Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-f...Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-form solu-tion due to the nonlinearity of HJI equation,and many iterative algorithms are proposed to solve the HJI equation.Simultane-ous policy updating algorithm(SPUA)is an effective algorithm for solving HJI equation,but it is an on-policy integral reinforce-ment learning(IRL).For online implementation of SPUA,the dis-turbance signals need to be adjustable,which is unrealistic.In this paper,an off-policy IRL algorithm based on SPUA is pro-posed without making use of any knowledge of the systems dynamics.Then,a neural-network based online adaptive critic implementation scheme of the off-policy IRL algorithm is pre-sented.Based on the online off-policy IRL method,a computa-tional intelligence interception guidance(CIIG)law is developed for intercepting high-maneuvering target.As a model-free method,intercepting targets can be achieved through measur-ing system data online.The effectiveness of the CIIG is verified through two missile and target engagement scenarios.展开更多
Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid ...Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid solutions.Besides,unmanned aerial vehicles(UAV)developed a hot research topic in the smart city environment.Despite the benefits of UAVs,security remains a major challenging issue.In addition,deep learning(DL)enabled image classification is useful for several applications such as land cover classification,smart buildings,etc.This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification(MDLS-UAVIC)model in a smart city environment.Themajor purpose of the MDLS-UAVIC algorithm is to securely encrypt the images and classify them into distinct class labels.The proposedMDLS-UAVIC model follows a two-stage process:encryption and image classification.The encryption technique for image encryption effectively encrypts the UAV images.Next,the image classification process involves anXception-based deep convolutional neural network for the feature extraction process.Finally,shuffled shepherd optimization(SSO)with a recurrent neural network(RNN)model is applied for UAV image classification,showing the novelty of the work.The experimental validation of the MDLS-UAVIC approach is tested utilizing a benchmark dataset,and the outcomes are examined in various measures.It achieved a high accuracy of 98%.展开更多
Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com-...Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com- prehensive reviews have summarized the ongoing efforts of computational intelligence in machinery condition moni- toring and fault diagnosis. The recent research and devel- opment of computational intelligence techniques in fault diagnosis, prediction and optimal sensor placement are reviewed. The advantages and limitations of computational intelligence techniques in practical applications are dis- cussed. The characteristics of different algorithms are compared, and application situations of these methods are summarized. Computational intelligence methods need to be further studied in deep understanding algorithm mech- anism, improving algorithm efficiency and enhancing engineering application. This review may be considered as a useful guidance for researchers in selecting a suit- able method for a specific situation and pointing out potential research directions.展开更多
A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The st...A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The structure and process of this network is clear. Fuzzy rules (knowledge) are expressed in the model explicitly, and can be self-adjusted by learning from samples. Genetic algorithm (GA) is employed as the learning algorithm to train the network, and makes the training of the model efficient. This model is a self-learning and self-adaptive system with a rule set revised by training.展开更多
Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise...Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by the user or other networked devices. With the increasing number of these devices attached to the network, the complexity to configure and control them increases, which may lead to major processing and communication overhead. Hence, the devices are no longer expected to just act as primitive stand-alone appliances that only provide the facilities and services to the user they are designed for, but also offer complex services that emerge from unique combinations of devices. This creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness to enable them to be self-configuring and self-programming. However, with this "smart evolution", the cognitive load to configure and control such spaces becomes immense. One way to relieve this load is by employing artificial intelligence (AI) techniques to create an intelligent "presence" where the system will be able to recognize the users and autonomously program the environment to be energy efficient and responsive to the user's needs and behaviours. These AI mechanisms should be embedded in the user's environments and should operate in a non-intrusive manner. This paper will show how computational intelligence (CI), which is an emerging domain of AI, could be employed and embedded in our living spaces to help such environments to be more energy efficient, intelligent, adaptive and convenient to the users.展开更多
Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quan...Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quantify "bounded rationality", and therefore it is difficult to pinpoint its impact to all those economic theories that depend on the assumption of full rationality. Ariel Rubinstein proposed to model bounded rationality by explicitly specifying the decision makers' decision-making procedures. This paper takes a computational point of view to Rubinstein's approach. From a computational point of view, decision procedures can be encoded in algorithms and heuristics. We argue that, everything else being equal, the effective rationality of an agent is determined by its computational power - we refer to this as the computational intelligence determines effective rationality (CIDER) theory. This is not an attempt to propose a unifying definition of bounded rationality. It is merely a proposal of a computational point of view of bounded rationality. This way of interpreting bounded rationality enables us to (computationally) reason about economic systems when the full rationality assumption is relaxed.展开更多
A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is requi...A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is required.As storage capacity increases,additional storage solutions are required.By leveraging deduplication,you can fundamentally solve the cost problem.However,deduplication poses privacy concerns due to the structure itself.In this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve it.In the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is maintained.In addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing attacks.The proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows.展开更多
The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a...The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002 in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society, and the Institution of Engineering and Technology, and composed of the 2008 International Joint Conference on Neural Networks (IJCNN2008), 2008 IEEE International Conference on Fuzzy Syrtems (FUZZ-IEEE2008), and 2008 IEEE Congress on Evolutionary Computation (CEC2008), WCC12008 will be the largest technical event on computational intelligence in the world with the biggest impact. WCCI 2008 will provide a stimulating forum for thousands of scientists, engineers, educators and students from all over the world to disseminate their new research findingsand exchange information on emerging areas of research in the fields. WCCI 2008 will also create a pleasant environment for the participants to meet old friends and make new friends who share similar research interests.展开更多
)The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a g...)The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society,展开更多
Sensory evaluation is the evaluation of signals that a human receives via its senses of sight, smell, taste, touch and hearing. In today’s industrial companies, sensory evaluation is widely used in quality inspection...Sensory evaluation is the evaluation of signals that a human receives via its senses of sight, smell, taste, touch and hearing. In today’s industrial companies, sensory evaluation is widely used in quality inspection of products, in marketing study and in many other fields such as risk evaluation, investment evaluation and safety evaluation. In practice, setting up a suitable mathematical formulation, an efficient working procedure and a pertinent computing method for sensory evaluation is quite difficult because of uncertainty and imprecision in sensory panels and their results involving linguistic expressions, non normalized data, data reliability, etc. At the present a prime problem of the practitioner is not the lack of useful methods but the lack of transparency in this area. In this tutorial lecture, we briefly describe some of the technology in the computational intelligence (CI) areas that has been developed for application to sensory evaluation and related fields. Moreover, we will illustrate the role of CI in sensory evaluation related applications from some recent publications.展开更多
The present situation of lacking fast and effective coal and gas outburst prediction techniques will lead to long out- burst prevention cycles and poor accurate prediction effects and slows down coal roadway drive spe...The present situation of lacking fast and effective coal and gas outburst prediction techniques will lead to long out- burst prevention cycles and poor accurate prediction effects and slows down coal roadway drive speed seriously. Also, due to historical and economic reasons, some coal mines in China are equipped with poor safety equipment, and the staff professional capability is low. What's worse, artificial and mine geological conditions have great influences on the traditional technologies of coal and gas outburst prediction. Therefore, seeking a new fast and efficient coal and gas outburst prediction method is nec- essary. By using system engineering theory, combined with the current mine production conditions and based on the coal and gas outburst composite hypothesis, a coal and gas outburst spatiotemporal forecasting system was established. This system can guide forecasting work schedule, optimize prediction technologies, carry out step-by-step prediction and eliminate hazard hier- archically. From the point of view of application, the proposed system improves the prediction efficiency and accuracy. On this basis, computational intelligence methods to construct disaster information analysis platform were used. Feed-back results pro- vide decision support to mine safety supervisors.展开更多
The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more...The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more efficient,it is essential to assess the reusability of the components used.This paper proposes a software reusability prediction model named Flexible Random Fit(FRF)based on aging resilience for a Service Net(SN)software system.The reusability predic-tion model is developed based on a multilevel optimization technique based on software characteristics such as cohesion,coupling,and complexity.Metrics are obtained from the SN software system,which is then subjected to min-max nor-malization to avoid any saturation during the learning process.The feature extrac-tion process is made more feasible by enriching the data quality via outlier detection.The reusability of the classes is estimated based on a tool called Soft Audit.Software reusability can be predicted more effectively based on the pro-posed FRF-ANN(Flexible Random Fit-Artificial Neural Network)algorithm.Performance evaluation shows that the proposed algorithm outperforms all the other techniques,thus ensuring the optimization of software reusability based on aging resilient.The model is then tested using constraint-based testing techni-ques to make sure that it is perfect at optimizing and making predictions.展开更多
White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches ...White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches which categorize different kinds of WBC. Conventionally, laboratorytests are carried out to determine the kind of WBC which is erroneousand time consuming. Recently, deep learning (DL) models can be employedfor automated investigation of WBC images in short duration. Therefore,this paper introduces an Aquila Optimizer with Transfer Learning basedAutomated White Blood Cells Classification (AOTL-WBCC) technique. Thepresented AOTL-WBCC model executes data normalization and data augmentationprocess (rotation and zooming) at the initial stage. In addition,the residual network (ResNet) approach was used for feature extraction inwhich the initial hyperparameter values of the ResNet model are tuned by theuse of AO algorithm. Finally, Bayesian neural network (BNN) classificationtechnique has been implied for the identification of WBC images into distinctclasses. The experimental validation of the AOTL-WBCC methodology isperformed with the help of Kaggle dataset. The experimental results foundthat the AOTL-WBCC model has outperformed other techniques which arebased on image processing and manual feature engineering approaches underdifferent dimensions.展开更多
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en...Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.展开更多
This article explores the key role of intelligent computing in driving the paradigm shift of scientific discovery.The article first outlines the five paradigms of scientific discovery,from empirical observation to the...This article explores the key role of intelligent computing in driving the paradigm shift of scientific discovery.The article first outlines the five paradigms of scientific discovery,from empirical observation to theoretical models,then to computational simulation and data intensive science,and finally introduces intelligent computing as the core of the fifth paradigm.Intelligent computing enhances the ability to understand,predict,and automate scientific discoveries of complex systems through technologies such as deep learning and machine learning.The article further analyzes the applications of intelligent computing in fields such as bioinformatics,astronomy,climate science,materials science,and medical image analysis,demonstrating its practical utility in solving scientific problems and promoting knowledge development.Finally,the article predicts that intelligent computing will play a more critical role in future scientific research,promoting interdisciplinary integration,open science,and collaboration,providing new solutions for solving complex problems.展开更多
Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the ne...Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the need for effective risk prediction models. Machine learning (ML) techniques have shown promise in analyzing complex data patterns and predicting disease outcomes. The accuracy of these techniques is greatly affected by changing their parameters. Hyperparameter optimization plays a crucial role in improving model performance. In this work, the Particle Swarm Optimization (PSO) algorithm was used to effectively search the hyperparameter space and improve the predictive power of the machine learning models by identifying the optimal hyperparameters that can provide the highest accuracy. A dataset with a variety of clinical and epidemiological characteristics linked to COVID-19 cases was used in this study. Various machine learning models, including Random Forests, Decision Trees, Support Vector Machines, and Neural Networks, were utilized to capture the complex relationships present in the data. To evaluate the predictive performance of the models, the accuracy metric was employed. The experimental findings showed that the suggested method of estimating COVID-19 risk is effective. When compared to baseline models, the optimized machine learning models performed better and produced better results.展开更多
Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assist...Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assisted decision support systems for endoscopy is an area of rapid research and development.The systems promise improved detection,classification,screening,and surveillance for colorectal polyps and cancer.Several recently developed applications for AIassisted colonoscopy have shown promising results for the detection and classification of colorectal polyps and adenomas.However,their value for real-time application in clinical practice has yet to be determined owing to limitations in the design,validation,and testing of AI models under real-life clinical conditions.Despite these current limitations,ambitious attempts to expand the technology further by developing more complex systems capable of assisting and supporting the endoscopist throughout the entire colonoscopy examination,including polypectomy procedures,are at the concept stage.However,further work is required to address the barriers and challenges of AI integration into broader colonoscopy practice,to navigate the approval process from regulatory organizations and societies,and to support physicians and patients on their journey to accepting the technology by providing strong evidence of its accuracy and safety.This article takes a closer look at the current state of AI integration into the field of colonoscopy and offers suggestions for future research.展开更多
Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent an...Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent and mathematical foundations of autonomous systems.It focuses on structural and behavioral properties that constitute the intelligent power of autonomous systems.It explains how system intelligence aggregates from reflexive,imperative,adaptive intelligence to autonomous and cognitive intelligence.A hierarchical intelligence model(HIM)is introduced to elaborate the evolution of human and system intelligence as an inductive process.The properties of system autonomy are formally analyzed towards a wide range of applications in computational intelligence and systems engineering.Emerging paradigms of autonomous systems including brain-inspired systems,cognitive robots,and autonomous knowledge learning systems are described.Advances in autonomous systems will pave a way towards highly intelligent machines for augmenting human capabilities.展开更多
The application of bio-inspired computational techniques to the field of condition monitoring is addressed. First, the bio-inspired computational techniques are briefly addressed; the advantages and disadvantages of t...The application of bio-inspired computational techniques to the field of condition monitoring is addressed. First, the bio-inspired computational techniques are briefly addressed; the advantages and disadvantages of these computational methods are made clear. Then, the roles of condition monitoring in the predictive maintenance and failures prediction and the development trends of condition monitoring are discussed. Finally, a case study on the condition monitoring of grinding machine is described, which shows the application of bio-inspired computational technique to a practical condition monitoring system.展开更多
Selective logging is well-recognized as an effective practice in sustainable forest management.However,the ecological efficiency or resilience of the residual stand is often in doubt.Recovery time depends on operation...Selective logging is well-recognized as an effective practice in sustainable forest management.However,the ecological efficiency or resilience of the residual stand is often in doubt.Recovery time depends on operational variables,diversity,and forest structure.Selective logging is excellent but is open to changes.This may be resolved by mathematical programming and this study integrates the economic-ecological aspects in multi-objective function by applying two evolutionary algorithms.The function maximizes remaining stand diversity,merchantable logs,and the inverse of distance between trees for harvesting and log landings points.The Brazilian rainforest database(566 trees)was used to simulate our 216-ha model.The log landing design has a maximum volume limit of 500 m3.The nondominated sorting genetic algorithm was applied to solve the main optimization problem.In parallel,a sub-problem(p-facility allocation)was solved for landing allocation by a genetic algorithm.Pareto frontier analysis was applied to distinguish the gradientsα-economic,β-ecological,andγ-equilibrium.As expected,the solutions have high diameter changes in the residual stand(average removal of approximately 16 m^(3) ha^(-1)).All solutions showed a grouping of trees selected for harvesting,although there was no formation of large clearings(percentage of canopy removal<7%,with an average of 2.5 ind ha^(-1)).There were no differences in floristic composition by preferentially selecting species with greater frequency in the initial stand for harvesting.This implies a lower impact on the demographic rates of the remaining stand.The methodology should support projects of reduced impact logging by using spatial-diversity information to guide better practices in tropical forests.展开更多
文摘Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-form solu-tion due to the nonlinearity of HJI equation,and many iterative algorithms are proposed to solve the HJI equation.Simultane-ous policy updating algorithm(SPUA)is an effective algorithm for solving HJI equation,but it is an on-policy integral reinforce-ment learning(IRL).For online implementation of SPUA,the dis-turbance signals need to be adjustable,which is unrealistic.In this paper,an off-policy IRL algorithm based on SPUA is pro-posed without making use of any knowledge of the systems dynamics.Then,a neural-network based online adaptive critic implementation scheme of the off-policy IRL algorithm is pre-sented.Based on the online off-policy IRL method,a computa-tional intelligence interception guidance(CIIG)law is developed for intercepting high-maneuvering target.As a model-free method,intercepting targets can be achieved through measur-ing system data online.The effectiveness of the CIIG is verified through two missile and target engagement scenarios.
基金Deputyship for Research&Inno-vation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number RI-44-0446.
文摘Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid solutions.Besides,unmanned aerial vehicles(UAV)developed a hot research topic in the smart city environment.Despite the benefits of UAVs,security remains a major challenging issue.In addition,deep learning(DL)enabled image classification is useful for several applications such as land cover classification,smart buildings,etc.This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification(MDLS-UAVIC)model in a smart city environment.Themajor purpose of the MDLS-UAVIC algorithm is to securely encrypt the images and classify them into distinct class labels.The proposedMDLS-UAVIC model follows a two-stage process:encryption and image classification.The encryption technique for image encryption effectively encrypts the UAV images.Next,the image classification process involves anXception-based deep convolutional neural network for the feature extraction process.Finally,shuffled shepherd optimization(SSO)with a recurrent neural network(RNN)model is applied for UAV image classification,showing the novelty of the work.The experimental validation of the MDLS-UAVIC approach is tested utilizing a benchmark dataset,and the outcomes are examined in various measures.It achieved a high accuracy of 98%.
基金Supported by National Natural Science Foundation of China(Grant No.51675098)
文摘Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com- prehensive reviews have summarized the ongoing efforts of computational intelligence in machinery condition moni- toring and fault diagnosis. The recent research and devel- opment of computational intelligence techniques in fault diagnosis, prediction and optimal sensor placement are reviewed. The advantages and limitations of computational intelligence techniques in practical applications are dis- cussed. The characteristics of different algorithms are compared, and application situations of these methods are summarized. Computational intelligence methods need to be further studied in deep understanding algorithm mech- anism, improving algorithm efficiency and enhancing engineering application. This review may be considered as a useful guidance for researchers in selecting a suit- able method for a specific situation and pointing out potential research directions.
基金Funded by the Open Research Fund Program of GIS Laboratory of Wuhan University (No. wd200609).
文摘A novel model of land suitability evaluation is built based on computational intelligence (CI). A fuzzy neural network (FNN) is constructed by the integration of fuzzy logic and artificial neural network (ANN). The structure and process of this network is clear. Fuzzy rules (knowledge) are expressed in the model explicitly, and can be self-adjusted by learning from samples. Genetic algorithm (GA) is employed as the learning algorithm to train the network, and makes the training of the model efficient. This model is a self-learning and self-adaptive system with a rule set revised by training.
文摘Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by the user or other networked devices. With the increasing number of these devices attached to the network, the complexity to configure and control them increases, which may lead to major processing and communication overhead. Hence, the devices are no longer expected to just act as primitive stand-alone appliances that only provide the facilities and services to the user they are designed for, but also offer complex services that emerge from unique combinations of devices. This creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness to enable them to be self-configuring and self-programming. However, with this "smart evolution", the cognitive load to configure and control such spaces becomes immense. One way to relieve this load is by employing artificial intelligence (AI) techniques to create an intelligent "presence" where the system will be able to recognize the users and autonomously program the environment to be energy efficient and responsive to the user's needs and behaviours. These AI mechanisms should be embedded in the user's environments and should operate in a non-intrusive manner. This paper will show how computational intelligence (CI), which is an emerging domain of AI, could be employed and embedded in our living spaces to help such environments to be more energy efficient, intelligent, adaptive and convenient to the users.
文摘Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quantify "bounded rationality", and therefore it is difficult to pinpoint its impact to all those economic theories that depend on the assumption of full rationality. Ariel Rubinstein proposed to model bounded rationality by explicitly specifying the decision makers' decision-making procedures. This paper takes a computational point of view to Rubinstein's approach. From a computational point of view, decision procedures can be encoded in algorithms and heuristics. We argue that, everything else being equal, the effective rationality of an agent is determined by its computational power - we refer to this as the computational intelligence determines effective rationality (CIDER) theory. This is not an attempt to propose a unifying definition of bounded rationality. It is merely a proposal of a computational point of view of bounded rationality. This way of interpreting bounded rationality enables us to (computationally) reason about economic systems when the full rationality assumption is relaxed.
基金This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(NRF-2019R1I1A3A01062789)(received by N.Park).
文摘A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is required.As storage capacity increases,additional storage solutions are required.By leveraging deduplication,you can fundamentally solve the cost problem.However,deduplication poses privacy concerns due to the structure itself.In this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve it.In the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is maintained.In addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing attacks.The proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows.
文摘The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002 in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society, and the Institution of Engineering and Technology, and composed of the 2008 International Joint Conference on Neural Networks (IJCNN2008), 2008 IEEE International Conference on Fuzzy Syrtems (FUZZ-IEEE2008), and 2008 IEEE Congress on Evolutionary Computation (CEC2008), WCC12008 will be the largest technical event on computational intelligence in the world with the biggest impact. WCCI 2008 will provide a stimulating forum for thousands of scientists, engineers, educators and students from all over the world to disseminate their new research findingsand exchange information on emerging areas of research in the fields. WCCI 2008 will also create a pleasant environment for the participants to meet old friends and make new friends who share similar research interests.
文摘)The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society,
文摘Sensory evaluation is the evaluation of signals that a human receives via its senses of sight, smell, taste, touch and hearing. In today’s industrial companies, sensory evaluation is widely used in quality inspection of products, in marketing study and in many other fields such as risk evaluation, investment evaluation and safety evaluation. In practice, setting up a suitable mathematical formulation, an efficient working procedure and a pertinent computing method for sensory evaluation is quite difficult because of uncertainty and imprecision in sensory panels and their results involving linguistic expressions, non normalized data, data reliability, etc. At the present a prime problem of the practitioner is not the lack of useful methods but the lack of transparency in this area. In this tutorial lecture, we briefly describe some of the technology in the computational intelligence (CI) areas that has been developed for application to sensory evaluation and related fields. Moreover, we will illustrate the role of CI in sensory evaluation related applications from some recent publications.
文摘The present situation of lacking fast and effective coal and gas outburst prediction techniques will lead to long out- burst prevention cycles and poor accurate prediction effects and slows down coal roadway drive speed seriously. Also, due to historical and economic reasons, some coal mines in China are equipped with poor safety equipment, and the staff professional capability is low. What's worse, artificial and mine geological conditions have great influences on the traditional technologies of coal and gas outburst prediction. Therefore, seeking a new fast and efficient coal and gas outburst prediction method is nec- essary. By using system engineering theory, combined with the current mine production conditions and based on the coal and gas outburst composite hypothesis, a coal and gas outburst spatiotemporal forecasting system was established. This system can guide forecasting work schedule, optimize prediction technologies, carry out step-by-step prediction and eliminate hazard hier- archically. From the point of view of application, the proposed system improves the prediction efficiency and accuracy. On this basis, computational intelligence methods to construct disaster information analysis platform were used. Feed-back results pro- vide decision support to mine safety supervisors.
文摘The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more efficient,it is essential to assess the reusability of the components used.This paper proposes a software reusability prediction model named Flexible Random Fit(FRF)based on aging resilience for a Service Net(SN)software system.The reusability predic-tion model is developed based on a multilevel optimization technique based on software characteristics such as cohesion,coupling,and complexity.Metrics are obtained from the SN software system,which is then subjected to min-max nor-malization to avoid any saturation during the learning process.The feature extrac-tion process is made more feasible by enriching the data quality via outlier detection.The reusability of the classes is estimated based on a tool called Soft Audit.Software reusability can be predicted more effectively based on the pro-posed FRF-ANN(Flexible Random Fit-Artificial Neural Network)algorithm.Performance evaluation shows that the proposed algorithm outperforms all the other techniques,thus ensuring the optimization of software reusability based on aging resilient.The model is then tested using constraint-based testing techni-ques to make sure that it is perfect at optimizing and making predictions.
基金The Deanship of Scientific Research (DSR)at King Abdulaziz University (KAU),Jeddah,Saudi Arabia has funded this project,under Grant No.KEP-1–120–42.
文摘White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches which categorize different kinds of WBC. Conventionally, laboratorytests are carried out to determine the kind of WBC which is erroneousand time consuming. Recently, deep learning (DL) models can be employedfor automated investigation of WBC images in short duration. Therefore,this paper introduces an Aquila Optimizer with Transfer Learning basedAutomated White Blood Cells Classification (AOTL-WBCC) technique. Thepresented AOTL-WBCC model executes data normalization and data augmentationprocess (rotation and zooming) at the initial stage. In addition,the residual network (ResNet) approach was used for feature extraction inwhich the initial hyperparameter values of the ResNet model are tuned by theuse of AO algorithm. Finally, Bayesian neural network (BNN) classificationtechnique has been implied for the identification of WBC images into distinctclasses. The experimental validation of the AOTL-WBCC methodology isperformed with the help of Kaggle dataset. The experimental results foundthat the AOTL-WBCC model has outperformed other techniques which arebased on image processing and manual feature engineering approaches underdifferent dimensions.
基金supported by the Key-Area Research and Development Program of Guangdong Province(Grant No.2021B0909060002)National Natural Science Foundation of China(Grant Nos.62204219,62204140)+1 种基金Major Program of Natural Science Foundation of Zhejiang Province(Grant No.LDT23F0401)Thanks to Professor Zhang Yishu from Zhejiang University,Professor Gao Xu from Soochow University,and Professor Zhong Shuai from Guangdong Institute of Intelligence Science and Technology for their support。
文摘Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence.
文摘This article explores the key role of intelligent computing in driving the paradigm shift of scientific discovery.The article first outlines the five paradigms of scientific discovery,from empirical observation to theoretical models,then to computational simulation and data intensive science,and finally introduces intelligent computing as the core of the fifth paradigm.Intelligent computing enhances the ability to understand,predict,and automate scientific discoveries of complex systems through technologies such as deep learning and machine learning.The article further analyzes the applications of intelligent computing in fields such as bioinformatics,astronomy,climate science,materials science,and medical image analysis,demonstrating its practical utility in solving scientific problems and promoting knowledge development.Finally,the article predicts that intelligent computing will play a more critical role in future scientific research,promoting interdisciplinary integration,open science,and collaboration,providing new solutions for solving complex problems.
文摘Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the need for effective risk prediction models. Machine learning (ML) techniques have shown promise in analyzing complex data patterns and predicting disease outcomes. The accuracy of these techniques is greatly affected by changing their parameters. Hyperparameter optimization plays a crucial role in improving model performance. In this work, the Particle Swarm Optimization (PSO) algorithm was used to effectively search the hyperparameter space and improve the predictive power of the machine learning models by identifying the optimal hyperparameters that can provide the highest accuracy. A dataset with a variety of clinical and epidemiological characteristics linked to COVID-19 cases was used in this study. Various machine learning models, including Random Forests, Decision Trees, Support Vector Machines, and Neural Networks, were utilized to capture the complex relationships present in the data. To evaluate the predictive performance of the models, the accuracy metric was employed. The experimental findings showed that the suggested method of estimating COVID-19 risk is effective. When compared to baseline models, the optimized machine learning models performed better and produced better results.
文摘Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assisted decision support systems for endoscopy is an area of rapid research and development.The systems promise improved detection,classification,screening,and surveillance for colorectal polyps and cancer.Several recently developed applications for AIassisted colonoscopy have shown promising results for the detection and classification of colorectal polyps and adenomas.However,their value for real-time application in clinical practice has yet to be determined owing to limitations in the design,validation,and testing of AI models under real-life clinical conditions.Despite these current limitations,ambitious attempts to expand the technology further by developing more complex systems capable of assisting and supporting the endoscopist throughout the entire colonoscopy examination,including polypectomy procedures,are at the concept stage.However,further work is required to address the barriers and challenges of AI integration into broader colonoscopy practice,to navigate the approval process from regulatory organizations and societies,and to support physicians and patients on their journey to accepting the technology by providing strong evidence of its accuracy and safety.This article takes a closer look at the current state of AI integration into the field of colonoscopy and offers suggestions for future research.
基金supported in part by the Department of National Defence’s Innovation for Defence Excellence and Security(IDEa S)Program,Canadathrough the Project of Auto Defence Towards Trustworthy Technologies for Autonomous Human-Machine Systems,NSERCthe IEEE SMC Society Technical Committee on Brain-Inspired Systems(TCBCS)。
文摘Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent and mathematical foundations of autonomous systems.It focuses on structural and behavioral properties that constitute the intelligent power of autonomous systems.It explains how system intelligence aggregates from reflexive,imperative,adaptive intelligence to autonomous and cognitive intelligence.A hierarchical intelligence model(HIM)is introduced to elaborate the evolution of human and system intelligence as an inductive process.The properties of system autonomy are formally analyzed towards a wide range of applications in computational intelligence and systems engineering.Emerging paradigms of autonomous systems including brain-inspired systems,cognitive robots,and autonomous knowledge learning systems are described.Advances in autonomous systems will pave a way towards highly intelligent machines for augmenting human capabilities.
基金supported by the National Natural Science Foundation of China ( No. 61025019No. 90820016)+1 种基金Program for New Century Excellent Talents in University ( No. NECT-07-0735)Natural Science Foundation of Hebei ( No. F2009001638)
文摘The application of bio-inspired computational techniques to the field of condition monitoring is addressed. First, the bio-inspired computational techniques are briefly addressed; the advantages and disadvantages of these computational methods are made clear. Then, the roles of condition monitoring in the predictive maintenance and failures prediction and the development trends of condition monitoring are discussed. Finally, a case study on the condition monitoring of grinding machine is described, which shows the application of bio-inspired computational technique to a practical condition monitoring system.
基金supported by the Coordenacao de Aperfeicoamento de Pessoal de Nível Superior–Brasil (CAPES)–Finance Code 001the Postgraduate Programme in Forest Engineering of the Federal University of Lavras (PPGEF/UFLA)and Group of Optimization and Planning (GOPLAN/UFLA/LEMAF-Forest Management Research Lab)。
文摘Selective logging is well-recognized as an effective practice in sustainable forest management.However,the ecological efficiency or resilience of the residual stand is often in doubt.Recovery time depends on operational variables,diversity,and forest structure.Selective logging is excellent but is open to changes.This may be resolved by mathematical programming and this study integrates the economic-ecological aspects in multi-objective function by applying two evolutionary algorithms.The function maximizes remaining stand diversity,merchantable logs,and the inverse of distance between trees for harvesting and log landings points.The Brazilian rainforest database(566 trees)was used to simulate our 216-ha model.The log landing design has a maximum volume limit of 500 m3.The nondominated sorting genetic algorithm was applied to solve the main optimization problem.In parallel,a sub-problem(p-facility allocation)was solved for landing allocation by a genetic algorithm.Pareto frontier analysis was applied to distinguish the gradientsα-economic,β-ecological,andγ-equilibrium.As expected,the solutions have high diameter changes in the residual stand(average removal of approximately 16 m^(3) ha^(-1)).All solutions showed a grouping of trees selected for harvesting,although there was no formation of large clearings(percentage of canopy removal<7%,with an average of 2.5 ind ha^(-1)).There were no differences in floristic composition by preferentially selecting species with greater frequency in the initial stand for harvesting.This implies a lower impact on the demographic rates of the remaining stand.The methodology should support projects of reduced impact logging by using spatial-diversity information to guide better practices in tropical forests.