期刊文献+
共找到199篇文章
< 1 2 10 >
每页显示 20 50 100
Beyond 5G Networks: Integration of Communication, Computing, Caching, and Control 被引量:1
1
作者 Musbahu Mohammed Adam Liqiang Zhao +1 位作者 Kezhi Wang Zhu Han 《China Communications》 SCIE CSCD 2023年第7期137-174,共38页
In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular networks.Such challenges can be potentially overcome by integrating c... In recent years,the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular networks.Such challenges can be potentially overcome by integrating communication,computing,caching,and control(i4C)technologies.In this survey,we first give a snapshot of different aspects of the i4C,comprising background,motivation,leading technological enablers,potential applications,and use cases.Next,we describe different models of communication,computing,caching,and control(4C)to lay the foundation of the integration approach.We review current stateof-the-art research efforts related to the i4C,focusing on recent trends of both conventional and artificial intelligence(AI)-based integration approaches.We also highlight the need for intelligence in resources integration.Then,we discuss the integration of sensing and communication(ISAC)and classify the integration approaches into various classes.Finally,we propose open challenges and present future research directions for beyond 5G networks,such as 6G. 展开更多
关键词 4C 6G integration of communication computing caching and control i4C multi-access edge computing(MEC)
下载PDF
Computer Vision and Deep Learning-enabled Weed Detection Model for Precision Agriculture 被引量:1
2
作者 R.Punithavathi A.Delphin Carolina Rani +4 位作者 K.R.Sughashinir Chinnarao Kurangit M.Nirmala Hasmath Farhana Thariq Ahmed S.P.Balamurugan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2759-2774,共16页
Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)approaches.Weed plays a vital ... Presently,precision agriculture processes like plant disease,crop yield prediction,species recognition,weed detection,and irrigation can be accom-plished by the use of computer vision(CV)approaches.Weed plays a vital role in influencing crop productivity.The wastage and pollution of farmland's natural atmosphere instigated by full coverage chemical herbicide spraying are increased.Since the proper identification of weeds from crops helps to reduce the usage of herbicide and improve productivity,this study presents a novel computer vision and deep learning based weed detection and classification(CVDL-WDC)model for precision agriculture.The proposed CVDL-WDC technique intends to prop-erly discriminate the plants as well as weeds.The proposed CVDL-WDC technique involves two processes namely multiscale Faster RCNN based object detection and optimal extreme learning machine(ELM)based weed classification.The parameters of the ELM model are optimally adjusted by the use of farmland fertility optimization(FFO)algorithm.A comprehensive simulation analysis of the CVDL-WDC technique against benchmark dataset reported the enhanced out-comes over its recent approaches interms of several measures. 展开更多
关键词 Precision agriculture smart farming weed detection computer vision deep learning
下载PDF
Estrada index of dynamic random graphs
3
作者 SHANG Yi-lun 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2023年第2期159-165,共7页
The Estrada index of a graph G on n vertices is defined by EE(G)=∑^(n)_(i=1)^(eλ_(i)),whereλ_(1),λ_(2),···,λ_(n)are the adjacency eigenvalues of G.We define two general types of dynamic graphs evol... The Estrada index of a graph G on n vertices is defined by EE(G)=∑^(n)_(i=1)^(eλ_(i)),whereλ_(1),λ_(2),···,λ_(n)are the adjacency eigenvalues of G.We define two general types of dynamic graphs evolving according to continuous-time Markov processes with their stationary distributions matching the Erd¨os-R´enyi random graph and the random graph with given expected degrees,respectively.We formulate some new estimates and upper and lower bounds for the Estrada indices of these dynamic graphs. 展开更多
关键词 Estrada index temporary graph Markov process EIGENVALUE
下载PDF
Combined Effect of Concept Drift and Class Imbalance on Model Performance During Stream Classification
4
作者 Abdul Sattar Palli Jafreezal Jaafar +3 位作者 Manzoor Ahmed Hashmani Heitor Murilo Gomes Aeshah Alsughayyir Abdul Rehman Gilal 《Computers, Materials & Continua》 SCIE EI 2023年第4期1827-1845,共19页
Every application in a smart city environment like the smart grid,health monitoring, security, and surveillance generates non-stationary datastreams. Due to such nature, the statistical properties of data changes over... Every application in a smart city environment like the smart grid,health monitoring, security, and surveillance generates non-stationary datastreams. Due to such nature, the statistical properties of data changes overtime, leading to class imbalance and concept drift issues. Both these issuescause model performance degradation. Most of the current work has beenfocused on developing an ensemble strategy by training a new classifier on thelatest data to resolve the issue. These techniques suffer while training the newclassifier if the data is imbalanced. Also, the class imbalance ratio may changegreatly from one input stream to another, making the problem more complex.The existing solutions proposed for addressing the combined issue of classimbalance and concept drift are lacking in understating of correlation of oneproblem with the other. This work studies the association between conceptdrift and class imbalance ratio and then demonstrates how changes in classimbalance ratio along with concept drift affect the classifier’s performance.We analyzed the effect of both the issues on minority and majority classesindividually. To do this, we conducted experiments on benchmark datasetsusing state-of-the-art classifiers especially designed for data stream classification.Precision, recall, F1 score, and geometric mean were used to measure theperformance. Our findings show that when both class imbalance and conceptdrift problems occur together the performance can decrease up to 15%. Ourresults also show that the increase in the imbalance ratio can cause a 10% to15% decrease in the precision scores of both minority and majority classes.The study findings may help in designing intelligent and adaptive solutionsthat can cope with the challenges of non-stationary data streams like conceptdrift and class imbalance. 展开更多
关键词 CLASSIFICATION data streams class imbalance concept drift class imbalance ratio
下载PDF
Comparison of Websites Employing Search Engine Optimization and Live Data
5
作者 Subhradeep Maitra Laxminarayan Sahoo +1 位作者 Supriyan Sen Kalishankar Tiwary 《Journal of Computer Science Research》 2023年第2期16-27,共12页
This study compares websites that take live data into account using search engine optimization(SEO).A series of steps called search engine optimization can help a website rank highly in search engine results.Static we... This study compares websites that take live data into account using search engine optimization(SEO).A series of steps called search engine optimization can help a website rank highly in search engine results.Static websites and dynamic websites are two different types of websites.Static websites must have the necessary expertise in programming compatible with SEO.Whereas in dynamic websites,one can utilize readily available plugins/modules.The fundamental issue of all website holders is the lower level of page rank,congestion,utilization,and exposure of the website on the search engine.Here,the authors have studied the live data of four websites as the real-time data would indicate how the SEO strategy may be applied to website page rank,page difficulty removal,and brand query,etc.It is also necessary to choose relevant keywords on any website.The right keyword might assist to increase the brand query while also lowering the page difficulty both on and off the page.In order to calculate Off-page SEO,On-page SEO,and SEO Difficulty,the authors examined live data in this study and chose four well-known Indian university and institute websites for this study:www.caluniv.ac.in,www.jnu.ac.in,www.iima.ac.in,and www.iitb.ac.in.Using live data and SEO,the authors estimated the Off-page SEO,On-page SEO,and SEO Difficulty.It has been shown that the Off-page SEO of www.caluniv.ac.in is lower than that of www.jnu.ac.in,www.iima.ac.in,and www.iitb.ac.in by 9%,7%,and 7%,respectively.On-page SEO is,in comparison,4%,1%,and 1%more.Every university has continued to keep up its own brand query.Additionally,www.caluniv.ac.in has slightly less SEO Difficulty compared to other websites.The final computed results have been displayed and compared. 展开更多
关键词 Search engine optimization Live data Off-page SEO On-page SEO SEO Difficulty
下载PDF
Integrated Clustering and Routing Design and Triangle Path Optimization for UAV-Assisted Wireless Sensor Networks
6
作者 Shao Liwei Qian Liping +1 位作者 Wu Mengru Wu Yuan 《China Communications》 SCIE CSCD 2024年第4期178-192,共15页
With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated... With the development of the Internet of Things(IoT),it requires better performance from wireless sensor networks(WSNs),such as larger coverage,longer lifetime,and lower latency.However,a large amount of data generated from monitoring and long-distance transmission places a heavy burden on sensor nodes with the limited battery power.For this,we investigate an unmanned aerial vehicles assisted mobile wireless sensor network(UAV-assisted WSN)to prolong the network lifetime in this paper.Specifically,we use UAVs to assist the WSN in collecting data.In the current UAV-assisted WSN,the clustering and routing schemes are determined sequentially.However,such a separate consideration might not maximize the lifetime of the whole WSN due to the mutual coupling of clustering and routing.To efficiently prolong the lifetime of the WSN,we propose an integrated clustering and routing scheme that jointly optimizes the clustering and routing together.In the whole network space,it is intractable to efficiently obtain the optimal integrated clustering and routing scheme.Therefore,we propose the Monte-Las search strategy based on Monte Carlo and Las Vegas ideas,which can generate the chain matrix to guide the algorithm to find the solution faster.Unnecessary point-to-point collection leads to long collection paths,so a triangle optimization strategy is then proposed that finds a compromise path to shorten the collection path based on the geometric distribution and energy of sensor nodes.To avoid the coverage hole caused by the death of sensor nodes,the deployment of mobile sensor nodes and the preventive mechanism design are indispensable.An emergency data transmission mechanism is further proposed to reduce the latency of collecting the latency-sensitive data due to the absence of UAVs.Compared with the existing schemes,the proposed scheme can prolong the lifetime of the UAVassisted WSN at least by 360%,and shorten the collection path of UAVs by 56.24%. 展开更多
关键词 Monte-Las search strategy triangle path optimization unmanned aerial vehicles wireless sensor networks
下载PDF
A Survey of Human-centered Intelligent Robots:Issues and Challenges 被引量:26
7
作者 Wei He Zhijun Li C.L.Philip Chen 《IEEE/CAA Journal of Automatica Sinica》 CSCD 2017年第4期602-609,共8页
Intelligent techniques foster the dissemination of new discoveries and novel technologies that advance the ability of robots to assist and support humans. The human-centered intelligent robot has become an important r... Intelligent techniques foster the dissemination of new discoveries and novel technologies that advance the ability of robots to assist and support humans. The human-centered intelligent robot has become an important research field that spans all of the robot capabilities including navigation, intelligent control, pattern recognition and human-robot interaction. This paper focuses on the recent achievements and presents a survey of existing works on human-centered robots. Furthermore, we provide a comprehensive survey of the recent development of the human-centered intelligent robot and discuss the issues and challenges in the field. 展开更多
关键词 Human-centered robots human-robot interaction intelligent control navigation path planning pattern recognition
下载PDF
Path Planning and Navigation of Oceanic Autonomous Sailboats and Vessels: A Survey 被引量:1
8
作者 JING Wei LIU Chao +7 位作者 LI Ting RAHMAN A B M Mohaimenur XIAN Lintao WANG Xi WANG Yu GUO Zhongwen BRENDA Gumede TENDAI Wachi Kelvin 《Journal of Ocean University of China》 SCIE CAS CSCD 2020年第3期609-621,共13页
Oceanic autonomous surface vehicles(ASVs) are one kind of autonomous marine robots that have advantages of energy saving and is flexible to use. Nowadays, ASVs are playing an important role in marine science, maritime... Oceanic autonomous surface vehicles(ASVs) are one kind of autonomous marine robots that have advantages of energy saving and is flexible to use. Nowadays, ASVs are playing an important role in marine science, maritime industry, and national defense. It could improve the efficiency of oceanic data collection, ensure marine transportation safety, and protect national security. One of the core challenges for ASVs is how to plan a safe navigation autonomously under the complicated ocean environment. Based on the type of marine vehicles, ASVs could be divided into two categories: autonomous sailboats and autonomous vessels. In this article, we review the challenges and related solutions of ASVs' autonomous navigation, including modeling analysis, path planning and implementation. Finally, we make a summary of all of those in four tables and discuss about the future research directions. 展开更多
关键词 autonomous sailboats autonomous vessels model analysis path planning
下载PDF
Read-write rule property research of the combined function about the confidentiality and integrality 被引量:1
9
作者 LIU Yi-he 《通讯和计算机(中英文版)》 2008年第5期40-42,共3页
关键词 BLP模式 Biba模式 秘密性 完整性
下载PDF
Usability and Effectiveness of Mobile Learning Course Content Application as a Revision Tool
10
作者 Ahmad Sobri Hashim Wan Fatimah Wan Ahmad Rohiza Ahmad 《Computer Technology and Application》 2011年第2期148-157,共10页
关键词 可用性测试 移动学习 应用程序 修改工具 课程内容 测试过程 移动通信系统 实验设计
下载PDF
Automated Colorization of Grayscale Images Using Texture Descriptors and a Modified Fuzzy C-Means Clustering
11
作者 Christophe Gauge Sreela Sasi 《Journal of Intelligent Learning Systems and Applications》 2012年第2期135-143,共9页
A novel example-based process for Automated Colorization of grayscale images using Texture Descriptors (ACTD) without any human intervention is proposed. By analyzing a set of sample color images, coherent regions of ... A novel example-based process for Automated Colorization of grayscale images using Texture Descriptors (ACTD) without any human intervention is proposed. By analyzing a set of sample color images, coherent regions of homogeneous textures are extracted. A multi-channel filtering technique is used for texture-based image segmentation, combined with a modified Fuzzy C-means (FCM) clustering algorithm. This modified FCM clustering algorithm includes both the local spatial information from neighboring pixels, and the spatial Euclidian distance to the cluster’s center of gravity. For each area of interest, state-of-the-art texture descriptors are then computed and stored, along with corresponding color information. These texture descriptors and the color information are used for colorization of a grayscale image with similar textures. Given a grayscale image to be colorized, the segmentation and feature extraction processes are repeated. The texture descriptors are used to perform Content-Based Image Retrieval (CBIR). The colorization process is performed by Chroma replacement. This research finds numerous applications, ranging from classic film restoration and enhancement, to adding valuable information into medical and satellite imaging. Also, this can be used to enhance the detection of objects from x-ray images at the airports. 展开更多
关键词 Image Processing Pattern Recognition COMPUTER VISION Fuzzy C-MEANS Clustering GABOR
下载PDF
Real-Time Detection of Human Drowsiness via a Portable Brain-Computer Interface
12
作者 Julia Shen Baiyan Li Xuefei Shi 《Open Journal of Applied Sciences》 2017年第3期98-113,共16页
In this paper, we proposed a new concept: depth of drowsiness, which can more precisely describe the drowsiness than existing binary description. A set of effective markers for drowsiness: normalized band norm was suc... In this paper, we proposed a new concept: depth of drowsiness, which can more precisely describe the drowsiness than existing binary description. A set of effective markers for drowsiness: normalized band norm was successfully developed. These markers are invariant from voltage amplitude of brain waves, eliminating the need for calibrating the voltage output of the brain-computer interface devices. A new polling algorithm was designed and implemented for computing the depth of drowsiness. The time cost of data acquisition and processing for each estimate is about one second, which is well suited for real-time applications. Test results with a portable brain-computer interface device show that the depth of drowsiness computed by the method in this paper is generally invariant from ages of test subjects and sensor channels (P3 and C4). The comparison between experiment and computing results indicate that the new method is noticeably better than one of the recent methods in terms of accuracy for predicting the drowsiness. 展开更多
关键词 Brain-Computer Interface BRAIN Wave DROWSINESS Real-Time FOURIER TRANSFORM POLLING Algorithm
下载PDF
Optimal Deep Belief Network Enabled Malware Detection and Classification Model
13
作者 P.Pandi Chandran N.Hema Rajini M.Jeyakarthic 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3349-3364,共16页
Cybercrime has increased considerably in recent times by creating new methods of stealing,changing,and destroying data in daily lives.Portable Docu-ment Format(PDF)has been traditionally utilized as a popular way of s... Cybercrime has increased considerably in recent times by creating new methods of stealing,changing,and destroying data in daily lives.Portable Docu-ment Format(PDF)has been traditionally utilized as a popular way of spreading malware.The recent advances of machine learning(ML)and deep learning(DL)models are utilized to detect and classify malware.With this motivation,this study focuses on the design of mayfly optimization with a deep belief network for PDF malware detection and classification(MFODBN-MDC)technique.The major intention of the MFODBN-MDC technique is for identifying and classify-ing the presence of malware exist in the PDFs.The proposed MFODBN-MDC method derives a new MFO algorithm for the optimal selection of feature subsets.In addition,Adamax optimizer with the DBN model is used for PDF malware detection and classification.The design of the MFO algorithm to select features and Adamax based hyperparameter tuning for PDF malware detection and classi-fication demonstrates the novelty of the work.For demonstrating the improved outcomes of the MFODBN-MDC model,a wide range of simulations are exe-cuted,and the results are assessed in various aspects.The comparison study high-lighted the enhanced outcomes of the MFODBN-MDC model over the existing techniques with maximum precision,recall,and F1 score of 97.42%,97.33%,and 97.33%,respectively. 展开更多
关键词 PDF malware data classification SECURITY deep learning feature selection metaheuristics
下载PDF
Classification of Adversarial Attacks Using Ensemble Clustering Approach
14
作者 Pongsakorn Tatongjai Tossapon Boongoen +2 位作者 Natthakan Iam-On Nitin Naik Longzhi Yang 《Computers, Materials & Continua》 SCIE EI 2023年第2期2479-2498,共20页
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of attacks.To safeguard these,a perimeter defence l... As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of attacks.To safeguard these,a perimeter defence likeNIDS(network-based intrusion detection system)can be effective for known intrusions.There has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks,where obfuscation techniques are applied to disguise patterns of intrusive traffics.The current research focuses on non-payload connections at the TCP(transmission control protocol)stack level that is applicable to different network applications.In contrary to the wrapper method introduced with the benchmark dataset,three new filter models are proposed to transform the feature space without knowledge of class labels.These ECT(ensemble clustering based transformation)techniques,i.e.,ECT-Subspace,ECT-Noise and ECT-Combined,are developed using the concept of ensemble clustering and three different ensemble generation strategies,i.e.,random feature subspace,feature noise injection and their combinations.Based on the empirical study with published dataset and four classification algorithms,new models usually outperform that original wrapper and other filter alternatives found in the literature.This is similarly summarized from the first experiment with basic classification of legitimate and direct attacks,and the second that focuses on recognizing obfuscated intrusions.In addition,analysis of algorithmic parameters,i.e.,ensemble size and level of noise,is provided as a guideline for a practical use. 展开更多
关键词 Intrusion detection adversarial attack machine learning feature transformation ensemble clustering
下载PDF
Multimodal Machine Learning Based Crop Recommendation and Yield Prediction Model
15
作者 P.S.S.Gopi M.Karthikeyan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期313-326,共14页
Agriculture plays a vital role in the Indian economy.Crop recommen-dation for a specific region is a tedious process as it can be affected by various variables such as soil type and climatic parameters.At the same time... Agriculture plays a vital role in the Indian economy.Crop recommen-dation for a specific region is a tedious process as it can be affected by various variables such as soil type and climatic parameters.At the same time,crop yield prediction was based on several features like area,irrigation type,temperature,etc.The recent advancements of artificial intelligence(AI)and machine learning(ML)models pave the way to design effective crop recommendation and crop pre-diction models.In this view,this paper presents a novel Multimodal Machine Learning Based Crop Recommendation and Yield Prediction(MMML-CRYP)technique.The proposed MMML-CRYP model mainly focuses on two processes namely crop recommendation and crop prediction.At the initial stage,equilibrium optimizer(EO)with kernel extreme learning machine(KELM)technique is employed for effectual recommendation of crops.Next,random forest(RF)tech-nique was executed for predicting the crop yield accurately.For reporting the improved performance of the MMML-CRYP system,a wide range of simulations were carried out and the results are investigated using benchmark dataset.Experi-mentation outcomes highlighted the significant performance of the MMML-CRYP approach on the compared approaches with maximum accuracy of 97.91%. 展开更多
关键词 AGRICULTURE crop recommendation yield prediction machine learning artificial intelligence
下载PDF
VGWO: Variant Grey Wolf Optimizer with High Accuracy and Low Time Complexity
16
作者 Junqiang Jiang Zhifang Sun +3 位作者 Xiong Jiang Shengjie Jin Yinli Jiang Bo Fan 《Computers, Materials & Continua》 SCIE EI 2023年第11期1617-1644,共28页
The grey wolf optimizer(GWO)is a swarm-based intelligence optimization algorithm by simulating the steps of searching,encircling,and attacking prey in the process of wolf hunting.Along with its advantages of simple pr... The grey wolf optimizer(GWO)is a swarm-based intelligence optimization algorithm by simulating the steps of searching,encircling,and attacking prey in the process of wolf hunting.Along with its advantages of simple principle and few parameters setting,GWO bears drawbacks such as low solution accuracy and slow convergence speed.A few recent advanced GWOs are proposed to try to overcome these disadvantages.However,they are either difficult to apply to large-scale problems due to high time complexity or easily lead to early convergence.To solve the abovementioned issues,a high-accuracy variable grey wolf optimizer(VGWO)with low time complexity is proposed in this study.VGWO first uses the symmetrical wolf strategy to generate an initial population of individuals to lay the foundation for the global seek of the algorithm,and then inspired by the simulated annealing algorithm and the differential evolution algorithm,a mutation operation for generating a new mutant individual is performed on three wolves which are randomly selected in the current wolf individuals while after each iteration.A vectorized Manhattan distance calculation method is specifically designed to evaluate the probability of selecting the mutant individual based on its status in the current wolf population for the purpose of dynamically balancing global search and fast convergence capability of VGWO.A series of experiments are conducted on 19 benchmark functions from CEC2014 and CEC2020 and three real-world engineering cases.For 19 benchmark functions,VGWO’s optimization results place first in 80%of comparisons to the state-of-art GWOs and the CEC2020 competition winner.A further evaluation based on the Friedman test,VGWO also outperforms all other algorithms statistically in terms of robustness with a better average ranking value. 展开更多
关键词 Intelligence optimization algorithm grey wolf optimizer(GWO) manhattan distance symmetric coordinates
下载PDF
A Double Adaptive Random Spare Reinforced Sine Cosine Algorithm
17
作者 Abdelazim G.Hussien Guoxi Liang +1 位作者 Huiling Chen Haiping Lin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2267-2289,共23页
Many complex optimization problems in the real world can easily fall into local optimality and fail to find the optimal solution,so more new techniques and methods are needed to solve such challenges.Metaheuristic alg... Many complex optimization problems in the real world can easily fall into local optimality and fail to find the optimal solution,so more new techniques and methods are needed to solve such challenges.Metaheuristic algorithms have received a lot of attention in recent years because of their efficient performance and simple structure.Sine Cosine Algorithm(SCA)is a recent Metaheuristic algorithm that is based on two trigonometric functions Sine&Cosine.However,like all other metaheuristic algorithms,SCA has a slow convergence and may fail in sub-optimal regions.In this study,an enhanced version of SCA named RDSCA is suggested that depends on two techniques:random spare/replacement and double adaptive weight.The first technique is employed in SCA to speed the convergence whereas the second method is used to enhance exploratory searching capabilities.To evaluate RDSCA,30 functions from CEC 2017 and 4 real-world engineering problems are used.Moreover,a nonparametric test called Wilcoxon signed-rank is carried out at 5%level to evaluate the significance of the obtained results between RDSCA and the other 5 variants of SCA.The results show that RDSCA has competitive results with other metaheuristics algorithms. 展开更多
关键词 Sine cosine algorithm global optimization swarm intelligence meta-heuristic algorithms
下载PDF
Integrated Sensing,Computing and Communications Technologies in IoV and V2X
18
作者 Shanzhi Chen FRichard Yu +1 位作者 Weisong Shi Changle Li 《China Communications》 SCIE CSCD 2023年第3期I0002-I0004,共3页
With the development of new generation of information and communication technology,the Internet of Vehicles(IoV)/Vehicle-to-Everything(V2X),which realizes the connection between vehicle and X(i.e.,vehicles,pedestrians... With the development of new generation of information and communication technology,the Internet of Vehicles(IoV)/Vehicle-to-Everything(V2X),which realizes the connection between vehicle and X(i.e.,vehicles,pedestrians,infrastructures,clouds,etc.),is playing an increasingly important role in improving traffic operation efficiency and driving safety as well as enhancing the intelligence level of social traffic services. 展开更多
关键词 driving TRAFFIC operation
下载PDF
Machine Learning and Synthetic Minority Oversampling Techniques for Imbalanced Data: Improving Machine Failure Prediction
19
作者 Yap Bee Wah Azlan Ismail +4 位作者 Nur Niswah Naslina Azid Jafreezal Jaafar Izzatdin Abdul Aziz Mohd Hilmi Hasan Jasni Mohamad Zain 《Computers, Materials & Continua》 SCIE EI 2023年第6期4821-4841,共21页
Prediction of machine failure is challenging as the dataset is often imbalanced with a low failure rate.The common approach to han-dle classification involving imbalanced data is to balance the data using a sampling a... Prediction of machine failure is challenging as the dataset is often imbalanced with a low failure rate.The common approach to han-dle classification involving imbalanced data is to balance the data using a sampling approach such as random undersampling,random oversampling,or Synthetic Minority Oversampling Technique(SMOTE)algorithms.This paper compared the classification performance of three popular classifiers(Logistic Regression,Gaussian Naïve Bayes,and Support Vector Machine)in predicting machine failure in the Oil and Gas industry.The original machine failure dataset consists of 20,473 hourly data and is imbalanced with 19945(97%)‘non-failure’and 528(3%)‘failure data’.The three independent variables to predict machine failure were pressure indicator,flow indicator,and level indicator.The accuracy of the classifiers is very high and close to 100%,but the sensitivity of all classifiers using the original dataset was close to zero.The performance of the three classifiers was then evaluated for data with different imbalance rates(10%to 50%)generated from the original data using SMOTE,SMOTE-Support Vector Machine(SMOTE-SVM)and SMOTE-Edited Nearest Neighbour(SMOTE-ENN).The classifiers were evaluated based on improvement in sensitivity and F-measure.Results showed that the sensitivity of all classifiers increases as the imbalance rate increases.SVM with radial basis function(RBF)kernel has the highest sensitivity when data is balanced(50:50)using SMOTE(Sensitivitytest=0.5686,Ftest=0.6927)compared to Naïve Bayes(Sensitivitytest=0.4033,Ftest=0.6218)and Logistic Regression(Sensitivitytest=0.4194,Ftest=0.621).Overall,the Gaussian Naïve Bayes model consistently improves sensitivity and F-measure as the imbalance ratio increases,but the sensitivity is below 50%.The classifiers performed better when data was balanced using SMOTE-SVM compared to SMOTE and SMOTE-ENN. 展开更多
关键词 Machine failure machine learning imbalanced data SMOTE classification
下载PDF
Target tracking method of Siamese networks based on the broad learning system
20
作者 Dan Zhang C.L.Philip Chen +2 位作者 Tieshan Li Yi Zuo Nguyen Quang Duy 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期1043-1057,共15页
Target tracking has a wide range of applications in intelligent transportation,real‐time monitoring,human‐computer interaction and other aspects.However,in the tracking process,the target is prone to deformation,occ... Target tracking has a wide range of applications in intelligent transportation,real‐time monitoring,human‐computer interaction and other aspects.However,in the tracking process,the target is prone to deformation,occlusion,loss,scale variation,background clutter,illumination variation,etc.,which bring great challenges to realize accurate and real‐time tracking.Tracking based on Siamese networks promotes the application of deep learning in the field of target tracking,ensuring both accuracy and real‐time performance.However,due to its offline training,it is difficult to deal with the fast motion,serious occlusion,loss and deformation of the target during tracking.Therefore,it is very helpful to improve the performance of the Siamese networks by learning new features of the target quickly and updating the target position in time online.The broad learning system(BLS)has a simple network structure,high learning efficiency,and strong feature learning ability.Aiming at the problems of Siamese networks and the characteristics of BLS,a target tracking method based on BLS is proposed.The method combines offline training with fast online learning of new features,which not only adopts the powerful feature representation ability of deep learning,but also skillfully uses the BLS for re‐learning and re‐detection.The broad re‐learning information is used for re‐detection when the target tracking appears serious occlusion and so on,so as to change the selection of the Siamese networks search area,solve the problem that the search range cannot meet the fast motion of the target,and improve the adaptability.Experimental results show that the proposed method achieves good results on three challenging datasets and improves the performance of the basic algorithm in difficult scenarios. 展开更多
关键词 broad learning system siamese network target tracking
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部