Abstract In wireless communication technology, wireless sensor networks usually need to collect and process information in very harsh environment. Therefore, accurate positioning of sensors becomes the key to wireless communication technology. In this study, Davidon–Fletcher–Powell (DFP) algorithm was combined with particle swarm optimization (PSO) to reduce the influence of distance estimation error on positioning accuracy by using the characteristics of PSO iterative optimization. From the experimental results, among the average precision (AP) values of DFP, PSO, and PSO-DFP algorithms, the AP value of PSO-DFP was 0.9972. In the analysis of node positioning error, the maximum node positioning error of PSO-DFP was only about 21 mm. The results showed that the PSO-DFP algorithm had better performance, and the average positioning error of the algorithm was inversely proportional to the proportion of anchor nodes, node communication radius, and node density. In conclusion, the wireless sensor node location algorithm combined with PSO-DFP has a better location effect and higher stability than the traditional location algorithm.
{"title":"Wireless sensor node localization algorithm combined with PSO-DFP","authors":"Jingjing Sun, Peng Zhang, Xiaohong Kong","doi":"10.1515/jisys-2022-0323","DOIUrl":"https://doi.org/10.1515/jisys-2022-0323","url":null,"abstract":"Abstract In wireless communication technology, wireless sensor networks usually need to collect and process information in very harsh environment. Therefore, accurate positioning of sensors becomes the key to wireless communication technology. In this study, Davidon–Fletcher–Powell (DFP) algorithm was combined with particle swarm optimization (PSO) to reduce the influence of distance estimation error on positioning accuracy by using the characteristics of PSO iterative optimization. From the experimental results, among the average precision (AP) values of DFP, PSO, and PSO-DFP algorithms, the AP value of PSO-DFP was 0.9972. In the analysis of node positioning error, the maximum node positioning error of PSO-DFP was only about 21 mm. The results showed that the PSO-DFP algorithm had better performance, and the average positioning error of the algorithm was inversely proportional to the proportion of anchor nodes, node communication radius, and node density. In conclusion, the wireless sensor node location algorithm combined with PSO-DFP has a better location effect and higher stability than the traditional location algorithm.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiao Ye, Hemant N. Patel, Sankaranamasivayam Meena, Renato R. Maaliw, Samuel-Soma M. Ajibade, Ismail Keshta
Abstract In order to realize online detection and control of network viruses in robots, the authors propose a data mining-based anti-virus solution for smart robots. First, using internet of things (IoT) intrusion prevention system design method based on network intrusion signal detection and feedforward modulation filtering design, the overall design description and function analysis are carried out, and then the intrusion signal detection algorithm is designed, and finally, the hardware design and software development for a breach protection solution for the IoT are completed, and the integrated design of the system is realized. The findings demonstrated that based on the mean value of 10,000 tests, the IoT’s average packet loss rate is 0. Conclusion: This system has high accuracy, good performance, and strong compatibility and friendliness.
{"title":"Smart robots’ virus defense using data mining technology","authors":"Jiao Ye, Hemant N. Patel, Sankaranamasivayam Meena, Renato R. Maaliw, Samuel-Soma M. Ajibade, Ismail Keshta","doi":"10.1515/jisys-2023-0065","DOIUrl":"https://doi.org/10.1515/jisys-2023-0065","url":null,"abstract":"Abstract In order to realize online detection and control of network viruses in robots, the authors propose a data mining-based anti-virus solution for smart robots. First, using internet of things (IoT) intrusion prevention system design method based on network intrusion signal detection and feedforward modulation filtering design, the overall design description and function analysis are carried out, and then the intrusion signal detection algorithm is designed, and finally, the hardware design and software development for a breach protection solution for the IoT are completed, and the integrated design of the system is realized. The findings demonstrated that based on the mean value of 10,000 tests, the IoT’s average packet loss rate is 0. Conclusion: This system has high accuracy, good performance, and strong compatibility and friendliness.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135650263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract In multimedia correspondence, steganography schemes are commonly applied. To reduce storage capacity, multimedia files, including images, are always compressed. Most steganographic video schemes are, therefore, not compression tolerant. In the frame sequences, the video includes extra hidden space. Artificial intelligence (AI) creates a digital world of real-time information for athletes, sponsors, and broadcasters. AI is reshaping business, and although it has already produced a significant impact on other sectors, the sports industry is the newest and most receptive one. Human-centered AI for web applications has substantially influenced audience participation, strategic plan execution, and other aspects of the sports industry that have traditionally relied heavily on statistics. Thus, this study presents the motion vector steganography of sports training video integrating with the artificial bee colony algorithm (MVS-ABC). The motion vector stenography detects the hidden information from the motion vectors in the sports training video bitstreams. Artificial bee colony (ABC) algorithm optimizes the block assignment to inject a hidden message into a host video, in which the block assignment is considered a combinatorial optimization problem. The experimental analysis evaluates the data embedding performance using steganographic technology compared with existing embedding technologies, using the ABC algorithm compared with other genetic algorithms. The findings show that the proposed model can give the highest performance in terms of embedding capacity and the least error rate of video steganography compared with the existing models.
{"title":"Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications","authors":"Jinmao Tong, Zhongwang Cao, Wenjiang J. Fu","doi":"10.1515/jisys-2022-0093","DOIUrl":"https://doi.org/10.1515/jisys-2022-0093","url":null,"abstract":"Abstract In multimedia correspondence, steganography schemes are commonly applied. To reduce storage capacity, multimedia files, including images, are always compressed. Most steganographic video schemes are, therefore, not compression tolerant. In the frame sequences, the video includes extra hidden space. Artificial intelligence (AI) creates a digital world of real-time information for athletes, sponsors, and broadcasters. AI is reshaping business, and although it has already produced a significant impact on other sectors, the sports industry is the newest and most receptive one. Human-centered AI for web applications has substantially influenced audience participation, strategic plan execution, and other aspects of the sports industry that have traditionally relied heavily on statistics. Thus, this study presents the motion vector steganography of sports training video integrating with the artificial bee colony algorithm (MVS-ABC). The motion vector stenography detects the hidden information from the motion vectors in the sports training video bitstreams. Artificial bee colony (ABC) algorithm optimizes the block assignment to inject a hidden message into a host video, in which the block assignment is considered a combinatorial optimization problem. The experimental analysis evaluates the data embedding performance using steganographic technology compared with existing embedding technologies, using the ABC algorithm compared with other genetic algorithms. The findings show that the proposed model can give the highest performance in terms of embedding capacity and the least error rate of video steganography compared with the existing models.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"347 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77697577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Min Lin, Yanyan Xu, Chenghao Cai, Dengfeng Ke, Kaile Su
Abstract Named entity recognition (NER) is the localization and classification of entities with specific meanings in text data, usually used for applications such as relation extraction, question answering, etc. Chinese is a language with Chinese characters as the basic unit, but a Chinese named entity is normally a word containing several characters, so both the relationships between words and those between characters play an important role in Chinese NER. At present, a large number of studies have demonstrated that reasonable word information can effectively improve deep learning models for Chinese NER. Besides, graph convolution can help deep learning models perform better for sequence labeling. Therefore, in this article, we combine word information and graph convolution and propose our Lattice-Transformer-Graph (LTG) deep learning model for Chinese NER. The proposed model pays more attention to additional word information through position-attention, and therefore can learn relationships between characters by using lattice-transformer. Moreover, the adapted graph convolutional layer enables the model to learn both richer character relationships and word relationships and hence helps to recognize Chinese named entities better. Our experiments show that compared with 12 other state-of-the-art models, LTG achieves the best results on the public datasets of Microsoft Research Asia, Resume, and WeiboNER, with the F1 score of 95.89%, 96.81%, and 72.32%, respectively.
{"title":"A lattice-transformer-graph deep learning model for Chinese named entity recognition","authors":"Min Lin, Yanyan Xu, Chenghao Cai, Dengfeng Ke, Kaile Su","doi":"10.1515/jisys-2022-2014","DOIUrl":"https://doi.org/10.1515/jisys-2022-2014","url":null,"abstract":"Abstract Named entity recognition (NER) is the localization and classification of entities with specific meanings in text data, usually used for applications such as relation extraction, question answering, etc. Chinese is a language with Chinese characters as the basic unit, but a Chinese named entity is normally a word containing several characters, so both the relationships between words and those between characters play an important role in Chinese NER. At present, a large number of studies have demonstrated that reasonable word information can effectively improve deep learning models for Chinese NER. Besides, graph convolution can help deep learning models perform better for sequence labeling. Therefore, in this article, we combine word information and graph convolution and propose our Lattice-Transformer-Graph (LTG) deep learning model for Chinese NER. The proposed model pays more attention to additional word information through position-attention, and therefore can learn relationships between characters by using lattice-transformer. Moreover, the adapted graph convolutional layer enables the model to learn both richer character relationships and word relationships and hence helps to recognize Chinese named entities better. Our experiments show that compared with 12 other state-of-the-art models, LTG achieves the best results on the public datasets of Microsoft Research Asia, Resume, and WeiboNER, with the F1 score of 95.89%, 96.81%, and 72.32%, respectively.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"1 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88834255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Environmental landscaping is known to build, plan, and manage landscapes that consider the ecology of a site and produce gardens that benefit both people and the rest of the ecosystem. Landscaping and the environment are combined in landscape design planning to provide holistic answers to complex issues. Seeding native species and eradicating alien species are just a few ways humans influence the region’s ecosystem. Landscape architecture is the design of landscapes, urban areas, or gardens and their modification. It comprises the construction of urban and rural landscapes via coordinating the creation and management of open spaces and economics, finding a job, and working within a confined project budget. There was a lot of discussion about global warming and water shortages. There is a lot of hope to be found even in the face of seemingly insurmountable obstacles. AI is becoming more significant in many urban landscape planning and design elements with the advent of web 4.0 and Human-Centred computing. It created a virtual reality-based landscape to create deep neural networks (DNNs) to make deep learning (DL) more user-friendly and efficient. Users may only manipulate physical items in this environment to manually construct neural networks. These setups are automatically converted into a model, and the real-time testing set is reported and aware of the DNN models that users are producing. This research presents a novel strategy for combining DL-DNN with landscape architecture, providing a long-term solution to the problem of environmental pollution. Carbon dioxide levels are constantly checked when green plants are in and around the house. Plants, on either hand, remove toxins from the air, making it easier to maintain a healthy environment. Human-centered Artificial Intelligence-based web 4.0 may be used to assess and evaluate the data model. The study findings can be sent back into the design process for further modification and optimization.
{"title":"Environmental landscape design and planning system based on computer vision and deep learning","authors":"Xiubo Chen","doi":"10.1515/jisys-2022-0092","DOIUrl":"https://doi.org/10.1515/jisys-2022-0092","url":null,"abstract":"Abstract Environmental landscaping is known to build, plan, and manage landscapes that consider the ecology of a site and produce gardens that benefit both people and the rest of the ecosystem. Landscaping and the environment are combined in landscape design planning to provide holistic answers to complex issues. Seeding native species and eradicating alien species are just a few ways humans influence the region’s ecosystem. Landscape architecture is the design of landscapes, urban areas, or gardens and their modification. It comprises the construction of urban and rural landscapes via coordinating the creation and management of open spaces and economics, finding a job, and working within a confined project budget. There was a lot of discussion about global warming and water shortages. There is a lot of hope to be found even in the face of seemingly insurmountable obstacles. AI is becoming more significant in many urban landscape planning and design elements with the advent of web 4.0 and Human-Centred computing. It created a virtual reality-based landscape to create deep neural networks (DNNs) to make deep learning (DL) more user-friendly and efficient. Users may only manipulate physical items in this environment to manually construct neural networks. These setups are automatically converted into a model, and the real-time testing set is reported and aware of the DNN models that users are producing. This research presents a novel strategy for combining DL-DNN with landscape architecture, providing a long-term solution to the problem of environmental pollution. Carbon dioxide levels are constantly checked when green plants are in and around the house. Plants, on either hand, remove toxins from the air, making it easier to maintain a healthy environment. Human-centered Artificial Intelligence-based web 4.0 may be used to assess and evaluate the data model. The study findings can be sent back into the design process for further modification and optimization.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"65 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88959754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Privacy is the main concern in cyberspace because, every single click of a user on Internet is recognized and analyzed for different purposes like credit card purchase records, healthcare records, business, personalized shopping store experience to the user, deciding marketing strategy, and the list goes on. Here, the user’s personal information is considered a risk process. Though data mining applications focus on statistically useful patterns and not on the personal data of individuals, there is a threat of unrestricted access to individual records. Also, it is necessary to maintain the secrecy of data while retaining the accuracy of data classification and quality as well. For real-time applications, the data analytics carried out should be time efficient. Here, the proposed Convolution-based Privacy Preserving Algorithm (C-PPA) transforms the input into lower dimensions while preserving privacy which leads to better mining accuracy. The proposed algorithm is evaluated over different privacy-preserving metrics like accuracy, precision, recall, and F1-measure. Simulations carried out show that the average increment in the accuracy of C-PPA is 14.15 for Convolutional Neural Network (CNN) classifier when compared with results without C-PPA. Overlap-add C-PPA is proposed for parallel processing which is based on overlap-add convolution. It shows an average accuracy increment of 12.49 for CNN. The analytics show that the algorithm benefits regarding privacy preservation, data utility, and performance. Since the algorithm works on lowering the dimensions of data, the communication cost over the Internet is also reduced.
{"title":"Data analysis with performance and privacy enhanced classification","authors":"R. Tajanpure, A. Muddana","doi":"10.1515/jisys-2022-0215","DOIUrl":"https://doi.org/10.1515/jisys-2022-0215","url":null,"abstract":"Abstract Privacy is the main concern in cyberspace because, every single click of a user on Internet is recognized and analyzed for different purposes like credit card purchase records, healthcare records, business, personalized shopping store experience to the user, deciding marketing strategy, and the list goes on. Here, the user’s personal information is considered a risk process. Though data mining applications focus on statistically useful patterns and not on the personal data of individuals, there is a threat of unrestricted access to individual records. Also, it is necessary to maintain the secrecy of data while retaining the accuracy of data classification and quality as well. For real-time applications, the data analytics carried out should be time efficient. Here, the proposed Convolution-based Privacy Preserving Algorithm (C-PPA) transforms the input into lower dimensions while preserving privacy which leads to better mining accuracy. The proposed algorithm is evaluated over different privacy-preserving metrics like accuracy, precision, recall, and F1-measure. Simulations carried out show that the average increment in the accuracy of C-PPA is 14.15 for Convolutional Neural Network (CNN) classifier when compared with results without C-PPA. Overlap-add C-PPA is proposed for parallel processing which is based on overlap-add convolution. It shows an average accuracy increment of 12.49 for CNN. The analytics show that the algorithm benefits regarding privacy preservation, data utility, and performance. Since the algorithm works on lowering the dimensions of data, the communication cost over the Internet is also reduced.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"102 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84761303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Real-time object detection is an integral part of internet of things (IoT) application, which is an important research field of computer vision. Existing lightweight algorithms cannot handle target occlusions well in target detection tasks in indoor narrow scenes, resulting in a large number of missed detections and misclassifications. To this end, an accurate real-time multi-scale detection method that integrates density-based spatial clustering of applications with noise (DBSCAN) clustering algorithm and the improved You Only Look Once (YOLO)-v4-tiny network is proposed. First, by improving the neck network of the YOLOv4-tiny model, the detailed information of the shallow network is utilized to boost the average precision of the model to identify dense small objects, and the Cross mini-Batch Normalization strategy is adopted to improve the accuracy of statistical information. Second, the DBSCAN clustering algorithm is fused with the modified network to achieve better clustering effects. Finally, Mosaic data enrichment technique is adopted during model training process to improve the capability of the model to recognize occluded targets. Experimental results show that compared to the original YOLOv4-tiny algorithm, the mAP values of the improved algorithm on the self-construct dataset are significantly improved, and the processing speed can well meet the requirements of real-time applications on embedded devices. The performance of the proposed model on public datasets PASCAL VOC07 and PASCAL VOC12 is also better than that of other advanced lightweight algorithms, and the detection ability for occluded objects is significantly improved, which meets the requirements of mobile terminals for real-time detection in crowded indoor environments.
摘要实时目标检测是物联网应用的重要组成部分,是计算机视觉的一个重要研究领域。现有的轻量级算法在室内狭窄场景的目标检测任务中不能很好地处理目标遮挡,导致大量的漏检和误分类。为此,提出了一种将基于密度的应用空间聚类与噪声(DBSCAN)聚类算法和改进的You Only Look Once (YOLO)-v4-tiny网络相结合的精确实时多尺度检测方法。首先,通过改进YOLOv4-tiny模型的颈部网络,利用浅层网络的详细信息提高模型识别密集小目标的平均精度,并采用Cross mini-Batch归一化策略提高统计信息的精度。其次,将DBSCAN聚类算法与改进后的网络进行融合,获得更好的聚类效果。最后,在模型训练过程中采用马赛克数据充实技术,提高模型对遮挡目标的识别能力。实验结果表明,与原始的YOLOv4-tiny算法相比,改进算法在自构建数据集上的mAP值有了显著提高,处理速度可以很好地满足嵌入式设备上实时应用的要求。本文提出的模型在公共数据集PASCAL VOC07和PASCAL VOC12上的性能也优于其他先进的轻量级算法,对遮挡物的检测能力显著提高,满足了移动终端在拥挤室内环境下实时检测的要求。
{"title":"Accurate and real-time object detection in crowded indoor spaces based on the fusion of DBSCAN algorithm and improved YOLOv4-tiny network","authors":"Jianing Shen, Yang Zhou","doi":"10.1515/jisys-2022-0268","DOIUrl":"https://doi.org/10.1515/jisys-2022-0268","url":null,"abstract":"Abstract Real-time object detection is an integral part of internet of things (IoT) application, which is an important research field of computer vision. Existing lightweight algorithms cannot handle target occlusions well in target detection tasks in indoor narrow scenes, resulting in a large number of missed detections and misclassifications. To this end, an accurate real-time multi-scale detection method that integrates density-based spatial clustering of applications with noise (DBSCAN) clustering algorithm and the improved You Only Look Once (YOLO)-v4-tiny network is proposed. First, by improving the neck network of the YOLOv4-tiny model, the detailed information of the shallow network is utilized to boost the average precision of the model to identify dense small objects, and the Cross mini-Batch Normalization strategy is adopted to improve the accuracy of statistical information. Second, the DBSCAN clustering algorithm is fused with the modified network to achieve better clustering effects. Finally, Mosaic data enrichment technique is adopted during model training process to improve the capability of the model to recognize occluded targets. Experimental results show that compared to the original YOLOv4-tiny algorithm, the mAP values of the improved algorithm on the self-construct dataset are significantly improved, and the processing speed can well meet the requirements of real-time applications on embedded devices. The performance of the proposed model on public datasets PASCAL VOC07 and PASCAL VOC12 is also better than that of other advanced lightweight algorithms, and the detection ability for occluded objects is significantly improved, which meets the requirements of mobile terminals for real-time detection in crowded indoor environments.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"114 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85065332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract With the need of social and economic development, the audit method is also continuously reformed and improved. Traditional audit methods have defects of comprehensively considering various risk factors, and cannot meet the needs of enterprise financial work. To improve the effectiveness of audit work and meet the financial needs of enterprises, a solution for intelligent auditing of enterprise finance is proposed, including intelligent analysis of accounting vouchers and of audit reports. Then, Bi-directional Long Short-Term Memory (BiLSTM) neural network is used to classify the audit problems under three text feature extraction methods. The test results show that the accuracy, recall rate, and F 1 value of the COWORDS-IOM algorithm in the aggregate clustering of accounting vouchers are 85.12, 83.28, and 84.85%, respectively, which are better than the self-organizing map algorithm before the improvement. The accuracy rate, recall rate, and F 1 value of Word2vec TF-IDF LDA-BiLSTM model for intelligent analysis of audit reports are 87.43, 87.88, and 87.66%, respectively. This shows that the proposed method has good performance in accounting voucher clustering and intelligent analysis of audit reports, which can provide guidance for the development of enterprise financial intelligence software to a certain extent.
{"title":"Intelligent auditing techniques for enterprise finance","authors":"Chen Peng, Guixian Tian","doi":"10.1515/jisys-2023-0011","DOIUrl":"https://doi.org/10.1515/jisys-2023-0011","url":null,"abstract":"Abstract With the need of social and economic development, the audit method is also continuously reformed and improved. Traditional audit methods have defects of comprehensively considering various risk factors, and cannot meet the needs of enterprise financial work. To improve the effectiveness of audit work and meet the financial needs of enterprises, a solution for intelligent auditing of enterprise finance is proposed, including intelligent analysis of accounting vouchers and of audit reports. Then, Bi-directional Long Short-Term Memory (BiLSTM) neural network is used to classify the audit problems under three text feature extraction methods. The test results show that the accuracy, recall rate, and F 1 value of the COWORDS-IOM algorithm in the aggregate clustering of accounting vouchers are 85.12, 83.28, and 84.85%, respectively, which are better than the self-organizing map algorithm before the improvement. The accuracy rate, recall rate, and F 1 value of Word2vec TF-IDF LDA-BiLSTM model for intelligent analysis of audit reports are 87.43, 87.88, and 87.66%, respectively. This shows that the proposed method has good performance in accounting voucher clustering and intelligent analysis of audit reports, which can provide guidance for the development of enterprise financial intelligence software to a certain extent.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135261073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The current technology of foundation pit deformation measurement is inefficient, and its accuracy is not ideal. Therefore, an intelligent prediction model of foundation pit deformation based on back propagation neural network (BPNN) is proposed to predict the foundation pit deformation intelligently, with high accuracy and efficiency, so as to improve the safety of the project. Firstly, to address the shortcomings of BPNNs, which rely on the initial parameter settings and tend to fall into local optimum and unstable performance, this study adopts the modified particle swarm optimization (MPSO) to optimise the parameters of BPNNs and constructs a pit deformation prediction model based on the MPSO–BP algorithm to achieve predictive measurements of pit deformation. After training and testing the data samples, the results show that the prediction accuracy of the MPSO–BP pit deformation prediction model is 99.76%, which is 2.25% higher than that of the particle swarm optimization–back propagation (PSO–BP) pit deformation prediction model and 3.01% higher than that of the BP pit deformation prediction model. The aforementioned results show that the MPSO–BP pit deformation prediction model proposed in this study can effectively predict the pit deformation variables of construction projects and provide data support for the protective measures of the staff, which is helpful for the cause of construction projects in China.
{"title":"Construction pit deformation measurement technology based on neural network algorithm","authors":"Yong Wu, Xiaoli Zhou","doi":"10.1515/jisys-2022-0292","DOIUrl":"https://doi.org/10.1515/jisys-2022-0292","url":null,"abstract":"Abstract The current technology of foundation pit deformation measurement is inefficient, and its accuracy is not ideal. Therefore, an intelligent prediction model of foundation pit deformation based on back propagation neural network (BPNN) is proposed to predict the foundation pit deformation intelligently, with high accuracy and efficiency, so as to improve the safety of the project. Firstly, to address the shortcomings of BPNNs, which rely on the initial parameter settings and tend to fall into local optimum and unstable performance, this study adopts the modified particle swarm optimization (MPSO) to optimise the parameters of BPNNs and constructs a pit deformation prediction model based on the MPSO–BP algorithm to achieve predictive measurements of pit deformation. After training and testing the data samples, the results show that the prediction accuracy of the MPSO–BP pit deformation prediction model is 99.76%, which is 2.25% higher than that of the particle swarm optimization–back propagation (PSO–BP) pit deformation prediction model and 3.01% higher than that of the BP pit deformation prediction model. The aforementioned results show that the MPSO–BP pit deformation prediction model proposed in this study can effectively predict the pit deformation variables of construction projects and provide data support for the protective measures of the staff, which is helpful for the cause of construction projects in China.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135361368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Factors like rising work costs and the imminent transformation and upgrading of manufacturing industries are driving the rapid development of the industrial robotics market. In this study, by analyzing the structure of the transport arm and China Fusion Engineering Test Reactor and performing mathematical modeling, a feasible solution for the robot can be obtained using the dynamic ant colony optimization algorithm and grayscale values. However, for multiple degree of freedom robots, due to a large number of joints, the pure use of joint angle restrictions cannot avoid their own mutual interference. The design of the transport arm robot’s own collision algorithm is shown, which focuses on each linkage as a rod wrapped by a cylinder. The experiment shows that the relationship between the integrated center of mass and the whole machine center of mass can get the action area of the whole machine center of mass of the robot, according to which the relationship between the radius of the catch circle and time of the projection area of the whole machine center of mass of the robot in the horizontal plane can be obtained. The maximum outer circle radius rcom =267.977mm {r}_{text{com}}=267.977hspace{.25em}text{mm} , according to the stability criterion rssa >rcon {r}_{text{ssa}}gt {r}_{text{con}} , can be obtained, so the stability analysis of the gait switching process can be judged to be correct and effective.
工作成本上升、制造业转型升级迫在眉睫等因素推动着工业机器人市场的快速发展。本研究通过对输送臂和中国聚变工程试验堆的结构进行分析,并进行数学建模,利用动态蚁群优化算法和灰度值得到机器人的可行解。然而,对于多自由度机器人来说,由于关节数量众多,单纯利用关节角度限制并不能避免自身的相互干扰。展示了运输臂机器人自身碰撞算法的设计,该算法将每个连杆作为一根被圆柱体包裹的杆。实验表明,综合质心与整机质心的关系可以得到机器人整机质心的作用面积,据此可以得到机器人整机质心在水平面上的投影面积与捕捉圆半径的关系。最大外圆半径r com =267.977 mm {r}_{text{com}}=267.977hspace{。25em}text{mm},根据稳定性判据r ssa >R con {R}_{text{ssa}}gt {R}_{text{con}},从而判断步态切换过程的稳定性分析是正确有效的。
{"title":"CMOR motion planning and accuracy control for heavy-duty robots","authors":"Congju Zuo, Weihua Wang, Liang Xia, Feng Wang, Pucheng Zhou, Leiji Lu","doi":"10.1515/jisys-2023-0050","DOIUrl":"https://doi.org/10.1515/jisys-2023-0050","url":null,"abstract":"Abstract Factors like rising work costs and the imminent transformation and upgrading of manufacturing industries are driving the rapid development of the industrial robotics market. In this study, by analyzing the structure of the transport arm and China Fusion Engineering Test Reactor and performing mathematical modeling, a feasible solution for the robot can be obtained using the dynamic ant colony optimization algorithm and grayscale values. However, for multiple degree of freedom robots, due to a large number of joints, the pure use of joint angle restrictions cannot avoid their own mutual interference. The design of the transport arm robot’s own collision algorithm is shown, which focuses on each linkage as a rod wrapped by a cylinder. The experiment shows that the relationship between the integrated center of mass and the whole machine center of mass can get the action area of the whole machine center of mass of the robot, according to which the relationship between the radius of the catch circle and time of the projection area of the whole machine center of mass of the robot in the horizontal plane can be obtained. The maximum outer circle radius <m:math xmlns:m=\"http://www.w3.org/1998/Math/MathML\"> <m:msub> <m:mrow> <m:mi>r</m:mi> </m:mrow> <m:mrow> <m:mtext>com </m:mtext> </m:mrow> </m:msub> <m:mo>=</m:mo> <m:mn>267.977</m:mn> <m:mspace width=\".25em\" /> <m:mtext>mm</m:mtext> </m:math> {r}_{text{com}}=267.977hspace{.25em}text{mm} , according to the stability criterion <m:math xmlns:m=\"http://www.w3.org/1998/Math/MathML\"> <m:msub> <m:mrow> <m:mi>r</m:mi> </m:mrow> <m:mrow> <m:mtext>ssa </m:mtext> </m:mrow> </m:msub> <m:mo>></m:mo> <m:msub> <m:mrow> <m:mi>r</m:mi> </m:mrow> <m:mrow> <m:mtext>con </m:mtext> </m:mrow> </m:msub> </m:math> {r}_{text{ssa}}gt {r}_{text{con}} , can be obtained, so the stability analysis of the gait switching process can be judged to be correct and effective.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135599800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}