首页 > 最新文献

Expert Systems with Applications最新文献

英文 中文
Autonomous obstacle avoidance decision method for spherical underwater robot based on brain-inspired spiking neural network
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.127021
Boyang Zhang, Huiming Xing, Zhicheng Zhang, Weixing Feng
Autonomous obstacle avoidance is a critical capability for underwater robots to operate safely and sustainably in complex, unfamiliar, and unknown underwater environments. Existing methods often lack information processing and intelligent rapid decision-making ability similar to the human brain, making it difficult to adapt to the complex and challenging underwater environment. To address these limitations, with the spherical underwater robot (SUR) as the research object, a novel brain-inspired spiking neural network, neuromorphic hybrid deep deterministic policy gradient (Neuro-HDDPG), is proposed in this paper. The soft reset membrane potential update mechanism is designed to better represent the variation of spiking neuron membrane potentials. By integrating the spiking neural network and deep reinforcement learning, the proposed Neuro-HDDPG is composed of a soft reset spiking actor normal network (SANN) and deep critic normal network (DCNN). The SANN consists of soft reset improved leaky integrate-and-fire (SR-ILIF) neurons, and the DCNN comprises artificial neurons, realizing autonomous obstacle avoidance exploration of SUR in complex and unknown environments, with more temporal continuity and biological interpretability. To evaluate the obstacle avoidance efficiency of the proposed Neuro-HDDPG, through the ablation studies and comparison experiments with other known methods, the proposed Neuro-HDDPG achieved the highest success rate of 91% and 92%, respectively, in the two underwater evaluation environments with different levels of complexity, demonstrating superior obstacle avoidance performance and forming a reliable and efficient underwater obstacle avoidance decision-making capability. Simultaneously, the concept of combining spiking neural network with deep reinforcement learning provides an intelligent and reliable reference for other unmanned underwater intelligent systems.
自主避障是水下机器人在复杂、陌生和未知的水下环境中安全持续运行的关键能力。现有的方法往往缺乏类似人脑的信息处理和智能快速决策能力,难以适应复杂而充满挑战的水下环境。针对这些局限性,本文以球形水下机器人(SUR)为研究对象,提出了一种新颖的大脑启发尖峰神经网络--神经形态混合深度确定性策略梯度(Neuro-HDDPG)。为了更好地表现尖峰神经元膜电位的变化,本文设计了软复位膜电位更新机制。通过整合尖峰神经网络和深度强化学习,本文提出的 Neuro-HDDPG 由软复位尖峰行为正常网络(SANN)和深度批判正常网络(DCNN)组成。其中,SANN 由软复位改进型漏整合发射(SR-ILIF)神经元组成,DCNN 由人工神经元组成,实现了 SUR 在复杂未知环境中的自主避障探索,具有更强的时间连续性和生物可解释性。为了评价所提出的神经-HDDPG的避障效率,通过消融研究和与其他已知方法的对比实验,所提出的神经-HDDPG在两种不同复杂程度的水下评估环境中分别取得了91%和92%的最高成功率,显示了优越的避障性能,形成了可靠高效的水下避障决策能力。同时,尖峰神经网络与深度强化学习相结合的理念为其他无人水下智能系统提供了智能可靠的参考。
{"title":"Autonomous obstacle avoidance decision method for spherical underwater robot based on brain-inspired spiking neural network","authors":"Boyang Zhang,&nbsp;Huiming Xing,&nbsp;Zhicheng Zhang,&nbsp;Weixing Feng","doi":"10.1016/j.eswa.2025.127021","DOIUrl":"10.1016/j.eswa.2025.127021","url":null,"abstract":"<div><div>Autonomous obstacle avoidance is a critical capability for underwater robots to operate safely and sustainably in complex, unfamiliar, and unknown underwater environments. Existing methods often lack information processing and intelligent rapid decision-making ability similar to the human brain, making it difficult to adapt to the complex and challenging underwater environment. To address these limitations, with the spherical underwater robot (SUR) as the research object, a novel brain-inspired spiking neural network, neuromorphic hybrid deep deterministic policy gradient (Neuro-HDDPG), is proposed in this paper. The soft reset membrane potential update mechanism is designed to better represent the variation of spiking neuron membrane potentials. By integrating the spiking neural network and deep reinforcement learning, the proposed Neuro-HDDPG is composed of a soft reset spiking actor normal network (SANN) and deep critic normal network (DCNN). The SANN consists of soft reset improved leaky integrate-and-fire (SR-ILIF) neurons, and the DCNN comprises artificial neurons, realizing autonomous obstacle avoidance exploration of SUR in complex and unknown environments, with more temporal continuity and biological interpretability. To evaluate the obstacle avoidance efficiency of the proposed Neuro-HDDPG, through the ablation studies and comparison experiments with other known methods, the proposed Neuro-HDDPG achieved the highest success rate of 91% and 92%, respectively, in the two underwater evaluation environments with different levels of complexity, demonstrating superior obstacle avoidance performance and forming a reliable and efficient underwater obstacle avoidance decision-making capability. Simultaneously, the concept of combining spiking neural network with deep reinforcement learning provides an intelligent and reliable reference for other unmanned underwater intelligent systems.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 127021"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Q-fractional fuzzy influence pair domination number to locate and control smog area
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.126886
Fahad Ur Rehman, Tabasam Rashid, Muhammad Tanveer Hussain
<div><div>An intuitionistic fuzzy graph <span><math><mrow><mo>(</mo><mi>I</mi><mi>F</mi><mi>G</mi><mo>)</mo></mrow></math></span> and its extensions could not handle the situation of the form <span><math><mrow><msub><mrow><mi>η</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>=</mo><mrow><mo>{</mo><mrow><mo>(</mo><msub><mrow><mo>ħ</mo></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mn>0</mn><mo>.</mo><mn>8</mn><mo>,</mo><mn>0</mn><mo>.</mo><mn>7</mn><mo>)</mo></mrow><mo>,</mo><mrow><mo>(</mo><msub><mrow><mo>ħ</mo></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mn>0</mn><mo>.</mo><mn>9</mn><mo>,</mo><mn>0</mn><mo>.</mo><mn>8</mn><mo>)</mo></mrow><mo>,</mo><mrow><mo>(</mo><msub><mrow><mo>ħ</mo></mrow><mrow><mn>3</mn></mrow></msub><mo>,</mo><mn>1</mn><mo>,</mo><mn>1</mn><mo>)</mo></mrow><mo>}</mo></mrow></mrow></math></span> because <span><math><mrow><mn>0</mn><mo>.</mo><mn>8</mn><mo>+</mo><mn>0</mn><mo>.</mo><mn>7</mn><mo>=</mo><mn>1</mn><mo>.</mo><mn>5</mn><mo>></mo><mn>1</mn></mrow></math></span>, <span><math><mrow><mn>0</mn><mo>.</mo><mn>9</mn><mo>+</mo><mn>0</mn><mo>.</mo><mn>8</mn><mo>=</mo><mn>1</mn><mo>.</mo><mn>7</mn><mo>></mo><mn>1</mn></mrow></math></span>, and <span><math><mrow><mn>1</mn><mo>+</mo><mn>1</mn><mo>=</mo><mn>2</mn><mo>></mo><mn>1</mn></mrow></math></span>. In this article, we proposed the concept of a q-fractional fuzzy influence graph <span><math><mrow><mo>(</mo><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi></mrow></msub><mi>F</mi><mi>I</mi><mi>G</mi><mo>)</mo></mrow></math></span>. A <span><math><mrow><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi></mrow></msub><mi>F</mi><mi>I</mi><mi>G</mi></mrow></math></span> can indicate degrees of membership and non-membership 100% independently using the q-intercept of a straight line. We explore some ideas like a strongest q-fractional fuzzy influence pair <span><math><mrow><mo>(</mo><mi>S</mi><mi>G</mi><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi></mrow></msub><mi>F</mi><mi>I</mi><mi>P</mi><mo>)</mo></mrow></math></span>, strong q-fractional fuzzy influence pair <span><math><mrow><mo>(</mo><mi>S</mi><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi></mrow></msub><mi>F</mi><mi>I</mi><mi>P</mi><mo>)</mo></mrow></math></span>, weak q-fractional fuzzy influence pair <span><math><mrow><mo>(</mo><mi>W</mi><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi></mrow></msub><mi>F</mi><mi>I</mi><mi>P</mi><mo>)</mo></mrow></math></span>, q-fractional fuzzy influence cut-node <span><math><mrow><mo>(</mo><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi></mrow></msub><mi>F</mi><mi>I</mi><mi>C</mi><mi>N</mi><mo>)</mo></mrow></math></span>, q-fractional fuzzy influence bridge <span><math><mrow><mo>(</mo><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi></mrow></msub><mi>F</mi><mi>I</mi><mi>B</mi><mo>)</mo></mrow></math></span>, q-fractional fuzzy influence cut-pair <span><math><mrow><mo>(</mo><mi>q</mi><msub><mrow><mi>f</mi></mrow><mrow><mi>r</mi><
{"title":"Q-fractional fuzzy influence pair domination number to locate and control smog area","authors":"Fahad Ur Rehman,&nbsp;Tabasam Rashid,&nbsp;Muhammad Tanveer Hussain","doi":"10.1016/j.eswa.2025.126886","DOIUrl":"10.1016/j.eswa.2025.126886","url":null,"abstract":"&lt;div&gt;&lt;div&gt;An intuitionistic fuzzy graph &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt; and its extensions could not handle the situation of the form &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;η&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mrow&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mo&gt;ħ&lt;/mo&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;8&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;7&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mo&gt;ħ&lt;/mo&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;9&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;8&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mo&gt;ħ&lt;/mo&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/mrow&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt; because &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;8&lt;/mn&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;7&lt;/mn&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;5&lt;/mn&gt;&lt;mo&gt;&gt;&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;9&lt;/mn&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;8&lt;/mn&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;.&lt;/mo&gt;&lt;mn&gt;7&lt;/mn&gt;&lt;mo&gt;&gt;&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, and &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mo&gt;&gt;&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;. In this article, we proposed the concept of a q-fractional fuzzy influence graph &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;. A &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt; can indicate degrees of membership and non-membership 100% independently using the q-intercept of a straight line. We explore some ideas like a strongest q-fractional fuzzy influence pair &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;P&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, strong q-fractional fuzzy influence pair &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;P&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, weak q-fractional fuzzy influence pair &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;P&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, q-fractional fuzzy influence cut-node &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;C&lt;/mi&gt;&lt;mi&gt;N&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, q-fractional fuzzy influence bridge &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mi&gt;I&lt;/mi&gt;&lt;mi&gt;B&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, q-fractional fuzzy influence cut-pair &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;q&lt;/mi&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;r&lt;/mi&gt;&lt;","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126886"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143474266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online sequential Extreme learning Machine (OSELM) based denoising of encrypted image
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.126999
Biniyam Ayele Belete, Demissie Jobir Gelmecha, Ram Sewak Singh
With the increasing demand for secure digital communication, image encryption is essential for safeguarding sensitive information from unauthorized access. Conventional encryption techniques frequently encounter difficulties when dealing with noise and maintaining image quality during transmission. This study presents an innovative approach to image encryption that integrates an Online Sequential Extreme Learning Machine (OSELM) autoencoder and chaotic systems with DNA code for enhanced image encryption and denoising. The proposed method amalgamates an OSELM autoencoder, a hyperchaotic system incorporating two mersisters, a two-dimensional sine map, and DNA coding to effectively protect images from various types of noise such as Gaussian, Salt and Pepper, Quantization, Speckle, Sensor, and Environmental noises. OSELM-based denoising boosts encryption images’ resilience to noise attacks, ensuring strong security and image quality. Simulation results have shown that the proposed method achieved a key space of around 10240 or 2797, with information entropy values near 8 for encrypted images. This method also attains Number of Pixels Change Rate (NPCR) values between 99.59 % and 99.64 % and Unified Average Changing Intensity (UACI) values ranging from 32.97 % to 33.92 %, Peak Signal to Noise Ratio (PSNR) values of denoised images between 23.63 and 37.45, indicating outstanding performance in terms do both security and noise resilience. Additionally, histogram analysis, correlation analysis, and Mean Squared Error (MSE) results highlight the algorithm’s strong resistance to statistical attacks. At the same time, NPCR and UACI values affirm its robustness against differential attacks. The algorithm exhibits high sensitivity to key variations of up to 10-16, ensuring robust protection even with slight changes to the encryption of the decryption key. Finally, the NIST SP800-22 statistical tests confirm the randomness of the encrypted image’s bitstream, reinforcing its cryptographic strength. This dual approach effectively addresses the challenges of image security and noise resilience, safeguarding the integrity and clarity of digital images. This makes it highly suitable for the secure transmission and storage of digital images in diverse fields such as medicine, photography, biology, astronomy, and defense.
{"title":"Online sequential Extreme learning Machine (OSELM) based denoising of encrypted image","authors":"Biniyam Ayele Belete,&nbsp;Demissie Jobir Gelmecha,&nbsp;Ram Sewak Singh","doi":"10.1016/j.eswa.2025.126999","DOIUrl":"10.1016/j.eswa.2025.126999","url":null,"abstract":"<div><div>With the increasing demand for secure digital communication, image encryption is essential for safeguarding sensitive information from unauthorized access. Conventional encryption techniques frequently encounter difficulties when dealing with noise and maintaining image quality during transmission. This study presents an innovative approach to image encryption that integrates an Online Sequential Extreme Learning Machine (OSELM) autoencoder and chaotic systems with DNA code for enhanced image encryption and denoising. The proposed method amalgamates an OSELM autoencoder, a hyperchaotic system incorporating two mersisters, a two-dimensional sine map, and DNA coding to effectively protect images from various types of noise such as Gaussian, Salt and Pepper, Quantization, Speckle, Sensor, and Environmental noises. OSELM-based denoising boosts encryption images’ resilience to noise attacks, ensuring strong security and image quality. Simulation results have shown that the proposed method achieved a key space of around 10<sup>240</sup> or 2<sup>797</sup>, with information entropy values near 8 for encrypted images. This method also attains Number of Pixels Change Rate (NPCR) values between 99.59 % and 99.64 % and Unified Average Changing Intensity (UACI) values ranging from 32.97 % to 33.92 %, Peak Signal to Noise Ratio (PSNR) values of denoised images between 23.63 and 37.45, indicating outstanding performance in terms do both security and noise resilience. Additionally, histogram analysis, correlation analysis, and Mean Squared Error (MSE) results highlight the algorithm’s strong resistance to statistical attacks. At the same time, NPCR and UACI values affirm its robustness against differential attacks. The algorithm exhibits high sensitivity to key variations of up to 10<sup>-16</sup>, ensuring robust protection even with slight changes to the encryption of the decryption key. Finally, the NIST SP800-22 statistical tests confirm the randomness of the encrypted image’s bitstream, reinforcing its cryptographic strength. This dual approach effectively addresses the challenges of image security and noise resilience, safeguarding the integrity and clarity of digital images. This makes it highly suitable for the secure transmission and storage of digital images in diverse fields such as medicine, photography, biology, astronomy, and defense.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126999"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust sparse orthogonal basis clustering for unsupervised feature selection
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.126890
Jianyu Miao , Jingjing Zhao , Tiejun Yang , Yingjie Tian , Yong Shi , Mingliang Xu
Unsupervised Feature Selection (UFS), which identifies the optimal-related feature subset from the original feature set to lower the dimensionality of data without label information, has had a high profile in recent years. Given the absence of label information, the existing UFS approaches usually utilize graph and manifold learning techniques to retain the intrinsic structure of the data. The inclusion of irrelevant and redundant features and noise, would inevitably lower the quality of the structure. For this purpose, in this paper, we come up with Robust Sparse Orthogonal Basis Clustering (RSOBC), a novel method for UFS that integrates feature selection process with clustering task into a unified framework. Instead of explicitly utilizing the pre-computed local information, such a strategy focuses on exploring the inherent clustering structures of data. RSOBC leverages the log-based function as the loss to lessen the effect of noise and outliers, thereby enhancing its robustness. To select the more useful and discriminative features, the 2,1 norm is employed as the sparse regularization to encourage sparsity of the projection matrix. Meanwhile, we adopt the low redundancy regularization to make the weights of the correlated features small. In this way, the correlated features cannot be selected simultaneously. Consequently, the projection matrix, centroid matrix and cluster label matrix are learned simultaneously, such that the intrinsic structure is constructed in a more accurate way. The resulting optimization can be readily tackled by multi-block Alternating Direction Method of Multipliers (ADMM) based algorithm. Comprehensive experiments have been carried out on nine diverse real-world datasets. The results demonstrate that RSOBC surpasses many state-of-the-art UFS approaches, which indicates its effectiveness and superiority.
{"title":"Robust sparse orthogonal basis clustering for unsupervised feature selection","authors":"Jianyu Miao ,&nbsp;Jingjing Zhao ,&nbsp;Tiejun Yang ,&nbsp;Yingjie Tian ,&nbsp;Yong Shi ,&nbsp;Mingliang Xu","doi":"10.1016/j.eswa.2025.126890","DOIUrl":"10.1016/j.eswa.2025.126890","url":null,"abstract":"<div><div>Unsupervised Feature Selection (UFS), which identifies the optimal-related feature subset from the original feature set to lower the dimensionality of data without label information, has had a high profile in recent years. Given the absence of label information, the existing UFS approaches usually utilize graph and manifold learning techniques to retain the intrinsic structure of the data. The inclusion of irrelevant and redundant features and noise, would inevitably lower the quality of the structure. For this purpose, in this paper, we come up with Robust Sparse Orthogonal Basis Clustering (RSOBC), a novel method for UFS that integrates feature selection process with clustering task into a unified framework. Instead of explicitly utilizing the pre-computed local information, such a strategy focuses on exploring the inherent clustering structures of data. RSOBC leverages the log-based function as the loss to lessen the effect of noise and outliers, thereby enhancing its robustness. To select the more useful and discriminative features, the <span><math><msub><mrow><mi>ℓ</mi></mrow><mrow><mn>2</mn><mo>,</mo><mn>1</mn></mrow></msub></math></span> norm is employed as the sparse regularization to encourage sparsity of the projection matrix. Meanwhile, we adopt the low redundancy regularization to make the weights of the correlated features small. In this way, the correlated features cannot be selected simultaneously. Consequently, the projection matrix, centroid matrix and cluster label matrix are learned simultaneously, such that the intrinsic structure is constructed in a more accurate way. The resulting optimization can be readily tackled by multi-block Alternating Direction Method of Multipliers (ADMM) based algorithm. Comprehensive experiments have been carried out on nine diverse real-world datasets. The results demonstrate that RSOBC surpasses many state-of-the-art UFS approaches, which indicates its effectiveness and superiority.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126890"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143474352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient data stream clustering via elastic sparse representation and Bayesian dictionary learning
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.126889
Yao Li , Ming Chi , Xiaodong Liu
Existing data stream clustering algorithms face two key challenges: (1) reducing resource consumption by designing algorithms that can handle continuous data streams; (2) efficiently processing large-scale data and identifying the intrinsic structures of data objects. To address these challenges, this paper introduces an efficient data stream clustering method via elastic sparse representation and Bayesian dictionary learning (ESRBDL). Firstly, we control the size of the landmark windows to ensure data object richness while using fuzzy rules to limit the number of data objects, thereby managing continuous data streams. Secondly, the elastic penalty is introduced to enhance model flexibility, balancing sparsity while improving the identification of different data characteristics. Thirdly, we apply Bayesian theory to infer the true posterior distribution from the initial dictionary distributions, effectively identifying intrinsic relationships among data objects. Finally, we use the spectral clustering algorithm to cluster data streams. Additionally, comparative experiments were conducted on five synthetic and six real datasets to benchmark the proposed method against advanced data stream clustering methods. The experimental results demonstrate the effectiveness and robustness of ESRBDL in data stream clustering.
{"title":"Efficient data stream clustering via elastic sparse representation and Bayesian dictionary learning","authors":"Yao Li ,&nbsp;Ming Chi ,&nbsp;Xiaodong Liu","doi":"10.1016/j.eswa.2025.126889","DOIUrl":"10.1016/j.eswa.2025.126889","url":null,"abstract":"<div><div>Existing data stream clustering algorithms face two key challenges: (1) reducing resource consumption by designing algorithms that can handle continuous data streams; (2) efficiently processing large-scale data and identifying the intrinsic structures of data objects. To address these challenges, this paper introduces an efficient data stream clustering method via elastic sparse representation and Bayesian dictionary learning (ESRBDL). Firstly, we control the size of the landmark windows to ensure data object richness while using fuzzy rules to limit the number of data objects, thereby managing continuous data streams. Secondly, the elastic penalty is introduced to enhance model flexibility, balancing sparsity while improving the identification of different data characteristics. Thirdly, we apply Bayesian theory to infer the true posterior distribution from the initial dictionary distributions, effectively identifying intrinsic relationships among data objects. Finally, we use the spectral clustering algorithm to cluster data streams. Additionally, comparative experiments were conducted on five synthetic and six real datasets to benchmark the proposed method against advanced data stream clustering methods. The experimental results demonstrate the effectiveness and robustness of ESRBDL in data stream clustering.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126889"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143474271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LLM-AE-MP: Web Attack Detection Using a Large Language Model with Autoencoder and Multilayer Perceptron
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.126982
Jing Yang , Yuangui Wu , Yuping Yuan , Haozhong Xue , Sami Bourouis , Mahmoud Abdel-Salam , Sunil Prajapat , Lip Yee Por
Web applications store sensitive data, making them prime targets for cybercriminals and posing national security risks. This study introduces a new approach to distinguishing legitimate and malicious hypertext transfer protocol (HTTP) requests using an autoencoder (AE). The integration of AE allows for efficient feature distillation, enhancing the sensitivity of the model to anomalies in HTTP traffic. The AE framework is combined with a transductive long short-term memory (TLSTM) network, which is trained with an advanced generative adversarial network (GAN). Using GAN promotes an adaptive learning environment, significantly boosting the robustness and generalizability of our method against evolving web attack vectors. TLSTM uses transductive learning to focus on data points near the test set, improving the adaptability of the model to outperform traditional LSTM models. In our GAN, the generator purposely excludes gradients from the most influential batch elements, improving the ability of the model to generate diverse and generalized outputs. After training the AE, its latent representations are passed to a multilayer perceptron (MLP) for detection tasks. To address the imbalanced classification in MLP, we use a reinforcement learning (RL) strategy. The RL approach strategically adjusts incentives, enhancing the performance of the model in identifying less frequent but critical malicious instances, thereby supporting a balanced security assessment. Our evaluations using the CSIC 2010 (Spanish National Research Council 2010), FWAF (web application firewall), and HttpParams datasets show that our method outperforms existing techniques, achieving (Accuracy, F-measure, geometric mean (G-means), and area under the curve (AUC)) reaching (90.937%, 89.755%, 88.446%, 0.838), (89.055, 90.663%, 88.334%, 0.847) and (92.242%, 93.774%, 91.356%, 0.897), respectively. Moreover, our model achieves efficient runtime and memory usage across the datasets, providing a practical solution for real-time web attack detection. These results confirm the effectiveness of the model in security contexts, representing a substantial advancement in web attack detection and the improvement of investigative strategies.
{"title":"LLM-AE-MP: Web Attack Detection Using a Large Language Model with Autoencoder and Multilayer Perceptron","authors":"Jing Yang ,&nbsp;Yuangui Wu ,&nbsp;Yuping Yuan ,&nbsp;Haozhong Xue ,&nbsp;Sami Bourouis ,&nbsp;Mahmoud Abdel-Salam ,&nbsp;Sunil Prajapat ,&nbsp;Lip Yee Por","doi":"10.1016/j.eswa.2025.126982","DOIUrl":"10.1016/j.eswa.2025.126982","url":null,"abstract":"<div><div>Web applications store sensitive data, making them prime targets for cybercriminals and posing national security risks. This study introduces a new approach to distinguishing legitimate and malicious hypertext transfer protocol (HTTP) requests using an autoencoder (AE). The integration of AE allows for efficient feature distillation, enhancing the sensitivity of the model to anomalies in HTTP traffic. The AE framework is combined with a transductive long short-term memory (TLSTM) network, which is trained with an advanced generative adversarial network (GAN). Using GAN promotes an adaptive learning environment, significantly boosting the robustness and generalizability of our method against evolving web attack vectors. TLSTM uses transductive learning to focus on data points near the test set, improving the adaptability of the model to outperform traditional LSTM models. In our GAN, the generator purposely excludes gradients from the most influential batch elements, improving the ability of the model to generate diverse and generalized outputs. After training the AE, its latent representations are passed to a multilayer perceptron (MLP) for detection tasks. To address the imbalanced classification in MLP, we use a reinforcement learning (RL) strategy. The RL approach strategically adjusts incentives, enhancing the performance of the model in identifying less frequent but critical malicious instances, thereby supporting a balanced security assessment. Our evaluations using the CSIC 2010 (Spanish National Research Council 2010), FWAF (web application firewall), and HttpParams datasets show that our method outperforms existing techniques, achieving (Accuracy, F-measure, geometric mean (G-means), and area under the curve (AUC)) reaching (90.937%, 89.755%, 88.446%, 0.838), (89.055, 90.663%, 88.334%, 0.847) and (92.242%, 93.774%, 91.356%, 0.897), respectively. Moreover, our model achieves efficient runtime and memory usage across the datasets, providing a practical solution for real-time web attack detection. These results confirm the effectiveness of the model in security contexts, representing a substantial advancement in web attack detection and the improvement of investigative strategies.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126982"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143488654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.126883
Deep Singh, Sandeep Kumar
In the era of today’s open network communication, security issues of private data over these networks are at their peak, and it is challenging to secure data transmission. Therefore, to overcome these security crises, cryptographers need to develop efficient and robust encryption algorithms. This article proposes a new multilayer image ciphering scheme along with a modified authentication technique for grayscale and color images by using the RSA public key cryptosystem and two chaotic maps. The chaotic key sequences generated through a 2D piecewise smooth non-linear chaotic map (2D-PSNCM) are utilized to perform permutation of rows and columns to enhance the level of confusion. Also, bitwise XOR is applied to fulfill an intricate level of diffusion. To decrease the correlation and to strengthen the security level, the scrambling of pixels is created by using a suitable number of iterations of the Baker map. For authenticity purposes, the modified digital signature is proposed by using the RSA public key cryptosystem for partially encrypted images. The proposed digital signature is employed for further encryption purposes as well. The scheme provides multilayer security and is well-protected against different brute-force attacks. The secret keys and their arrangement in each layer of encryption are imperative for the correct decryption. The proposed algorithm’s robustness and efficiency are verified using multiple RGB and grayscale images. Security analysis demonstrates the validation by comparing it with some recent cryptographic image encryption algorithms. These results show the proposed algorithm’s robustness, such as vast sizeable keyspace, very low correlation coefficient, high sensitivity for keys, and good information entropy. Altogether, this proves the high efficiency of the proposed algorithm in resisting statistical attacks.
{"title":"Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps","authors":"Deep Singh,&nbsp;Sandeep Kumar","doi":"10.1016/j.eswa.2025.126883","DOIUrl":"10.1016/j.eswa.2025.126883","url":null,"abstract":"<div><div>In the era of today’s open network communication, security issues of private data over these networks are at their peak, and it is challenging to secure data transmission. Therefore, to overcome these security crises, cryptographers need to develop efficient and robust encryption algorithms. This article proposes a new multilayer image ciphering scheme along with a modified authentication technique for grayscale and color images by using the RSA public key cryptosystem and two chaotic maps. The chaotic key sequences generated through a 2D piecewise smooth non-linear chaotic map (2D-PSNCM) are utilized to perform permutation of rows and columns to enhance the level of confusion. Also, bitwise XOR is applied to fulfill an intricate level of diffusion. To decrease the correlation and to strengthen the security level, the scrambling of pixels is created by using a suitable number of iterations of the Baker map. For authenticity purposes, the modified digital signature is proposed by using the RSA public key cryptosystem for partially encrypted images. The proposed digital signature is employed for further encryption purposes as well. The scheme provides multilayer security and is well-protected against different brute-force attacks. The secret keys and their arrangement in each layer of encryption are imperative for the correct decryption. The proposed algorithm’s robustness and efficiency are verified using multiple RGB and grayscale images. Security analysis demonstrates the validation by comparing it with some recent cryptographic image encryption algorithms. These results show the proposed algorithm’s robustness, such as vast sizeable keyspace, very low correlation coefficient, high sensitivity for keys, and good information entropy. Altogether, this proves the high efficiency of the proposed algorithm in resisting statistical attacks.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126883"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143474268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency is the rule: Domain adaptive semantic segmentation with minimal annotations
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.126892
Tianyu Huai , Junhang Zhang , Xingjiao Wu , Jian Jin , Liang He
Active domain adaptation aims to select a few yet informative samples of the target domain for manual annotation to improve model performance. However, a critical observation in our research is the less-than-ideal domain alignment of existing active domain adaptive semantic segmentation (ADASS) methods. Specifically, they only measure the complementarity between target samples and the source domain but neglect the degree of domain shift in the active sample selection process. Furthermore, the impact of hard samples on domain alignment and model discriminative ability is underestimated. To tackle these issues, we propose a framework that contains a novel main-sub anchor modeling method and Confusing Sample Selection (CSS) and Offset Sample Selection (OSS) strategies. While improving the model performance of the ADASS task, we also consider that there remains a substantial resource demand. To solve this issue, we introduce the Instance Assignment Module (IAM). Extensive experiments on GTAV Cityscapes and SYNTHIA Cityscapes benchmarks, demonstrate that our method sets a new standard in both weakly supervised domain adaptive semantic segmentation (WDASS) and ADASS tasks, achieving the optimal trade-off between annotation cost and model performance.
{"title":"Efficiency is the rule: Domain adaptive semantic segmentation with minimal annotations","authors":"Tianyu Huai ,&nbsp;Junhang Zhang ,&nbsp;Xingjiao Wu ,&nbsp;Jian Jin ,&nbsp;Liang He","doi":"10.1016/j.eswa.2025.126892","DOIUrl":"10.1016/j.eswa.2025.126892","url":null,"abstract":"<div><div>Active domain adaptation aims to select a few yet informative samples of the target domain for manual annotation to improve model performance. However, a critical observation in our research is the less-than-ideal domain alignment of existing active domain adaptive semantic segmentation (ADASS) methods. Specifically, they only measure the complementarity between target samples and the source domain but neglect the degree of domain shift in the active sample selection process. Furthermore, the impact of hard samples on domain alignment and model discriminative ability is underestimated. To tackle these issues, we propose a framework that contains a novel main-sub anchor modeling method and Confusing Sample Selection (CSS) and Offset Sample Selection (OSS) strategies. While improving the model performance of the ADASS task, we also consider that there remains a substantial resource demand. To solve this issue, we introduce the Instance Assignment Module (IAM). Extensive experiments on GTAV <span><math><mo>→</mo></math></span> Cityscapes and SYNTHIA <span><math><mo>→</mo></math></span> Cityscapes benchmarks, demonstrate that our method sets a new standard in both weakly supervised domain adaptive semantic segmentation (WDASS) and ADASS tasks, achieving the optimal trade-off between annotation cost and model performance.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126892"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143474273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching of manual operation trajectories and warehouse operation information: A data chain Construction method based on indoor positioning technology
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-21 DOI: 10.1016/j.eswa.2025.127016
Yunhai Xiang , Kun Wang , Xinru Wu
Accurate data collection in manual warehouses faces significant challenges due to the reliance on singular information collection method and the operators’ flexibility, which impedes data-driven, intelligent decision-making in warehouse operations. This paper addresses this problem to construct the data chain using indoor positioning technology (DCC-IPS). A unique feature of the proposed approach is the integration of the operators’ positioning data with the layout, operations, and tasks in the warehouse, facilitating a deep fusion of new external data and internal business data. Experiments conducted at Southwest Jiaotong University’s laboratory have demonstrated that the DCC-IPS achieves a matching accuracy exceeding 80%. Compared to traditional scanning with PDA, DCC-IPS reduces the delay in operation recognition by 20 s in the experimental scenario. Furthermore, by utilizing the data chain for evaluating operators’ capability and optimizing task assignments, our numerical experiments showed a 22.13% increase in efficiency over random assignments. These results highlight the accuracy and effectiveness of DCC-IPS in enhancing operational efficiency in warehouses.
{"title":"Matching of manual operation trajectories and warehouse operation information: A data chain Construction method based on indoor positioning technology","authors":"Yunhai Xiang ,&nbsp;Kun Wang ,&nbsp;Xinru Wu","doi":"10.1016/j.eswa.2025.127016","DOIUrl":"10.1016/j.eswa.2025.127016","url":null,"abstract":"<div><div>Accurate data collection in manual warehouses faces significant challenges due to the reliance on singular information collection method and the operators’ flexibility, which impedes data-driven, intelligent decision-making in warehouse operations. This paper addresses this problem to construct the data chain using indoor positioning technology (DCC-IPS). A unique feature of the proposed approach is the integration of the operators’ positioning data with the layout, operations, and tasks in the warehouse, facilitating a deep fusion of new external data and internal business data. Experiments conducted at Southwest Jiaotong University’s laboratory have demonstrated that the DCC-IPS achieves a matching accuracy exceeding 80%. Compared to traditional scanning with PDA, DCC-IPS reduces the delay in operation recognition by 20 s in the experimental scenario. Furthermore, by utilizing the data chain for evaluating operators’ capability and optimizing task assignments, our numerical experiments showed a 22.13% increase in efficiency over random assignments. These results highlight the accuracy and effectiveness of DCC-IPS in enhancing operational efficiency in warehouses.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 127016"},"PeriodicalIF":7.5,"publicationDate":"2025-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143488652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep attention-based encoder for the prediction of type 2 diabetes longitudinal outcomes from routinely collected health care data
IF 7.5 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-02-20 DOI: 10.1016/j.eswa.2025.126876
Enrico Manzini , Bogdan Vlacho , Josep Franch-Nadal , Joan Escudero , Ana Génova , Elisenda Reixach , Erich Andrés , Israel Pizarro , Dídac Mauricio , Alexandre Perera-Lluna
Recent evidence indicates that Type 2 Diabetes Mellitus (T2DM) is a complex and highly heterogeneous disease involving various pathophysiological and genetic pathways, which presents clinicians with challenges in disease management. While deep learning models have made significant progress in helping practitioners manage T2DM treatments, several important limitations persist. In this paper we propose DARE, a model based on the transformer encoder, designed for analyzing longitudinal heterogeneous diabetes data. The model can be easily fine-tuned for various clinical prediction tasks, enabling a computational approach to assist clinicians in the management of the disease. We trained DARE using data from over 200,000 diabetic subjects from the primary healthcare SIDIAP database, which includes diagnosis and drug codes, along with various clinical and analytical measurements. After an unsupervised pre-training phase, we fine-tuned the model for predicting three specific clinical outcomes: i) occurrence of comorbidity, ii) achievement of target glycemic control (defined as glycated hemoglobin <7%) and iii) changes in glucose-lowering treatment. In cross-validation, the embedding vectors generated by DARE outperformed those from baseline models (comorbidities prediction task AUC=0.88, treatment prediction task AUC=0.91, HbA1c target prediction task AUC=0.82). Our findings suggest that attention-based encoders improve results with respect to different deep learning and classical baseline models when used to predict different clinical relevant outcomes from T2DM longitudinal data.
{"title":"A deep attention-based encoder for the prediction of type 2 diabetes longitudinal outcomes from routinely collected health care data","authors":"Enrico Manzini ,&nbsp;Bogdan Vlacho ,&nbsp;Josep Franch-Nadal ,&nbsp;Joan Escudero ,&nbsp;Ana Génova ,&nbsp;Elisenda Reixach ,&nbsp;Erich Andrés ,&nbsp;Israel Pizarro ,&nbsp;Dídac Mauricio ,&nbsp;Alexandre Perera-Lluna","doi":"10.1016/j.eswa.2025.126876","DOIUrl":"10.1016/j.eswa.2025.126876","url":null,"abstract":"<div><div>Recent evidence indicates that Type 2 Diabetes Mellitus (T2DM) is a complex and highly heterogeneous disease involving various pathophysiological and genetic pathways, which presents clinicians with challenges in disease management. While deep learning models have made significant progress in helping practitioners manage T2DM treatments, several important limitations persist. In this paper we propose DARE, a model based on the transformer encoder, designed for analyzing longitudinal heterogeneous diabetes data. The model can be easily fine-tuned for various clinical prediction tasks, enabling a computational approach to assist clinicians in the management of the disease. We trained DARE using data from over 200,000 diabetic subjects from the primary healthcare SIDIAP database, which includes diagnosis and drug codes, along with various clinical and analytical measurements. After an unsupervised pre-training phase, we fine-tuned the model for predicting three specific clinical outcomes: i) occurrence of comorbidity, ii) achievement of target glycemic control (defined as glycated hemoglobin <span><math><mrow><mo>&lt;</mo><mn>7</mn><mtext>%</mtext></mrow></math></span>) and iii) changes in glucose-lowering treatment. In cross-validation, the embedding vectors generated by DARE outperformed those from baseline models (comorbidities prediction task <span><math><mrow><mi>A</mi><mi>U</mi><mi>C</mi><mo>=</mo><mn>0</mn><mo>.</mo><mn>88</mn></mrow></math></span>, treatment prediction task <span><math><mrow><mi>A</mi><mi>U</mi><mi>C</mi><mo>=</mo><mn>0</mn><mo>.</mo><mn>91</mn></mrow></math></span>, HbA1c target prediction task <span><math><mrow><mi>A</mi><mi>U</mi><mi>C</mi><mo>=</mo><mn>0</mn><mo>.</mo><mn>82</mn></mrow></math></span>). Our findings suggest that attention-based encoders improve results with respect to different deep learning and classical baseline models when used to predict different clinical relevant outcomes from T2DM longitudinal data.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"274 ","pages":"Article 126876"},"PeriodicalIF":7.5,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143479888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Expert Systems with Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1