This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec...
详细信息
Evolutionary machine learning has drawn much attentions on solving data-driven learning problem in the past decades, where classification is a major branch of data-driven learning problem. To improve the quality of ob...
详细信息
Evolutionary machine learning has drawn much attentions on solving data-driven learning problem in the past decades, where classification is a major branch of data-driven learning problem. To improve the quality of obtained classifier, ensemble is a simple yet powerful strategy. However, gathering classifiers for ensemble requires multiple runs of learning process which bring additional cost at evaluation on the data. This study proposes an innovative framework for ensemble learning through evolutionary multitasking, i.e., the evolutionary multitasking for ensemble learning (EMTEL). There are four main features in the EMTEL. First, the EMTEL formulates a classification problem as a dynamic multitask optimization problem. Second, the EMTEL utilizes evolutionary multitasking to resolve the dynamic multitask optimization problem for better convergence through the synergy of common properties hidden in the tasks. Third, the EMTEL incorporates evolutionary instance selection for saving the cost at evaluation. Finally, the EMTEL formulates the ensemble learning problem as a numerical optimization problem and proposes an online ensemble aggregation approach to simultaneously select appropriate ensemble candidates from learning history and optimize ensemble weights for aggregating predictions. A case study is investigated by integrating two state-of-the-art methods for evolutionary multitasking and evolutionary instance selection respectively, i.e., the symbiosis in biocoenosis optimization and cooperative evolutionary learning and instance selection. For online ensemble aggregation, this study adopts the well-known covariance matrix adaptation evolution strategy. Experiments validate the effectiveness of the EMTEL over conventional and advanced evolutionary machine learning algorithms, including genetic programming, self-learning gene expression programming, and multi-dimensional genetic programming. Experimental results show that the proposed framework ameliorates state-o
Wireless sensor networks (WSNs) play a vital role in modern research and applications due to their potential to gather data from various environments. Because sensor nodes (SNs) within WSNs have limited battery life, ...
详细信息
In recent years, object detection (OD) has become essential in computer vision for identifying and localizing objects in digital images, prompting various sectors to adopt this technology. However, increased reliance ...
详细信息
In recent years, object detection (OD) has become essential in computer vision for identifying and localizing objects in digital images, prompting various sectors to adopt this technology. However, increased reliance on OD has also revealed vulnerabilities to attacks, highlighting the need for effective detection methods to mitigate potential risks. Therefore, the present paper primarily surveys existing studies on OD in the context of security and surveillance, highlighting its significance in these critical areas. The discussion includes an examination of conventional techniques such as HOG, DPM, and the Viola‒Jones detector. While these traditional methods have laid the groundwork for object detection, they are often considered inadequate because of their time-consuming and labor-intensive nature. Consequently, the focus shifts to DL (deep learning)-based OD models such as YOLO (you only look once), single shot detector (SSD), and Fast R-CNN. Among these, the present survey paper emphasizes YOLO models for their speed and efficiency, as they utilize a unified architecture for both region proposal and classification, making them particularly suitable for real-time applications. However, the distinguishing feature of the proposed survey lies in its comprehensive coverage, which not only encompasses YOLO models but also integrates an analysis of generative AI (GenAI) models and metaheuristic approaches. This multifaceted exploration allows for a richer understanding of the current landscape in computer vision and AI, highlighting the synergies and potential applications that arise from combining these diverse methodologies. Furthermore, the paper explores a wide range of applications for OD in real-time security and surveillance settings, illustrating its effectiveness in addressing contemporary security challenges. This highlights how advanced OD techniques can enhance situational awareness and response capabilities in various scenarios. By focusing on these aspect
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
The brain is the central part of the body that controls the overall functionality of the human body. The formulation of abnormal cells in the brain may lead to a brain tumor. Manual examination of a brain tumor is cha...
详细信息
With the continuous growth of the population, crowd counting plays a crucial role in intelligent monitoring systems for the Internet of Things (IoT) and smart city development. Accurate monitoring of crowd density not...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In...
详细信息
Efficient navigation of emergency response vehicles (ERVs) through urban congestion is crucial to life-saving efforts, yet traditional traffic systems often slow down their swift passage. In this work, we introduce Dy...
详细信息
暂无评论