagates back to other parts of the model through the attention mechanism module. In the multimodel comparison experiment and three different enterprise data experiments, the CNN-LSTM-ATT model proposed in this paper is superior to the traditional models LR, RF, CNN, LSTM, and CNN-LSTM in most cases. The experimental results under multimodel comparison reflect the higher accuracy of the model, and the group test reflects the higher robustness of the model.
Collapse
|
128
|
Xie J, Shi G, Zhu W. Intelligent Recognition Technology for the Segmentation of Traffic Indication Images Concerning Different Pavement Materials. Appl Bionics Biomech 2022; 2022:6278240. [PMID: 36245933 PMCID: PMC9553650 DOI: 10.1155/2022/6278240] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/30/2022] [Revised: 08/20/2022] [Accepted: 08/22/2022] [Indexed: 11/18/2022] Open
Abstract
Traffic indication is an important part of the road environment, providing information about road conditions, restrictions, prohibitions, warnings, and the current status related to the flow of the traffic and other navigational aspects. The shape, color, and pictogram of a traffic indication are encoded into the visual characteristics of traffic signs. Not paying attention to these traffic signs could lead directly or indirectly to traffic accidents. In this article, the support traffic indication vector recognition (STIVR) method is proposed to classify the best signal detection to avoid traffic congestion and accidents. The proposed STIVR recognizes the traffic indication system automatically, reduces occurrences of traffic accidents, and helps drivers move safely on different pavement materials. Besides, the adaptive median filter (AMF) algorithm is used to pre-process and protect the traffic indication images without obscuring them. Thus, it indicates the edge of the non-smoothed nasty ferment from the service. In the detection of traffic events, indication images are enhanced, pre-treated, and divided according to symbols and their characteristics such as color, shape, or both. The output becomes a segmented image, including the available space identified as a road sign. The experimental results show that the proposed method functions well; achieves a sufficiently higher process speed and better segmentation of traffic indications and more accuracy in recognition of the objects. For example, the proposed method reaches a higher sensitivity performance of 96%.
Collapse
Affiliation(s)
- Juanhong Xie
- Guangdong Technology College, Zhaoqing, 526100 Guangdong Province, China
| | - Guojian Shi
- Guangdong Technology College, Zhaoqing, 526100 Guangdong Province, China
| | - Weizhi Zhu
- Guangdong Technology College, Zhaoqing, 526100 Guangdong Province, China
| |
Collapse
|
129
|
Zhang Q. An optimized solution to the course scheduling problem in universities under an improved genetic algorithm. JOURNAL OF INTELLIGENT SYSTEMS 2022. [DOI: 10.1515/jisys-2022-0114] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022] Open
Abstract
Abstract
The increase in the size of universities has greatly increased the number of teachers, students, and courses and has also increased the difficulty of scheduling courses. This study used coevolution to improve the genetic algorithm and applied it to solve the course scheduling problem in universities. Finally, simulation experiments were conducted on the traditional and improved genetic algorithms in MATLAB software. The results showed that the improved genetic algorithm converged faster and produced better solutions than the traditional genetic algorithm under the same crossover and mutation probability. As the mutation probability in the algorithm increased, the fitness values of both genetic algorithms gradually decreased, and the computation time increased. With the increase in crossover probability in the algorithm, the fitness value of the two genetic algorithms increased first and then decreased, and the computational time decreased first and then increased.
Collapse
Affiliation(s)
- Qiang Zhang
- School of Hotel Administration, Zhengzhou Tourism College , Unit 1, Building 3, District A, Xingfu Gangwan, Chengdong South Road, Guancheng District , Zhengzhou , Henan, 450000 , China
| |
Collapse
|
130
|
Robert B, Boulanger P. Automatic Bone Segmentation from MRI for Real-Time Knee Tracking in Fluoroscopic Imaging. Diagnostics (Basel) 2022; 12:diagnostics12092228. [PMID: 36140633 PMCID: PMC9498193 DOI: 10.3390/diagnostics12092228] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/21/2022] [Revised: 08/31/2022] [Accepted: 09/06/2022] [Indexed: 11/17/2022] Open
Abstract
Recent progress in real-time tracking of knee bone structures from fluoroscopic imaging using CT templates has opened the door to studying knee kinematics to improve our understanding of patellofemoral syndrome. The problem with CT imaging is that it exposes patients to extra ionising radiation, which adds to fluoroscopic imaging. This can be solved by segmenting bone templates from MRI instead of CT by using a deep neural network architecture called 2.5D U-Net. To train the network, we used the SKI10 database from the MICCAI challenge; it contains 100 knee MRIs with their corresponding annotated femur and tibia bones as the ground truth. Since patella tracking is essential in our application, the SKI10 database was augmented with a new label named UofA Patella. Using 70 MRIs from the database, a 2.5D U-Net was trained successfully after 75 epochs with an excellent final Dice score of 98%, which compared favourably with the best state-of-the-art algorithms. A test set of 30 MRIs were segmented using the trained 2.5D U-Net and then converted into 3D mesh templates by using a marching cube algorithm. The resulting 3D mesh templates were compared to the 3D mesh model extracted from the corresponding labelled data from the augmented SKI10. Even though the final Dice score (98%) compared well with the state-of-the-art algorithms, we initially found that the Euclidean distance between the segmented MRI and SKI10 meshes was over 6 mm in many regions, which is unacceptable for our application. By optimising many of the hyper-parameters of the 2.5D U-Net, we were able to find that, by changing the threshold used in the last layer of the network, one can significantly improve the average accuracy to 0.2 mm with a variance of 0.065 mm for most of the MRI mesh templates. These results illustrate that the Dice score is not always a good predictor of the geometric accuracy of segmentation and that fine-tuning hyper-parameters is critical for improving geometric accuracy.
Collapse
|
131
|
Boopathi M, Chavan M, J. JJ, Kumar SNP. An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network. INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS 2022. [DOI: 10.1108/ijpcc-05-2022-0197] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Purpose
The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.
Design/methodology/approach
This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.
Findings
The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.
Originality/value
The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.
Collapse
|
132
|
A Natural Language Processing (NLP) Evaluation on COVID-19 Rumour Dataset Using Deep Learning Techniques. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:6561622. [PMID: 36156967 PMCID: PMC9492356 DOI: 10.1155/2022/6561622] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/17/2022] [Revised: 06/18/2022] [Accepted: 07/22/2022] [Indexed: 11/17/2022]
Abstract
Context and Background: Since December 2019, the coronavirus (COVID-19) epidemic has sparked considerable alarm among the general community and significantly affected societal attitudes and perceptions. Apart from the disease itself, many people suffer from anxiety and depression due to the disease and the present threat of an outbreak. Due to the fast propagation of the virus and misleading/fake information, the issues of public discourse alter, resulting in significant confusion in certain places. Rumours are unproven facts or stories that propagate and promote sentiments of prejudice, hatred, and fear. Objective. The study’s objective is to propose a novel solution to detect fake news using state-of-the-art machines and deep learning models. Furthermore, to analyse which models outperformed in detecting the fake news. Method. In the research study, we adapted a COVID-19 rumours dataset, which incorporates rumours from news websites and tweets, together with information about the rumours. It is important to analyse data utilizing Natural Language Processing (NLP) and Deep Learning (DL) approaches. Based on the accuracy, precision, recall, and the f1 score, we can assess the effectiveness of the ML and DL algorithms. Results. The data adopted from the source (mentioned in the paper) have collected 9200 comments from Google and 34,779 Twitter postings filtered for phrases connected with COVID-19-related fake news. Experiment 1. The dataset was assessed using the following three criteria: veracity, stance, and sentiment. In these terms, we have different labels, and we have applied the DL algorithms separately to each term. We have used different models in the experiment such as (i) LSTM and (ii) Temporal Convolution Networks (TCN). The TCN model has more performance on each measurement parameter in the evaluated results. So, we have used the TCN model for the practical implication for better findings. Experiment 2. In the second experiment, we have used different state-of-the-art deep learning models and algorithms such as (i) Simple RNN; (ii) LSTM + Word Embedding; (iii) Bidirectional + Word Embedding; (iv) LSTM + CNN-1D; and (v) BERT. Furthermore, we have evaluated the performance of these models on all three datasets, e.g., veracity, stance, and sentiment. Based on our second experimental evaluation, the BERT has a superior performance over the other models compared.
Collapse
|
133
|
Key Information Extraction of Food Environmental Safety Criminal Judgment Documents Based on Deep Learning. JOURNAL OF ENVIRONMENTAL AND PUBLIC HEALTH 2022; 2022:4661166. [PMID: 36148404 PMCID: PMC9489390 DOI: 10.1155/2022/4661166] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/03/2022] [Revised: 07/22/2022] [Accepted: 07/24/2022] [Indexed: 11/18/2022]
Abstract
Food has an impact on everyone’s daily life, the long-term stability of the nation, human survival and development, people’s lives and health, and the steady advancement of society. A food safety criminal judgment is a legal document used to record the trial of food-related offences. It primarily contains the case’s history, information about the parties involved, and the verdict. In order to identify defendants, their charges in court documents, and other important court information, this paper proposes a method for extracting key information from food safety criminal conviction documents based on deep learning. It builds and analyses a hidden Markov model (HMM) based on the corpus of crime-related components, and uses the model trained by a DL neural network to determine the trend of a given data set. In the test result classification task, the results demonstrate that the Transformer model can achieve macro accuracy rates of roughly 0.963, macro recall rates of 0.932, and macro F1 scores of 0.958. Experiments demonstrate the model suggested in this paper’s performance and effectiveness in extracting abstract information from food criminal trial documents.
Collapse
|
134
|
Arslan S, Yazici A. MM-FOOD: a high-dimensional index structure for efficiently querying content and concept of multimedia data. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2022. [DOI: 10.3233/jifs-220673] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Abstract
The semantic query problem is commonly called the semantic gap and is one of the significant problems in multimedia data retrieval. In this study, we focus on multimedia data retrieval by combining semantic information with data content to solve the semantic gap problem effectively. The main idea behind the combination of low-level content descriptors and the concept of multimedia data is to represent the content information with the semantic information by adding a low-level content descriptor as a new dimension to the index structure. This new dimension is represented by constructing an array index structure that uses a fuzzy clustering algorithm. Thus, a new high-dimensional index structure, named MM-FOOD, supporting querying of multimedia data, including fuzzy querying, is presented in this paper. This proposed index structure’s construction and query algorithms are explained throughout this paper. Our experiments show that our indexing mechanism is considerably efficient compared to the basic indexing approach, which stores low-level content and semantic concept descriptors in separate structures when the data size is large.
Collapse
Affiliation(s)
- Serdar Arslan
- Department of Computer Engineering, ÇankayaUniversity, Ankara, Turkey
| | - Adnan Yazici
- Department of Computer Science, Nazarbayev University, Astana, Kazakhstan
| |
Collapse
|
135
|
Application of Artificial Neural Network Algorithm in Facial Biological Image Information Scanning and Recognition. CONTRAST MEDIA & MOLECULAR IMAGING 2022; 2022:1142682. [PMID: 36134119 PMCID: PMC9481339 DOI: 10.1155/2022/1142682] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/24/2022] [Revised: 08/06/2022] [Accepted: 08/16/2022] [Indexed: 11/18/2022]
Abstract
In order to solve the problem that the accuracy of face recognition is not good due to the influence of jitter and environmental factors in the mobile shooting environment, this paper proposes the application of an artificial neural network algorithm in the information scanning and recognition of face biological images. The spatial neighborhood information is integrated into the amplitude detection of multipose face images, and the dynamic corner features of multipose face images are extracted. The structural texture information of multipose face images is compared to a global moving RGB three-dimensional bit plane random field, and the multipose face images are detected and fused. At different scales, appropriate feature registration functions are selected to describe the feature points of multipose face images. The parallax analysis of target pixels and key feature detection of multipose face images are carried out. Image stabilization and automatic recognition are realized by combining artificial neural network learning and feature registration methods. The experimental results show that the experiment is designed with MATLAB, the frame frequency of dynamic face image acquisition is 1200 kHz, the number of collected samples of the multipose face image is 2000, the training sample set is 200, the noise coefficient = 0.24, the number of multipose face image blocks is 120, and the structural similarity is 0.12. It is found that the output signal-to-noise ratio of multipose face image recognition using the method in this paper is high. Conclusion. This method has good performance in feature point registration and high recognition accuracy for multipose face image recognition.
Collapse
|
136
|
Selection and Optimization of Regional Economic Industrial Structure Based on Fuzzy k-Means Clustering Algorithm. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:4278524. [PMID: 36120685 PMCID: PMC9473882 DOI: 10.1155/2022/4278524] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/28/2022] [Revised: 07/24/2022] [Accepted: 08/01/2022] [Indexed: 11/23/2022]
Abstract
Learning about the regional business model is essential for the sustainable development of the regional economy. From the perspective of urban renewable energy, city A is the product of energy development. This paper analyzes the current situation and existing problems of the industrial model of city A through fuzzy k-means clustering algorithm. The results show that although the optimization of industrial structure in city A has achieved some results, the more intuitive problems mainly include low labor productivity of the primary industry, strong resource dependence, insufficient extension of industrial chain, and slow development of technology intensive industries. This paper uses fuzzy k-means clustering algorithm to select the leading industries from the perspective of the current situation of leading industries, urban development pattern, and regional policies in city A. The results show that, as a renewable resource-based city, the leading industries suitable for the current development of city A include manufacturing, power, alkali gas and water production and supply, transportation, warehousing and postal industry, leasing, and business services. The results of fuzzy k-means clustering algorithm are quite excellent, and the accuracy rate is 93.3%. This paper uses the grey dynamic linear programming model to predict the future development of the Urban A business model and combines the selection of key functions to obtain the best business model: deep and efficient technical equipment as a good goal, achieved through regional logistics, transportation, new services, etc., to enhance the output value of the tertiary industry in city A and optimize the internal structure of the secondary industry in city A.
Collapse
|
137
|
A Computational Neural Network Model for College English Grammar Correction. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:9592200. [PMID: 36105632 PMCID: PMC9467766 DOI: 10.1155/2022/9592200] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/04/2022] [Revised: 08/15/2022] [Accepted: 08/17/2022] [Indexed: 12/02/2022]
Abstract
For the error correction of English grammar, if there are errors in the semantic units (words and sentences), it will inevitably affect the subsequent text analysis and semantic understanding, and ultimately reduce the overall performance of the practical application system. Therefore, intelligent error detection and correction of the word and grammatical errors in English texts is one of the key and difficult points of natural language processing. This exploration innovatively combines a computational neural model with college grammar error correction to improve the accuracy of college grammar error correction. It studies the computational neural model in English grammar error correction based on a neural network named Knowledge and Neural machine translation powered College English Grammar Typo Correction (KNGTC). First, the Recurrent Neural Network is introduced, and the overall structure of the English grammatical error correction neural model is constructed. Moreover, the supervised training of Attention is discussed, and the experimental environment and experimental data are given. The results show that KNGTC has high accuracy in college English grammar correction, and the accuracy of this model in CET-4 and CET-6 writing can reach 82.69%. The English grammar error correction model based on the computational neural network has perfect function and strong error correction ability. The optimization and perfection of the model can improve students' English grammar level, which has certain practical value. After years of continuous optimization and improvement, English grammar error correction technology has entered a performance bottleneck. This mode's construction can break the current technology's limitations and bring a better user experience. Therefore, it is very valuable to study the error correction model of English grammar in practical application.
Collapse
|
138
|
Bagadi KR, Sivappagari CMR. A robust feature selection method based on meta-heuristic optimization for speech emotion recognition. EVOLUTIONARY INTELLIGENCE 2022. [DOI: 10.1007/s12065-022-00772-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
|
139
|
A Novel Trademark Image Retrieval System Based on Multi-Feature Extraction and Deep Networks. J Imaging 2022; 8:jimaging8090238. [PMID: 36135404 PMCID: PMC9505340 DOI: 10.3390/jimaging8090238] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/01/2022] [Revised: 08/28/2022] [Accepted: 08/31/2022] [Indexed: 11/23/2022] Open
Abstract
Graphical Search Engines are conceptually used in many development areas surrounding information retrieval systems that aim to provide a visual representation of results, typically associated with retrieving images relevant to one or more input images. Since the 1990s, efforts have been made to improve the result quality, be it through improved processing speeds or more efficient graphical processing techniques that generate accurate representations of images for comparison. While many systems achieve timely results by combining high-level features, they still struggle when dealing with large datasets and abstract images. Image datasets regarding industrial property are an example of an hurdle for typical image retrieval systems where the dimensions and characteristics of images make adequate comparison a difficult task. In this paper, we introduce an image retrieval system based on a multi-phase implementation of different deep learning and image processing techniques, designed to deliver highly accurate results regardless of dataset complexity and size. The proposed approach uses image signatures to provide a near exact representation of an image, with abstraction levels that allow the comparison with other signatures as a means to achieve a fully capable image comparison process. To overcome performance disadvantages related to multiple image searches due to the high complexity of image signatures, the proposed system incorporates a parallel processing block responsible for dealing with multi-image search scenarios. The system achieves the image retrieval through the use of a new similarity compound formula that accounts for all components of an image signature. The results shows that the developed approach performs image retrieval with high accuracy, showing that combining multiple image assets allows for more accurate comparisons across a broad spectrum of image typologies. The use of deep convolutional networks for feature extraction as a means of semantically describing more commonly encountered objects allows for the system to perform research with a degree of abstraction.
Collapse
|
140
|
Gholizadeh H, Chaleshigar M, Fazlollahtabar H. Robust optimization of uncertainty-based preventive maintenance model for scheduling series-parallel production systems (real case: disposable appliances production). ISA TRANSACTIONS 2022; 128:54-67. [PMID: 34973689 DOI: 10.1016/j.isatra.2021.11.041] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/31/2020] [Revised: 11/15/2021] [Accepted: 11/15/2021] [Indexed: 06/14/2023]
Abstract
Industrial companies would attempt to keep themselves agile in the dynamic market. Given the competition among industries, lean methods are employed to reduce costs in the system. Among them, maintenance is significant to have a system available for manufacturing tasks. Maintenance is identified as the largest cost control tools in the equipment-driven industry. Implementing an effectual plan for preventive maintenance helps to be much more flexible and create an innovative solution for planning in the production. In this vein, this paper introduces an optimization model related to flexible flow-shop system scheduling in a series-parallel production system of disposable appliances by considering the preventive maintenance (PM) policy. By planning preventive maintenance, extra operation time is incurred to the system which may influence the cycle time and lead to lost sales and back orders. Therefore, the paper proposes a mathematical model to consider both operations times and availability of the whole production system to minimize the delays to reach an optimal sequence of processing. Since uncertainty exists in real industrial systems, the processing times are uncertain here. To handle uncertainty, robust optimization has been applied to solve the problem. In addition, a scenario-based genetic algorithm (SBGA) and Particle Swarm Optimization (PSO) algorithm have been developed to solve the proposed model. The results indicate the appropriate performance of the proposed approach in terms of time-saving leads to saving the cost of PM.
Collapse
Affiliation(s)
- Hadi Gholizadeh
- Department of Industrial Engineering, Mazandaran University of Science and Technology, Babol, Iran; Département de Génie Mécanique, Université Laval, Québec, Canada.
| | | | - Hamed Fazlollahtabar
- Department of Industrial Engineering, School of Engineering, Damghan University, Damghan, Iran.
| |
Collapse
|
141
|
Lu K, Liao H. A survey of group decision making methods in Healthcare Industry 4.0: bibliometrics, applications, and directions. APPL INTELL 2022. [DOI: 10.1007/s10489-021-02909-y 10.1007/s10489-021-02909-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/07/2022]
|
142
|
Zou F, Chen D, Liu H, Cao S, Ji X, Zhang Y. A survey of fitness landscape analysis for optimization. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.06.084] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/26/2022]
|
143
|
Hu C, Qu G, Zhang Y. Pigeon-inspired fuzzy multi-objective task allocation of unmanned aerial vehicles for multi-target tracking. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2022.109310] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
144
|
Polignano M, Basile V, Basile P, Gabrieli G, Vassallo M, Bosco C. A hybrid lexicon-based and neural approach for explainable polarity detection. Inf Process Manag 2022. [DOI: 10.1016/j.ipm.2022.103058] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
145
|
Effect of the distance functions on the distance-based instance selection for the feed-forward neural network. EVOLUTIONARY INTELLIGENCE 2022. [DOI: 10.1007/s12065-021-00607-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
146
|
Arif M, Shamsudheen S, Ajesh F, Wang G, Chen J. AI bot to detect fake COVID-19 vaccine certificate. IET INFORMATION SECURITY 2022; 16:362-372. [PMID: 35942003 PMCID: PMC9348167 DOI: 10.1049/ise2.12063] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/06/2021] [Revised: 03/29/2022] [Accepted: 04/11/2022] [Indexed: 06/15/2023]
Abstract
As the world is now fighting against rampant virus COVID-19, the development of vaccines on a large scale and making it reach millions of people to be immunised has become quintessential. So far 40.9% of the world got vaccinated. Still, there are more to get vaccinated. Those who got vaccinated have the chance of getting the vaccine certificate as proof to move, work, etc., based on their daily requirements. But others create their own forged vaccine certificate using advanced software and digital tools which will create complex problems where we cannot distinguish between real and fake vaccine certificates. Also, it will create immense pressure on the government and as well as healthcare workers as they have been trying to save people from day 1, but parallelly people who have fake vaccine certificates roam around even if they are COVID/Non-COVID patients. So, to avoid this huge problem, this paper focuses on detecting fake vaccine certificates using a bot powered by Artificial Intelligence and neurologically powered by Deep Learning in which the following are the stages: a) Data Collection, b) Preprocessing to remove noise from the data, and convert to grayscale and normalised, c) Error level analysis, d) Texture-based feature extraction for extracting logo, symbol and for the signature we extract Crest-Trough parameter, and e) Classification using DenseNet201 and thereby giving the results as fake/real certificate. The evaluation of the model is taken over performance measures like accuracy, specificity, sensitivity, detection rate, recall, f1-score, and computation time over state-of-art models such as SVM, RNN, VGG16, Alexnet, and CNN in which the proposed model (D201-LBP) outperforms with an accuracy of 0.94.
Collapse
Affiliation(s)
- Muhammad Arif
- School of Computer ScienceGuangzhou UniversityGuangzhouChina
| | - Shermin Shamsudheen
- Faculty of Computer Science and Information Technology, Jazan UniversityJazanSaudi Arabia
| | - F Ajesh
- Department of Computer Science and EngineeringSree Buddha College of EngineeringAlappuzhaIndia
| | - Guojun Wang
- School of Computer ScienceGuangzhou UniversityGuangzhouChina
| | - Jianer Chen
- School of Computer ScienceGuangzhou UniversityGuangzhouChina
| |
Collapse
|
147
|
Makhdoom I, Abolhasan M, Lipman J. A comprehensive survey of covert communication techniques, limitations and future challenges. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102784] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
|
148
|
Abdulkhaleq MT, Rashid TA, Alsadoon A, Hassan BA, Mohammadi M, Abdullah JM, Chhabra A, Ali SL, Othman RN, Hasan HA, Azad S, Mahmood NA, Abdalrahman SS, Rasul HO, Bacanin N, Vimal S. Harmony search: Current studies and uses on healthcare systems. Artif Intell Med 2022; 131:102348. [DOI: 10.1016/j.artmed.2022.102348] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/03/2022] [Revised: 05/08/2022] [Accepted: 06/30/2022] [Indexed: 11/29/2022]
|
149
|
Tang M, Zhou F. A robust and secure watermarking algorithm based on DWT and SVD in the fractional order fourier transform domain. ARRAY 2022. [DOI: 10.1016/j.array.2022.100230] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022] Open
|
150
|
Shao N, Hu H. Exploring the Path of Enhancing Ideological and Political Education in Universities in the Era of Big Data. JOURNAL OF ENVIRONMENTAL AND PUBLIC HEALTH 2022; 2022:2288321. [PMID: 36089951 PMCID: PMC9451991 DOI: 10.1155/2022/2288321] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/20/2022] [Revised: 08/08/2022] [Accepted: 08/09/2022] [Indexed: 11/18/2022]
Abstract
The emergence of the big data era has drastically altered people's lives and perceptions. One needs a thorough understanding of the topic to effectively apply big data's benefits to the ideological and political education work that colleges and universities carry out. By doing so, the advantages of big data can be better exploited and integrated into the educational process, enhancing the work's overall quality. To enhance the path of ideological and political education in colleges and universities, it is necessary to change according to the matter, advance according to the time, and make new changes according to the situation, and therefore, it is important to actively explore the path of ideological and political education in colleges and universities under the times. In this study, we research and analyze the opportunities and challenges facing the ideological and political education of universities in the era of big data, reexamine the subjective and objective environment in which the ideological and political education of universities is located, and explore the innovative development path of the ideological and political education of universities in the new environment. We will also encourage the innovative growth of ideological and political work in four areas, such as cultivating big data thinking innovation, working method innovation, working carrier innovation, and ideological work team construction, and conduct a ranking analysis on the significance of the exploration variables to improve the path of ideological work. The importance score measures the value of features in the construction of the ascending decision in the model, so the XGBoost algorithm is used to sort and analyze the significance of exploring variables to enhance the political and ideological work trajectory. The analysis of the experimental results shows that the innovation of working methods has greatly enhanced the conditions for carrying out ideological and political education in the new environment and has far-reaching implications and important significance for the innovation of ideological and political education in universities.
Collapse
Affiliation(s)
- Nana Shao
- School of Marxism, Hainan Medical University, Hainan, Haikou 571199, China
- Hainan Integrated Moral Education Research Base for College, Middle School and Children, Hainan, Haikou 570204, China
| | - He Hu
- School of Marxism, Qiongtai Normal University, Hainan, Haikou 570204, China
- Hainan Integrated Moral Education Research Base for College, Middle School and Children, Hainan, Haikou 570204, China
| |
Collapse
|