期刊文献+
共找到6,296篇文章
< 1 2 250 >
每页显示 20 50 100
Planning a Course of a Computer Engineering Program by Bloom's Taxonomy
1
作者 Valfredo Pilla Jr Giancarlo F.Aguiar 《Journal of Mechanics Engineering and Automation》 2015年第4期263-267,共5页
The planning of teaching for a course that belongs to an undergraduate program usually begins with the definition of its contents,which are derived from syllabus of a political-pedagogical project.The contents listed ... The planning of teaching for a course that belongs to an undergraduate program usually begins with the definition of its contents,which are derived from syllabus of a political-pedagogical project.The contents listed are organized in a sequence considered logical.A set of actions is planned,such as lectures,laboratories,among others,through which content will be developed.The previous training of the student is considered,the concurrent and subsequent courses,the context of the course inside the program,the specific and general objectives of the program.A set of assessments is also defined as part of this planning,the associated methodologies,techniques and teaching objectives.In this context,this paper focuses on the aspect of the sequencing of content,methodologies and teaching techniques in a course.For this purpose,the Bloom's Taxonomy of Educational Objectives is applied,which provides a hierarchical structure for the cognitive process.The importance of this hierarchy of knowledge is greater awareness of the teacher about the ways to be adopted in the teaching process. 展开更多
关键词 Teaching organization Bloom's Taxonomy of Educational Objectives.
下载PDF
When Does Sora Show:The Beginning of TAO to Imaginative Intelligence and Scenarios Engineering 被引量:14
2
作者 Fei-Yue Wang Qinghai Miao +6 位作者 Lingxi Li Qinghua Ni Xuan Li Juanjuan Li Lili Fan Yonglin Tian Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期809-815,共7页
DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in... DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in the direction of Imaginative Intelligence(II),i.e.,something similar to automatic wordsto-videos generation or intelligent digital movies/theater technology that could be used for conducting new“Artificiofactual Experiments”[2]to replace conventional“Counterfactual Experiments”in scientific research and technical development for both natural and social studies[2]-[6].Now we have OpenAI’s Sora,so soon,but this is not the final,actually far away,and it is just the beginning. 展开更多
关键词 SOMETHING INTELLIGENCE replace
下载PDF
Frilled Lizard Optimization: A Novel Bio-Inspired Optimizer for Solving Engineering Applications 被引量:1
3
作者 Ibraheem Abu Falahah Osama Al-Baik +6 位作者 Saleh Alomari Gulnara Bektemyssova Saikat Gochhait Irina Leonova OmParkash Malik Frank Werner Mohammad Dehghani 《Computers, Materials & Continua》 SCIE EI 2024年第6期3631-3678,共48页
This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural habitat.FLO draws its inspi... This research presents a novel nature-inspired metaheuristic algorithm called Frilled Lizard Optimization(FLO),which emulates the unique hunting behavior of frilled lizards in their natural habitat.FLO draws its inspiration from the sit-and-wait hunting strategy of these lizards.The algorithm’s core principles are meticulously detailed and mathematically structured into two distinct phases:(i)an exploration phase,which mimics the lizard’s sudden attack on its prey,and(ii)an exploitation phase,which simulates the lizard’s retreat to the treetops after feeding.To assess FLO’s efficacy in addressing optimization problems,its performance is rigorously tested on fifty-two standard benchmark functions.These functions include unimodal,high-dimensional multimodal,and fixed-dimensional multimodal functions,as well as the challenging CEC 2017 test suite.FLO’s performance is benchmarked against twelve established metaheuristic algorithms,providing a comprehensive comparative analysis.The simulation results demonstrate that FLO excels in both exploration and exploitation,effectively balancing these two critical aspects throughout the search process.This balanced approach enables FLO to outperform several competing algorithms in numerous test cases.Additionally,FLO is applied to twenty-two constrained optimization problems from the CEC 2011 test suite and four complex engineering design problems,further validating its robustness and versatility in solving real-world optimization challenges.Overall,the study highlights FLO’s superior performance and its potential as a powerful tool for tackling a wide range of optimization problems. 展开更多
关键词 OPTIMIZATION engineering BIO-INSPIRED METAHEURISTIC frilled lizard exploration EXPLOITATION
下载PDF
A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images
4
作者 Yuejie Li Shijun Li 《Computers, Materials & Continua》 SCIE EI 2024年第3期3041-3070,共30页
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is... 6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous Connectivity.In tandem with these advancements,blockchain technology is leveraged to enhance computer vision applications’security,trustworthiness,and transparency.With the widespread use of mobile devices equipped with cameras,the ability to capture and recognize Chinese characters in natural scenes has become increasingly important.Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount,such as facial recognition or personal healthcare monitoring.Users can control their visual data and grant or revoke access as needed.Recognizing Chinese characters from images can provide convenience in various aspects of people’s lives.However,traditional Chinese character text recognition methods often need higher accuracy,leading to recognition failures or incorrect character identification.In contrast,computer vision technologies have significantly improved image recognition accuracy.This paper proposed a Secure end-to-end recognition system(SE2ERS)for Chinese characters in natural scenes based on convolutional neural networks(CNN)using 6G technology.The proposed SE2ERS model uses the Weighted Hyperbolic Curve Cryptograph(WHCC)of the secure data transmission in the 6G network with the blockchain model.The data transmission within the computer vision system,with a 6G gradient directional histogram(GDH),is employed for character estimation.With the deployment of WHCC and GDH in the constructed SE2ERS model,secure communication is achieved for the data transmission with the 6G network.The proposed SE2ERS compares the performance of traditional Chinese text recognition methods and data transmission environment with 6G communication.Experimental results demonstrate that SE2ERS achieves an average recognition accuracy of 88%for simple Chinese characters,compared to 81.2%with traditional methods.For complex Chinese characters,the average recognition accuracy improves to 84.4%with our system,compared to 72.8%with traditional methods.Additionally,deploying the WHCC model improves data security with the increased data encryption rate complexity of∼12&higher than the traditional techniques. 展开更多
关键词 6G technology blockchain end-to-end recognition Chinese characters natural scene computer vision algorithms convolutional neural network
下载PDF
Optimizing Deep Learning for Computer-Aided Diagnosis of Lung Diseases: An Automated Method Combining Evolutionary Algorithm, Transfer Learning, and Model Compression
5
作者 Hassen Louati Ali Louati +1 位作者 Elham Kariri Slim Bechikh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2519-2547,共29页
Recent developments in Computer Vision have presented novel opportunities to tackle complex healthcare issues,particularly in the field of lung disease diagnosis.One promising avenue involves the use of chest X-Rays,w... Recent developments in Computer Vision have presented novel opportunities to tackle complex healthcare issues,particularly in the field of lung disease diagnosis.One promising avenue involves the use of chest X-Rays,which are commonly utilized in radiology.To fully exploit their potential,researchers have suggested utilizing deep learning methods to construct computer-aided diagnostic systems.However,constructing and compressing these systems presents a significant challenge,as it relies heavily on the expertise of data scientists.To tackle this issue,we propose an automated approach that utilizes an evolutionary algorithm(EA)to optimize the design and compression of a convolutional neural network(CNN)for X-Ray image classification.Our approach accurately classifies radiography images and detects potential chest abnormalities and infections,including COVID-19.Furthermore,our approach incorporates transfer learning,where a pre-trainedCNNmodel on a vast dataset of chest X-Ray images is fine-tuned for the specific task of detecting COVID-19.This method can help reduce the amount of labeled data required for the task and enhance the overall performance of the model.We have validated our method via a series of experiments against state-of-the-art architectures. 展开更多
关键词 Computer-aided diagnosis deep learning evolutionary algorithms deep compression transfer learning
下载PDF
Introduction to the Special Issue on ComputerModeling for Smart Cities Applications
6
作者 Wenbing Zhao Chenxi Huang Yizhang Jiang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1015-1017,共3页
A significant fraction of the world’s population is living in cities. With the rapid development ofinformation and computing technologies (ICT), cities may be made smarter by embedding ICT intotheir infrastructure. B... A significant fraction of the world’s population is living in cities. With the rapid development ofinformation and computing technologies (ICT), cities may be made smarter by embedding ICT intotheir infrastructure. By smarter, we mean that the city operation will be more efficient, cost-effective,energy-saving, be more connected, more secure, and more environmentally friendly. As such, a smartcity is typically defined as a city that has a strong integration with ICT in all its components, includingits physical components, social components, and business components [1,2]. 展开更多
关键词 SMART typically SMART
下载PDF
Facile Semiconductor p-n Homojunction Nanowires with Strategic p-Type Doping Engineering Combined with Surface Reconstruction for Biosensing Applications
7
作者 Liuan Li Shi Fang +12 位作者 Wei Chen Yueyue Li Mohammad Fazel Vafadar Danhao Wang Yang Kang Xin Liu Yuanmin Luo Kun Liang Yiping Dang Lei Zhao Songrui Zhao Zongzhi Yin Haiding Sun 《Nano-Micro Letters》 SCIE EI CAS CSCD 2024年第10期15-30,共16页
Photosensors with versatile functionalities have emerged as a cornerstone for breakthroughs in the future optoelectronic systems across a wide range of applications.In particular,emerging photoelectrochemical(PEC)-typ... Photosensors with versatile functionalities have emerged as a cornerstone for breakthroughs in the future optoelectronic systems across a wide range of applications.In particular,emerging photoelectrochemical(PEC)-type devices have recently attracted extensive interest in liquid-based biosensing applications due to their natural electrolyte-assisted operating characteristics.Herein,a PEC-type photosensor was carefully designed and constructed by employing gallium nitride(GaN)p-n homojunction semiconductor nanowires on silicon,with the p-GaN segment strategically doped and then decorated with cobalt-nickel oxide(CoNiO_(x)).Essentially,the p-n homojunction configuration with facile p-doping engineering improves carrier separation efficiency and facilitates carrier transfer to the nanowire surface,while CoNiO_(x)decoration further boosts PEC reaction activity and carrier dynamics at the nanowire/electrolyte interface.Consequently,the constructed photosensor achieves a high responsivity of 247.8 mA W^(-1)while simultaneously exhibiting excellent operating stability.Strikingly,based on the remarkable stability and high responsivity of the device,a glucose sensing system was established with a demonstration of glucose level determination in real human serum.This work offers a feasible and universal approach in the pursuit of high-performance bio-related sensing applications via a rational design of PEC devices in the form of nanostructured architecture with strategic doping engineering. 展开更多
关键词 p-n GaN nanowires Strategic p-doping Surface decoration Photoelectrochemical sensor Glucose sensing
下载PDF
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems
8
作者 Farouq Zitouni Saad Harous +4 位作者 Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期219-265,共47页
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengt... Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems.This approach aims to leverage the strengths of multiple algorithms,enhancing solution quality,convergence speed,and robustness,thereby offering a more versatile and efficient means of solving intricate real-world optimization tasks.In this paper,we introduce a hybrid algorithm that amalgamates three distinct metaheuristics:the Beluga Whale Optimization(BWO),the Honey Badger Algorithm(HBA),and the Jellyfish Search(JS)optimizer.The proposed hybrid algorithm will be referred to as BHJO.Through this fusion,the BHJO algorithm aims to leverage the strengths of each optimizer.Before this hybridization,we thoroughly examined the exploration and exploitation capabilities of the BWO,HBA,and JS metaheuristics,as well as their ability to strike a balance between exploration and exploitation.This meticulous analysis allowed us to identify the pros and cons of each algorithm,enabling us to combine them in a novel hybrid approach that capitalizes on their respective strengths for enhanced optimization performance.In addition,the BHJO algorithm incorporates Opposition-Based Learning(OBL)to harness the advantages offered by this technique,leveraging its diverse exploration,accelerated convergence,and improved solution quality to enhance the overall performance and effectiveness of the hybrid algorithm.Moreover,the performance of the BHJO algorithm was evaluated across a range of both unconstrained and constrained optimization problems,providing a comprehensive assessment of its efficacy and applicability in diverse problem domains.Similarly,the BHJO algorithm was subjected to a comparative analysis with several renowned algorithms,where mean and standard deviation values were utilized as evaluation metrics.This rigorous comparison aimed to assess the performance of the BHJOalgorithmabout its counterparts,shedding light on its effectiveness and reliability in solving optimization problems.Finally,the obtained numerical statistics underwent rigorous analysis using the Friedman post hoc Dunn’s test.The resulting numerical values revealed the BHJO algorithm’s competitiveness in tackling intricate optimization problems,affirming its capability to deliver favorable outcomes in challenging scenarios. 展开更多
关键词 Global optimization hybridization of metaheuristics beluga whale optimization honey badger algorithm jellyfish search optimizer chaotic maps opposition-based learning
下载PDF
Electrochemical Carbon Dioxide Reduction to Ethylene:From Mechanistic Understanding to Catalyst Surface Engineering 被引量:4
9
作者 Junpeng Qu Xianjun Cao +7 位作者 Li Gao Jiayi Li Lu Li Yuhan Xie Yufei Zhao Jinqiang Zhang Minghong Wu Hao Liu 《Nano-Micro Letters》 SCIE EI CAS CSCD 2023年第10期382-415,共34页
Electrochemical carbon dioxide reduction reaction(CO_(2)RR)provides a promising way to convert CO_(2)to chemicals.The multicarbon(C_(2+))products,especially ethylene,are of great interest due to their versatile indust... Electrochemical carbon dioxide reduction reaction(CO_(2)RR)provides a promising way to convert CO_(2)to chemicals.The multicarbon(C_(2+))products,especially ethylene,are of great interest due to their versatile industrial applications.However,selectively reducing CO_(2)to ethylene is still challenging as the additional energy required for the C–C coupling step results in large overpotential and many competing products.Nonetheless,mechanistic understanding of the key steps and preferred reaction pathways/conditions,as well as rational design of novel catalysts for ethylene production have been regarded as promising approaches to achieving the highly efficient and selective CO_(2)RR.In this review,we first illustrate the key steps for CO_(2)RR to ethylene(e.g.,CO_(2)adsorption/activation,formation of~*CO intermediate,C–C coupling step),offering mechanistic understanding of CO_(2)RR conversion to ethylene.Then the alternative reaction pathways and conditions for the formation of ethylene and competitive products(C_1 and other C_(2+)products)are investigated,guiding the further design and development of preferred conditions for ethylene generation.Engineering strategies of Cu-based catalysts for CO_(2)RR-ethylene are further summarized,and the correlations of reaction mechanism/pathways,engineering strategies and selectivity are elaborated.Finally,major challenges and perspectives in the research area of CO_(2)RR are proposed for future development and practical applications. 展开更多
关键词 Key steps in CO_(2)RR-ethylene Preferable reaction pathways Mechanism understanding Surface engineering strategies of Cu-based catalysts
下载PDF
Novel Computer-Aided Diagnosis System for the Early Detection of Alzheimer’s Disease
10
作者 Meshal Alharbi Shabana R.Ziyad 《Computers, Materials & Continua》 SCIE EI 2023年第3期5483-5505,共23页
Aging is a natural process that leads to debility,disease,and dependency.Alzheimer’s disease(AD)causes degeneration of the brain cells leading to cognitive decline and memory loss,as well as dependence on others to f... Aging is a natural process that leads to debility,disease,and dependency.Alzheimer’s disease(AD)causes degeneration of the brain cells leading to cognitive decline and memory loss,as well as dependence on others to fulfill basic daily needs.AD is the major cause of dementia.Computer-aided diagnosis(CADx)tools aid medical practitioners in accurately identifying diseases such as AD in patients.This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop(IWD)algorithm and the Random Forest(RF)classifier.The IWD algorithm an efficient feature selection method,was used to identify the most deterministic features of AD in the dataset.RF is an ensemble method that leverages multiple weak learners to classify a patient’s disease as either demented(DN)or cognitively normal(CN).The proposed tool also classifies patients as mild cognitive impairment(MCI)or CN.The dataset on which the performance of the proposed CADx was evaluated was sourced from the Alzheimer’s Disease Neuroimaging Initiative(ADNI).The RF ensemble method achieves 100%accuracy in identifying DN patients from CN patients.The classification accuracy for classifying patients as MCI or CN is 92%.This study emphasizes the significance of pre-processing prior to classification to improve the classification results of the proposed CADx tool. 展开更多
关键词 Alzheimer’s disease DEMENTIA mild cognitive impairment computer-aided diagnosis intelligent water drop algorithm random forest
下载PDF
Face Mask and Social Distance Monitoring via Computer Vision and Deployable System Architecture
11
作者 Meherab Mamun Ratul Kazi Ayesha Rahman +2 位作者 Javeria Fazal Naimur Rahman Abanto Riasat Khan 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3641-3658,共18页
The coronavirus(COVID-19)is a lethal virus causing a rapidly infec-tious disease throughout the globe.Spreading awareness,taking preventive mea-sures,imposing strict restrictions on public gatherings,wearing facial ma... The coronavirus(COVID-19)is a lethal virus causing a rapidly infec-tious disease throughout the globe.Spreading awareness,taking preventive mea-sures,imposing strict restrictions on public gatherings,wearing facial masks,and maintaining safe social distancing have become crucial factors in keeping the virus at bay.Even though the world has spent a whole year preventing and curing the disease caused by the COVID-19 virus,the statistics show that the virus can cause an outbreak at any time on a large scale if thorough preventive measures are not maintained accordingly.Tofight the spread of this virus,technologically developed systems have become very useful.However,the implementation of an automatic,robust,continuous,and lightweight monitoring system that can be efficiently deployed on an embedded device still has not become prevalent in the mass community.This paper aims to develop an automatic system to simul-taneously detect social distance and face mask violation in real-time that has been deployed in an embedded system.A modified version of a convolutional neural network,the ResNet50 model,has been utilized to identify masked faces in peo-ple.You Only Look Once(YOLOv3)approach is applied for object detection and the DeepSORT technique is used to measure the social distance.The efficiency of the proposed model is tested on real-time video sequences taken from a video streaming source from an embedded system,Jetson Nano edge computing device,and smartphones,Android and iOS applications.Empirical results show that the implemented model can efficiently detect facial masks and social distance viola-tions with acceptable accuracy and precision scores. 展开更多
关键词 Artificial intelligence COVID-19 deep learning technique face mask detection social distance monitor you only look once
下载PDF
Measuring tree stem diameters and straightness with depth-image computer vision
12
作者 Hoang Tran Keith Woeste +2 位作者 Bowen Li Akshat Verma Guofan Shao 《Journal of Forestry Research》 SCIE CAS CSCD 2023年第5期1395-1405,共11页
Current techniques of forest inventory rely on manual measurements and are slow and labor intensive.Recent developments in computer vision and depth sensing can produce accurate measurement data at significantly reduc... Current techniques of forest inventory rely on manual measurements and are slow and labor intensive.Recent developments in computer vision and depth sensing can produce accurate measurement data at significantly reduced time and labor costs.We developed the ForSense system to measure the diameters of trees at various points along the stem as well as stem straightness.Time use,mean absolute error(MAE),and root mean squared error(RMSE)metrics were used to compare the system against manual methods,and to compare the system against itself(reproducibility).Depth-derived diameter measurements of the stems at the heights of 0.3,1.4,and 2.7 m achieved RMSE of 1.7,1.5,and 2.7 cm,respectively.The ForSense system produced straightness measurement data that was highly correlated with straightness ratings by trained foresters.The ForSense system was also consistent,achieving sub-centimeter diameter difference with subsequent measures and less than 4%difference in straightness value between runs.This method of forest inventory,which is based on depth-image computer vision,is time efficient compared to manual methods and less computationally and technologically intensive compared to Structure-from-Motion(SFM)photogrammetry and ground-based LiDAR or terrestrial laser scanning(TLS). 展开更多
关键词 Forest inventory Depth sensing Computer vision Tree diameter Stem straightness Trunk volume
下载PDF
Numerical Modeling and Computer Simulation of a Meander Line Antenna for Alzheimer’s Disease Treatment, a Feasibility Study
13
作者 Felipe P. Perez Maryam Rahmani +8 位作者 Jorge Morisaki Farhan Amran Syazwani Bakri Akmal Halim Alston Dsouza Nurafifi Mohd Yusuff Amran Farhan James Maulucci Maher Rizkalla 《Journal of Biosciences and Medicines》 CAS 2023年第2期177-185,共9页
Alzheimer’s disease (AD) is a brain disorder that eventually causes memory loss and the ability to perform simple cognitive functions;research efforts within pharmaceuticals and other medical treatments have minimal ... Alzheimer’s disease (AD) is a brain disorder that eventually causes memory loss and the ability to perform simple cognitive functions;research efforts within pharmaceuticals and other medical treatments have minimal impact on the disease. Our preliminary biological studies showed that Repeated Electromagnetic Field Stimulation (REFMS) applying an EM frequency of 64 MHz and a specific absorption rate (SAR) of 0.4 - 0.9 W/kg decrease the level of amyloid-β peptides (Aβ), which is the most likely etiology of AD. This study emphasizes uniform E/H field and SAR distribution with adequate penetration depth penetration through multiple human head layers driven with low input power for safety treatments. In this work, we performed numerical modeling and computer simulations of a portable Meander Line antenna (MLA) to achieve the required EMF parameters to treat AD. The MLA device features a low cost, small size, wide bandwidth, and the ability to integrate into a portable system. This study utilized a High-Frequency Simulation System (HFSS) in the design of the MLA with the desired characteristics suited for AD treatment in humans. The team designed a 24-turn antenna with a 60 cm length and 25 cm width and achieved the required resonant frequency of 64 MHz. Here we used two numerical human head phantoms to test the antenna, the MIDA and spherical head phantom with six and seven tissue layers, respectively. The antenna was fed from a 50-Watt input source to obtain the SAR of 0.6 W/kg requirement in the center of the simulated brain tissue layer. We found that the E/H field and SAR distribution produced was not homogeneous;there were areas of high SAR values close to the antenna transmitter, also areas of low SAR value far away from the antenna. This paper details the antenna parameters, the scattering parameters response, the efficiency response, and the E and H field distribution;we presented the computer simulation results and discussed future work for a practical model. 展开更多
关键词 Alzheimer’s Disease Meander Line Antenna HFSS EMF Linearity SAR Field Distribution
下载PDF
Human-Computer Interaction Using Deep Fusion Model-Based Facial Expression Recognition System
14
作者 Saiyed Umer Ranjeet Kumar Rout +3 位作者 Shailendra Tiwari Ahmad Ali AlZubi Jazem Mutared Alanazi Kulakov Yurii 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1165-1185,共21页
A deep fusion model is proposed for facial expression-based human-computer Interaction system.Initially,image preprocessing,i.e.,the extraction of the facial region from the input image is utilized.Thereafter,the extr... A deep fusion model is proposed for facial expression-based human-computer Interaction system.Initially,image preprocessing,i.e.,the extraction of the facial region from the input image is utilized.Thereafter,the extraction of more discriminative and distinctive deep learning features is achieved using extracted facial regions.To prevent overfitting,in-depth features of facial images are extracted and assigned to the proposed convolutional neural network(CNN)models.Various CNN models are then trained.Finally,the performance of each CNN model is fused to obtain the final decision for the seven basic classes of facial expressions,i.e.,fear,disgust,anger,surprise,sadness,happiness,neutral.For experimental purposes,three benchmark datasets,i.e.,SFEW,CK+,and KDEF are utilized.The performance of the proposed systemis compared with some state-of-the-artmethods concerning each dataset.Extensive performance analysis reveals that the proposed system outperforms the competitive methods in terms of various performance metrics.Finally,the proposed deep fusion model is being utilized to control a music player using the recognized emotions of the users. 展开更多
关键词 Deep learning facial expression emotions RECOGNITION CNN
下载PDF
Recent advances in computerized imaging and its vital roles in liverdisease diagnosis, preoperative planning, and interventional liversurgery: A review
15
作者 Paramate Horkaew Jirapa Chansangrat +1 位作者 Nattawut Keeratibharat Doan Cong Le 《World Journal of Gastrointestinal Surgery》 SCIE 2023年第11期2382-2397,共16页
The earliest and most accurate detection of the pathological manifestations of hepatic diseases ensures effective treatments and thus positive prognostic outcomes.In clinical settings,screening and determining the ext... The earliest and most accurate detection of the pathological manifestations of hepatic diseases ensures effective treatments and thus positive prognostic outcomes.In clinical settings,screening and determining the extent of a pathology are prominent factors in preparing remedial agents and administering approp-riate therapeutic procedures.Moreover,in a patient undergoing liver resection,a realistic preoperative simulation of the subject-specific anatomy and physiology also plays a vital part in conducting initial assessments,making surgical decisions during the procedure,and anticipating postoperative results.Conventionally,various medical imaging modalities,e.g.,computed tomography,magnetic resonance imaging,and positron emission tomography,have been employed to assist in these tasks.In fact,several standardized procedures,such as lesion detection and liver segmentation,are also incorporated into prominent commercial software packages.Thus far,most integrated software as a medical device typically involves tedious interactions from the physician,such as manual delineation and empirical adjustments,as per a given patient.With the rapid progress in digital health approaches,especially medical image analysis,a wide range of computer algorithms have been proposed to facilitate those procedures.They include pattern recognition of a liver,its periphery,and lesion,as well as pre-and postoperative simulations.Prior to clinical adoption,however,software must conform to regulatory requirements set by the governing agency,for instance,valid clinical association and analytical and clinical validation.Therefore,this paper provides a detailed account and discussion of the state-of-the-art methods for liver image analyses,visualization,and simulation in the literature.Emphasis is placed upon their concepts,algorithmic classifications,merits,limitations,clinical considerations,and future research trends. 展开更多
关键词 Computer aided diagnosis Medical image analysis Pattern recognition Artificial intelligence Surgical simulation Liver surgery
下载PDF
A Novel Computerized Cognitive Test for the Detection of Mild Cognitive Impairment and Its Association with Neurodegeneration in Alzheimer’s Disease Prone Brain Regions
16
作者 Rosie E. Curiel Cid D. Diane Zheng +11 位作者 Marcela Kitaigorodsky Malek Adjouadi Elizabeth A. Crocco Mike Georgiou Christian Gonzalez-Jimenez Alexandra Ortega Mohammed Goryawala Natalya Nagornaya Pradip Pattany Efrosyni Sfakianaki Ubbo Visser David A. Loewenstein 《Advances in Alzheimer's Disease》 2023年第3期38-54,共17页
During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to me... During the prodromal stage of Alzheimer’s disease (AD), neurodegenerative changes can be identified by measuring volumetric loss in AD-prone brain regions on MRI. Cognitive assessments that are sensitive enough to measure the early brain-behavior manifestations of AD and that correlate with biomarkers of neurodegeneration are needed to identify and monitor individuals at risk for dementia. Weak sensitivity to early cognitive change has been a major limitation of traditional cognitive assessments. In this study, we focused on expanding our previous work by determining whether a digitized cognitive stress test, the Loewenstein-Acevedo Scales for Semantic Interference and Learning, Brief Computerized Version (LASSI-BC) could differentiate between Cognitively Unimpaired (CU) and amnestic Mild Cognitive Impairment (aMCI) groups. A second focus was to correlate LASSI-BC performance to volumetric reductions in AD-prone brain regions. Data was gathered from 111 older adults who were comprehensively evaluated and administered the LASSI-BC. Eighty-seven of these participants (51 CU;36 aMCI) underwent MR imaging. The volumes of 12 AD-prone brain regions were related to LASSI-BC and other memory tests correcting for False Discovery Rate (FDR). Results indicated that, even after adjusting for initial learning ability, the failure to recover from proactive semantic interference (frPSI) on the LASSI-BC differentiated between CU and aMCI groups. An optimal combination of frPSI and initial learning strength on the LASSI-BC yielded an area under the ROC curve of 0.876 (76.1% sensitivity, 82.7% specificity). Further, frPSI on the LASSI-BC was associated with volumetric reductions in the hippocampus, amygdala, inferior temporal lobes, precuneus, and posterior cingulate. 展开更多
关键词 Mild Cognitive Impairment Proactive Semantic Interference MRI Volume Cortical Thickness LASSI-L
下载PDF
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms 被引量:3
17
作者 Keyao Li Yiming Wang +6 位作者 Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第1期28-35,共8页
Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since... Secret sharing is a promising technology for information encryption by splitting the secret information into different shares.However,the traditional scheme suffers from information leakage in decryption process since the amount of available information channels is limited.Herein,we propose and demonstrate an optical secret sharing framework based on the multi-dimensional multiplexing liquid crystal(LC)holograms.The LC holograms are used as spatially separated shares to carry secret images.The polarization of the incident light and the distance between different shares are served as secret keys,which can significantly improve the information security and capacity.Besides,the decryption condition is also restricted by the applied external voltage due to the variant diffraction efficiency,which further increases the information security.In implementation,an artificial neural network(ANN)model is developed to carefully design the phase distribution of each LC hologram.With the advantage of high security,high capacity and simple configuration,our optical secret sharing framework has great potentials in optical encryption and dynamic holographic display. 展开更多
关键词 holographic encryption optical secret sharing cascaded liquid crystal hologram multi-dimensional multiplexing
下载PDF
Recent Progress in Reinforcement Learning and Adaptive Dynamic Programming for Advanced Control Applications 被引量:4
18
作者 Ding Wang Ning Gao +2 位作者 Derong Liu Jinna Li Frank L.Lewis 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期18-36,共19页
Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and ... Reinforcement learning(RL) has roots in dynamic programming and it is called adaptive/approximate dynamic programming(ADP) within the control community. This paper reviews recent developments in ADP along with RL and its applications to various advanced control fields. First, the background of the development of ADP is described, emphasizing the significance of regulation and tracking control problems. Some effective offline and online algorithms for ADP/adaptive critic control are displayed, where the main results towards discrete-time systems and continuous-time systems are surveyed, respectively.Then, the research progress on adaptive critic control based on the event-triggered framework and under uncertain environment is discussed, respectively, where event-based design, robust stabilization, and game design are reviewed. Moreover, the extensions of ADP for addressing control problems under complex environment attract enormous attention. The ADP architecture is revisited under the perspective of data-driven and RL frameworks,showing how they promote ADP formulation significantly.Finally, several typical control applications with respect to RL and ADP are summarized, particularly in the fields of wastewater treatment processes and power systems, followed by some general prospects for future research. Overall, the comprehensive survey on ADP and RL for advanced control applications has d emonstrated its remarkable potential within the artificial intelligence era. In addition, it also plays a vital role in promoting environmental protection and industrial intelligence. 展开更多
关键词 Adaptive dynamic programming(ADP) advanced control complex environment data-driven control event-triggered design intelligent control neural networks nonlinear systems optimal control reinforcement learning(RL)
下载PDF
A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles 被引量:1
19
作者 Naiyu Wang Wenti Yang +4 位作者 Xiaodong Wang Longfei Wu Zhitao Guan Xiaojiang Du Mohsen Guizani 《Digital Communications and Networks》 SCIE CSCD 2024年第1期126-134,共9页
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have be... The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic management.Meanwhile,concerns have been raised over the security and privacy of the tons of traffic and vehicle data.In this regard,Federated Learning(FL)with privacy protection features is considered a highly promising solution.However,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global model.Most existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same time.In this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of FL.We improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving privacy-preservation.Additionally,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice honesty.The security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model. 展开更多
关键词 Federated learning Blockchain Privacy-preservation Homomorphic encryption Internetof vehicles
下载PDF
Point Cloud Classification Using Content-Based Transformer via Clustering in Feature Space 被引量:2
20
作者 Yahui Liu Bin Tian +2 位作者 Yisheng Lv Lingxi Li Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期231-239,共9页
Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to est... Recently, there have been some attempts of Transformer in 3D point cloud classification. In order to reduce computations, most existing methods focus on local spatial attention,but ignore their content and fail to establish relationships between distant but relevant points. To overcome the limitation of local spatial attention, we propose a point content-based Transformer architecture, called PointConT for short. It exploits the locality of points in the feature space(content-based), which clusters the sampled points with similar features into the same class and computes the self-attention within each class, thus enabling an effective trade-off between capturing long-range dependencies and computational complexity. We further introduce an inception feature aggregator for point cloud classification, which uses parallel structures to aggregate high-frequency and low-frequency information in each branch separately. Extensive experiments show that our PointConT model achieves a remarkable performance on point cloud shape classification. Especially, our method exhibits 90.3% Top-1 accuracy on the hardest setting of ScanObjectN N. Source code of this paper is available at https://github.com/yahuiliu99/PointC onT. 展开更多
关键词 Content-based Transformer deep learning feature aggregator local attention point cloud classification
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部