期刊文献+
共找到47篇文章
< 1 2 3 >
每页显示 20 50 100
Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment
1
作者 Firas Abedi Hayder M.A.Ghanimi +6 位作者 Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Ali Hashim Abbas Zahraa H.Kareem Hussein Muhi Hariz Ahmed Alkhayyat 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期3127-3144,共18页
Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid ... Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life problems.The CI is useful in the UAV domain as it produces efficient,precise,and rapid solutions.Besides,unmanned aerial vehicles(UAV)developed a hot research topic in the smart city environment.Despite the benefits of UAVs,security remains a major challenging issue.In addition,deep learning(DL)enabled image classification is useful for several applications such as land cover classification,smart buildings,etc.This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification(MDLS-UAVIC)model in a smart city environment.Themajor purpose of the MDLS-UAVIC algorithm is to securely encrypt the images and classify them into distinct class labels.The proposedMDLS-UAVIC model follows a two-stage process:encryption and image classification.The encryption technique for image encryption effectively encrypts the UAV images.Next,the image classification process involves anXception-based deep convolutional neural network for the feature extraction process.Finally,shuffled shepherd optimization(SSO)with a recurrent neural network(RNN)model is applied for UAV image classification,showing the novelty of the work.The experimental validation of the MDLS-UAVIC approach is tested utilizing a benchmark dataset,and the outcomes are examined in various measures.It achieved a high accuracy of 98%. 展开更多
关键词 computational intelligence unmanned aerial vehicles deep learning metaheuristics smart city image encryption image classification
下载PDF
Comprehensive Overview on Computational Intelligence Techniques for Machinery Condition Monitoring and Fault Diagnosis 被引量:15
2
作者 Wan Zhang Min-Ping Jia +1 位作者 Lin Zhu Xiao-An Yan 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第4期782-795,共14页
Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com-... Computational intelligence is one of the most powerful data processing tools to solve complex nonlinear problems, and thus plays a significant role in intelligent fault diagnosis and prediction. However, only few com- prehensive reviews have summarized the ongoing efforts of computational intelligence in machinery condition moni- toring and fault diagnosis. The recent research and devel- opment of computational intelligence techniques in fault diagnosis, prediction and optimal sensor placement are reviewed. The advantages and limitations of computational intelligence techniques in practical applications are dis- cussed. The characteristics of different algorithms are compared, and application situations of these methods are summarized. Computational intelligence methods need to be further studied in deep understanding algorithm mech- anism, improving algorithm efficiency and enhancing engineering application. This review may be considered as a useful guidance for researchers in selecting a suit- able method for a specific situation and pointing out potential research directions. 展开更多
关键词 computational intelligence Machinerycondition monitoring Fault diagnosis Neural networkFuzzy logic Support vector machine - Evolutionaryalgorithms
下载PDF
Employing Computational Intelligence to Generate More Intelligent and Energy Efficient Living Spaces 被引量:2
3
作者 Hani Hagras 《International Journal of Automation and computing》 EI 2008年第1期1-9,共9页
Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise... Our living environments are being gradually occupied with an abundant number of digital objects that have networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by the user or other networked devices. With the increasing number of these devices attached to the network, the complexity to configure and control them increases, which may lead to major processing and communication overhead. Hence, the devices are no longer expected to just act as primitive stand-alone appliances that only provide the facilities and services to the user they are designed for, but also offer complex services that emerge from unique combinations of devices. This creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness to enable them to be self-configuring and self-programming. However, with this "smart evolution", the cognitive load to configure and control such spaces becomes immense. One way to relieve this load is by employing artificial intelligence (AI) techniques to create an intelligent "presence" where the system will be able to recognize the users and autonomously program the environment to be energy efficient and responsive to the user's needs and behaviours. These AI mechanisms should be embedded in the user's environments and should operate in a non-intrusive manner. This paper will show how computational intelligence (CI), which is an emerging domain of AI, could be employed and embedded in our living spaces to help such environments to be more energy efficient, intelligent, adaptive and convenient to the users. 展开更多
关键词 computational intelligence (CI) fuzzy systems neural networks (NNs) genetic algorithms (GAs) intelligent buildings energy efficiency.
下载PDF
Computational Intelligence Determines Effective Rationality
4
作者 Edward P.K.Tsang 《International Journal of Automation and computing》 EI 2008年第1期63-66,共4页
Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quan... Rationality is a fundamental concept in economics. Most researchers will accept that human beings are not fully rational. Herbert Simon suggested that we are "bounded rational". However, it is very difficult to quantify "bounded rationality", and therefore it is difficult to pinpoint its impact to all those economic theories that depend on the assumption of full rationality. Ariel Rubinstein proposed to model bounded rationality by explicitly specifying the decision makers' decision-making procedures. This paper takes a computational point of view to Rubinstein's approach. From a computational point of view, decision procedures can be encoded in algorithms and heuristics. We argue that, everything else being equal, the effective rationality of an agent is determined by its computational power - we refer to this as the computational intelligence determines effective rationality (CIDER) theory. This is not an attempt to propose a unifying definition of bounded rationality. It is merely a proposal of a computational point of view of bounded rationality. This way of interpreting bounded rationality enables us to (computationally) reason about economic systems when the full rationality assumption is relaxed. 展开更多
关键词 RATIONALITY bounded rationality computational intelligence ECONOMICS computational intelligence determines effective rationality (CIDER) theory.
下载PDF
Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications
5
作者 Jinsu Kim Sungwook Ryu Namje Park 《Computers, Materials & Continua》 SCIE EI 2022年第2期4169-4184,共16页
A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is requi... A significant number of cloud storage environments are already implementing deduplication technology.Due to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is required.As storage capacity increases,additional storage solutions are required.By leveraging deduplication,you can fundamentally solve the cost problem.However,deduplication poses privacy concerns due to the structure itself.In this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve it.In the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is maintained.In addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing attacks.The proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows. 展开更多
关键词 computational intelligence CLOUD MULTIMEDIA data deduplication
下载PDF
WCCI 2008 CALL FOR PAPERS IEEE World Congress on Computational Intelligence
6
《控制理论与应用(英文版)》 EI 2007年第2期211-211,共1页
The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a... The 2008 IEEE Wodd Congress on Computational Intelligence (WCCI 2008) will be held at the Hong Kong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone in this series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002 in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society, co-sponsored by the International Neural Network Society, Evolutionary Programming Society, and the Institution of Engineering and Technology, and composed of the 2008 International Joint Conference on Neural Networks (IJCNN2008), 2008 IEEE International Conference on Fuzzy Syrtems (FUZZ-IEEE2008), and 2008 IEEE Congress on Evolutionary Computation (CEC2008), WCC12008 will be the largest technical event on computational intelligence in the world with the biggest impact. WCCI 2008 will provide a stimulating forum for thousands of scientists, engineers, educators and students from all over the world to disseminate their new research findingsand exchange information on emerging areas of research in the fields. WCCI 2008 will also create a pleasant environment for the participants to meet old friends and make new friends who share similar research interests. 展开更多
关键词 IEEE CO WCCI 2008 CALL FOR PAPERS IEEE World Congress on computational intelligence CALL World
下载PDF
WCCI 2008 CALL FOR PAPERS IEEE World Congress on Computational Intelligence HongKong June 1-6, 2008
7
《控制理论与应用》 EI CAS CSCD 北大核心 2007年第3期511-511,共1页
)The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a g... )The 2008 IEEE World Congress on Computational Intelligence (WCCI 2008) will be held at the HongKong Convention and Exhibition Centre during June 1-6, 2008. WCCI 2008 will be the fifth milestone inthis series with a glorious history from WCCI 1994 in Orlando, WCCI 1998 in Anchorage, WCCI 2002in Honolulu, to WCCI 2006 in Vancouver. Sponsored by the IEEE Computational Intelligence Society, 展开更多
关键词 IEEE WCCI 2008 CALL FOR PAPERS IEEE World Congress on computational intelligence HongKong June 1-6 World CALL
下载PDF
Artificial Intelligence Model for Software Reusability Prediction System
8
作者 R.Subha Anandakumar Haldorai Arulmurugan Ramu 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期2639-2654,共16页
The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more... The most significant invention made in recent years to serve various applications is software.Developing a faultless software system requires the soft-ware system design to be resilient.To make the software design more efficient,it is essential to assess the reusability of the components used.This paper proposes a software reusability prediction model named Flexible Random Fit(FRF)based on aging resilience for a Service Net(SN)software system.The reusability predic-tion model is developed based on a multilevel optimization technique based on software characteristics such as cohesion,coupling,and complexity.Metrics are obtained from the SN software system,which is then subjected to min-max nor-malization to avoid any saturation during the learning process.The feature extrac-tion process is made more feasible by enriching the data quality via outlier detection.The reusability of the classes is estimated based on a tool called Soft Audit.Software reusability can be predicted more effectively based on the pro-posed FRF-ANN(Flexible Random Fit-Artificial Neural Network)algorithm.Performance evaluation shows that the proposed algorithm outperforms all the other techniques,thus ensuring the optimization of software reusability based on aging resilient.The model is then tested using constraint-based testing techni-ques to make sure that it is perfect at optimizing and making predictions. 展开更多
关键词 Service net aging resilient software reusability evolutionary computing intelligent computing
下载PDF
Automated Artificial Intelligence Empowered White Blood Cells Classification Model
9
作者 Mohammad Yamin Abdullah M.Basahel +3 位作者 Mona Abusurrah Sulafah M Basahel Sachi Nandan Mohanty E.Laxmi Lydia 《Computers, Materials & Continua》 SCIE EI 2023年第4期409-425,共17页
White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches ... White blood cells (WBC) or leukocytes are a vital component ofthe blood which forms the immune system, which is accountable to fightforeign elements. The WBC images can be exposed to different data analysisapproaches which categorize different kinds of WBC. Conventionally, laboratorytests are carried out to determine the kind of WBC which is erroneousand time consuming. Recently, deep learning (DL) models can be employedfor automated investigation of WBC images in short duration. Therefore,this paper introduces an Aquila Optimizer with Transfer Learning basedAutomated White Blood Cells Classification (AOTL-WBCC) technique. Thepresented AOTL-WBCC model executes data normalization and data augmentationprocess (rotation and zooming) at the initial stage. In addition,the residual network (ResNet) approach was used for feature extraction inwhich the initial hyperparameter values of the ResNet model are tuned by theuse of AO algorithm. Finally, Bayesian neural network (BNN) classificationtechnique has been implied for the identification of WBC images into distinctclasses. The experimental validation of the AOTL-WBCC methodology isperformed with the help of Kaggle dataset. The experimental results foundthat the AOTL-WBCC model has outperformed other techniques which arebased on image processing and manual feature engineering approaches underdifferent dimensions. 展开更多
关键词 White blood cells cell engineering computational intelligence image classification transfer learning
下载PDF
Advances of embedded resistive random access memory in industrial manufacturing and its potential applications
10
作者 Zijian Wang Yixian Song +7 位作者 Guobin Zhang Qi Luo Kai Xu Dawei Gao Bin Yu Desmond Loke Shuai Zhong Yishu Zhang 《International Journal of Extreme Manufacturing》 SCIE EI CAS CSCD 2024年第3期175-214,共40页
Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to en... Embedded memory,which heavily relies on the manufacturing process,has been widely adopted in various industrial applications.As the field of embedded memory continues to evolve,innovative strategies are emerging to enhance performance.Among them,resistive random access memory(RRAM)has gained significant attention due to its numerousadvantages over traditional memory devices,including high speed(<1 ns),high density(4 F^(2)·n^(-1)),high scalability(~nm),and low power consumption(~pJ).This review focuses on the recent progress of embedded RRAM in industrial manufacturing and its potentialapplications.It provides a brief introduction to the concepts and advantages of RRAM,discusses the key factors that impact its industrial manufacturing,and presents the commercial progress driven by cutting-edge nanotechnology,which has been pursued by manysemiconductor giants.Additionally,it highlights the adoption of embedded RRAM in emerging applications within the realm of the Internet of Things and future intelligent computing,with a particular emphasis on its role in neuromorphic computing.Finally,the review discusses thecurrent challenges and provides insights into the prospects of embedded RRAM in the era of big data and artificial intelligence. 展开更多
关键词 embedded resistive random access memory industrial manufacturing intelligent computing advanced process node
下载PDF
Particle Swarm Optimization-Based Hyperparameters Tuning of Machine Learning Models for Big COVID-19 Data Analysis
11
作者 Hend S. Salem Mohamed A. Mead Ghada S. El-Taweel 《Journal of Computer and Communications》 2024年第3期160-183,共24页
Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the ne... Analyzing big data, especially medical data, helps to provide good health care to patients and face the risks of death. The COVID-19 pandemic has had a significant impact on public health worldwide, emphasizing the need for effective risk prediction models. Machine learning (ML) techniques have shown promise in analyzing complex data patterns and predicting disease outcomes. The accuracy of these techniques is greatly affected by changing their parameters. Hyperparameter optimization plays a crucial role in improving model performance. In this work, the Particle Swarm Optimization (PSO) algorithm was used to effectively search the hyperparameter space and improve the predictive power of the machine learning models by identifying the optimal hyperparameters that can provide the highest accuracy. A dataset with a variety of clinical and epidemiological characteristics linked to COVID-19 cases was used in this study. Various machine learning models, including Random Forests, Decision Trees, Support Vector Machines, and Neural Networks, were utilized to capture the complex relationships present in the data. To evaluate the predictive performance of the models, the accuracy metric was employed. The experimental findings showed that the suggested method of estimating COVID-19 risk is effective. When compared to baseline models, the optimized machine learning models performed better and produced better results. 展开更多
关键词 Big COVID-19 Data Machine Learning Hyperparameter Optimization Particle Swarm Optimization computational intelligence
下载PDF
Artificial intelligence-assisted colonoscopy:A review of current state of practice and research 被引量:3
12
作者 Mahsa Taghiakbari Yuichi Mori Daniel von Renteln 《World Journal of Gastroenterology》 SCIE CAS 2021年第47期8103-8122,共20页
Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assist... Colonoscopy is an effective screening procedure in colorectal cancer prevention programs;however,colonoscopy practice can vary in terms of lesion detection,classification,and removal.Artificial intelligence(AI)-assisted decision support systems for endoscopy is an area of rapid research and development.The systems promise improved detection,classification,screening,and surveillance for colorectal polyps and cancer.Several recently developed applications for AIassisted colonoscopy have shown promising results for the detection and classification of colorectal polyps and adenomas.However,their value for real-time application in clinical practice has yet to be determined owing to limitations in the design,validation,and testing of AI models under real-life clinical conditions.Despite these current limitations,ambitious attempts to expand the technology further by developing more complex systems capable of assisting and supporting the endoscopist throughout the entire colonoscopy examination,including polypectomy procedures,are at the concept stage.However,further work is required to address the barriers and challenges of AI integration into broader colonoscopy practice,to navigate the approval process from regulatory organizations and societies,and to support physicians and patients on their journey to accepting the technology by providing strong evidence of its accuracy and safety.This article takes a closer look at the current state of AI integration into the field of colonoscopy and offers suggestions for future research. 展开更多
关键词 COLONOSCOPY ADENOMA Artificial intelligence computational intelligence ENDOSCOPY SURVEILLANCE
下载PDF
Towards a Theoretical Framework of Autonomous Systems Underpinned by Intelligence and Systems Sciences 被引量:2
13
作者 Yingxu Wang Ming Hou +5 位作者 Konstantinos NPlataniotis Sam Kwong Henry Leung Edward Tunstel Imre JRudas Ljiljana Trajkovic 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第1期52-63,共12页
Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent an... Autonomous systems are an emerging AI technology functioning without human intervention underpinned by the latest advances in intelligence,cognition,computer,and systems sciences.This paper explores the intelligent and mathematical foundations of autonomous systems.It focuses on structural and behavioral properties that constitute the intelligent power of autonomous systems.It explains how system intelligence aggregates from reflexive,imperative,adaptive intelligence to autonomous and cognitive intelligence.A hierarchical intelligence model(HIM)is introduced to elaborate the evolution of human and system intelligence as an inductive process.The properties of system autonomy are formally analyzed towards a wide range of applications in computational intelligence and systems engineering.Emerging paradigms of autonomous systems including brain-inspired systems,cognitive robots,and autonomous knowledge learning systems are described.Advances in autonomous systems will pave a way towards highly intelligent machines for augmenting human capabilities. 展开更多
关键词 Autonomous systems(AS) cognitive systems computational intelligence engineering paradigms intelligence science intelligent mathematics
下载PDF
Computational intelligence interception guidance law using online off-policy integral reinforcement learning
14
作者 WANG Qi LIAO Zhizhong 《Journal of Systems Engineering and Electronics》 SCIE 2024年第4期1042-1052,共11页
Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-f... Missile interception problem can be regarded as a two-person zero-sum differential games problem,which depends on the solution of Hamilton-Jacobi-Isaacs(HJI)equa-tion.It has been proved impossible to obtain a closed-form solu-tion due to the nonlinearity of HJI equation,and many iterative algorithms are proposed to solve the HJI equation.Simultane-ous policy updating algorithm(SPUA)is an effective algorithm for solving HJI equation,but it is an on-policy integral reinforce-ment learning(IRL).For online implementation of SPUA,the dis-turbance signals need to be adjustable,which is unrealistic.In this paper,an off-policy IRL algorithm based on SPUA is pro-posed without making use of any knowledge of the systems dynamics.Then,a neural-network based online adaptive critic implementation scheme of the off-policy IRL algorithm is pre-sented.Based on the online off-policy IRL method,a computa-tional intelligence interception guidance(CIIG)law is developed for intercepting high-maneuvering target.As a model-free method,intercepting targets can be achieved through measur-ing system data online.The effectiveness of the CIIG is verified through two missile and target engagement scenarios. 展开更多
关键词 two-person zero-sum differential games Hamilton–Jacobi–Isaacs(HJI)equation off-policy integral reinforcement learning(IRL) online learning computational intelligence inter-ception guidance(CIIG)law
下载PDF
Multi-objective forest harvesting under sustainable and economic principles 被引量:1
15
作者 Talles Hudson Souza Lacerda Luciano Cavalcante de Jesus Franca +5 位作者 Isáira Leite e Lopes Sammilly Lorrayne Souza Lacerda Evandro OrfanóFigueiredo Bruno Henrique Groenner Barbosa Carolina Souza Jarochinski e Silva Lucas Rezende Gomide 《Journal of Forestry Research》 SCIE CAS CSCD 2023年第5期1379-1394,共16页
Selective logging is well-recognized as an effective practice in sustainable forest management.However,the ecological efficiency or resilience of the residual stand is often in doubt.Recovery time depends on operation... Selective logging is well-recognized as an effective practice in sustainable forest management.However,the ecological efficiency or resilience of the residual stand is often in doubt.Recovery time depends on operational variables,diversity,and forest structure.Selective logging is excellent but is open to changes.This may be resolved by mathematical programming and this study integrates the economic-ecological aspects in multi-objective function by applying two evolutionary algorithms.The function maximizes remaining stand diversity,merchantable logs,and the inverse of distance between trees for harvesting and log landings points.The Brazilian rainforest database(566 trees)was used to simulate our 216-ha model.The log landing design has a maximum volume limit of 500 m3.The nondominated sorting genetic algorithm was applied to solve the main optimization problem.In parallel,a sub-problem(p-facility allocation)was solved for landing allocation by a genetic algorithm.Pareto frontier analysis was applied to distinguish the gradientsα-economic,β-ecological,andγ-equilibrium.As expected,the solutions have high diameter changes in the residual stand(average removal of approximately 16 m^(3) ha^(-1)).All solutions showed a grouping of trees selected for harvesting,although there was no formation of large clearings(percentage of canopy removal<7%,with an average of 2.5 ind ha^(-1)).There were no differences in floristic composition by preferentially selecting species with greater frequency in the initial stand for harvesting.This implies a lower impact on the demographic rates of the remaining stand.The methodology should support projects of reduced impact logging by using spatial-diversity information to guide better practices in tropical forests. 展开更多
关键词 Amazon rainforest management computational intelligence Multi-objective functions Evolutionary computing
下载PDF
Broad Learning System for Tackling Emerging Challenges in Face Recognition 被引量:1
16
作者 Wenjun Zhang WenfengWang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1597-1619,共23页
Face recognition has been rapidly developed and widely used.However,there is still considerable uncertainty in the computational intelligence based on human-centric visual understanding.Emerging challenges for face re... Face recognition has been rapidly developed and widely used.However,there is still considerable uncertainty in the computational intelligence based on human-centric visual understanding.Emerging challenges for face recognition are resulted from information loss.This study aims to tackle these challenges with a broad learning system(BLS).We integrated two models,IR3C with BLS and IR3C with a triplet loss,to control the learning process.In our experiments,we used different strategies to generate more challenging datasets and analyzed the competitiveness,sensitivity,and practicability of the proposed two models.In the model of IR3C with BLS,the recognition rates for the four challenging strategies are all 100%.In the model of IR3C with a triplet loss,the recognition rates are 94.61%,94.61%,96.95%,96.23%,respectively.The experiment results indicate that the proposed two models can achieve a good performance in tackling the considered information loss challenges from face recognition. 展开更多
关键词 computational intelligence human-centric visual understanding
下载PDF
An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time
17
作者 Ademola Olusola Adesina Patrick Seun Ayobioloja +3 位作者 Ibidun Christiana Obagbuwa Tola John Odule Adenrele AAfolorunso Sunday Adeola Ajagbe 《Computers, Materials & Continua》 SCIE EI 2023年第2期2661-2675,共15页
CAPTCHA is an acronym that stands for Completely Automated Public Turing Test to tell Computers and Humans Apart(CAPTCHA),it is a good example of an authentication system that can be used to determine the true identit... CAPTCHA is an acronym that stands for Completely Automated Public Turing Test to tell Computers and Humans Apart(CAPTCHA),it is a good example of an authentication system that can be used to determine the true identity of any user.It serves as a security measure to prevent an attack caused by web bots(automatic programs)during an online transaction.It can come as text-based or image-based depending on the project and the programmer.The usability and robustness,as well as level of security,provided each of the varies and call for the development of an improved system.Hence,this paper studied and improved two different CAPTCHA systems(the text-based CAPTCHA and image-based CAPTCHA).The textbased and image-based CAPTCHAwere designed using JavaScript.Response time and solving time are the two metrics used to determine the effectiveness and efficiency of the two CAPTCHA systems.The inclusion of response time and solving time improved the shortfall of the usability and robustness of the existing system.The developed system was tested using 200 students from the Federal College of Animal Health and Production Technology.The results of each of the participants,for the two CAPTCHAs,were extracted from the database and subjected to analysis using SPSS.The result shows that textbased CAPTCHAhas the lowest average solving time(21.3333 s)with a 47.8%success rate while image-based CAPTCHA has the highest average solving time was 23.5138 s with a 52.8%success rate.The average response time for the image-based CAPTCHA was 2.1855 s with a 37.9%success rate lower than the text-based CAPTCHA response time(3.5561 s)with a 62.1%success rate.This indicates that the text-based CAPTCHA is more effective in terms of usability tests while image-based CAPTCHA is more efficient in terms of system responsiveness and recommended for potential users. 展开更多
关键词 CAPTCHA computational intelligence information security response time solving time
下载PDF
Pruning method for dendritic neuron model based on dendrite layer significance constraints
18
作者 Xudong Luo Xiaohao Wen +1 位作者 Yan Li Quanfu Li 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第2期308-318,共11页
The dendritic neural model(DNM)mimics the non-linearity of synapses in the human brain to simulate the information processing mechanisms and procedures of neurons.This enhances the understanding of biological nervous ... The dendritic neural model(DNM)mimics the non-linearity of synapses in the human brain to simulate the information processing mechanisms and procedures of neurons.This enhances the understanding of biological nervous systems and the applicability of the model in various fields.However,the existing DNM suffers from high complexity and limited generalisation capability.To address these issues,a DNM pruning method with dendrite layer significance constraints is proposed.This method not only evaluates the significance of dendrite layers but also allocates the significance of a few dendrite layers in the trained model to a few dendrite layers,allowing the removal of low-significance dendrite layers.The simulation experiments on six UCI datasets demonstrate that our method surpasses existing pruning methods in terms of network size and generalisation performance. 展开更多
关键词 compression computational intelligence deep learning neural network machine learning
下载PDF
An activated variable parameter gradient‐based neural network for time‐variant constrained quadratic programming and its applications
19
作者 Guancheng Wang Zhihao Hao +1 位作者 Haisheng Li Bob Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期670-679,共10页
This study proposes a novel gradient‐based neural network model with an activated variable parameter,named as the activated variable parameter gradient‐based neural network(AVPGNN)model,to solve time‐varying constr... This study proposes a novel gradient‐based neural network model with an activated variable parameter,named as the activated variable parameter gradient‐based neural network(AVPGNN)model,to solve time‐varying constrained quadratic programming(TVCQP)problems.Compared with the existing models,the AVPGNN model has the following advantages:(1)avoids the matrix inverse,which can significantly reduce the computing complexity;(2)introduces the time‐derivative of the time‐varying param-eters in the TVCQP problem by adding an activated variable parameter,enabling the AVPGNN model to achieve a predictive calculation that achieves zero residual error in theory;(3)adopts the activation function to accelerate the convergence rate.To solve the TVCQP problem with the AVPGNN model,the TVCQP problem is transformed into a non‐linear equation with a non‐linear compensation problem function based on the Karush Kuhn Tucker conditions.Then,a variable parameter with an activation function is employed to design the AVPGNN model.The accuracy and convergence rate of the AVPGNN model are rigorously analysed in theory.Furthermore,numerical experiments are also executed to demonstrate the effectiveness and superiority of the proposed model.Moreover,to explore the feasibility of the AVPGNN model,appli-cations to the motion planning of a robotic manipulator and the portfolio selection of marketed securities are illustrated. 展开更多
关键词 computational intelligence mathematics computing optimisation
下载PDF
Overlapping community‐based particle swarm optimization algorithm for influence maximization in social networks
20
作者 Lei Zhang Yutong Liu +3 位作者 Haipeng Yang Fan Cheng Qi Liu Xingyi Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期893-913,共21页
Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour s... Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour suppression.Among the existing influence maximization methods,the community‐based ones can achieve a good balance between effectiveness and efficiency.However,this kind of algorithm usually utilise the network community structures by viewing each node as a non‐overlapping node.In fact,many nodes in social networks are overlapping ones,which play more important role in influence spreading.To this end,an overlapping community‐based particle swarm opti-mization algorithm named OCPSO for influence maximization in social networks,which can make full use of overlapping nodes,non‐overlapping nodes,and their interactive information is proposed.Specifically,an overlapping community detection algorithm is used to obtain the information of overlapping community structures,based on which three novel evolutionary strategies,such as initialisation,mutation,and local search are designed in OCPSO for better finding influential nodes.Experimental results in terms of influence spread and running time on nine real‐world social networks demonstrate that the proposed OCPSO is competitive and promising comparing to several state‐of‐the‐arts(e.g.CGA,CMA‐IM,CIM,CDH‐SHRINK,CNCG,and CFIN). 展开更多
关键词 computational intelligence data mining social network
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部