Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (18,363)

Search Parameters:
Keywords = network-based approach

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 1377 KiB  
Review
Indoor Positioning Systems in Logistics: A Review
by Laura Vaccari, Antonio Maria Coruzzolo, Francesco Lolli and Miguel Afonso Sellitto
Logistics 2024, 8(4), 126; https://doi.org/10.3390/logistics8040126 (registering DOI) - 4 Dec 2024
Abstract
Background: Indoor Positioning Systems (IPS) have gained increasing relevance in logistics, offering solutions for safety enhancement, intralogistics management, and material flow control across various environments such as industrial facilities, offices, hospitals, and supermarkets. This study aims to evaluate IPS technologies’ performance and applicability [...] Read more.
Background: Indoor Positioning Systems (IPS) have gained increasing relevance in logistics, offering solutions for safety enhancement, intralogistics management, and material flow control across various environments such as industrial facilities, offices, hospitals, and supermarkets. This study aims to evaluate IPS technologies’ performance and applicability to guide practitioners in selecting systems suited to specific contexts. Methods: The study systematically reviews key IPS technologies, positioning methods, data types, filtering methods, and hybrid technologies, alongside real-world examples of IPS applications in various testing environments. Results: Our findings reveal that radio-based technologies, such as Radio Frequency Identification (RFID), Ultra-wideband (UWB), Wi-Fi, and Bluetooth (BLE), are the most commonly used, with UWB offering the highest accuracy in industrial settings. Geometric methods, particularly multilateration, proved to be the most effective for positioning and are supported by advanced filtering techniques like the Extended Kalman Filter and machine learning models such as Convolutional Neural Networks. Overall, hybrid approaches that integrate multiple technologies demonstrated enhanced accuracy and reliability, effectively mitigating environmental interferences and signal attenuation. Conclusions: The study provides valuable insights for logistics practitioners, emphasizing the importance of selecting IPS technologies suited to specific operational contexts, where precision and reliability are critical to operational success. Full article
Show Figures

Figure 1

Figure 1
<p>Selection process diagram.</p>
Full article ">Figure 2
<p>Number of annual published articles between 2011 and 2024.</p>
Full article ">Figure 3
<p>Top ten countries.</p>
Full article ">Figure 4
<p>Specific subject area grouping.</p>
Full article ">Figure 5
<p>Distribution of papers across different environments.</p>
Full article ">Figure 6
<p>Distribution of tracked actors in indoor positioning systems.</p>
Full article ">Figure 7
<p>Percentage of contribution aims in indoor positioning.</p>
Full article ">Figure 8
<p>Preferred communication types for indoor positioning by environment.</p>
Full article ">Figure 9
<p>Indoor positioning technologies.</p>
Full article ">Figure 10
<p>Data.</p>
Full article ">Figure 11
<p>Methods.</p>
Full article ">Figure 12
<p>Filters.</p>
Full article ">Figure 13
<p>Machine learning filters.</p>
Full article ">Figure 14
<p>Minimum and maximum accuracy levels for indoor positioning technologies.</p>
Full article ">
31 pages, 3720 KiB  
Article
A Deep-Learning-Based Detection Method for Small Target Tomato Pests in Insect Traps
by Song Wang, Daqing Chen, Jianxia Xiang and Cong Zhang
Agronomy 2024, 14(12), 2887; https://doi.org/10.3390/agronomy14122887 - 3 Dec 2024
Abstract
In a greenhouse environment where tomatoes are grown, pests in yellow sticky traps need to be detected in order to control the pest population. However, tomato pests typically found on yellow sticky traps are small in size and lack distinct visual features, making [...] Read more.
In a greenhouse environment where tomatoes are grown, pests in yellow sticky traps need to be detected in order to control the pest population. However, tomato pests typically found on yellow sticky traps are small in size and lack distinct visual features, making it difficult for convolutional networks to extract sufficient contextual information, thereby rendering the tasks of localization and classification exceptionally challenging. In this work, an improved approach based on the advanced object detection model You Only Look Once version 7-tiny (YOLOv7-tiny) is introduced, aiming to enhance the accuracy of detecting small tomato pests while maintaining computational complexity. Firstly, a context information extraction block (CIE) based on a Transformer encoder is proposed, and this block aims to capture global context, explore potential relationships between features, and emphasize important characteristics. Secondly, an Tiny-ELAN fusion network is introduced, which enhanced the feature fusion ability of the network. Thirdly, the feature fusion part takes the P2 feature layer into account and adds a P2 small target detection head. Finally, the SCYLLA-IoU (SIoU) loss function is introduced, and its components are redefined to incorporate direction information, which enhances the model’s learning ability and convergence performance. Experimental results show that our method can accurately detect three insects: whitefly (WF), macrolophus (MR), and nesidiocoris (NC) in the yellow sticky trap images of tomato crops. Compared with Faster R-CNN, SSD, YOLOv3-tiny, YOLOv5s, YOLOv7-tiny, YOLOv7, YOLOv7-x, YOLOv8n, YOLOv8s, YOLOv10n, and RT-DETR, the mean average precision of our method increased by 3.14%, 11.8%, 4.7%, 4.7%, 4.4%, 3.5%, 2.9%, 4.6%, 4.4%, 4.2%, and 4.2%, respectively. Full article
(This article belongs to the Special Issue In-Field Detection and Monitoring Technology in Precision Agriculture)
22 pages, 2415 KiB  
Article
A Fuzzy-Bayesian Network Approach Based Assessment of CoP System in Forging Higher Education Social Responsibility
by Binglei Xie, Pengchang Li, Yuhong Wang, Feiyi Luo and Linhua Wu
Systems 2024, 12(12), 540; https://doi.org/10.3390/systems12120540 - 3 Dec 2024
Abstract
Community of practice (CoP) has been seen as a pivotal support for higher education institutions to implement their social responsibilities. Even though this model is widely admired, assessing its effectiveness and sustainability still faces many challenges: (1) the absence of an appropriate index [...] Read more.
Community of practice (CoP) has been seen as a pivotal support for higher education institutions to implement their social responsibilities. Even though this model is widely admired, assessing its effectiveness and sustainability still faces many challenges: (1) the absence of an appropriate index reveals the significance of CoP; (2) the difficulty of realizing quantitative assessment; and (3) the strategies to improve contribution sustainably by considering CoP development. To address these challenges, a comprehensive Higher Education Social Responsibility Contribution Index (HESRCI) is constructed by taking into account the CoP key influence factors. An FBN model is further developed for the purpose of assessing the various corresponding contributions quantitatively and investigating the potential interdependencies between influence factors. The effectiveness of the proposed approach is evidenced by the quantitative indication of CoP’s contributions to priorities. Research findings also highlight the significance of CoP governance, the mechanism of resource allocation, and team development, in particular, in facilitating the synergy between university development and sustainable socio-economic growth. In addition, it provides data support and a theoretical basis for higher education institutions to make more informed decisions when implementing industry-education integration strategies. Full article
Show Figures

Figure 1

Figure 1
<p>Value creation framework of CoPs in HESR. Source: Adapted by author based on Wenger, et al. [<a href="#B37-systems-12-00540" class="html-bibr">37</a>].</p>
Full article ">Figure 2
<p>Higher Education Social Responsibility Contribution Index (HESRCI).</p>
Full article ">Figure 3
<p>Fuzzy numbers of natural language.</p>
Full article ">Figure 4
<p>Bayesian network simulation of HESRCI in GENIE.</p>
Full article ">Figure 5
<p>Distribution of respondent roles.</p>
Full article ">Figure 6
<p>BN prediction results.</p>
Full article ">Figure 7
<p>Sensitivity value folding line.</p>
Full article ">
24 pages, 826 KiB  
Article
Policy-Based Smart Contracts Management for IoT Privacy Preservation
by Mohsen Rouached, Aymen Akremi, Mouna Macherki and Naoufel Kraiem
Future Internet 2024, 16(12), 452; https://doi.org/10.3390/fi16120452 - 3 Dec 2024
Abstract
This paper addresses the challenge of preserving user privacy within the Internet of Things (IoT) ecosystem using blockchain technology. Several approaches consider using blockchain and encryption to enhance the privacy of IoT applications and constrained IoT devices. However, existing blockchain platforms such as [...] Read more.
This paper addresses the challenge of preserving user privacy within the Internet of Things (IoT) ecosystem using blockchain technology. Several approaches consider using blockchain and encryption to enhance the privacy of IoT applications and constrained IoT devices. However, existing blockchain platforms such as Ethereum and Hyperledger Fabric already use encryption to store data blocks and secure communication. Therefore, introducing an additional cryptographic layer on top of these platforms could potentially increase processing overhead and reduce response time. In this work, we investigate the integration of IoT and blockchain for privacy preservation. More specifically, we propose a new model that leverages the properties of private blockchain and smart contracts to ensure user data privacy when shared with others. We define policy-based algorithms and notations to assist users in managing smart contracts responsible for registering and controlling their IoT devices. We also specify multiple smart contracts designed to enhance privacy by creating a private channel for communication between the user and the blockchain network. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Proposed model.</p>
Full article ">Figure 2
<p>New IoT device registration.</p>
Full article ">Figure 3
<p>Illustrative model of healthcare.</p>
Full article ">Figure 4
<p>Privatization of the transaction between actors.</p>
Full article ">Figure 5
<p>Displaying the data of the owner device.</p>
Full article ">Figure 6
<p>The Hyperledger Explorer.</p>
Full article ">Figure 7
<p>Blockchain block.</p>
Full article ">Figure 8
<p>Transaction time of Hyperledger Fabric 2.0 for one organization [<a href="#B54-futureinternet-16-00452" class="html-bibr">54</a>].</p>
Full article ">Figure 9
<p>Impact of the block size and transaction arrival rate on performance (increased smart contract execution) [<a href="#B55-futureinternet-16-00452" class="html-bibr">55</a>].</p>
Full article ">
20 pages, 2859 KiB  
Article
A Mobility Handover Decision Method Based on Multi-Topology
by Chi Zhang, Haojiang Deng and Rui Han
Electronics 2024, 13(23), 4777; https://doi.org/10.3390/electronics13234777 - 3 Dec 2024
Abstract
With the emergence of new applications in mobile networks, users demand higher network stability and lower data transmission delays. When the network address of a mobile user changes, the data transmission path in the wired network may need to be switched to maintain [...] Read more.
With the emergence of new applications in mobile networks, users demand higher network stability and lower data transmission delays. When the network address of a mobile user changes, the data transmission path in the wired network may need to be switched to maintain service continuity. Traditional mobility support methods typically rely on a single switching path for all mobile data flows. However, if this path cannot meet the requirements of all the flows, it may lead to network congestion or a decline in user experience. To overcome this limitation, this paper proposes a mobility handover decision method based on multi-topology. It enables the dynamic allocation of mobile data flows across different switching paths within multiple logical topologies. The method models a multi-topology selection problem aimed at minimizing average packet transmission delay and packet loss rate, while considering network conditions and the Quality of Service (QoS) requirements for each flow. By solving the dual problem of the original optimization, a near-optimal solution is achieved. The proposed scheme and algorithm were implemented and tested using the Mininet network simulator. Results show that the proposed approach achieves low average packet transmission delay, low average packet loss rate, and high throughput, compared to traditional single-path switching methods and existing multipath routing methods. Full article
(This article belongs to the Special Issue Advances in Mobile Networked Systems)
Show Figures

Figure 1

Figure 1
<p>Mobile communication system with multi-topology.</p>
Full article ">Figure 2
<p>Physical topology and logical topologies. (<b>a</b>) Physical topology, (<b>b</b>) logical topology T1, (<b>c</b>) logical topology T2, and (<b>d</b>) logical topology T3.</p>
Full article ">Figure 3
<p>Physical topology of simulation.</p>
Full article ">Figure 4
<p>Logical topologies of simulation.</p>
Full article ">Figure 5
<p>Average packet transmission delay.</p>
Full article ">Figure 6
<p>QoS satisfaction rate.</p>
Full article ">Figure 7
<p>Average packet loss rate.</p>
Full article ">Figure 8
<p>Handover Delay.</p>
Full article ">Figure 9
<p>Runtime of MHMT.</p>
Full article ">Figure 10
<p>Throughput.</p>
Full article ">
17 pages, 2496 KiB  
Article
Radar HRRP Feature Fusion Recognition Method Based on ConvLSTM Network with Multi-Input Gate Recurrent Unit
by Wei Yang, Tianqi Chen, Shiwen Lei, Zhiqin Zhao, Haoquan Hu and Jun Hu
Remote Sens. 2024, 16(23), 4533; https://doi.org/10.3390/rs16234533 - 3 Dec 2024
Abstract
Recently, the radar high-resolution range profiles (HRRPs) have gained significant attention in the field of radar automatic target recognition due to their advantages of being easy to acquire, having a small data footprint, and providing rich target structural information. However, existing recognition methods [...] Read more.
Recently, the radar high-resolution range profiles (HRRPs) have gained significant attention in the field of radar automatic target recognition due to their advantages of being easy to acquire, having a small data footprint, and providing rich target structural information. However, existing recognition methods typically focus on single-domain features, utilizing either the raw HRRP sequence or the extracted feature sequence independently. To fully exploit the multi-domain information present in HRRP sequences, this paper proposes a novel target feature fusion recognition approach. By combining a convolutional long short-term memory (ConvLSTM) network with a cascaded gated recurrent unit (GRU) structure, the proposed method leverages multi-domain and temporal information to enhance recognition performance. Furthermore, a multi-input framework based on learnable parameters is designed to improve target representation capabilities. Experimental results of 6 ship targets demonstrate that the fusion recognition method achieves superior accuracy and faster convergence compared to methods relying on single-domain sequences. It is also found that the proposed method consistently outperforms the other previous methods. And the recognition accuracy is up to 93.32% and 82.15% for full polarization under the SNRs of 20 dB and 5 dB, respectively. Therefore, the proposed method consistently outperforms the previous methods overall. Full article
Show Figures

Figure 1

Figure 1
<p>Anti-Ship Missile Attacking Scene.</p>
Full article ">Figure 2
<p>Co-polarization HRRPs of 6 ships at <math display="inline"><semantics> <mrow> <mi>θ</mi> <mo>=</mo> <msup> <mn>30</mn> <mo>∘</mo> </msup> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϕ</mi> <mo>=</mo> <mo>−</mo> <msup> <mn>60</mn> <mo>∘</mo> </msup> </mrow> </semantics></math> (<b>a</b>) Ship 1; (<b>b</b>) Ship 2; (<b>c</b>) Ship 3; (<b>d</b>) Ship 4; (<b>e</b>) Ship 5; (<b>f</b>) Ship 6.</p>
Full article ">Figure 3
<p>Cross-polarization HRRPs of 6 ships at <math display="inline"><semantics> <mrow> <mi>θ</mi> <mo>=</mo> <msup> <mn>30</mn> <mo>∘</mo> </msup> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ϕ</mi> <mo>=</mo> <mo>−</mo> <msup> <mn>60</mn> <mo>∘</mo> </msup> </mrow> </semantics></math> (<b>a</b>) Ship 1; (<b>b</b>) Ship 2; (<b>c</b>) Ship 3; (<b>d</b>) Ship 4; (<b>e</b>) Ship 5; (<b>f</b>) Ship 6.</p>
Full article ">Figure 4
<p>Overall structure of the fusion process.</p>
Full article ">Figure 5
<p>GRU network structure.</p>
Full article ">Figure 6
<p>Flowchart of the ConvLSTM Blocks.</p>
Full article ">Figure 7
<p>Learnable parameters adjustment framework.</p>
Full article ">Figure 8
<p>Comparison of loss function (<b>a</b>) full polarization (<b>b</b>) HH polarization.</p>
Full article ">Figure 9
<p>Confusion matrix of proposed method in full polarization: (<b>a</b>) 5 dB SNR (<b>b</b>) 10 dB SNR (<b>c</b>) 15 dB SNR (<b>d</b>) 20 dB SNR (<b>e</b>) Orignial dataset.</p>
Full article ">Figure 10
<p>Two-dimensional t-SNE projection from extracted feature vectors with 6 classes of target. (<b>a</b>) LSTM (<b>b</b>) ConvLSTM (<b>c</b>) Proposed Method.</p>
Full article ">
11 pages, 7807 KiB  
Article
Yield Impact of Data-Informed Surface Drainage: An On-Farm Case Study
by Sagar Regmi, Paul Davidson and Cody Allen
Agriculture 2024, 14(12), 2210; https://doi.org/10.3390/agriculture14122210 - 3 Dec 2024
Viewed by 96
Abstract
Drainage is an important aspect of effective water management in row-crop agriculture. Drainage systems can be broadly categorized as either subsurface or surface drainage. A significant amount of design goes into subsurface drainage installations, such as tile networks, and permanent surface drainage installations, [...] Read more.
Drainage is an important aspect of effective water management in row-crop agriculture. Drainage systems can be broadly categorized as either subsurface or surface drainage. A significant amount of design goes into subsurface drainage installations, such as tile networks, and permanent surface drainage installations, such as waterways and berms. However, many farmers also implement temporary surface drainage installations to drain localized areas within their fields each year. This practice involves creating shallow water paths, typically using spinner ditchers, and it is especially commonplace in areas with poor soil permeability. However, this practice is traditionally performed using only observations by farmers and without any data-based workflows. The objective of this study was to analyze the potential yield benefits from a more data-informed approach to surface drainage on a production row-crop farm by exploring corn and soybean yield data from 2008–2021 from two fields where a data-informed approach to surface drainage was implemented. Field topography and drainage information were combined with yield maps from prior years with traditional ad hoc drainage and the years following the incorporation of the data-informed approach to better understand the impact of the workflow. Geospatial distribution of the average normalized crop yields and elevation maps for the fields were analyzed to isolate the yield impacts of the areas affected by the data-informed on-farm surface drainage artifacts. In the years after implementation of the data-informed surface drainage approach, Field 1 and Field 2 showed respective increases of 18.3% and 13.9% in average corn yields. Further analysis isolating three areas affected by the surface drainage using topography and drainage layout showed that all three isolated areas improved more than the field averages, ranging from 15.9–26.5% for Field 1 and 21.4–40.2% for Field 2. Similarly, soybean yields were also higher in the isolated affected areas after the data-informed drainage ditch construction. The findings highlight the effectiveness of data-informed on-farm surface drainage, a relatively straightforward approach that proved beneficial for both soybean and corn production. Full article
Show Figures

Figure 1

Figure 1
<p>Range of years that the crop-yield dataset included. The blue arrow shows that there was some form of empirical surface drainage before the year 2012 and the green arrow shows that the data-informed surface drainage was constructed in 2012.</p>
Full article ">Figure 2
<p>Mapped areas of water that ponded (red dots) after heavy rainfall (<b>a</b>), topographical map of the field (<b>b</b>), resulting ditch layout for the field created using the elevation and the areas of water ponding (<b>c</b>).</p>
Full article ">Figure 3
<p>Flow diagram of the procedure carried out to analyze isolated areas affected by the drainage system. Red lines on the figures are the implemented drainage ditches.</p>
Full article ">Figure 4
<p>Selected affected areas in Field 1 (<b>left</b>) and Field 2 (<b>right</b>) isolated for the yield analysis on the areas affected by drainage within the field. The area in magenta on the right-side figure shows the isolated area for the corn field and the blue shows the isolated area for the soybean field. The red lines on the figures are the implemented drainage ditches.</p>
Full article ">Figure 5
<p>(<b>a</b>) Satellite image with Field 1 outlined in red and (<b>b</b>) an elevation plot of Field 1, where the greener area corresponds to a higher elevation.</p>
Full article ">Figure 6
<p>(<b>a</b>) Satellite image with Field 2 outlined in red and (<b>b</b>) Elevation plot of Field 2, where greener corresponds to higher elevation.</p>
Full article ">Figure 7
<p>Average normalized corn yield for Field 1 before and after surface drainage was implemented. The dotted circle highlights the spatial effects on the corn yield due to the implementation of the surface drainage.</p>
Full article ">Figure 8
<p>Average normalized soybean yield for Field 1 before and after the surface drainage was implemented.</p>
Full article ">Figure 9
<p>Average normalized corn (<b>a</b>) and soybean (<b>b</b>) yields for Field 2 before and after the surface drainage was implemented.</p>
Full article ">Figure 10
<p>Percentage changes in mean yields before and after drainage for Field 1 (<b>left</b>) and Field 2 (<b>right</b>) in bushels/acre and dry basis across isolated sections of watershed for both corn and soybean. Note: TF, total field; IAA1, isolated affected area 1; IAA2, isolated affected area 2; IAA3, isolated affected area 3.</p>
Full article ">
17 pages, 11774 KiB  
Article
Hierarchical Federated Learning-Based Intrusion Detection for In-Vehicle Networks
by Muzun Althunayyan, Amir Javed, Omer Rana and Theodoros Spyridopoulos
Future Internet 2024, 16(12), 451; https://doi.org/10.3390/fi16120451 - 3 Dec 2024
Viewed by 95
Abstract
Intrusion detection systems (IDSs) are crucial for identifying cyberattacks on in-vehicle networks. To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). However, traditional FL-based IDSs depend on a single central aggregator, creating performance bottlenecks and introducing [...] Read more.
Intrusion detection systems (IDSs) are crucial for identifying cyberattacks on in-vehicle networks. To enhance IDS robustness and preserve user data privacy, researchers are increasingly adopting federated learning (FL). However, traditional FL-based IDSs depend on a single central aggregator, creating performance bottlenecks and introducing a single point of failure, thereby compromising robustness and scalability. To address these limitations, this paper proposes a Hierarchical Federated Learning (H-FL) framework to deploy and evaluate the performance of the IDS. The H-FL framework incorporates multiple edge aggregators alongside the central aggregator, mitigating single-point failure risks, improving scalability, and efficiently distributing computational load. We evaluate the proposed IDS using the H-FL framework on two car hacking datasets under realistic non-independent and identically distributed (non-IID) data scenarios. Experimental results demonstrate that deploying the IDS within an H-FL framework can enhance the F1-score by up to 10.63%, addressing the limitations of edge-FL in dataset diversity and attack coverage. Notably, H-FL improved the F1-score in 16 out of 24 evaluated scenarios. By enabling the IDS to learn from diverse data, driving conditions, and evolving threats, this approach substantially strengthens cybersecurity in modern vehicular systems. Full article
(This article belongs to the Special Issue IoT Security: Threat Detection, Analysis and Defense)
Show Figures

Figure 1

Figure 1
<p>Cloud-based FL and H-FL.</p>
Full article ">Figure 2
<p>Architecture of the proposed H-FL method.</p>
Full article ">Figure 3
<p>H-FL environment in Flower.</p>
Full article ">Figure 4
<p>Workflow of the proposed multistage in-vehicle IDS.</p>
Full article ">Figure 5
<p>Data partitioning.</p>
Full article ">Figure 6
<p>Horizontal CAN bus data.</p>
Full article ">Figure 7
<p>Dataset distribution based on Dirichlet <math display="inline"><semantics> <mrow> <mo>(</mo> <mi>μ</mi> <mo>)</mo> </mrow> </semantics></math> distribution.</p>
Full article ">Figure 8
<p>Average F1-score results non-IID levels across communication rounds for car hacking dataset [<a href="#B29-futureinternet-16-00451" class="html-bibr">29</a>].</p>
Full article ">Figure 9
<p>F1-score of ANN model for different non-IID levels across communication rounds.</p>
Full article ">Figure 10
<p>F1-score of our proposed multistage-IDS for different non-IID levels across communication rounds.</p>
Full article ">Figure 11
<p>Distributed loss across communication rounds.</p>
Full article ">Figure 12
<p>Average F1-score results non-IID levels across communication rounds for car hacking: Attack &amp; Defense Challenge 2020 dataset [<a href="#B26-futureinternet-16-00451" class="html-bibr">26</a>].</p>
Full article ">
13 pages, 1769 KiB  
Article
Collaborative Beamforming with DQN for Interference Mitigation in 5G and Beyond Networks
by Alaelddin F. Y. Mohammed, Salman Md Sultan and Sakshi Patni
Telecom 2024, 5(4), 1192-1204; https://doi.org/10.3390/telecom5040060 (registering DOI) - 3 Dec 2024
Viewed by 171
Abstract
This paper addresses the problem of side lobe interference in 5G networks by proposing a unique collaborative beamforming strategy based on Deep Q-Network (DQN) reinforcement learning. Our method, which operates in the sub-6 GHz band, maximizes beam steering and power management by using [...] Read more.
This paper addresses the problem of side lobe interference in 5G networks by proposing a unique collaborative beamforming strategy based on Deep Q-Network (DQN) reinforcement learning. Our method, which operates in the sub-6 GHz band, maximizes beam steering and power management by using a two-antenna system with DQN-controlled phase shifters. We provide an OFDM cellular network environment where inter-cell interference is managed while many base stations serve randomly dispersed customers. In order to reduce interference strength and improve signal-to-interference-plus-noise ratio (SINR), the DQN agent learns to modify the interference angle. Our model integrates experience replay memory with a long short-term memory (LSTM) recurrent neural network for time series prediction to enhance learning stability. The outcomes of our simulations show that our suggested DQN approach works noticeably better than current DQN and Q-learning methods. In particular, our technique reaches a maximum of 29.18 dB and a minimum of 5.15 dB, whereas the other approaches only manage 0.77–27.04 dB. Additionally, we significantly decreased the average interference level to 5.42 dB compared to competing approaches of 38.84 dB and 34.12 dB. The average sum-rate capacity is also increased to 3.90 by the suggested strategy, outperforming previous approaches. These findings demonstrate how well our cooperative beamforming method reduces interference and improves overall network performance in 5G systems. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Radiation pattern with antenna spacing <span class="html-italic">d</span> = 43 mm. (<b>b</b>) Radiation pattern with antenna spacing <span class="html-italic">d</span> = 150 mm. (<b>c</b>) Radiation pattern with antenna spacing <span class="html-italic">d</span> = 300 mm.</p>
Full article ">Figure 2
<p>The proposed DQN-based 5G beamforming architecture: (<b>a</b>) Beamforming and interference in a traditional 5G network without DQN control, (<b>b</b>) Proposed DQN-based 5G beamforming with interference angle steering.</p>
Full article ">Figure 3
<p>Radiation pattern of different phase angles.</p>
Full article ">Figure 4
<p>Flow chart of proposed DQN model.</p>
Full article ">Figure 5
<p>Model summary of proposed LSTM + Dense.</p>
Full article ">Figure 6
<p>SINR at each successful step.</p>
Full article ">Figure 7
<p>Interference power vs. successful step.</p>
Full article ">Figure 8
<p>Served power comparison at each step.</p>
Full article ">
19 pages, 556 KiB  
Article
A Temporal Graph Network Algorithm for Detecting Fraudulent Transactions on Online Payment Platforms
by Diego Saldaña-Ulloa, Guillermo De Ita Luna and J. Raymundo Marcial-Romero
Algorithms 2024, 17(12), 552; https://doi.org/10.3390/a17120552 - 3 Dec 2024
Viewed by 143
Abstract
A temporal graph network (TGN) algorithm is introduced to identify fraudulent activities within a digital platform. The central premise is that digital transactions can be modeled via a graph network where various entities interact. The data used to build an event-based temporal graph [...] Read more.
A temporal graph network (TGN) algorithm is introduced to identify fraudulent activities within a digital platform. The central premise is that digital transactions can be modeled via a graph network where various entities interact. The data used to build an event-based temporal graph (ETG) were sourced from an online payment platform and include details such as users, cards, devices, bank accounts, and features related to all these entities. Based on these data, seven distinct graphs were created; the first three represent individual interaction events (card registration, device registration, and bank account registration), while the remaining four are combinations of these graphs (card–device, card–bank account, device–bank account, and card–device–bank account registration). This approach was adopted to determine if the graph’s structure influenced the detection of fraudulent transactions. The results demonstrate that integrating more interaction events into the graph enhances the metrics, meaning graphs containing more interaction events yield superior fraud detection results than those based on individual events. In addition, the data used in this work correspond to Latin American payment transactions, which is relevant in the context of fraud detection since this region has the highest fraud rate in the world, yet few studies have focused on this issue. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Diagram of the process followed by the MPTGNN. The process begins with the raw data provided by the payment platform. The data must be converted to an ETG to be processed by the algorithm. The steps described here summarize Algorithm 1.</p>
Full article ">Figure 2
<p>An example schema of the temporal graph with timestamps. The graph includes four distinct types of vertices: users (brown), devices (blue), cards (green), and bank accounts (orange). This particular graph represents the card–device–bank account registration, where each edge has an associated timestamp.</p>
Full article ">Figure 3
<p>Sample subgraph of the cards–devices–bank accounts graph. Gray vertices represent users, blue vertices are devices, green vertices are cards, and purple vertices are bank accounts. In this sample, it can be observed that users share devices (blue vertices) and bank accounts (purple vertices) more prominently than they do cards (green vertices). In addition, some users (gray vertices) act as bridges (long edges) between some connected components of the graph. Each edge has a corresponding timestamp (not shown in this image). This is not a general behavior; the figure is only intended as an example.</p>
Full article ">Figure 4
<p>AUC vs. edge-to-vertex ratio for the graphs with 43 edge features and 118 edge features. The considered features are related to user behaviors and transaction information in the online payment platform. It can be seen that if the graph density increases, the AUC increases linearly. The coefficient of determination <math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> is also reported. This also shows that aggregating more events (structural information) helps produce better metric results.</p>
Full article ">Figure 4 Cont.
<p>AUC vs. edge-to-vertex ratio for the graphs with 43 edge features and 118 edge features. The considered features are related to user behaviors and transaction information in the online payment platform. It can be seen that if the graph density increases, the AUC increases linearly. The coefficient of determination <math display="inline"><semantics> <msup> <mi>R</mi> <mn>2</mn> </msup> </semantics></math> is also reported. This also shows that aggregating more events (structural information) helps produce better metric results.</p>
Full article ">
17 pages, 6358 KiB  
Article
Continuous Multi-Target Approaching Control of Hyper-Redundant Manipulators Based on Reinforcement Learning
by Han Xu, Chen Xue, Quan Chen, Jun Yang and Bin Liang
Mathematics 2024, 12(23), 3822; https://doi.org/10.3390/math12233822 - 3 Dec 2024
Viewed by 152
Abstract
Hyper-redundant manipulators based on bionic structures offer superior dexterity due to their large number of degrees of freedom (DOFs) and slim bodies. However, controlling these manipulators is challenging because of infinite inverse kinematic solutions. In this paper, we present a novel reinforcement learning-based [...] Read more.
Hyper-redundant manipulators based on bionic structures offer superior dexterity due to their large number of degrees of freedom (DOFs) and slim bodies. However, controlling these manipulators is challenging because of infinite inverse kinematic solutions. In this paper, we present a novel reinforcement learning-based control method for hyper-redundant manipulators, integrating path and configuration planning. First, we introduced a deep reinforcement learning-based control method for a multi-target approach, eliminating the need for complicated reward engineering. Then, we optimized the network structure and joint space target points sampling to implement precise control. Furthermore, we designed a variable-reset cycle technique for a continuous multi-target approach without resetting the manipulator, enabling it to complete end-effector trajectory tracking tasks. Finally, we verified the proposed control method in a dynamic simulation environment. The results demonstrate the effectiveness of our approach, achieving a success rate of 98.32% with a 134% improvement using the variable-reset cycle technique. Full article
(This article belongs to the Special Issue Intelligent Control and Applications of Nonlinear Dynamic System)
Show Figures

Figure 1

Figure 1
<p>Overall model of the hyper-redundant manipulator.</p>
Full article ">Figure 2
<p>D-H coordinate frame of the hyper-redundant manipulator.</p>
Full article ">Figure 3
<p>Diagram of reinforcement learning process of this paper.</p>
Full article ">Figure 4
<p>Structure of the critic networks and actor networks. (<b>a</b>) DenseConnect. (<b>b</b>) SimpleDenseConnect.</p>
Full article ">Figure 5
<p>Distribution of the target points mapped to a workspace by different sampling in the joint space of a 12-link, 24-DOF, and hyper-redundant manipulator. (<b>a</b>) Normal Distribution I sampling. (<b>b</b>) Normal Distribution II sampling. (<b>c</b>) Uniform distribution sampling. (<b>d</b>) U-shaped distribution sampling.</p>
Full article ">Figure 6
<p>Different control tasks of the hyper-redundant manipulator. (<b>a</b>) Conventional multi-target approach control. (<b>b</b>) Continuous multi-target approach control.</p>
Full article ">Figure 7
<p>Problems of the direct samples from joint space. (<b>a</b>) Initial state model penetration. (<b>b</b>) Knotting. (<b>c</b>) Collision. (<b>d</b>) Inconsistent with reality.</p>
Full article ">Figure 8
<p>Performance of the 12-link, 24-DOF, and hyper-redundant manipulator on continuous multi-target approaching tasks trained by our method. (<b>a</b>) Circle on <math display="inline"><semantics> <mrow> <mi>Y</mi> <mi>O</mi> <mi>Z</mi> </mrow> </semantics></math> plane. (<b>b</b>) Circle on <math display="inline"><semantics> <mrow> <mi>X</mi> <mi>O</mi> <mi>Y</mi> </mrow> </semantics></math> plane. (<b>c</b>) Custom shape on <math display="inline"><semantics> <mrow> <mi>Y</mi> <mi>O</mi> <mi>Z</mi> </mrow> </semantics></math> plane.</p>
Full article ">Figure 9
<p>Performance of the 12-link, 24-DOF, and hyper-redundant manipulator on continuous multi-target approaching tasks trained by each episode reset. (<b>a</b>) TD3. (<b>b</b>) PPO.</p>
Full article ">Figure 10
<p>Training results of the different network structures under different control accuracies.</p>
Full article ">Figure 11
<p>Performance of the 12-link, 24-DOF, and hyper-redundant manipulator on the continuous multi-target approaching tasks trained by each episode reset. (<b>a</b>) Circle on <math display="inline"><semantics> <mrow> <mi>Y</mi> <mi>O</mi> <mi>Z</mi> </mrow> </semantics></math> plane. (<b>b</b>) Circle on <math display="inline"><semantics> <mrow> <mi>X</mi> <mi>O</mi> <mi>Y</mi> </mrow> </semantics></math> plane.</p>
Full article ">Figure 12
<p>Training effect of the planar hyper-redundant manipulator with 2-to-12 DOFs that were trained by never resetting.</p>
Full article ">Figure 13
<p>Training effect of the hyper-redundant manipulator by fixed-cycle reset. (<b>a</b>) Planar manipulator with 10 DOFs. (<b>b</b>) 3D manipulators with 4-to-20 DOFs.</p>
Full article ">
9 pages, 6603 KiB  
Proceeding Paper
Spatially Seamless Downscaling of a SMAP Soil Moisture Product Through a CNN-Based Approach with Integrated Multi-Source Remote Sensing Data
by Yan Jin, Haoyu Fan, Zeshuo Li and Yaojie Liu
Proceedings 2024, 110(1), 8; https://doi.org/10.3390/proceedings2024110008 - 3 Dec 2024
Viewed by 49
Abstract
Surface soil moisture (SSM) is crucial for understanding terrestrial hydrological processes. Despite its widespread use since 2015, the Soil Moisture Active and Passive (SMAP) SSM dataset faces challenges due to its inherent low spatial resolution and data gaps. This study addresses these limitations [...] Read more.
Surface soil moisture (SSM) is crucial for understanding terrestrial hydrological processes. Despite its widespread use since 2015, the Soil Moisture Active and Passive (SMAP) SSM dataset faces challenges due to its inherent low spatial resolution and data gaps. This study addresses these limitations through a deep learning approach aimed at interpolating missing values and downscaling soil moisture data. The result is a seamless, daily 1 km resolution SSM dataset for China, spanning from 1 January 2016 to 31 December 2022. For the original 9 km daily SMAP products, a convolutional neural network (CNN) with residual connections was employed to achieve the spatially seamless 9 km SSM data, integrating multi-source remote sensing data. Subsequently, auxiliary data including land cover, land surface temperatures, vegetation indices, vegetation temperature drought indices, elevation, and soil texture were integrated into the CNN-based downscaling model to generate the spatially seamless 1 km SSM. Comparative analysis of the spatially seamless 9 km and 1 km SSM datasets with ground observations yielded unbiased root mean square error values of 0.09 cm3/cm3 for both, demonstrating the effectiveness of the downscaling method. This approach provides a promising solution for generating high-resolution, spatially seamless soil moisture data to meet the needs of hydrological, meteorological, and agricultural applications. Full article
Show Figures

Figure 1

Figure 1
<p>Study area and locations of the ground stations. The label in the figure represents the network name, which refers to the specific monitoring networks included in ISMN. Each network consists of multiple sites.</p>
Full article ">Figure 2
<p>Model structure of the developed TsSMN.</p>
Full article ">Figure 3
<p>SSM images for 25 June 2018: original SMAP data, spatially seamless 9 km SSM predictions, and downscaled spatially seamless 1 km SSM data.</p>
Full article ">Figure 4
<p>Scatter plots comparing the ground observations with three different 9 km SSM datasets. The dashed line in the figure represents the situation where the predicted value is equal to the actual value, the solid line is the equation obtained by linear regression of the scatter plot, and the values in the figure represent the difference in vertical distance from the point to the regression equation line.</p>
Full article ">Figure 5
<p>Time series comparison of SSM data derived at four ground stations: ground observations (In Situ), original SMAP, TsSMN-based 9 km predictions, SMN-based 9 km predictions, and downscaled 1 km predictions.</p>
Full article ">Figure 6
<p>Scatter plot comparing ground observations with the downscaled 1 km predictions.</p>
Full article ">
16 pages, 3705 KiB  
Article
Multimodal Contrastive Learning for Remote Sensing Image Feature Extraction Based on Relaxed Positive Samples
by Zhenshi Zhang, Qiujun Li, Wenxuan Jing, Guangjun He, Lili Zhu and Shijuan Gao
Sensors 2024, 24(23), 7719; https://doi.org/10.3390/s24237719 (registering DOI) - 3 Dec 2024
Viewed by 180
Abstract
Traditional multimodal contrastive learning brings text and its corresponding image closer together as a positive pair, where the text typically consists of fixed sentence structures or specific descriptive statements, and the image features are generally global features (with some fine-grained work using local [...] Read more.
Traditional multimodal contrastive learning brings text and its corresponding image closer together as a positive pair, where the text typically consists of fixed sentence structures or specific descriptive statements, and the image features are generally global features (with some fine-grained work using local features). Similar to unimodal self-supervised contrastive learning, this approach can be seen as enforcing a strict identity constraint in a multimodal context. However, due to the inherent complexity of remote sensing images, which cannot be easily described in a single sentence, and the fact that remote sensing images contain rich ancillary information beyond just object features, this strict identity constraint may be insufficient. To fully leverage the characteristics of remote sensing images, we propose a multimodal contrastive learning method for remote sensing image feature extraction, based on positive sample tripartite relaxation, where the model is relaxed in three aspects. The first aspect of relaxation involves both the text and image inputs. By introducing learnable parameters in the language and image branches, instead of relying on fixed sentence structures and fixed image features, the network can achieve a more flexible description of remote sensing images in text and extract ancillary information from the image features, thereby relaxing the input constraints. Second relaxation is achieved through multimodal alignment of various features. By aligning semantic information with the corresponding semantic regions in the images, the method allows for the relaxation of local image features under semantic constraints. This approach addresses the issue of selecting image patches in unimodal settings, where there is no semantic constraint. The proposed method for remote sensing image feature extraction has been validated on four datasets. On the PatternNet dataset, it achieved a 91.1% accuracy with just one-shot. Full article
(This article belongs to the Section Remote Sensors)
Show Figures

Figure 1

Figure 1
<p>Overall structure diagram of MRiSSNet.</p>
Full article ">Figure 2
<p>Language Prompt Diagram: the left side represents the previous prompt method, and the right side represents our prompt method.</p>
Full article ">Figure 3
<p>Visual Prompt Diagram: the left side represents the previous prompt method, and the right side represents our prompt method.</p>
Full article ">Figure 4
<p>Relaxed identity positive sample selection under semantic guidance, where the red parts represent the top k image patches most similar to the semantics.</p>
Full article ">Figure 5
<p>Dataset visualization results.</p>
Full article ">Figure 6
<p>Experimental results of various methods on different datasets for 2/4/8/16 shots.</p>
Full article ">Figure 7
<p>Visualization of results for relaxed identity sample selection under semantic guidance.</p>
Full article ">
24 pages, 2138 KiB  
Article
A Multimodal Machine Learning Model in Pneumonia Patients Hospital Length of Stay Prediction
by Anna Annunziata, Salvatore Cappabianca, Salvatore Capuozzo, Nicola Coppola, Camilla Di Somma, Ludovico Docimo, Giuseppe Fiorentino, Michela Gravina, Lidia Marassi, Stefano Marrone, Domenico Parmeggiani, Giorgio Emanuele Polistina, Alfonso Reginelli, Caterina Sagnelli and Carlo Sansone
Big Data Cogn. Comput. 2024, 8(12), 178; https://doi.org/10.3390/bdcc8120178 - 3 Dec 2024
Viewed by 191
Abstract
Hospital overcrowding, driven by both structural management challenges and widespread medical emergencies, has prompted extensive research into machine learning (ML) solutions for predicting patient length of stay (LOS) to optimize bed allocation. While many existing models simplify the LOS prediction problem to a [...] Read more.
Hospital overcrowding, driven by both structural management challenges and widespread medical emergencies, has prompted extensive research into machine learning (ML) solutions for predicting patient length of stay (LOS) to optimize bed allocation. While many existing models simplify the LOS prediction problem to a classification task, predicting broad ranges of hospital days, an exact day-based regression model is often crucial for precise planning. Additionally, available data are typically limited and heterogeneous, often collected from a small patient cohort. To address these challenges, we present a novel multimodal ML framework that combines imaging and clinical data to enhance LOS prediction accuracy. Specifically, our approach uses the following: (i) feature extraction from chest CT scans via a convolutional neural network (CNN), (ii) their integration with clinically relevant tabular data from patient exams, refined through a feature selection system to retain only significant predictors. As a case study, we applied this framework to pneumonia patient data collected during the COVID-19 pandemic at two hospitals in Naples, Italy—one specializing in infectious diseases and the other general-purpose. Under our experimental setup, the proposed system achieved an average prediction error of only three days, demonstrating its potential to improve patient flow management in critical care environments. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Complete dataset distribution on outcome output, where patients with value 0 have been dismissed, with value 1 are deceased without being in intensive care unit, with value 2 are deceased after being in intensive care unit. (<b>b</b>) Complete dataset distribution on LOS output.</p>
Full article ">Figure 2
<p>Complete dataset distribution on range output.</p>
Full article ">Figure 3
<p>(<b>a</b>) Vanvitelli dataset distribution on gender feature. (<b>b</b>) Cotugno dataset distribution on gender feature.</p>
Full article ">Figure 4
<p>(<b>a</b>) Vanvitelli dataset distribution on age feature. (<b>b</b>) Cotugno dataset distribution on age feature.</p>
Full article ">Figure 5
<p>(<b>a</b>) Vanvitelli dataset distribution on CT machine model feature. (<b>b</b>) Cotugno dataset distribution on CT machine model feature.</p>
Full article ">Figure 6
<p>Vanvitelli dataset correlation matrix.</p>
Full article ">Figure 7
<p>Cotugno dataset correlation matrix.</p>
Full article ">Figure 8
<p>Complete dataset correlation matrix.</p>
Full article ">Figure 9
<p>The original Vanvitelli and Cotugno datasets consist of patients’ lung CT scans and raw clinical data. To extract relevant features, we process 3D CT volumes using a 3D-CNN to obtain three-dimensional tabular features. Additionally, the slice with the highest count of non-zero pixels is identified from each CT volume and processed via a 2D-CNN to extract two-dimensional tabular features. Concurrently, the raw clinical tabular data are pre-processed to generate clinically useful features. The final, consolidated dataset—referred to as the Complete dataset—is formed by concatenating patient data from both Vanvitelli and Cotugno sources across all feature sets. Features are color-coded by dataset origin: green for Vanvitelli, orange for Cotugno, and sky blue for the Complete dataset.</p>
Full article ">Figure 10
<p>Models training workflow. The last block contains the list of all the state-of-the-art ML models, in particular classification ones for Outcome and Days Range prediction and regression ones for Length of Stay estimation. The prediction task can be Length of stay estimation, Outcome or Days range prediction, the extracted features can be 3D, 2D or Tabular, according to the extraction process shown in <a href="#BDCC-08-00178-f009" class="html-fig">Figure 9</a>, and the dataset source can be Vanvitelli, Cotugno, or Complete.</p>
Full article ">Figure 11
<p>Architecture of the ResNet50 model with the extra fully connected layer at the end, marked in orange.</p>
Full article ">Figure 12
<p>Distributions of a subset sample over days range and LOS before and after applying SMOTE on days range.</p>
Full article ">
24 pages, 3608 KiB  
Article
Predicting the Performance of Students Using Deep Ensemble Learning
by Bo Tang, Senlin Li and Changhua Zhao
J. Intell. 2024, 12(12), 124; https://doi.org/10.3390/jintelligence12120124 - 3 Dec 2024
Viewed by 190
Abstract
Universities and schools rely heavily on the ability to forecast student performance, as it enables them to develop efficient strategies for enhancing academic results and averting student attrition. The automation of processes and the management of large datasets generated by technology-enhanced learning tools [...] Read more.
Universities and schools rely heavily on the ability to forecast student performance, as it enables them to develop efficient strategies for enhancing academic results and averting student attrition. The automation of processes and the management of large datasets generated by technology-enhanced learning tools can facilitate the analysis and processing of these data, which provides crucial insights into the knowledge of students and their engagement with academic endeavors. The method under consideration aims to forecast the academic achievement of students through an ensemble of deep neural networks. The proposed method presents a new feature-ranking mechanism based on existing approaches. This mechanism is effective in identifying the most pertinent features and their correlation with the academic performance of students. The proposed method employs an optimization strategy to concurrently configure and train the deep neural networks within our ensemble system. Furthermore, the proposed ensemble model uses weighted voting among its learning components for more accurate prediction. Put simply, the suggested approach enhances the accuracy of academic performance predictions for students not only by employing weighted ensemble techniques, but also by optimizing the parameters of deep learning models. These experimental outcomes provide evidence that the proposed method outperformed the alternative approaches, accurately predicting student performance with a root-mean-square error (RMSE) value of 1.66, a Mean Absolute Percentage Error (MAPE) value of 9.75, and an R-squared value of 0.7430. These results show a significant improvement compared to the null model (RMSE = 4.05, MAPE = 24.89, and R-squared = 0.2897) and prove the efficiency of the techniques employed in the proposed method. Full article
Show Figures

Figure 1

Figure 1
<p>A diagram of the proposed method.</p>
Full article ">Figure 2
<p>An example response vector for determining the topology and weight vector of a DBN.</p>
Full article ">Figure 3
<p>Details of selected features in each iteration of the experiments.</p>
Full article ">Figure 4
<p>Real values of target variable versus values predicted by different algorithms.</p>
Full article ">Figure 5
<p>Performance evaluation of proposed method in comparison with the methods of <a href="#B35-jintelligence-12-00124" class="html-bibr">Pallathadka et al.</a> (<a href="#B35-jintelligence-12-00124" class="html-bibr">2023</a>), <a href="#B30-jintelligence-12-00124" class="html-bibr">Lau et al.</a> (<a href="#B30-jintelligence-12-00124" class="html-bibr">2019</a>), and <a href="#B9-jintelligence-12-00124" class="html-bibr">Beckham et al.</a> (<a href="#B9-jintelligence-12-00124" class="html-bibr">2023</a>) based on MAPE: (<b>a</b>) MAPE values in each iteration and (<b>b</b>) box plot of MAPE after 10 iterations.</p>
Full article ">Figure 6
<p>Performance evaluation of proposed method in comparison with the methods of <a href="#B35-jintelligence-12-00124" class="html-bibr">Pallathadka et al.</a> (<a href="#B35-jintelligence-12-00124" class="html-bibr">2023</a>), <a href="#B30-jintelligence-12-00124" class="html-bibr">Lau et al.</a> (<a href="#B30-jintelligence-12-00124" class="html-bibr">2019</a>), and <a href="#B9-jintelligence-12-00124" class="html-bibr">Beckham et al.</a> (<a href="#B9-jintelligence-12-00124" class="html-bibr">2023</a>) based on RMSE: (<b>a</b>) RMSE values in each iteration and (<b>b</b>) box plot of RMSE after 10 iterations.</p>
Full article ">Figure 7
<p>Regression plots of the proposed method and the methods of <a href="#B35-jintelligence-12-00124" class="html-bibr">Pallathadka et al.</a> (<a href="#B35-jintelligence-12-00124" class="html-bibr">2023</a>), <a href="#B30-jintelligence-12-00124" class="html-bibr">Lau et al.</a> (<a href="#B30-jintelligence-12-00124" class="html-bibr">2019</a>), and <a href="#B9-jintelligence-12-00124" class="html-bibr">Beckham et al.</a> (<a href="#B9-jintelligence-12-00124" class="html-bibr">2023</a>) for predicting the target variable.</p>
Full article ">Figure 8
<p>A Taylor diagram of the proposed method and the methods of <a href="#B35-jintelligence-12-00124" class="html-bibr">Pallathadka et al.</a> (<a href="#B35-jintelligence-12-00124" class="html-bibr">2023</a>), <a href="#B30-jintelligence-12-00124" class="html-bibr">Lau et al.</a> (<a href="#B30-jintelligence-12-00124" class="html-bibr">2019</a>), and <a href="#B9-jintelligence-12-00124" class="html-bibr">Beckham et al.</a> (<a href="#B9-jintelligence-12-00124" class="html-bibr">2023</a>) for predicting the target variable.</p>
Full article ">Figure 9
<p>A performance comparison of the proposed method and the methods of <a href="#B35-jintelligence-12-00124" class="html-bibr">Pallathadka et al.</a> (<a href="#B35-jintelligence-12-00124" class="html-bibr">2023</a>), <a href="#B30-jintelligence-12-00124" class="html-bibr">Lau et al.</a> (<a href="#B30-jintelligence-12-00124" class="html-bibr">2019</a>), and <a href="#B9-jintelligence-12-00124" class="html-bibr">Beckham et al.</a> (<a href="#B9-jintelligence-12-00124" class="html-bibr">2023</a>) based on the criteria R<sup>2</sup>, PLCC, SROCC, and CCC.</p>
Full article ">
Back to TopTop