Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-f...Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-form solu-tion due to the nonlinearity of HJI equation,and many iterative algorithms are proposed to solve the HJI equation.Simultane-ous policy updating algorithm(SPUA)is an effective algorithm for solving HJI equation,but it is an on-policy integral reinforce-ment learning(IRL).For online implementation of SPUA,the dis-turbance signals need to be adjustable,which is unrealistic.In this paper,an off-policy IRL algorithm based on SPUA is pro-posed without making use of any knowledge of the systems dynamics.Then,a neural-network based online adaptive critic implementation scheme of the off-policy IRL algorithm is pre-sented.Based on the online off-policy IRL method,a computa-tional intelligence interception guidance(CIIG)law is developed for intercepting high-maneuvering target.As a model-free method,intercepting targets can be achieved through measur-ing system data online.The effectiveness of the CIIG is verified through two missile and target engagement scenarios.展开更多
Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid ...Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid solutions.Besides,unmanned aerial vehicles(UAV)developed a hot research topic in the smart city environment.Despite the benefits of UAVs,security remains a major challenging issue.In addition,deep learning(DL)enabled image classification is useful for several applications such as land cover classification,smart buildings,etc.This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification(MDLS-UAVIC)model in a smart city environment.Themajor purpose of the MDLS-UAVIC algorithm is to securely encrypt the images and classify them into distinct class labels.The proposedMDLS-UAVIC model follows a two-stage process:encryption and image classification.The encryption technique for image encryption effectively encrypts the UAV images.Next,the image classification process involves anXception-based deep convolutional neural network for the feature extraction process.Finally,shuffled shepherd optimization(SSO)with a recurrent neural network(RNN)model is applied for UAV image classification,showing the novelty of the work.The experimental validation of the MDLS-UAVIC approach is tested utilizing a benchmark dataset,and the outcomes are examined in various measures.It achieved a high accuracy of 98%.展开更多
Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quan...Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quantify "bounded rationality", and therefore it is difficult to pinpoint its impact to all those economic theories that depend on the assumption of full rationality. Ariel Rubinstein proposed to model bounded rationality by explicitly specifying the decision makers' decision-making procedures. This paper takes a computational point of view to Rubinstein's approach. From a computational point of view, decision procedures can be encoded in algorithms and heuristics. We argue that, everything else being equal, the effective rationality of an agent is determined by its computational power - we refer to this as the computational intelligence determines effective rationality (CIDER) theory. This is not an attempt to propose a unifying definition of bounded rationality. It is merely a proposal of a computational point of view of bounded rationality. This way of interpreting bounded rationality enables us to (computationally) reason about economic systems when the full rationality assumption is relaxed.展开更多
Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com-...Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com- prehensive reviews have summarized the ongoing efforts of computational intelligence in machinery condition moni- toring and fault diagnosis. The recent research and devel- opment of computational intelligence techniques in fault diagnosis, prediction and optimal sensor placement are reviewed. The advantages and limitations of computational intelligence techniques in practical applications are dis- cussed. The characteristics of different algorithms are compared, and application situations of these methods are summarized. Computational intelligence methods need to be further studied in deep understanding algorithm mech- anism, improving algorithm efficiency and enhancing engineering application. This review may be considered as a useful guidance for researchers in selecting a suit- able method for a specific situation and pointing out potential research directions.展开更多
A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The st...A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The structure and process of this network is clear. Fuzzy rules (knowledge) are expressed in the model explicitly, and can be self-adjusted by learning from samples. Genetic algorithm (GA) is employed as the learning algorithm to train the network, and makes the training of the model efficient. This model is a self-learning and self-adaptive system with a rule set revised by training.展开更多
Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise...Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by the user or other networked devices. With the increasing number of these devices attached to the network, the complexity to configure and control them increases, which may lead to major processing and communication overhead. Hence, the devices are no longer expected to just act as primitive stand-alone appliances that only provide the facilities and services to the user they are designed for, but also offer complex services that emerge from unique combinations of devices. This creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness to enable them to be self-configuring and self-programming. However, with this "smart evolution", the cognitive load to configure and control such spaces becomes immense. One way to relieve this load is by employing artificial intelligence (AI) techniques to create an intelligent "presence" where the system will be able to recognize the users and autonomously program the environment to be energy efficient and responsive to the user's needs and behaviours. These AI mechanisms should be embedded in the user's environments and should operate in a non-intrusive manner. This paper will show how computational intelligence (CI), which is an emerging domain of AI, could be employed and embedded in our living spaces to help such environments to be more energy efficient, intelligent, adaptive and convenient to the users.展开更多
The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a...The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002 in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society, and the Institution of Engineering and Technology, and composed of the 2008 International Joint Conference on Neural Networks (IJCNN2008), 2008 IEEE International Conference on Fuzzy Syrtems (FUZZ-IEEE2008), and 2008 IEEE Congress on Evolutionary Computation (CEC2008), WCC12008 will be the largest technical event on computational intelligence in the world with the biggest impact. WCCI 2008 will provide a stimulating forum for thousands of scientists, engineers, educators and students from all over the world to disseminate their new research findingsand exchange information on emerging areas of research in the fields. WCCI 2008 will also create a pleasant environment for the participants to meet old friends and make new friends who share similar research interests.展开更多
)The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a g...)The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society,展开更多
A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is requi...A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is required.As storage capacity increases,additional storage solutions are required.By leveraging deduplication,you can fundamentally solve the cost problem.However,deduplication poses privacy concerns due to the structure itself.In this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve it.In the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is maintained.In addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing attacks.The proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows.展开更多
Sensory evaluation is the evaluation of signals that a human receives via its senses of sight, smell, taste, touch and hearing. In today’s industrial companies, sensory evaluation is widely used in quality inspection...Sensory evaluation is the evaluation of signals that a human receives via its senses of sight, smell, taste, touch and hearing. In today’s industrial companies, sensory evaluation is widely used in quality inspection of products, in marketing study and in many other fields such as risk evaluation, investment evaluation and safety evaluation. In practice, setting up a suitable mathematical formulation, an efficient working procedure and a pertinent computing method for sensory evaluation is quite difficult because of uncertainty and imprecision in sensory panels and their results involving linguistic expressions, non normalized data, data reliability, etc. At the present a prime problem of the practitioner is not the lack of useful methods but the lack of transparency in this area. In this tutorial lecture, we briefly describe some of the technology in the computational intelligence (CI) areas that has been developed for application to sensory evaluation and related fields. Moreover, we will illustrate the role of CI in sensory evaluation related applications from some recent publications.展开更多
The present situation of lacking fast and effective coal and gas outburst prediction techniques will lead to long out- burst prevention cycles and poor accurate prediction effects and slows down coal roadway drive spe...The present situation of lacking fast and effective coal and gas outburst prediction techniques will lead to long out- burst prevention cycles and poor accurate prediction effects and slows down coal roadway drive speed seriously. Also, due to historical and economic reasons, some coal mines in China are equipped with poor safety equipment, and the staff professional capability is low. What's worse, artificial and mine geological conditions have great influences on the traditional technologies of coal and gas outburst prediction. Therefore, seeking a new fast and efficient coal and gas outburst prediction method is nec- essary. By using system engineering theory, combined with the current mine production conditions and based on the coal and gas outburst composite hypothesis, a coal and gas outburst spatiotemporal forecasting system was established. This system can guide forecasting work schedule, optimize prediction technologies, carry out step-by-step prediction and eliminate hazard hier- archically. From the point of view of application, the proposed system improves the prediction efficiency and accuracy. On this basis, computational intelligence methods to construct disaster information analysis platform were used. Feed-back results pro- vide decision support to mine safety supervisors.展开更多
This study investigates the effects of selected petrophysical properties on predicting flowing well bottomhole pressure.To efficiently situate the essence of this investigation,genetic,imperialist competitive and whal...This study investigates the effects of selected petrophysical properties on predicting flowing well bottomhole pressure.To efficiently situate the essence of this investigation,genetic,imperialist competitive and whale optimization algorithms were used in predicting the bottomhole pressure of a reservoir using production data and some selected petrophysical properties as independent input variables.A total of 15,633 data sets were collected from Volvo field in Norway,and after screening the data,a total of 9161 data sets were used to develop apt computational intelligence models.The data were randomly divided into three different groups:training,validation,and testing data.Two case scenarios were considered in this study.The first scenario involved the prediction of flowing bottomhole pressure using only eleven independent variables,while the second scenario bothered on the prediction of the same flowing bottomhole pressure using the same independent variables and two selected petrophysical properties(porosity and permeability).Each of the two scenarios involved as implied in the first scenario,the use of three(3)heuristic search optimizers to determine optimal model architectures.The optimizers were allowed to choose the optimal number of layers(between 1 and 10),the optimal number of nodal points(between 10 and 100)for each layer and the optimal learning rate required per task/operation.the results,showed that the models were able to learn the problems well with the learning rate fixed from 0.001 to 0.0001,although this became successively slower as the leaning rate decreased.With the chosen model configuration,the results suggest that a moderate learning rate of 0.0001 results in good model performance on the trained and tested data sets.Comparing the three heuristic search optimizers based on minimum MSE,RMSE,MAE and highest coefficient of determination(R^(2))for the actual and predicted values,shows that the imperialist competitive algorithm optimizer predicted the flowing bottomhole pressure most accurately relative to the genetic and whale optimization algorithm optimizers.展开更多
In recent years,computational intelligence has been widely used in many fields and achieved remarkable performance.Evolutionary computing and deep learning are important branches of computational intelligence.Many met...In recent years,computational intelligence has been widely used in many fields and achieved remarkable performance.Evolutionary computing and deep learning are important branches of computational intelligence.Many methods based on evolutionary computation and deep learning have achieved good performance in remote sensing image registration.This paper introduces the application of computational intelligence in remote sensing image registration from the two directions of evolutionary computing and deep learning.In the part of remote sensing image registration based on evolutionary calculation,the principles of evolutionary algorithms and swarm intelligence algorithms are elaborated and their application in remote sensing image registration is discussed.The application of deep learning in remote sensing image registration is also discussed.At the same time,the development status and future of remote sensing image registration are summarized and their prospects are examined.展开更多
Acute graft-versus-host disease (aGVHD) is a serious systemic complication of allogeneic hematopoietic stemcell transplantation (HSCT) causing considerable morbidity and mortality. Acute GVHD occurs when alloreactived...Acute graft-versus-host disease (aGVHD) is a serious systemic complication of allogeneic hematopoietic stemcell transplantation (HSCT) causing considerable morbidity and mortality. Acute GVHD occurs when alloreactivedonor-derived T cells recognize host-recipient antigens as foreign. These trigger a complex multiphase process thatultimately results in apoptotic injury in target organs. The early events leading to GVHD seem to occur very soon,presumably within hours from the graft infusion. Therefore, when the first signs of aGVHD clinically manifest, thedisease has been ongoing for several days at the cellular level, and the inflammatory cytokine cascade is fully activated.So, it comes as no surprise that progress in treatment based on clinical diagnosis of aGVHD has been limited in the past30 years. It is likely that a pre-emptive strategy using systemic high-dose corticosteroids as early as possible couldimprove the outcome of aGVHD. Due to the deleterious effects of such treatment particularly in terms of infection riskposed by systemic steroid administration in a population that is already immune-suppressed, it is critical to identifybiomarker signatures for approaching this very complex task. Some research groups have begun addressing this issuethrough molecular and proteomic analyses, combining these approaches with computational intelligence techniques,with the specific aim of facilitating the identification of diagnostic biomarkers in aGVHD. In this review, we focus on theaGVHD scenario and on the more recent state-of-the-art.We also attempt to give an overview of the classical and noveltechniques proposed as medical decision support system for the diagnosis of GVHD.展开更多
White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches ...White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches which categorize different kinds of WBC. Conventionally, laboratorytests are carried out to determine the kind of WBC which is erroneousand time consuming. Recently, deep learning (DL) models can be employedfor automated investigation of WBC images in short duration. Therefore,this paper introduces an Aquila Optimizer with Transfer Learning basedAutomated White Blood Cells Classification (AOTL-WBCC) technique. Thepresented AOTL-WBCC model executes data normalization and data augmentationprocess (rotation and zooming) at the initial stage. In addition,the residual network (ResNet) approach was used for feature extraction inwhich the initial hyperparameter values of the ResNet model are tuned by theuse of AO algorithm. Finally, Bayesian neural network (BNN) classificationtechnique has been implied for the identification of WBC images into distinctclasses. The experimental validation of the AOTL-WBCC methodology isperformed with the help of Kaggle dataset. The experimental results foundthat the AOTL-WBCC model has outperformed other techniques which arebased on image processing and manual feature engineering approaches underdifferent dimensions.展开更多
The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more...The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more efficient,it is essential to assess the reusability of the components used.This paper proposes a software reusability prediction model named Flexible Random Fit(FRF)based on aging resilience for a Service Net(SN)software system.The reusability predic-tion model is developed based on a multilevel optimization technique based on software characteristics such as cohesion,coupling,and complexity.Metrics are obtained from the SN software system,which is then subjected to min-max nor-malization to avoid any saturation during the learning process.The feature extrac-tion process is made more feasible by enriching the data quality via outlier detection.The reusability of the classes is estimated based on a tool called Soft Audit.Software reusability can be predicted more effectively based on the pro-posed FRF-ANN(Flexible Random Fit-Artificial Neural Network)algorithm.Performance evaluation shows that the proposed algorithm outperforms all the other techniques,thus ensuring the optimization of software reusability based on aging resilient.The model is then tested using constraint-based testing techni-ques to make sure that it is perfect at optimizing and making predictions.展开更多
Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the ne...Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the need for effective risk prediction models. Machine learning (ML) techniques have shown promise in analyzing complex data patterns and predicting disease outcomes. The accuracy of these techniques is greatly affected by changing their parameters. Hyperparameter optimization plays a crucial role in improving model performance. In this work, the Particle Swarm Optimization (PSO) algorithm was used to effectively search the hyperparameter space and improve the predictive power of the machine learning models by identifying the optimal hyperparameters that can provide the highest accuracy. A dataset with a variety of clinical and epidemiological characteristics linked to COVID-19 cases was used in this study. Various machine learning models, including Random Forests, Decision Trees, Support Vector Machines, and Neural Networks, were utilized to capture the complex relationships present in the data. To evaluate the predictive performance of the models, the accuracy metric was employed. The experimental findings showed that the suggested method of estimating COVID-19 risk is effective. When compared to baseline models, the optimized machine learning models performed better and produced better results.展开更多
Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assist...Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assisted decision support systems for endoscopy is an area of rapid research and development.The systems promise improved detection,classification,screening,and surveillance for colorectal polyps and cancer.Several recently developed applications for AIassisted colonoscopy have shown promising results for the detection and classification of colorectal polyps and adenomas.However,their value for real-time application in clinical practice has yet to be determined owing to limitations in the design,validation,and testing of AI models under real-life clinical conditions.Despite these current limitations,ambitious attempts to expand the technology further by developing more complex systems capable of assisting and supporting the endoscopist throughout the entire colonoscopy examination,including polypectomy procedures,are at the concept stage.However,further work is required to address the barriers and challenges of AI integration into broader colonoscopy practice,to navigate the approval process from regulatory organizations and societies,and to support physicians and patients on their journey to accepting the technology by providing strong evidence of its accuracy and safety.This article takes a closer look at the current state of AI integration into the field of colonoscopy and offers suggestions for future research.展开更多
Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent an...Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent and mathematical foundations of autonomous systems.It focuses on structural and behavioral properties that constitute the intelligent power of autonomous systems.It explains how system intelligence aggregates from reflexive,imperative,adaptive intelligence to autonomous and cognitive intelligence.A hierarchical intelligence model(HIM)is introduced to elaborate the evolution of human and system intelligence as an inductive process.The properties of system autonomy are formally analyzed towards a wide range of applications in computational intelligence and systems engineering.Emerging paradigms of autonomous systems including brain-inspired systems,cognitive robots,and autonomous knowledge learning systems are described.Advances in autonomous systems will pave a way towards highly intelligent machines for augmenting human capabilities.展开更多
文摘Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-form solu-tion due to the nonlinearity of HJI equation,and many iterative algorithms are proposed to solve the HJI equation.Simultane-ous policy updating algorithm(SPUA)is an effective algorithm for solving HJI equation,but it is an on-policy integral reinforce-ment learning(IRL).For online implementation of SPUA,the dis-turbance signals need to be adjustable,which is unrealistic.In this paper,an off-policy IRL algorithm based on SPUA is pro-posed without making use of any knowledge of the systems dynamics.Then,a neural-network based online adaptive critic implementation scheme of the off-policy IRL algorithm is pre-sented.Based on the online off-policy IRL method,a computa-tional intelligence interception guidance(CIIG)law is developed for intercepting high-maneuvering target.As a model-free method,intercepting targets can be achieved through measur-ing system data online.The effectiveness of the CIIG is verified through two missile and target engagement scenarios.
基金Deputyship for Research&Inno-vation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number RI-44-0446.
文摘Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid solutions.Besides,unmanned aerial vehicles(UAV)developed a hot research topic in the smart city environment.Despite the benefits of UAVs,security remains a major challenging issue.In addition,deep learning(DL)enabled image classification is useful for several applications such as land cover classification,smart buildings,etc.This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification(MDLS-UAVIC)model in a smart city environment.Themajor purpose of the MDLS-UAVIC algorithm is to securely encrypt the images and classify them into distinct class labels.The proposedMDLS-UAVIC model follows a two-stage process:encryption and image classification.The encryption technique for image encryption effectively encrypts the UAV images.Next,the image classification process involves anXception-based deep convolutional neural network for the feature extraction process.Finally,shuffled shepherd optimization(SSO)with a recurrent neural network(RNN)model is applied for UAV image classification,showing the novelty of the work.The experimental validation of the MDLS-UAVIC approach is tested utilizing a benchmark dataset,and the outcomes are examined in various measures.It achieved a high accuracy of 98%.
文摘Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quantify "bounded rationality", and therefore it is difficult to pinpoint its impact to all those economic theories that depend on the assumption of full rationality. Ariel Rubinstein proposed to model bounded rationality by explicitly specifying the decision makers' decision-making procedures. This paper takes a computational point of view to Rubinstein's approach. From a computational point of view, decision procedures can be encoded in algorithms and heuristics. We argue that, everything else being equal, the effective rationality of an agent is determined by its computational power - we refer to this as the computational intelligence determines effective rationality (CIDER) theory. This is not an attempt to propose a unifying definition of bounded rationality. It is merely a proposal of a computational point of view of bounded rationality. This way of interpreting bounded rationality enables us to (computationally) reason about economic systems when the full rationality assumption is relaxed.
基金Supported by National Natural Science Foundation of China(Grant No.51675098)
文摘Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com- prehensive reviews have summarized the ongoing efforts of computational intelligence in machinery condition moni- toring and fault diagnosis. The recent research and devel- opment of computational intelligence techniques in fault diagnosis, prediction and optimal sensor placement are reviewed. The advantages and limitations of computational intelligence techniques in practical applications are dis- cussed. The characteristics of different algorithms are compared, and application situations of these methods are summarized. Computational intelligence methods need to be further studied in deep understanding algorithm mech- anism, improving algorithm efficiency and enhancing engineering application. This review may be considered as a useful guidance for researchers in selecting a suit- able method for a specific situation and pointing out potential research directions.
基金Funded by the Open Research Fund Program of GIS Laboratory of Wuhan University (No. wd200609).
文摘A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The structure and process of this network is clear. Fuzzy rules (knowledge) are expressed in the model explicitly, and can be self-adjusted by learning from samples. Genetic algorithm (GA) is employed as the learning algorithm to train the network, and makes the training of the model efficient. This model is a self-learning and self-adaptive system with a rule set revised by training.
文摘Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by the user or other networked devices. With the increasing number of these devices attached to the network, the complexity to configure and control them increases, which may lead to major processing and communication overhead. Hence, the devices are no longer expected to just act as primitive stand-alone appliances that only provide the facilities and services to the user they are designed for, but also offer complex services that emerge from unique combinations of devices. This creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness to enable them to be self-configuring and self-programming. However, with this "smart evolution", the cognitive load to configure and control such spaces becomes immense. One way to relieve this load is by employing artificial intelligence (AI) techniques to create an intelligent "presence" where the system will be able to recognize the users and autonomously program the environment to be energy efficient and responsive to the user's needs and behaviours. These AI mechanisms should be embedded in the user's environments and should operate in a non-intrusive manner. This paper will show how computational intelligence (CI), which is an emerging domain of AI, could be employed and embedded in our living spaces to help such environments to be more energy efficient, intelligent, adaptive and convenient to the users.
文摘The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002 in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society, and the Institution of Engineering and Technology, and composed of the 2008 International Joint Conference on Neural Networks (IJCNN2008), 2008 IEEE International Conference on Fuzzy Syrtems (FUZZ-IEEE2008), and 2008 IEEE Congress on Evolutionary Computation (CEC2008), WCC12008 will be the largest technical event on computational intelligence in the world with the biggest impact. WCCI 2008 will provide a stimulating forum for thousands of scientists, engineers, educators and students from all over the world to disseminate their new research findingsand exchange information on emerging areas of research in the fields. WCCI 2008 will also create a pleasant environment for the participants to meet old friends and make new friends who share similar research interests.
文摘)The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society,
基金This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2019R1I1A3A01062789)(received by N.Park).
文摘A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is required.As storage capacity increases,additional storage solutions are required.By leveraging deduplication,you can fundamentally solve the cost problem.However,deduplication poses privacy concerns due to the structure itself.In this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve it.In the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is maintained.In addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing attacks.The proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows.
文摘Sensory evaluation is the evaluation of signals that a human receives via its senses of sight, smell, taste, touch and hearing. In today’s industrial companies, sensory evaluation is widely used in quality inspection of products, in marketing study and in many other fields such as risk evaluation, investment evaluation and safety evaluation. In practice, setting up a suitable mathematical formulation, an efficient working procedure and a pertinent computing method for sensory evaluation is quite difficult because of uncertainty and imprecision in sensory panels and their results involving linguistic expressions, non normalized data, data reliability, etc. At the present a prime problem of the practitioner is not the lack of useful methods but the lack of transparency in this area. In this tutorial lecture, we briefly describe some of the technology in the computational intelligence (CI) areas that has been developed for application to sensory evaluation and related fields. Moreover, we will illustrate the role of CI in sensory evaluation related applications from some recent publications.
文摘The present situation of lacking fast and effective coal and gas outburst prediction techniques will lead to long out- burst prevention cycles and poor accurate prediction effects and slows down coal roadway drive speed seriously. Also, due to historical and economic reasons, some coal mines in China are equipped with poor safety equipment, and the staff professional capability is low. What's worse, artificial and mine geological conditions have great influences on the traditional technologies of coal and gas outburst prediction. Therefore, seeking a new fast and efficient coal and gas outburst prediction method is nec- essary. By using system engineering theory, combined with the current mine production conditions and based on the coal and gas outburst composite hypothesis, a coal and gas outburst spatiotemporal forecasting system was established. This system can guide forecasting work schedule, optimize prediction technologies, carry out step-by-step prediction and eliminate hazard hier- archically. From the point of view of application, the proposed system improves the prediction efficiency and accuracy. On this basis, computational intelligence methods to construct disaster information analysis platform were used. Feed-back results pro- vide decision support to mine safety supervisors.
文摘This study investigates the effects of selected petrophysical properties on predicting flowing well bottomhole pressure.To efficiently situate the essence of this investigation,genetic,imperialist competitive and whale optimization algorithms were used in predicting the bottomhole pressure of a reservoir using production data and some selected petrophysical properties as independent input variables.A total of 15,633 data sets were collected from Volvo field in Norway,and after screening the data,a total of 9161 data sets were used to develop apt computational intelligence models.The data were randomly divided into three different groups:training,validation,and testing data.Two case scenarios were considered in this study.The first scenario involved the prediction of flowing bottomhole pressure using only eleven independent variables,while the second scenario bothered on the prediction of the same flowing bottomhole pressure using the same independent variables and two selected petrophysical properties(porosity and permeability).Each of the two scenarios involved as implied in the first scenario,the use of three(3)heuristic search optimizers to determine optimal model architectures.The optimizers were allowed to choose the optimal number of layers(between 1 and 10),the optimal number of nodal points(between 10 and 100)for each layer and the optimal learning rate required per task/operation.the results,showed that the models were able to learn the problems well with the learning rate fixed from 0.001 to 0.0001,although this became successively slower as the leaning rate decreased.With the chosen model configuration,the results suggest that a moderate learning rate of 0.0001 results in good model performance on the trained and tested data sets.Comparing the three heuristic search optimizers based on minimum MSE,RMSE,MAE and highest coefficient of determination(R^(2))for the actual and predicted values,shows that the imperialist competitive algorithm optimizer predicted the flowing bottomhole pressure most accurately relative to the genetic and whale optimization algorithm optimizers.
基金National Natural Science Foundation of China(Nos.61702392 and 61772393)Key Research and Development Program of Shaanxi Province(Nos.2018ZDXM-GY-045 and 2019JQ-189).
文摘In recent years,computational intelligence has been widely used in many fields and achieved remarkable performance.Evolutionary computing and deep learning are important branches of computational intelligence.Many methods based on evolutionary computation and deep learning have achieved good performance in remote sensing image registration.This paper introduces the application of computational intelligence in remote sensing image registration from the two directions of evolutionary computing and deep learning.In the part of remote sensing image registration based on evolutionary calculation,the principles of evolutionary algorithms and swarm intelligence algorithms are elaborated and their application in remote sensing image registration is discussed.The application of deep learning in remote sensing image registration is also discussed.At the same time,the development status and future of remote sensing image registration are summarized and their prospects are examined.
文摘Acute graft-versus-host disease (aGVHD) is a serious systemic complication of allogeneic hematopoietic stemcell transplantation (HSCT) causing considerable morbidity and mortality. Acute GVHD occurs when alloreactivedonor-derived T cells recognize host-recipient antigens as foreign. These trigger a complex multiphase process thatultimately results in apoptotic injury in target organs. The early events leading to GVHD seem to occur very soon,presumably within hours from the graft infusion. Therefore, when the first signs of aGVHD clinically manifest, thedisease has been ongoing for several days at the cellular level, and the inflammatory cytokine cascade is fully activated.So, it comes as no surprise that progress in treatment based on clinical diagnosis of aGVHD has been limited in the past30 years. It is likely that a pre-emptive strategy using systemic high-dose corticosteroids as early as possible couldimprove the outcome of aGVHD. Due to the deleterious effects of such treatment particularly in terms of infection riskposed by systemic steroid administration in a population that is already immune-suppressed, it is critical to identifybiomarker signatures for approaching this very complex task. Some research groups have begun addressing this issuethrough molecular and proteomic analyses, combining these approaches with computational intelligence techniques,with the specific aim of facilitating the identification of diagnostic biomarkers in aGVHD. In this review, we focus on theaGVHD scenario and on the more recent state-of-the-art.We also attempt to give an overview of the classical and noveltechniques proposed as medical decision support system for the diagnosis of GVHD.
基金The Deanship of Scientific Research (DSR)at King Abdulaziz University (KAU),Jeddah,Saudi Arabia has funded this project,under Grant No.KEP-1–120–42.
文摘White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches which categorize different kinds of WBC. Conventionally, laboratorytests are carried out to determine the kind of WBC which is erroneousand time consuming. Recently, deep learning (DL) models can be employedfor automated investigation of WBC images in short duration. Therefore,this paper introduces an Aquila Optimizer with Transfer Learning basedAutomated White Blood Cells Classification (AOTL-WBCC) technique. Thepresented AOTL-WBCC model executes data normalization and data augmentationprocess (rotation and zooming) at the initial stage. In addition,the residual network (ResNet) approach was used for feature extraction inwhich the initial hyperparameter values of the ResNet model are tuned by theuse of AO algorithm. Finally, Bayesian neural network (BNN) classificationtechnique has been implied for the identification of WBC images into distinctclasses. The experimental validation of the AOTL-WBCC methodology isperformed with the help of Kaggle dataset. The experimental results foundthat the AOTL-WBCC model has outperformed other techniques which arebased on image processing and manual feature engineering approaches underdifferent dimensions.
文摘The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more efficient,it is essential to assess the reusability of the components used.This paper proposes a software reusability prediction model named Flexible Random Fit(FRF)based on aging resilience for a Service Net(SN)software system.The reusability predic-tion model is developed based on a multilevel optimization technique based on software characteristics such as cohesion,coupling,and complexity.Metrics are obtained from the SN software system,which is then subjected to min-max nor-malization to avoid any saturation during the learning process.The feature extrac-tion process is made more feasible by enriching the data quality via outlier detection.The reusability of the classes is estimated based on a tool called Soft Audit.Software reusability can be predicted more effectively based on the pro-posed FRF-ANN(Flexible Random Fit-Artificial Neural Network)algorithm.Performance evaluation shows that the proposed algorithm outperforms all the other techniques,thus ensuring the optimization of software reusability based on aging resilient.The model is then tested using constraint-based testing techni-ques to make sure that it is perfect at optimizing and making predictions.
文摘Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the need for effective risk prediction models. Machine learning (ML) techniques have shown promise in analyzing complex data patterns and predicting disease outcomes. The accuracy of these techniques is greatly affected by changing their parameters. Hyperparameter optimization plays a crucial role in improving model performance. In this work, the Particle Swarm Optimization (PSO) algorithm was used to effectively search the hyperparameter space and improve the predictive power of the machine learning models by identifying the optimal hyperparameters that can provide the highest accuracy. A dataset with a variety of clinical and epidemiological characteristics linked to COVID-19 cases was used in this study. Various machine learning models, including Random Forests, Decision Trees, Support Vector Machines, and Neural Networks, were utilized to capture the complex relationships present in the data. To evaluate the predictive performance of the models, the accuracy metric was employed. The experimental findings showed that the suggested method of estimating COVID-19 risk is effective. When compared to baseline models, the optimized machine learning models performed better and produced better results.
文摘Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assisted decision support systems for endoscopy is an area of rapid research and development.The systems promise improved detection,classification,screening,and surveillance for colorectal polyps and cancer.Several recently developed applications for AIassisted colonoscopy have shown promising results for the detection and classification of colorectal polyps and adenomas.However,their value for real-time application in clinical practice has yet to be determined owing to limitations in the design,validation,and testing of AI models under real-life clinical conditions.Despite these current limitations,ambitious attempts to expand the technology further by developing more complex systems capable of assisting and supporting the endoscopist throughout the entire colonoscopy examination,including polypectomy procedures,are at the concept stage.However,further work is required to address the barriers and challenges of AI integration into broader colonoscopy practice,to navigate the approval process from regulatory organizations and societies,and to support physicians and patients on their journey to accepting the technology by providing strong evidence of its accuracy and safety.This article takes a closer look at the current state of AI integration into the field of colonoscopy and offers suggestions for future research.
基金supported in part by the Department of National Defence’s Innovation for Defence Excellence and Security(IDEa S)Program,Canadathrough the Project of Auto Defence Towards Trustworthy Technologies for Autonomous Human-Machine Systems,NSERCthe IEEE SMC Society Technical Committee on Brain-Inspired Systems(TCBCS)。
文摘Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent and mathematical foundations of autonomous systems.It focuses on structural and behavioral properties that constitute the intelligent power of autonomous systems.It explains how system intelligence aggregates from reflexive,imperative,adaptive intelligence to autonomous and cognitive intelligence.A hierarchical intelligence model(HIM)is introduced to elaborate the evolution of human and system intelligence as an inductive process.The properties of system autonomy are formally analyzed towards a wide range of applications in computational intelligence and systems engineering.Emerging paradigms of autonomous systems including brain-inspired systems,cognitive robots,and autonomous knowledge learning systems are described.Advances in autonomous systems will pave a way towards highly intelligent machines for augmenting human capabilities.