An Attentive LSTM based approach for adverse drug reactions prediction
Adverse drug reactions (ADRs), which are harmful physical reactions of patients to drug treatments, are inherent to the nature of drugs; the reactions can occur with any drug and are becoming a leading cause of patient morbidity and mortality ...
Feature semantic space-based sim2real decision model
At present, the intelligent decision model of unmanned systems can only be applied to virtual scenes, which makes it difficult to migrate to real scenes because the image gap between virtual scenes and real scenes is relatively large. The main ...
Domestic pig sound classification based on TransformerCNN
Excellent performance has been demonstrated in implementing challenging agricultural production processes using modern information technology, especially in the use of artificial intelligence methods to improve modern production environments. ...
Reciprocal question representation learning network for visual dialog
Visual dialog task entails an agent to answer a series of questions based on an image and the dialog history. Biases are often observed when the agent over relies on the dialog history. Thus, balanced usage of dialog history is crucial. Existing ...
A relative labeling importance estimation algorithm based on global-local label correlations for multi-label learning
In multi-label learning, considering the relative importance between labels can yield better performance than considering the equal importance. To explore relative labeling importance, many existing algorithms introduce the global label ...
RSPMP: real-time semantic perception and motion planning for autonomous navigation of unmanned ground vehicle in off-road environments
Considering autonomous navigation of an unmanned ground vehicle (UGV) in off-road environments, it faces various problems, such as semantic perception and motion planning. This paper proposes an intelligent approach to perception and planning for ...
Boosted support vector machines with genetic selection
This paper describes the experimental studies of ensembles of binary classifiers conformed of individual support vector machines. The GenBoost-SVM method is proposed to construct such ensembles. Our ensembles considered an adaptive boosting ...
RBFPDet: An anchor-free helmet wearing detection method
Wearing a safety helmet can reduce the accident rate in production and construction, and it is a necessary part of safety production management. At present, the effective supervision of helmet wearing still relies on manual on-site work, which is ...
An incomplete probabilistic linguistic multi-attribute group decision making method based on a three-dimensional trust network
It is necessary to consider the trust relationship among experts in the process of group decision-making, however the trust network and preference information among experts may be incomplete. Therefore, this paper proposes an incomplete ...
Vote-based integration of review spam detection algorithms
Due to the growth of online review data, detecting fake or fraudulent reviews is becoming an urgent issue. One barrier to effective detection of fake reviews/reviewers is the great difficulty of collecting ground-truth data—fake reviews are hard ...
Hierarchical attention network for multivariate time series long-term forecasting
Multivariate time series long-term forecasting has always been the subject of research in various fields such as economics, finance, and traffic. In recent years, attention-based recurrent neural networks (RNNs) have received attention due to ...
TBDRI: block decomposition based on relational interaction for temporal knowledge graph completion
Knowledge graph completion (KGC) can be interpreted as the task of missing inferences to real-world facts. Despite the importance and abundance of temporal knowledge graphs, most of the current research has been focused on reasoning on static ...
Deep convolutional transfer learning-based structural damage detection with domain adaptation
Most data-driven structural damage detection methods are built upon the assumption that enough labeled data is available and both training and test data have the same underlying distribution, which limit their successful applications in practical ...
Network rule extraction under the network formal context based on three-way decision
Knowledge discovery combined with network structure is an emerging field of network data analysis and mining. Three-way concept analysis is a method that can fit the human mind in uncertain decisions and analysis. In reality, when three-way ...
SC2Net: Scale-aware Crowd Counting Network with Pyramid Dilated Convolution
Accurate crowd counting is still challenging due to the variations of crowd heads. Most of crowd counting methods adopt multi-branch networks to extract multi-scale information. However, these networks are too complex to be optimized. To solve ...
An estimation of distribution algorithm with multiple intensification strategies for two-stage hybrid flow-shop scheduling problem with sequence-dependent setup time
The estimation of distribution algorithm (EDA) has recently emerged as a promising alternative to the traditional evolutionary algorithms for solving combinatorial optimization problems. In this paper, an estimation of distribution algorithm with ...
Uncover the reasons for performance differences between measurement functions (Provably)
Recently, an exciting experimental conclusion in Li et al. (Knowl Inf Syst 62(2):611–637, 1) about measures of uncertainty for knowledge bases has attracted great research interest for many scholars. However, these efforts lack solid theoretical ...
A brain storm optimization algorithm with feature information knowledge and learning mechanism
Various optimization problems with multiple decision variables and complex constraints, which exist widely in the real world, are difficult to be solved by traditional methods. Brain storm optimization (BSO) algorithm, an advanced swarm ...
LDN-RC: a lightweight denoising network with residual connection to improve adversarial robustness
Deep neural networks (DNNs) are prone to produce incorrect prediction results under the attack of adversarial samples. To cope with this problem, some defense methods are presented. However, most of them are based on adversarial training, which ...
Accurate and fast time series classification based on compressed random Shapelet Forest
Achieving accurate, fast, and interpretable time series classification (TSC) has attracted considerable attention from the data mining community over the past decades. In this paper, we propose an efficient algorithm, called Compressed Random ...
A multi-scale gated network for retinal hemorrhage detection
Retinal hemorrhage detection is of great significance for clinical diagnosis and disease control. However, most of the traditional methods need to obtain candidate lesions firstly, and then determine the true lesions. To address this problem, we ...
Weighted mean field reinforcement learning for large-scale UAV swarm confrontation
Finding the optimal game strategy is a difficult problem in unmanned aerial vehicle (UAV) swarm confrontation. As an effective solution to the sequential decision-making problem, multi-agent reinforcement learning (MARL) provides a promising way ...
Inference of isA commonsense knowledge with lexical taxonomy
Commonsense knowledge is a crucial resource to help the machine understand the human world. However, the conventional methods of extracting commonsense knowledge with isA relation (or isA commonsense knowledge) from text corpora generally do not ...
Physical-layer secret key generation based on domain-adversarial training of autoencoder for spatial correlated channels
As a novel approach to enhance information security, physical-layer key generation is based on the channel reciprocity and spatial decorrelation of the wireless channels between two legitimate sides. Due to the half-duplex mode of communication ...
Principal views selection based on growing graph convolution network for multi-view 3D model recognition
With the development of 3D technologies, 3D model recognition has attracted substantial attention in various areas, such as automatic driving, virtual/augmented reality, and computer-aided design. Many researchers are devoted to 3D model ...
Active constrained deep embedded clustering with dual source
Deep clustering using a deep neural network (DNN) is widely used for simultaneously learning feature representation and clustering. The existing constrained deep clustering methods utilize prior knowledge for improving deep clustering. However, ...
A DRL based cooperative approach for parking space allocation in an automated valet parking system
Automated valet parking (AVP) is one of the most advanced technologies for improving parking efficiency and security. However, in an AVP system, the traditional vehicle-side greedy search strategy for available parking spaces is likely to achieve ...
NOSMFuse: An infrared and visible image fusion approach based on norm optimization and slime mold architecture
In existing infrared and visible image fusion algorithms, it is usually difficult to maintain a good balance of meaningful information between two source images, which easily leads to the omission of important fractional information in a ...