Issue Information
DepNet: An automated industrial intelligent system using deep learning for video‐based depression analysis
As a common mental disorder, depression has attracted many researchers from affective computing field to estimate the depression severity. However, existing approaches based on Deep Learning (DL) are mainly focused on single facial image without ...
Two‐parametric generalized fuzzy knowledge measure and accuracy measure with applications
Fuzzy entropy concerning a fuzzy set computes the imprecision content of that set whereas the content of precision is evaluated by using the notion of fuzzy knowledge measure. In this paper, we suggest a two‐parametric version of the knowledge ...
Frequency tracking control of the WPT system based on fuzzy RBF neural network
With the application of electrical equipment, magnetically coupled resonant (MCR) wireless power transfer (WPT) technology has become an effective means to improve equipment intelligence. The MCR‐WPT system is a loosely coupled system, and the ...
A hybrid ITLHHO algorithm for numerical and engineering optimization problems
Harris hawks optimization (HHO) is one of the newest metaheuristic algorithms (MHAs) which mimic the interdependent behaviour and hunting style of Harris hawks in nature. It is an efficient swarm optimization technique that has been used to solve ...
Deep reinforcement learning for building honeypots against runtime DoS attack
Honeypot is a network environment utilized to protect proper network sources from attacks. Honeypot makes an environment that attracts the attacker to pay their operations to steal sources. Denial of Service (DoS) attacks are efficiently noticed ...
Deterministic policy gradient algorithms for semi‐Markov decision processes
A large class of sequential decision‐making problems under uncertainty, with broad applications from preventive maintenance to event‐triggered control can be modeled in the framework of semi‐Markov decision processes (SMDPs). Unlike Markov ...
Bidirectional GRU networks‐based next POI category prediction for healthcare
- Yuwen Liu,
- Zuolong Song,
- Xiaolong Xu,
- Wajid Rafique,
- Xuyun Zhang,
- Jun Shen,
- Mohammad R. Khosravi,
- Lianyong Qi
The Corona Virus Disease 2019 has a great impact on public health and public psychology. People stay at home for a long time and rarely go out. With the improvement of the epidemic situation, people began to go to different places to check in. To ...
Semantic key generation based on natural language
In recent years, the public has become more aware of security concerns, and the demand for convenient and efficient encryption technology has increased. Biological data is used in identity authentication and key generation as the innate ...
DRVAT: Exploring RSSI series representation and attention model for indoor positioning
Although Bluetooth Low Energy (BLE) fingerprinting localization has become a hot research topic with encouraging results, it is difficult to predict the location depending on a short duration received signal strength indication (RSSI) sequence in ...
Multi‐scale feature learning and temporal probing strategy for one‐stage temporal action localization
The aim of temporal action localization (TAL) is to determine the start and end frames of an action in a video. In recent years, TAL has attracted considerable attention because of its increasing applications in video understanding and retrieval. ...
Proportional hesitant 2‐tuple linguistic distance measurements and extended VIKOR method: Case study of evaluation and selection of green airport plans
Building green airports can be regarded as among the most promising routes to sustainable development of ecosystems and human health. This study aims at addressing the problem of green airport plan selection under an uncertain context by ...
Exploration of novel optimal fuzzy‐based controller for enhancement of frequency regulation of deregulated hybrid power system with modified HVDC tie‐line
Recent advancements in the power system put forth various challenges to frequency regulation studies. These challenges show an immense impact on the power system's inertia and load pattern. The traditional load frequency control (LFC) mechanism ...
Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing
Visual cryptography (VC) is a secret sharing cryptographic technique, which permits visual information that is encrypted in such a way that the decrypted information shows the visual image. Security is the common problem that arises in the general ...
AutoML classifier clustering procedure
Recommendation systems are one of the main applications of machine learning (ML) used across different industries. This paper presents a new automated machine learning (AutoML) method of providing recommendations by processing data sets using ML ...
Formalizing rough sets using a new noncontingency axiomatic system
Formalization of rough sets is a key issue in rough set theory. When rough sets are formalized by propositional logic, predicate logic, or modal propositional logic, it easily suffers from some problems. For instance, an incomplete system is ...
IWA: Integrated gradient‐based white‐box attacks for fooling deep neural networks
The widespread application of deep neural network (DNN) techniques is being challenged by adversarial examples—the legitimate input added with imperceptible and well‐designed perturbation that can fool DNNs easily in the DNN testing/deploying ...
Extended variational inference for Dirichlet process mixture of Beta‐Liouville distributions for proportional data modeling
Bayesian estimation of parameters in the Dirichlet mixture process of the Beta‐Liouville distribution (i.e., the infinite Beta‐Liouville mixture model) has recently gained considerable attention due to its modeling capability for proportional ...
Network unknown‐threat detection based on a generative adversarial network and evolutionary algorithm
Currently existing intrusion‐detection systems can only meet the needs of the people for defense against the known threat, and lag in the detection of the unknown threat. To solve this problem, this study considers that the character of an unknown ...
Fingerprint bio‐key generation based on a deep neural network
With the increasing use of biometric identity authentication, biological key generation technology is receiving much attention. A high‐strength key that is easy to store and manage can be generated from biological characteristics, which can ...