Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 37, Issue 7July 2022
Publisher:
  • John Wiley and Sons Ltd.
  • Baffins Lane Chichester West Sussex PO19 1UD
  • United Kingdom
ISSN:0884-8173
Reflects downloads up to 25 Nov 2024Bibliometrics
Skip Table Of Content Section
front-matter
Issue Information
research-article
Pneumonia detection from lung X‐ray images using local search aided sine cosine algorithm based deep feature selection method
Abstract

Pneumonia is a major cause of death among children below the age of 5 years, globally. It is especially prevalent in developing and underdeveloped nations where the risk factors for the disease such as unhygienic living conditions, high levels of ...

research-article
DepNet: An automated industrial intelligent system using deep learning for video‐based depression analysis
Abstract

As a common mental disorder, depression has attracted many researchers from affective computing field to estimate the depression severity. However, existing approaches based on Deep Learning (DL) are mainly focused on single facial image without ...

research-article
Two‐parametric generalized fuzzy knowledge measure and accuracy measure with applications
Abstract

Fuzzy entropy concerning a fuzzy set computes the imprecision content of that set whereas the content of precision is evaluated by using the notion of fuzzy knowledge measure. In this paper, we suggest a two‐parametric version of the knowledge ...

research-article
Frequency tracking control of the WPT system based on fuzzy RBF neural network
Abstract

With the application of electrical equipment, magnetically coupled resonant (MCR) wireless power transfer (WPT) technology has become an effective means to improve equipment intelligence. The MCR‐WPT system is a loosely coupled system, and the ...

research-article
A hybrid ITLHHO algorithm for numerical and engineering optimization problems
Abstract

Harris hawks optimization (HHO) is one of the newest metaheuristic algorithms (MHAs) which mimic the interdependent behaviour and hunting style of Harris hawks in nature. It is an efficient swarm optimization technique that has been used to solve ...

research-article
Deep reinforcement learning for building honeypots against runtime DoS attack
Abstract

Honeypot is a network environment utilized to protect proper network sources from attacks. Honeypot makes an environment that attracts the attacker to pay their operations to steal sources. Denial of Service (DoS) attacks are efficiently noticed ...

research-article
Deterministic policy gradient algorithms for semi‐Markov decision processes
Abstract

A large class of sequential decision‐making problems under uncertainty, with broad applications from preventive maintenance to event‐triggered control can be modeled in the framework of semi‐Markov decision processes (SMDPs). Unlike Markov ...

research-article
Bidirectional GRU networks‐based next POI category prediction for healthcare
Abstract

The Corona Virus Disease 2019 has a great impact on public health and public psychology. People stay at home for a long time and rarely go out. With the improvement of the epidemic situation, people began to go to different places to check in. To ...

research-article
Semantic key generation based on natural language
Abstract

In recent years, the public has become more aware of security concerns, and the demand for convenient and efficient encryption technology has increased. Biological data is used in identity authentication and key generation as the innate ...

research-article
DRVAT: Exploring RSSI series representation and attention model for indoor positioning
Abstract

Although Bluetooth Low Energy (BLE) fingerprinting localization has become a hot research topic with encouraging results, it is difficult to predict the location depending on a short duration received signal strength indication (RSSI) sequence in ...

research-article
Multi‐scale feature learning and temporal probing strategy for one‐stage temporal action localization
Abstract

The aim of temporal action localization (TAL) is to determine the start and end frames of an action in a video. In recent years, TAL has attracted considerable attention because of its increasing applications in video understanding and retrieval. ...

research-article
Proportional hesitant 2‐tuple linguistic distance measurements and extended VIKOR method: Case study of evaluation and selection of green airport plans
Abstract

Building green airports can be regarded as among the most promising routes to sustainable development of ecosystems and human health. This study aims at addressing the problem of green airport plan selection under an uncertain context by ...

research-article
Exploration of novel optimal fuzzy‐based controller for enhancement of frequency regulation of deregulated hybrid power system with modified HVDC tie‐line
Abstract

Recent advancements in the power system put forth various challenges to frequency regulation studies. These challenges show an immense impact on the power system's inertia and load pattern. The traditional load frequency control (LFC) mechanism ...

research-article
Sailfish invasive weed optimization algorithm for multiple image sharing in cloud computing
Abstract

Visual cryptography (VC) is a secret sharing cryptographic technique, which permits visual information that is encrypted in such a way that the decrypted information shows the visual image. Security is the common problem that arises in the general ...

research-article
AutoML classifier clustering procedure
Abstract

Recommendation systems are one of the main applications of machine learning (ML) used across different industries. This paper presents a new automated machine learning (AutoML) method of providing recommendations by processing data sets using ML ...

research-article
Formalizing rough sets using a new noncontingency axiomatic system
Abstract

Formalization of rough sets is a key issue in rough set theory. When rough sets are formalized by propositional logic, predicate logic, or modal propositional logic, it easily suffers from some problems. For instance, an incomplete system is ...

research-article
IWA: Integrated gradient‐based white‐box attacks for fooling deep neural networks
Abstract

The widespread application of deep neural network (DNN) techniques is being challenged by adversarial examples—the legitimate input added with imperceptible and well‐designed perturbation that can fool DNNs easily in the DNN testing/deploying ...

research-article
Extended variational inference for Dirichlet process mixture of Beta‐Liouville distributions for proportional data modeling
Abstract

Bayesian estimation of parameters in the Dirichlet mixture process of the Beta‐Liouville distribution (i.e., the infinite Beta‐Liouville mixture model) has recently gained considerable attention due to its modeling capability for proportional ...

research-article
Network unknown‐threat detection based on a generative adversarial network and evolutionary algorithm
Abstract

Currently existing intrusion‐detection systems can only meet the needs of the people for defense against the known threat, and lag in the detection of the unknown threat. To solve this problem, this study considers that the character of an unknown ...

research-article
Fingerprint bio‐key generation based on a deep neural network
Abstract

With the increasing use of biometric identity authentication, biological key generation technology is receiving much attention. A high‐strength key that is easy to store and manage can be generated from biological characteristics, which can ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.