Very short-term solar ultraviolet-A radiation forecasting system with cloud cover images and a Bayesian optimized interpretable artificial intelligence model
- Salvin Sanjesh Prasad,
- Ravinesh Chand Deo,
- Nathan James Downs,
- David Casillas-Pérez,
- Sancho Salcedo-Sanz,
- Alfio Venerando Parisi
High-dose single exposures of long-wavelength ultraviolet-A (UV-A) radiation may trigger severe biological and skin tissue damage in humans and animals, as well as photosynthetic damage in plants. In humans, the highly abundant UV-A is also ...
Graphical abstractDisplay Omitted
Highlights
- An interpretable AI method is designed to predict solar ultraviolet-A radiation.
- Deep learning ensemble approach is adopted to enhance forecasting performance.
- The model is optimized with neighborhood component analysis and ...
An improved two-archive artificial bee colony algorithm for many-objective optimization
Artificial bee colony (ABC) algorithm has shown good performance on many optimization problems. However, these problems mainly focus on single-objective and ordinary multi-objective optimization problems (MOPs). For many-objective optimization ...
Highlights
- Two archives namely convergence archive (CA) and diversity archive (DA) are introduced into ABC.
- Based on CA and DA, different search strategies are designed to enhance convergence or diversity.
- A new probability selection strategy ...
A volunteer allocation optimization model in response to major natural disasters based on improved Dempster–Shafer theory
Nowadays, factors such as global climate change, environmental damage, and the impact of human activities have led to an increase in natural disasters, and the frequency of natural disaster problems is increasing, which poses a great threat to ...
Highlights
- Propose effective methods for conflict evidence fusion based on differential evolution.
- Consider volunteers’ preferences, competencies and victims’ satisfaction in volunteer assignments.
- Use linguistic type-2 fuzzy sets and ...
Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics
Phishing websites distribute unsolicited content and are frequently used to commit email and internet fraud. Detecting them before any user information is submitted is critical. Several efforts have been made to detect these phishing websites in ...
Highlights
- WebPhish employs both raw URL and HTML content to detect phishing web pages.
- WebPhish uses character-level embeddings to enable the feature vectors to generalize to new data.
- Extensive experiments conducted on a real-world dataset ...
3D unsupervised anomaly detection through virtual multi-view projection and reconstruction: Clinical validation on low-dose chest computed tomography
Computer-aided diagnosis for low-dose computed tomography (CT) based on deep learning has recently attracted attention as a first-line automatic testing tool because of its high accuracy and low radiation exposure. We propose a method based on a ...
Highlights
- We proposed VMPR-UAD for anomaly detection and localization in 3D chest low-dose CT.
- VMPR-UAD utilized multi-view projection as a pre-processing technique.
- VMPR-UAD enabled 3D visualization of anomalies through post-processing ...
Adaptive stepsize estimation based accelerated gradient descent algorithm for fully complex-valued neural networks
Nesterov accelerated gradient (NAG) method is an efficient first-order algorithm for optimization problems. To ensure the convergence, it usually takes a relatively conservative constant as the stepsize. However, the choice of stepsize has a ...
Highlights
- Adaptive stepsize design methods without manual tuning are proposed for CNAG.
- Stepsize is obtained by estimating the norm of approximate Hessian matrix.
- Theoretical analysis is presented to support the validity of the design ...
EnsMulHateCyb: Multilingual hate speech and cyberbully detection in online social media
Nowadays, users across the globe interact with one another for information exchange, communication, and association on various online social media. However, some individuals exploit these venues for malicious practices like hate speech and ...
Highlights
- Proposed an ensemble DL multilingual model for hate speech & cyberbully detection.
- Model combines bagging, stacking, and super learning methods to improved results.
- Model adopts a light weight heterogeneous fusion and bagging-...
A multi-objective co-evolutionary algorithm for energy and cost-oriented mixed-model assembly line balancing with multi-skilled workers
Energy-saving, one of the most significant strategies for green manufacturing, has become the focus of more and more scholars and enterprise managers. Hence, this work addresses the minimization of energy and cost requirements on mixed-model ...
Highlights
- Define the MALBP-MW by a MILP model to minimize the energy and cost requirements.
- Design a new decoding with idle time reduction and a collaborative initialization.
- Propose four problem-specific evolutionary operators for MOCEA.
Exploring Multiple Hypergraphs for Heterogeneous Graph Neural Networks
Graph neural networks have demonstrated significant power in learning graph representations for homogeneous networks. However, real-world network data can often be denoted by heterogeneous networks with different types of nodes and edges, such as ...
Highlights
- The hypergraph can preserve high-order proximity and capture semantic interactions.
- Our model integrates multiple motif-based hypergraphs to cover all nodes in HIN.
- Attention mechanism aggregates node features based on importance ...
Generative adversarial nets for unsupervised outlier detection
- Unsupervised outlier detection with GAN networks.
- The GANs prefer to fit the normal object distributions to minimize error.
- The fake data generated by the GAN are used to train the autoencoder.
- A trained autoencoder can detect ...
Outlier detection, also known as anomaly detection, has been a persistent and active research area for decades due to its wide range of applications in various fields. Many well-established methods have difficulty fitting the distribution of high-...
Adaptive multi-scale attention convolution neural network for cross-domain fault diagnosis
This paper proposes a novel approach named adaptive multi-scale attention convolution neural network (AmaCNN) to accurately detect cross-domain faults with very few labelled data. In AmaCNN, multi-scale feature fusion CNN (MSFFCNN) with a multi-...
Container loading problem based on robotic loader system: An optimization approach
With the development of intelligent logistics technology, some companies began to use robots instead of humans to load cargo. This paper studies a novel container loading problem based on robotic loader system (CLP-RLS). Different from the ...
Highlights
- A novel container loading problem based on robotic loader system is studied.
- A tree search approach based on wall-building is proposed to solve this problem.
- The effectiveness of the proposed approach is verified through real-case ...
Secure and optimized satellite image sharing based on chaotic eπ map and Racah moments
- Hicham Karmouni,
- Mohamed Amine Tahiri,
- Idriss Dagal,
- Hicham Amakdouf,
- Mohamed Ouazzani Jamil,
- Hassan Qjidaa,
- Mhamed Sayyouri
The objective of this paper is to contribute to the sharing, transfer, and secured indexing of large color images. Watermarking and digital encryption have emerged as alternative and complementary solutions to ensure authorized access, facilitate ...
Integration of strategic and operational attributes to calculate the optimal cultivation of crops
Determining the optimal quantity of crops is crucial for establishing a sustainable cultivation pattern when multiple potential crops are available. To address this issue, we propose a novel hybrid multi-attribute optimization model (MAOM) based ...
A novel prediction model construction and result interpretation method for slope deformation of deep excavated expansive soil canals
Several giant water diversion projects go through large expansive soil areas in China. It is challenging to ensure the slope stability of the deep excavated expansive soil canal segments due to its undesirable geologic, and physical and ...
Consistent penalizing field loss for zero-shot image retrieval
Zero-shot image retrieval involves retrieving images of unseen classes using a query image of the same class. To determine whether a given image is of the same class as the query image, a universal threshold of similarity measures is needed, as ...
Highlights
- A novel Consistent Penalizing Field Loss is proposed for zero-shot image retrieval.
- No-gradient weighting mechanism explicitly separates the weighting and loss items.
- A dice-like mechanism leverages the loss elements of positive ...
Multi-site solar irradiance forecasting based on adaptive spatiotemporal graph convolutional network
Accurate solar irradiance forecasting with fine spatiotemporal correlations is essential for photovoltaic power generation. However, current spatiotemporal methods are unable to extract spatial features appropriately, leading to rough prediction ...
Potential sources of sensor data anomalies for autonomous vehicles: An overview from road vehicle safety perspective
Outstanding steps towards intelligent transportation systems with autonomous vehicles have been taken in the past few years. Nevertheless, the safety issue in autonomous vehicles is critical and remains to be fully solved. Sensor data provide ...
Multilingual personalized hashtag recommendation for low resource Indic languages using graph-based deep neural network
Users from different cultures and backgrounds often feel comfortable expressing their thoughts on trending topics by generating content in their regional languages. Recently, there has been an explosion in multilingual information, and a massive ...
Highlights
- We recommend multilingual personalized hashtags for low-resource Indic languages.
- We devised a novel way of attending to users’ topical and linguistic preferences.
- We capture relatedness among languages of same family using a graph ...
A cognitive analysis-based key concepts derivation approach for product design
In the development of a new product, concept generation is a crucial stage, as it determines much of the cost of the product lifetime. The process of generating concepts that meet customer requirements, however, can be challenging due to ...
Highlights
- We established a cognitive analysis-based approach for deriving key concepts.
- This approach can identify the most important concepts in the product design.
- We verified the approach in an analogy-based verbal protocol analysis ...
A label-relevance multi-direction interaction network with enhanced deformable convolution for forest smoke recognition
Forest fires pose a significant threat to both the economy and ecology, causing extensive damage. Smoke serves as a crucial indicator of forest fires, often appearing before the actual fire. However, existing methods for smoke recognition are ...
Causal carbon price interval prediction using lower upper bound estimation combined with asymmetric multi-objective evolutionary algorithm and long short-term memory
Recently the interval forecasting of carbon price is investigated by advanced research since it can better quantify the uncertainty and reliability of the forecast value in comparison with point forecasting. However, this kind of model is always ...
Online modeling and prediction of weld bead geometry in robotic gas metal arc based additive manufacturing using grey prediction model
- Online monitoring system was built and monitored weld bead size using OGM(1,N).
- The OGM(1,N) was trained with small number of samples with zero training time.
- Weld bead was controlled by the proposed methodology.
- A suitable ...
In the directed energy deposition process, online monitoring of weld bead geometry can give real-time information to researchers and manufacturers to understand and control the metal deposition layer by layer. In the current work, an optimization ...
Truth based three-tier Combinatorial Multi-Armed Bandit ecosystems for mobile crowdsensing
Many Multi-Armed Bandit (MAB) based workers selection schemes have been proposed to select high-quality workers to enhance the quality of tasks. However, in Mobile Crowd Sensing (MCS), a complex mutual effect exists among task requestors, the MCS ...
Enabling secure image transmission in unmanned aerial vehicle using digital image watermarking with H-Grey optimization
Drone technology, also known as Unmanned Aerial Vehicles (UAVs), has advanced rapidly in the last decade owing to the huge number of users. This approach has an immense opportunity in areas like healthcare, agriculture, and forestry. However, the ...
Highlights
- UAV technology has seen rapid development in recent years.
- Lack of security solutions in UAVs leads to vulnerabilities in digital image transmission.
- Image Watermarking is a viable solution for digital image transmission in UAV ...
Quantum-inspired particle swarm optimization for efficient IoT service placement in edge computing systems
With the advancement of the 5G networks, edge computing (EC) assisted Internet of Things (IoT) based applications demand real-time computation and high-volume data-intensive services. Due to the heterogeneity and limited resources of the edge ...
Highlights
- A Quantum-Inspired PSO is proposed to address IoT service placement.
- Quantum particle is designed to represent complete IoT service placement solution.
- The decoding of quantum particle is done using a novel double-hashing ...
Recommendations with minimum exposure guarantees: A post-processing framework
Relevance-based ranking is a popular ingredient in recommenders, but it frequently struggles to meet fairness criteria because social and cultural norms may favor some item groups over others. For instance, some items might receive lower ratings ...
Highlights
- A novel integer linear programming model to produce fair recommendation lists.
- Our post processing approach provides minimum exposure guarantees.
- We introduce and analyze two fairness raking-based constraints.
- We attest the ...
Dung beetle optimization algorithm based on quantum computing and multi-strategy fusion for solving engineering problems
The Dung beetle optimization algorithm is a kind of group intelligence optimization algorithm proposed by Jiankai Xue in 2022, which has the characteristics of strong optimization-seeking ability and fast convergence but suffers from the defect ...
Highlights
- Good point set strategy for initializing populations.
- Multi-strategy fusion balancing pre-global exploration and post-local search.
- Quantum computing interferes with t-distribution variation strategies.
A Genetic Algorithm-based sequential instance selection framework for ensemble learning
The accumulation of large amounts of historical data has led to the wide application of ensemble learning over the past few decades, but the balance between the individual accuracy of base classifiers (BCs) and the diversity among these BCs is ...