首页 > 最新文献

Journal of Ambient Intelligence and Humanized Computing最新文献

英文 中文
Personalized behavior modeling network for human mobility prediction 用于人类移动预测的个性化行为建模网络
3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-06 DOI: 10.1007/s12652-024-04806-x
Xiangping Wu, Zheng Zhang, Wangjun Wan, Shuaiwei Yao

Predicting human mobility is essential for urban planning and personalized services. The problem addressed in this study is analyzing user behavior patterns and predicting their next destination. Due to the complexity and diversity of human mobility, it’s necessary to study user behavior patterns from various angles and leverage diverse context information to construct prediction models. Unfortunately, most previous research often neglects personalized preferences and falls short in offering a comprehensive understanding of user behavior patterns. Furthermore, some studies have not effectively mined and utilized contextual information. To address these shortcomings, this paper introduces a novel Personalized Behavior Modeling Network (PBMN). Compared to existing methods, PBMN provides a more comprehensive modeling of user behavior and utilizes context information more extensively, enabling more accurate prediction. It models user behavior through two parallel channels, taking into account both sequential patterns and personalized preferences, while fully utilizing different contextual information. Ultimately, it generates prediction results by personalized integration of different behavior features. Specifically, PBMN employs a pair of attention-based encoders and decoders to model the overall behavior features. Additionally, it utilizes three parallel recurrent neural networks to model recent behavior features at different levels of context information. The performance of PBMN was evaluated using two real-world datasets. Experimental results demonstrate that PBMN outperforms five mainstream prediction methods concerning three commonly used evaluation metrics, emphasizing the effectiveness of PBMN

预测人类的流动性对于城市规划和个性化服务至关重要。本研究要解决的问题是分析用户行为模式并预测他们的下一个目的地。由于人类移动的复杂性和多样性,有必要从不同角度研究用户行为模式,并利用不同的上下文信息来构建预测模型。遗憾的是,以往的大多数研究往往忽视了个性化偏好,无法全面了解用户的行为模式。此外,一些研究也没有有效地挖掘和利用情境信息。针对这些不足,本文介绍了一种新颖的个性化行为建模网络(PBMN)。与现有方法相比,PBMN 提供了更全面的用户行为建模,并更广泛地利用了上下文信息,从而实现了更准确的预测。它通过两个并行通道对用户行为进行建模,同时考虑到顺序模式和个性化偏好,并充分利用不同的上下文信息。最终,它通过对不同行为特征的个性化整合生成预测结果。具体来说,PBMN 采用了一对基于注意力的编码器和解码器来模拟整体行为特征。此外,它还利用三个并行递归神经网络来模拟不同上下文信息级别的近期行为特征。我们使用两个真实世界数据集对 PBMN 的性能进行了评估。实验结果表明,在三个常用的评估指标上,PBMN 优于五种主流预测方法,突出了 PBMN 的有效性。
{"title":"Personalized behavior modeling network for human mobility prediction","authors":"Xiangping Wu, Zheng Zhang, Wangjun Wan, Shuaiwei Yao","doi":"10.1007/s12652-024-04806-x","DOIUrl":"https://doi.org/10.1007/s12652-024-04806-x","url":null,"abstract":"<p>Predicting human mobility is essential for urban planning and personalized services. The problem addressed in this study is analyzing user behavior patterns and predicting their next destination. Due to the complexity and diversity of human mobility, it’s necessary to study user behavior patterns from various angles and leverage diverse context information to construct prediction models. Unfortunately, most previous research often neglects personalized preferences and falls short in offering a comprehensive understanding of user behavior patterns. Furthermore, some studies have not effectively mined and utilized contextual information. To address these shortcomings, this paper introduces a novel Personalized Behavior Modeling Network (PBMN). Compared to existing methods, PBMN provides a more comprehensive modeling of user behavior and utilizes context information more extensively, enabling more accurate prediction. It models user behavior through two parallel channels, taking into account both sequential patterns and personalized preferences, while fully utilizing different contextual information. Ultimately, it generates prediction results by personalized integration of different behavior features. Specifically, PBMN employs a pair of attention-based encoders and decoders to model the overall behavior features. Additionally, it utilizes three parallel recurrent neural networks to model recent behavior features at different levels of context information. The performance of PBMN was evaluated using two real-world datasets. Experimental results demonstrate that PBMN outperforms five mainstream prediction methods concerning three commonly used evaluation metrics, emphasizing the effectiveness of PBMN</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140889124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sliced Wasserstein adversarial training for improving adversarial robustness 提高对抗鲁棒性的瓦瑟斯坦切片对抗训练
3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-05 DOI: 10.1007/s12652-024-04791-1
Woojin Lee, Sungyoon Lee, Hoki Kim, Jaewook Lee

Recently, deep-learning-based models have achieved impressive performance on tasks that were previously considered to be extremely challenging. However, recent works have shown that various deep learning models are susceptible to adversarial data samples. In this paper, we propose the sliced Wasserstein adversarial training method to encourage the logit distributions of clean and adversarial data to be similar to each other. We capture the dissimilarity between two distributions using the Wasserstein metric and then align distributions using an end-to-end training process. We present the theoretical background of the motivation for our study by providing generalization error bounds for adversarial data samples. We performed experiments on three standard datasets and the results demonstrate that our method is more robust against white box attacks compared to previous methods.

最近,基于深度学习的模型在以前被认为极具挑战性的任务上取得了令人印象深刻的表现。然而,最近的研究表明,各种深度学习模型容易受到对抗数据样本的影响。在本文中,我们提出了切片瓦瑟斯坦对抗训练法,鼓励干净数据和对抗数据的对数分布彼此相似。我们使用 Wasserstein 度量来捕捉两个分布之间的不相似性,然后通过端到端的训练过程来对齐分布。我们通过提供对抗数据样本的泛化误差边界,介绍了我们研究动机的理论背景。我们在三个标准数据集上进行了实验,结果表明,与以前的方法相比,我们的方法对白盒攻击具有更强的鲁棒性。
{"title":"Sliced Wasserstein adversarial training for improving adversarial robustness","authors":"Woojin Lee, Sungyoon Lee, Hoki Kim, Jaewook Lee","doi":"10.1007/s12652-024-04791-1","DOIUrl":"https://doi.org/10.1007/s12652-024-04791-1","url":null,"abstract":"<p>Recently, deep-learning-based models have achieved impressive performance on tasks that were previously considered to be extremely challenging. However, recent works have shown that various deep learning models are susceptible to adversarial data samples. In this paper, we propose the sliced Wasserstein adversarial training method to encourage the logit distributions of clean and adversarial data to be similar to each other. We capture the dissimilarity between two distributions using the Wasserstein metric and then align distributions using an end-to-end training process. We present the theoretical background of the motivation for our study by providing generalization error bounds for adversarial data samples. We performed experiments on three standard datasets and the results demonstrate that our method is more robust against white box attacks compared to previous methods.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140889847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the landscape of network security: a comparative analysis of attack detection strategies 探索网络安全格局:攻击检测策略比较分析
3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-05 DOI: 10.1007/s12652-024-04794-y
P. Rajesh Kanna, P. Santhi

The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the primary concerns in ensuring security is the authority over domains, and network owners are striving to establish a common language to exchange security information and respond quickly to emerging threats. Given the increasing prevalence of various types of attacks, network security has become a significant challenge in the realm of computing. To address this, a multi-level distributed approach incorporating vulnerability identification, dimensioning, and countermeasures based on attack graphs has been developed. Implementing reconfigurable virtual systems as countermeasures significantly improves attack detection and mitigates the impact of attacks. Password-based authentication, for instance, can be susceptible to password cracking techniques, social engineering attacks, or data breaches that expose user credentials. Similarly, ensuring privacy during data transmission through encryption helps protect data from unauthorized access, but it does not guarantee the prevention of other types of attacks such as malware infiltration or insider threats. This research explores various techniques to achieve effective attack detection. Multiple research methods have been utilized and evaluated to identify the most suitable approach for network security and attack detection in the context of cloud computing. The analysis and implementation of diverse research studies demonstrate that the based signature intrusion detection method outperforms others in terms of precision, recall, F-measure, accuracy, reliability, and time complexity.

随着互联网工具的迅速发展,计算机网络领域也在经历着快速增长。因此,人们越来越意识到网络安全的重要性。确保安全的首要问题之一是域的权限,网络所有者正在努力建立一种共同语言,以交换安全信息并对新出现的威胁做出快速反应。鉴于各类攻击日益猖獗,网络安全已成为计算领域的一项重大挑战。为解决这一问题,我们开发了一种基于攻击图的多层次分布式方法,其中包括漏洞识别、维度分析和应对措施。采用可重新配置的虚拟系统作为对策,可以大大提高攻击检测能力,减轻攻击的影响。例如,基于密码的身份验证很容易受到密码破解技术、社会工程学攻击或暴露用户凭证的数据泄露的影响。同样,通过加密确保数据传输过程中的隐私有助于保护数据免遭未经授权的访问,但并不能保证防止恶意软件渗透或内部威胁等其他类型的攻击。本研究探讨了实现有效攻击检测的各种技术。我们利用多种研究方法并对其进行评估,以确定最适合云计算环境下网络安全和攻击检测的方法。对各种研究的分析和实施表明,基于签名的入侵检测方法在精确度、召回率、F-measure、准确性、可靠性和时间复杂性方面都优于其他方法。
{"title":"Exploring the landscape of network security: a comparative analysis of attack detection strategies","authors":"P. Rajesh Kanna, P. Santhi","doi":"10.1007/s12652-024-04794-y","DOIUrl":"https://doi.org/10.1007/s12652-024-04794-y","url":null,"abstract":"<p>The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the primary concerns in ensuring security is the authority over domains, and network owners are striving to establish a common language to exchange security information and respond quickly to emerging threats. Given the increasing prevalence of various types of attacks, network security has become a significant challenge in the realm of computing. To address this, a multi-level distributed approach incorporating vulnerability identification, dimensioning, and countermeasures based on attack graphs has been developed. Implementing reconfigurable virtual systems as countermeasures significantly improves attack detection and mitigates the impact of attacks. Password-based authentication, for instance, can be susceptible to password cracking techniques, social engineering attacks, or data breaches that expose user credentials. Similarly, ensuring privacy during data transmission through encryption helps protect data from unauthorized access, but it does not guarantee the prevention of other types of attacks such as malware infiltration or insider threats. This research explores various techniques to achieve effective attack detection. Multiple research methods have been utilized and evaluated to identify the most suitable approach for network security and attack detection in the context of cloud computing. The analysis and implementation of diverse research studies demonstrate that the based signature intrusion detection method outperforms others in terms of precision, recall, F-measure, accuracy, reliability, and time complexity.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140889052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Outage performance of NOMA over shadowed faded channels in interference limited scenario 干扰受限情况下 NOMA 在阴影衰减信道上的中断性能
3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-29 DOI: 10.1007/s12652-024-04802-1
Shaik Thaherbasha, Ravindra Dhuli

In wireless communications networks, the non-orthogonal multiple access (NOMA) technique is different from the existing orthogonal multiple access (OMA) techniques. In NOMA, the available number of resources are more and it leads to multiple access interference. In this paper, initially we developed an analytical framework of interference for NOMA in terms of signal to interference ratio (SIR). Later, we asses the outage probability of NOMA based downlink communication system by considering the effect of interference. The outage probability of NOMA with fixed number of interferers is calculated for different channel propagation effects as Nakagami-m, Rayleigh faded channels with and without log-normal shadowing. The obtained outage probabilities with fixed number of interferers are used to calculate the outage probabilities with random number of interferers (total system outage probability) in different channel propagation effects. In this paper, we proposed a novel algorithm to calculate the total system outage probability for NOMA in different channel propagation effects by choosing different offered load in terms of Erlangs per cell. We calculate the analytical results of outage probability for two users which are at near and edge positions of the cell. The obtained analytical results are supported with simulated NOMA.

在无线通信网络中,非正交多址接入(NOMA)技术不同于现有的正交多址接入(OMA)技术。在 NOMA 中,可用的资源数量更多,因此会产生多路访问干扰。在本文中,我们首先从信号干扰比(SIR)的角度为 NOMA 建立了一个干扰分析框架。随后,我们考虑了干扰的影响,评估了基于 NOMA 的下行链路通信系统的中断概率。针对不同的信道传播效果,如 Nakagami-m、有对数正态阴影和无对数正态阴影的瑞利衰落信道,计算了固定干扰者数量的 NOMA 的中断概率。所获得的固定干扰者数量的中断概率可用于计算不同信道传播效果下随机干扰者数量的中断概率(系统总中断概率)。在本文中,我们提出了一种新颖的算法,通过选择不同的提供负荷(以每个小区的 Erlangs 为单位)来计算 NOMA 在不同信道传播效果下的总系统中断概率。我们计算了小区附近和边缘位置两个用户的中断概率的分析结果。得到的分析结果与模拟的 NOMA 结果相吻合。
{"title":"Outage performance of NOMA over shadowed faded channels in interference limited scenario","authors":"Shaik Thaherbasha, Ravindra Dhuli","doi":"10.1007/s12652-024-04802-1","DOIUrl":"https://doi.org/10.1007/s12652-024-04802-1","url":null,"abstract":"<p>In wireless communications networks, the non-orthogonal multiple access (NOMA) technique is different from the existing orthogonal multiple access (OMA) techniques. In NOMA, the available number of resources are more and it leads to multiple access interference. In this paper, initially we developed an analytical framework of interference for NOMA in terms of signal to interference ratio (SIR). Later, we asses the outage probability of NOMA based downlink communication system by considering the effect of interference. The outage probability of NOMA with fixed number of interferers is calculated for different channel propagation effects as Nakagami-<i>m</i>, Rayleigh faded channels with and without log-normal shadowing. The obtained outage probabilities with fixed number of interferers are used to calculate the outage probabilities with random number of interferers (total system outage probability) in different channel propagation effects. In this paper, we proposed a novel algorithm to calculate the total system outage probability for NOMA in different channel propagation effects by choosing different offered load in terms of Erlangs per cell. We calculate the analytical results of outage probability for two users which are at near and edge positions of the cell. The obtained analytical results are supported with simulated NOMA.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140840853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A feature weighted K-nearest neighbor algorithm based on association rules 基于关联规则的特征加权 K 近邻算法
3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-24 DOI: 10.1007/s12652-024-04793-z
Youness Manzali, Khalidou Abdoulaye Barry, Rachid Flouchi, Youssef Balouki, Mohamed Elfar
{"title":"A feature weighted K-nearest neighbor algorithm based on association rules","authors":"Youness Manzali, Khalidou Abdoulaye Barry, Rachid Flouchi, Youssef Balouki, Mohamed Elfar","doi":"10.1007/s12652-024-04793-z","DOIUrl":"https://doi.org/10.1007/s12652-024-04793-z","url":null,"abstract":"","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140660695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented data strategies for enhanced computer vision performance in breast cancer diagnosis 增强数据策略,提高计算机视觉在乳腺癌诊断中的性能
3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-23 DOI: 10.1007/s12652-024-04803-0
Asieh Kaffashbashi, Vahid Sobhani, Fariba Goodarzian, F. Jolai, A. Aghsami
{"title":"Augmented data strategies for enhanced computer vision performance in breast cancer diagnosis","authors":"Asieh Kaffashbashi, Vahid Sobhani, Fariba Goodarzian, F. Jolai, A. Aghsami","doi":"10.1007/s12652-024-04803-0","DOIUrl":"https://doi.org/10.1007/s12652-024-04803-0","url":null,"abstract":"","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140670976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid model using JAYA-GA metaheuristics for placement of fog nodes in fog-integrated cloud 使用 JAYA-GA 元搜索算法的混合模型,用于在雾集成云中放置雾节点
3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-21 DOI: 10.1007/s12652-024-04796-w
Satveer Singh, Deo Prakash Vidyarthi

It has been observed that Cloud services exhibit suboptimal performance for real-time requests due to increased network delay. Fog computing has emerged to address this issue by deploying Fog nodes at the network's edge. However, determining the optimal placement of Fog nodes for efficient service processing poses a significant challenge. The multiple ways to deploy a Fog node makes the Fog node placement an NP-class problem. It leverages the potential benefit of metaheuristic to solve this problem. In this work, we formulate a linear mathematical model for fog node placement (FNP), considering two important objectives for minimization, i.e., deployment cost (DC) and network latency (NL). A hybrid metaheuristic approach using genetic algorithm (GA) and JAYA, called JAYA-GA, is proposed to address this multi-objective optimization. The proposed model is simulated and the experimental results are compared against three popularly used metaheuristics: particle swarm optimization (PSO), GA, and JAYA. The proposed model consistently outperforms JAYA, PSO, and GA by the averages of 18.40%, 33.58%, and 30.75%, respectively, in terms of fitness (a weighted sum of DC and NL). Additionally, it exhibits superior performance on average convergence rate (16.60%, 53.42%, and 86.59%) and computation time (15.76%, 34.74%, and 59.22%) compared to JAYA, PSO, and GA respectively. Thus, the simulation results establish that the hybrid JAYA-GA technique surpasses the state-of-the-art alternatives on DC, NL, besides computation time and convergence rate.

据观察,由于网络延迟增加,云服务在处理实时请求时表现出不理想的性能。为解决这一问题,雾计算应运而生,在网络边缘部署雾节点。然而,确定雾节点的最佳位置以实现高效服务处理是一项重大挑战。部署雾节点的多种方法使雾节点的布置成为一个 NP 级问题。这就需要利用元启发式的潜在优势来解决这个问题。在这项工作中,我们建立了一个雾节点放置(FNP)的线性数学模型,考虑了两个重要的最小化目标,即部署成本(DC)和网络延迟(NL)。为解决这一多目标优化问题,提出了一种使用遗传算法(GA)和 JAYA 的混合元启发式方法,称为 JAYA-GA。对所提出的模型进行了仿真,并将实验结果与粒子群优化 (PSO)、GA 和 JAYA 这三种常用的元启发式方法进行了比较。就适配度(DC 和 NL 的加权和)而言,拟议模型始终优于 JAYA、PSO 和 GA,平均分别为 18.40%、33.58% 和 30.75%。此外,与 JAYA、PSO 和 GA 相比,它在平均收敛率(16.60%、53.42% 和 86.59%)和计算时间(15.76%、34.74% 和 59.22%)方面也表现出更优越的性能。因此,仿真结果表明,除了计算时间和收敛速度外,JAYA-GA 混合技术在 DC、NL 方面都超过了最先进的替代技术。
{"title":"A hybrid model using JAYA-GA metaheuristics for placement of fog nodes in fog-integrated cloud","authors":"Satveer Singh, Deo Prakash Vidyarthi","doi":"10.1007/s12652-024-04796-w","DOIUrl":"https://doi.org/10.1007/s12652-024-04796-w","url":null,"abstract":"<p>It has been observed that Cloud services exhibit suboptimal performance for real-time requests due to increased network delay. Fog computing has emerged to address this issue by deploying Fog nodes at the network's edge. However, determining the optimal placement of Fog nodes for efficient service processing poses a significant challenge. The multiple ways to deploy a Fog node makes the Fog node placement an NP-class problem. It leverages the potential benefit of metaheuristic to solve this problem. In this work, we formulate a linear mathematical model for fog node placement (FNP), considering two important objectives for minimization, i.e., deployment cost (DC) and network latency (NL). A hybrid metaheuristic approach using genetic algorithm (GA) and JAYA, called JAYA-GA, is proposed to address this multi-objective optimization. The proposed model is simulated and the experimental results are compared against three popularly used metaheuristics: particle swarm optimization (PSO), GA, and JAYA. The proposed model consistently outperforms JAYA, PSO, and GA by the averages of 18.40%, 33.58%, and 30.75%, respectively, in terms of fitness (a weighted sum of DC and NL). Additionally, it exhibits superior performance on average convergence rate (16.60%, 53.42%, and 86.59%) and computation time (15.76%, 34.74%, and 59.22%) compared to JAYA, PSO, and GA respectively. Thus, the simulation results establish that the hybrid JAYA-GA technique surpasses the state-of-the-art alternatives on DC, NL, besides computation time and convergence rate.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140635826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping 利用迁移学习和基于梯度的类激活映射进行人工智能龋齿检测
3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-21 DOI: 10.1007/s12652-024-04795-x
Hardik Inani, Veerangi Mehta, Drashti Bhavsar, Rajeev Kumar Gupta, Arti Jain, Zahid Akhtar

Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth decay, empowering individuals to take control of their oral health and maintain radiant smiles. This research paper delves into the realm of transfer learning techniques, aiming to elevate the precision and efficacy of dental caries diagnosis. Utilizing Keras ImageDataGenerator, a rich and balanced dataset is crafted by augmenting teeth images from the Kaggle teeth dataset. Five cutting-edge pre-trained architectures are harnessed in the transfer learning approach: EfficientNetV2B3, VGG19, InceptionResNetV2, Xception, and ResNet50, with each model, initialized using ImageNet weights and tailored top layers. A comprehensive set of evaluation metrics, encompassing accuracy, precision, recall, F1-score, and false negative rates are employed to gauge the performance of these architectures. The findings unveil the unique advantages and drawbacks of each model, illuminating the path to an optimal choice for dental caries detection using Grad-CAM (Gradient-weighted Class Activation Mapping). The testing accuracies achieved by EfficientNetV2B3, VGG19, InceptionResNetV2, Xception, and ResNet50 models stand at 95.89%, 96.58%, 93.15%, 93.15%, and 94.18%, respectively. The Training accuracies stood at 100%, 99.91%, 100%, 100% and 100%, meanwhile on validation we achieved 97.63%, 96.68%, 98.82%, 96.68%, and 100% accuracies for EfficientNetV2B3, VGG19, InceptionResNetV2, Xception, and ResNet50 models respectively. Capitalizing on transfer learning and juxtaposing diverse pre-trained architectures, this research paper paves the way for substantial advancements in dental diagnostic capabilities, culminating in enhanced patient outcomes and superior oral health.

龋齿检测是开启灿烂笑容和健康生活的钥匙,它能及早发现最常见的口腔健康问题之一。这一重要课题揭示了防治蛀牙的创新方法,使人们有能力控制自己的口腔健康,保持灿烂的笑容。本研究论文深入探讨了迁移学习技术领域,旨在提高龋齿诊断的精确性和有效性。利用 Keras ImageDataGenerator,通过增强来自 Kaggle 牙齿数据集的牙齿图像,制作了一个丰富而均衡的数据集。在迁移学习方法中利用了五种前沿的预训练架构:EfficientNetV2B3、VGG19、InceptionResNetV2、Xception 和 ResNet50,每个模型都使用 ImageNet 权重和定制的顶层进行初始化。为了衡量这些架构的性能,我们采用了一套全面的评估指标,包括准确率、精确度、召回率、F1-分数和假负率。研究结果揭示了每种模型的独特优势和缺点,为使用 Grad-CAM(梯度加权类激活映射)进行龋齿检测提供了最佳选择。EfficientNetV2B3、VGG19、InceptionResNetV2、Xception 和 ResNet50 模型的测试准确率分别为 95.89%、96.58%、93.15%、93.15% 和 94.18%。训练准确率分别为 100%、99.91%、100%、100% 和 100%,而在验证时,EfficientNetV2B3、VGG19、InceptionResNetV2、Xception 和 ResNet50 模型的准确率分别为 97.63%、96.68%、98.82%、96.68% 和 100%。本研究论文利用迁移学习和并置不同的预训练架构,为牙科诊断能力的大幅提升铺平了道路,最终提高了患者的治疗效果和口腔健康水平。
{"title":"AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping","authors":"Hardik Inani, Veerangi Mehta, Drashti Bhavsar, Rajeev Kumar Gupta, Arti Jain, Zahid Akhtar","doi":"10.1007/s12652-024-04795-x","DOIUrl":"https://doi.org/10.1007/s12652-024-04795-x","url":null,"abstract":"<p>Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth decay, empowering individuals to take control of their oral health and maintain radiant smiles. This research paper delves into the realm of transfer learning techniques, aiming to elevate the precision and efficacy of dental caries diagnosis. Utilizing Keras ImageDataGenerator, a rich and balanced dataset is crafted by augmenting teeth images from the Kaggle teeth dataset. Five cutting-edge pre-trained architectures are harnessed in the transfer learning approach: EfficientNetV2B3, VGG19, InceptionResNetV2, Xception, and ResNet50, with each model, initialized using ImageNet weights and tailored top layers. A comprehensive set of evaluation metrics, encompassing accuracy, precision, recall, F1-score, and false negative rates are employed to gauge the performance of these architectures. The findings unveil the unique advantages and drawbacks of each model, illuminating the path to an optimal choice for dental caries detection using Grad-CAM (Gradient-weighted Class Activation Mapping). The testing accuracies achieved by EfficientNetV2B3, VGG19, InceptionResNetV2, Xception, and ResNet50 models stand at 95.89%, 96.58%, 93.15%, 93.15%, and 94.18%, respectively. The Training accuracies stood at 100%, 99.91%, 100%, 100% and 100%, meanwhile on validation we achieved 97.63%, 96.68%, 98.82%, 96.68%, and 100% accuracies for EfficientNetV2B3, VGG19, InceptionResNetV2, Xception, and ResNet50 models respectively. Capitalizing on transfer learning and juxtaposing diverse pre-trained architectures, this research paper paves the way for substantial advancements in dental diagnostic capabilities, culminating in enhanced patient outcomes and superior oral health.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140635975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video emotional description with fact reinforcement and emotion awaking 带有事实强化和情感唤醒功能的视频情感描述
3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-20 DOI: 10.1007/s12652-024-04779-x
Pengjie Tang, Hong Rao, Ai Zhang, Yunlan Tan

Video description aims to translate the visual content in a video with appropriate natural language. Most of current works only focus on the description of factual content, paying insufficient attention to the emotions in the video. And the sentences always lack flexibility and vividness. In this work, a fact enhancement and emotion awakening based model is proposed to describe the video, making the sentence more attractive and colorful. The strategy of deep incremental leaning is employed to build a multi-layer sequential network firstly, and multi-stage training method is used to sufficiently optimize the model. Secondly, the modules of fact inspiration, fact reinforcement and emotion awakening are constructed layer by layer to discovery more facts and embed emotions naturally. The three modules are cumulatively trained to sufficiently mine the factual and emotional information. Two public datasets including EmVidCap-S and EmVidCap are employed to evaluate the proposed model. The experimental results show that the performance of the proposed model is superior to not only the baseline models, but also the other popular methods.

视频描述旨在用适当的自然语言翻译视频中的视觉内容。目前的大多数作品只关注事实内容的描述,对视频中的情感关注不够。而且句子总是缺乏灵活性和生动性。在这项工作中,提出了一种基于事实增强和情感唤醒的模型来描述视频,使句子更有吸引力,更加丰富多彩。首先,采用深度增量精简策略构建多层顺序网络,并采用多阶段训练方法对模型进行充分优化。其次,逐层构建事实启发、事实强化和情感唤醒模块,以发现更多事实并自然地嵌入情感。通过对这三个模块的累积训练,可以充分挖掘事实和情感信息。两个公开数据集(包括 EmVidCap-S 和 EmVidCap)被用来评估所提出的模型。实验结果表明,所提模型的性能不仅优于基线模型,也优于其他流行方法。
{"title":"Video emotional description with fact reinforcement and emotion awaking","authors":"Pengjie Tang, Hong Rao, Ai Zhang, Yunlan Tan","doi":"10.1007/s12652-024-04779-x","DOIUrl":"https://doi.org/10.1007/s12652-024-04779-x","url":null,"abstract":"<p>Video description aims to translate the visual content in a video with appropriate natural language. Most of current works only focus on the description of factual content, paying insufficient attention to the emotions in the video. And the sentences always lack flexibility and vividness. In this work, a fact enhancement and emotion awakening based model is proposed to describe the video, making the sentence more attractive and colorful. The strategy of deep incremental leaning is employed to build a multi-layer sequential network firstly, and multi-stage training method is used to sufficiently optimize the model. Secondly, the modules of fact inspiration, fact reinforcement and emotion awakening are constructed layer by layer to discovery more facts and embed emotions naturally. The three modules are cumulatively trained to sufficiently mine the factual and emotional information. Two public datasets including EmVidCap-S and EmVidCap are employed to evaluate the proposed model. The experimental results show that the performance of the proposed model is superior to not only the baseline models, but also the other popular methods.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140626792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A path planning method based on deep reinforcement learning for crowd evacuation 基于深度强化学习的人群疏散路径规划方法
3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-18 DOI: 10.1007/s12652-024-04787-x
Xiangdong Meng, Hong Liu, Wenhao Li

Deep reinforcement learning (DRL) is suitable for solving complex path-planning problems due to its excellent ability to make continuous decisions in a complex environment. However, the increase in the population size in the crowd evacuation path-planning problem causes a substantial computational burden for the algorithm, which leads to an unsatisfactory efficiency of the current DRL algorithm. This paper presents a path planning method based on DRL for crowd evacuation to solve the problem. First, we divide crowds into groups based on their relationship and distance from each other and select leaders from them. Next, we expand the Multi-Agent Deep Deterministic Policy Gradient (MADDPG) to propose an Optimized Multi-Agent Deep Deterministic Policy Gradient (OMADDPG) algorithm to obtain the global evacuation path. The OMADDPG algorithm uses the Cross-Entropy Method (CEM) to optimize policy and improve the neural network’s training efficiency by applying the Data Pruning (DP) algorithm. In addition, the social force model is improved, incorporating the relationship between individuals and psychological factors into the model. Finally, this paper combines the improved social force model and the OMADDPG algorithm. The OMADDPG algorithm transmits the path information to the leaders. Pedestrians in the environment are driven by the improved social force model to follow the leaders to complete the evacuation simulation. The method can use a leader to guide pedestrians safely arrive the exit and reduce evacuation time in different environments. The simulation results prove the efficiency of the path planning method.

深度强化学习(DRL)具有在复杂环境中做出连续决策的出色能力,因此适用于解决复杂的路径规划问题。然而,在人群疏散路径规划问题中,种群数量的增加会给算法带来很大的计算负担,导致目前 DRL 算法的效率不尽如人意。本文提出了一种基于 DRL 的人群疏散路径规划方法来解决这一问题。首先,我们根据人群之间的关系和距离将人群分为若干组,并从中选出领头人。接着,我们扩展了多代理深度确定性策略梯度(MADDPG),提出了优化多代理深度确定性策略梯度(OMADDPG)算法,以获得全局疏散路径。OMADDPG 算法采用交叉熵法(CEM)优化策略,并通过数据剪枝(DP)算法提高神经网络的训练效率。此外,本文还改进了社会力模型,将个体之间的关系和心理因素纳入模型。最后,本文将改进后的社会力模型与 OMADDPG 算法相结合。OMADDPG 算法将路径信息传递给领导者。在改进的社会力模型的驱动下,环境中的行人跟随领导者完成疏散模拟。该方法可在不同环境下利用领头人引导行人安全到达出口,并缩短疏散时间。模拟结果证明了路径规划方法的有效性。
{"title":"A path planning method based on deep reinforcement learning for crowd evacuation","authors":"Xiangdong Meng, Hong Liu, Wenhao Li","doi":"10.1007/s12652-024-04787-x","DOIUrl":"https://doi.org/10.1007/s12652-024-04787-x","url":null,"abstract":"<p>Deep reinforcement learning (DRL) is suitable for solving complex path-planning problems due to its excellent ability to make continuous decisions in a complex environment. However, the increase in the population size in the crowd evacuation path-planning problem causes a substantial computational burden for the algorithm, which leads to an unsatisfactory efficiency of the current DRL algorithm. This paper presents a path planning method based on DRL for crowd evacuation to solve the problem. First, we divide crowds into groups based on their relationship and distance from each other and select leaders from them. Next, we expand the Multi-Agent Deep Deterministic Policy Gradient (MADDPG) to propose an Optimized Multi-Agent Deep Deterministic Policy Gradient (OMADDPG) algorithm to obtain the global evacuation path. The OMADDPG algorithm uses the Cross-Entropy Method (CEM) to optimize policy and improve the neural network’s training efficiency by applying the Data Pruning (DP) algorithm. In addition, the social force model is improved, incorporating the relationship between individuals and psychological factors into the model. Finally, this paper combines the improved social force model and the OMADDPG algorithm. The OMADDPG algorithm transmits the path information to the leaders. Pedestrians in the environment are driven by the improved social force model to follow the leaders to complete the evacuation simulation. The method can use a leader to guide pedestrians safely arrive the exit and reduce evacuation time in different environments. The simulation results prove the efficiency of the path planning method.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140626920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Ambient Intelligence and Humanized Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1