首页期刊导航|Expert systems with applications
期刊信息/Journal information
Expert systems with applications
Pergamon
Expert systems with applications

Pergamon

双月刊

0957-4174

Expert systems with applications/Journal Expert systems with applicationsSCIISTPEIAHCI
正式出版
收录年代

    Vehicle routing problem for cold-chain drug distribution with epidemic spread situation

    Jie ZhangYanfeng Li
    125186.1-125186.15页
    查看更多>>摘要:We investigate a vehicle routing problem considering the influence of epidemic spread (VRP-ES) for the design of a novel cold-chain drug distribution system, in which the disease spread model is used to capture virus transmission characteristics and demand fluctuations. To this end, we aim to minimize the total travel time and transmission risk of the distribution network by incorporating realistic features including priority distribution and temperature control. We propose a hybrid tabu search heuristic (HTS) with a specifically designed initial solution, several neighborhood operators, and diversification strategies to solve this problem. A series of numerical experiments are conducted to test the proposed solution methodology. The virus spread model and vehicle routing results are discussed to analyze the VRP-ES optimization strategies through an empirical case study of Chongqing city in China. Sensitivity analysis is conducted to identify the impact of various parameters on the VRP-ES and provide some management implications as well.

    A stratified review of COVID-19 infection forecasting and an efficient methodology using multiple domain-based transfer learning

    Sandeep KumarSonakshi GargPranab K. Muhuri
    125277.1-125277.20页
    查看更多>>摘要:The initial outbreak of COVID-19 was reported in December 2019, China;. The pandemic has led to unforeseen challenges, causing unimaginable devastation of the economic and social disruption since its inception. An effective approach for forecasting infections will be beneficial for the health sector and administration in better strategic planning and proficient management of all necessary schemes towards preventive and curative treatments. Most existing studies consider image dataset for COVID-19 prediction, whereas studies involving structural data are very rare. Thus, initially the main focus of this paper is to provide an exhaustive review that discusses about COVID-19 forecasting papers with emphasis on structural data. Then, this paper introduces a pioneering approach to COVID-19 infection forecasting, utilizing structural datasets instead of traditional image datasets. It presents a novel multi-source transfer-learning framework to enhance prediction accuracy, integrating demographic, economic, and COVID-19 data for intra-provincial spread forecasts. The COVID-19 forecasting depends on several parameters such as its current statistics, geographical area, population density and economic status like GDP etc. However, the dataset generated for an individual province of a country is alone inadequate for the precise forecast, as it faces data scarcity. Thus, transfer learning helps in such cases, where the dataset has been collected from multiple provinces. Since, it is a time-series data, thus we also consider lagged features for efficient prediction of COVID cases. Thus, apart from the detailed review, this study also aims to develop robust machine learning models by proposing a novel and efficient multi-source transfer learning technique for accurate forecasting of COVID-19 in a province. The proposed approach has been evaluated over a wide range of datasets involving sixty-two different provinces belonging to a diverse set of countries. We also performed hyperparameter tuning using Bayesian optimisation to optimise the machine learning models used. Later, we performed Friedman and Nemenyi test to compare the results generated from different models. Empirical evidence proved that forecasting using the proposed approach is much more precise with the simpler models such as decision trees as compared to complex models. In cases of data scarcity, when target domain data could not be used for training/fine-tuning the models, simpler models are far more powerful due to their generalization capabilities than complex models. Hence, the proposed methodology is promising and valuable for governments and organizations to deal with the challenges of any pandemic outbreak for better healthcare planning and management, even when the data is in scarcity.

    A spatiotemporal separable graph convolutional network for oddball paradigm classification under different cognitive-load scenarios

    Yuangan LiKe LiShaofan WangHaopeng Wu...
    125303.1-125303.13页
    查看更多>>摘要:The application of flight automation systems has increased the demand for detecting the cognitive load of pilots. Event-related potentials (ERPs) based on electroencephalogram (EEG) signals contain crucial information regarding the human cognitive load. Accurate analysis of ERP signals are essential for the detection of cognitive load. However, existing ERP analysis methods typically rely on manual feature extraction or simple convolutional filters, whereas the spatiotemporal dependencies in EEG signals are disregarded. Herein, we propose a spatiotemporal separable graph convolutional network (STSGCN) to automatically extract spatiotemporal features in EEG signals. Utilising temporal-gate unit for temporal features and graph convolutional networks for spatial features, STSGCN merges temporal and spatial features using separable convolution. We validate the reliability of the STSGCN in classifying P300 ERPs under different cognitive-load scenarios. The results show that the STSGCN outperforms conventional convolutional neural networks in terms of accuracy and robustness, thus providing algorithmic support for the application of ERPs in actual-flight cognitive-load detection.

    Dual strategies consensus reaching process for ranking consensus based probabilistic linguistic multi-criteria group decision-making method

    Shu-Ping WanWen-Chang ZouJiu-Ying DongYu Gao...
    125342.1-125342.17页
    查看更多>>摘要:Group consensus is critical in multi-criteria group decision-making (MCGDM). However, the extant consensus reaching process (CRP) methods focus on the consensus on the decision matrices rather than the rankings of alternatives. This paper proposes the dual strategies CRP for ranking consensus based probabilistic linguistic MCGDM. According to the decision matrices provided by decision makers (DMs), the rankings of alternatives are generated. Then, we define ranking similarity degree based on the individual alternative rankings and opinion similarity degree based on the decision matrices, respectively. Based on the ranking similarity degrees, the group consensus index (GCI) is defined and the dual strategies CRP method is proposed. In the proposed CRP method, the first strategy pays attention to DMs with low ranking similarity degree but high opinion similarity degree, while the second strategy in CRP concentrates on DMs with low ranking similarity degree and low opinion similarity degree. The first strategy constructs minimum adjustment programming model while the second strategy directly provide adjustment advice according to the reference evaluation. These two strategies both aim to change the rankings of alternatives by adjusting the evaluations in the decision matrices. At length, an actual example is presented to demonstrate the effectiveness of the erected method and comparison analyses clarify its advantages and superiorities.

    Design of adaptive recommendation system for autism children using optimal feature selection-based adaptive dilated 1DCNN-LSTM with attention mechanism

    Balaji V.Mohana M.Hema M.Gururama Senthilvel P....
    125399.1-125399.17页
    查看更多>>摘要:One kind of neurological disorder is caused in the brain which is defined as Autism Spectrum Disorder (ASD). It has acquired the symptoms that appear in young children. In addition to that, it influences how the individual behaves and learns as well as communicates and interacts with others. More specifically, the term Autism is defined as a developmental disorder that impacts communication and social skills and it may vary from mental handicap cases to relieving superior cognitive abilities, intact, and the characteristic pattern of poor. Moreover, the school activities have acquired various difficulties to the given model that include changes in expected routines, intense sensory stimulation, noisy or disordered environments, and social interactions. Consequently, the conventional approaches face certain limitations like user privacy, scalability, and cold-start. Here, a novel suggestion system for autistic children is developed to detect distractions and anxious situations using deep learning and then treat the children based on their abilities. It has helped to prevent the risk to children. The data is given to the selection of the feature stage. The weight optimization is performed using the Modified Garter Snake Optimization Algorithm (MGSOA) during the selection of features. Then, the selected features are given to the Adaptive Dilated One Dimensional Conventional Neural Network (1DCNN) and Long Short-Term Memory (LSTM) with Attention Mechanism termed AD-1DCNN + LSTM-AMfor detecting the autism disorder for children. Here, the parameter optimization is performed using MGSOA optimization. It effectively forecasts the symptoms in a short time. This optimization helps to provide reliable and flexible outcomes for the developed recommendation system for autistic children. The developed recommendation system for autistic children is compared to baseline techniques with efficacy metrics to visualize elevated results.

    Time-frequency ridge characterisation of sleep stage transitions: Towards improving electroencephalogram annotations using an advanced visualisation technique

    Christopher McCauslandPardis BiglarbeigiRaymond BondGolnaz Yadollahikhales...
    125490.1-125490.13页
    查看更多>>摘要:Manual sleep stage scoring of polysomnography recordings is an expensive and time-consuming process, further complicated by inconsistent sleep stage agreement among sleep experts (clinicians and sleep technologists). Hence, development of automated sleep scoring algorithms are an emerging topic of interest. Automation typically mimics the clinical decision path by implementing a series of predefined rules, such as the American Academy of Sleep Medicine's (AASM) scoring manual. Recently, data driven methods have emerged using machine or deep learning. Both manual and automated methods of scoring have known limitations; primarily, unacceptable variation in agreement between different scorers and algorithms. Within the literature, electroencephalogram (EEG) frequency is an important feature considered by both sleep experts and automated approaches for classifying sleep stages. This study presents a novel approach to sleep stage analysis, by developing a methodology to precisely determine the temporal location of sleep stage transitions. The current gold standard fails to identify such transitional changes, which leads to poor inter-scorer reliability. Therefore, development and implementation of such methodologies is a crucial, but overlooked, step in improving the consistency of scoring within sleep studies. In this work, EEG time-frequency ridge analysis was used to characterise the dominant frequency component of EEG signals in time, at the point of sleep stage transition. An in-depth analysis of N3 → N2 and N2 → N3 transitions in the 2018 PhysioNet challenge "You Snooze, You Win" and the Wisconsin Sleep Cohort (WSC) datasets (n = 994, n = 742; approximately 13,888 h of sleep data) showed consistent time-frequency patterns at the point of transition, from one sleep stage to another. This methodology allows simple and 'interpretable' features to be generated in future work, to precisely identify the temporal location of sleep stage transitions with the aim of improving inter-scorer reliability.

    A lightweight network-based sign language robot with facial mirroring and speech system

    Na LiuXinchao LiBaolei WuQi Yu...
    125492.1-125492.11页
    查看更多>>摘要:Human-robot interaction is an essential capability for humanoid robots to enter the physical world and become companions in people's lives, learning, and work. While the majority of current research focuses on the voice-based interactions of robots, yet over 60% of communication occurs through nonverbal behaviors, such as facial expressions and hand gestures. Endowing robots with the ability to communicate through nonverbal behavior not only enhances the interactive experience with robots but also provides a potential communication tool for individuals with hearing or speech impairments. Here, we develop a humanoid robot capable of adjusting facial movements by driving servos, and design a novel framework for the robot to integrate sign language recognition and facial landmark detection algorithms. This framework facilitates the robot recognize sign language and translate it into spoken language, while also imitating the facial expressions of the signers. To achieve this, we also propose a lightweight deep learning network called RealTimeSignNet for real-time sign language recognition. Leveraging lightweight 3D convolution modules and time-dependent constraints, this model adapts to various time scales, ensuring efficient processing of sign language recognition tasks. Experimental results demonstrate the outstanding performance of the RealTimeSignNet model on mainstream sign language datasets, achieving an accuracy of 88.1% on the large continuous sign language dataset (continuous SLR), 98.2% on the isolated sign language dataset (SLR 500), and 91.50% on the English sign language dataset (WLAS). The overall assessment demonstrates that our humanoid robot is capable of recognizing sign language and translating it into spoken language, while imitating the facial emotions, providing a comprehensive solution to the communication challenges faced by individuals with hearing and speech impairments.

    Edge-assisted U-shaped split federated learning with privacy-preserving for Internet of Things

    Shiqiang ZhangZihang ZhaoDetian LiuYang Cao...
    125494.1-125494.14页
    查看更多>>摘要:In the realm of the Internet of Things (IoT), deploying deep learning models to process data generated or collected by IoT devices is a critical challenge. However, direct data transmission can cause network congestion and inefficient execution, given that IoT devices typically lack computation and communication capabilities. Centralized data processing in data centers is also no longer feasible due to concerns over data privacy and security. To address these challenges, we present an innovative Edge-assisted U-Shaped Split Federated Learning (EUSFL) framework, which harnesses the high-performance capabilities of edge servers to assist IoT devices in model training and optimization process. In this framework, we leverage Federated Learning (FL) to enable data holders to collaboratively train models without sharing their data, thereby enhancing data privacy protection by transmitting only model parameters. Additionally, inspired by Split Learning (SL), we split the neural network into three parts using U-shaped splitting for local training on IoT devices. By exploiting the greater computation capability of edge servers, our framework effectively reduces overall training time and allows IoT devices with varying capabilities to perform training tasks efficiently. Furthermore, we proposed a novel noise mechanism called LabelDP to ensure that data features and labels can securely resist reconstruction attacks, eliminating the risk of privacy leakage. Our theoretical analysis and experimental results demonstrate that EUSFL can be integrated with various aggregation algorithms, maintaining good performance across different computing capabilities of IoT devices, and significantly reducing training time and local computation overhead.

    Cascaded capsule twin attentional dilated convolutional network for malicious URL detection

    Vineet Kumar ChauhanAwadhesh Kumar
    125507.1-125507.15页
    查看更多>>摘要:Malware is one of the most popular cyber-attacks, and it is becoming more common on the network every day. In contrast to benign transmission, which typically exhibits symmetrical patterns, malware communication often shows asymmetrical behaviours, making detection a complex challenge. Fortunately, malware can be distinguished and identified for actual activities utilizing a variety of artificial intelligence methods. However, insufficient work has been allocated to the problem of handling high-dimensional and huge data. This paper proposes a novel deep learning-based approach to identify malicious Uniform Resource Locators (URLs) specifically designed to handle the challenges posed by large-scale and complex data. Initially, input data is sourced from a comprehensive Kaggle dataset, which includes diverse and large-scale URL samples. The URLs are then transformed into vector representations using a Vector Embedding Module, which employs a character-level word embedding technique to capture intricate patterns within the URLs. To further refine the data, the Chaotic Kookaburra Efficient-Bo Network (CKEBO-Net) is applied to extract the most significant features from these vectors, effectively reducing the dimensionality and computational burden. Subsequently, the Cascaded Capsule Twin Attentional Dilated Convolutional Network (C~2TA_DiCN) model is introduced to classify and identify malicious URLs with high precision. This model leverages the unique strengths of capsule networks and attentional mechanisms, enhancing its capability to capture subtle dependencies within the data. Furthermore, the Lyrebird Meta-heuristic Optimization (LMO) algorithm is used to fine-tune the model parameters appropriately, ensuring that the training process is efficient and robust. The proposed approach is implemented using Python and rigorously evaluated on the Kaggle dataset. Simulation results demonstrate that the proposed method significantly outperforms existing models, achieving a malicious URL detection accuracy of 99.7%.

    Design and implementation of a decentralized document management system

    Jongbeen HanYongseok Son
    125516.1-125516.14页
    查看更多>>摘要:Digital document management systems (DMSs) can enhance organizational efficiency, security, and compliance, fostering collaboration and reducing operational costs, and are widely used for convenience and productivity. However, DMSs are vulnerable to security issues, such as unauthorized access, document forgery, and malicious insider activities. Traditional DMSs grant access permissions to individual users, which increases the risk of document leakage or manipulation when these permissions are misused. This article aims to design and implement a decentralized document management system (DDMS) that enhances the security and integrity of digital documents by decentralizing access permissions and using blockchain technology. The proposed DDMS encrypts digital documents using a symmetric key and then the key is divided and distributed among multiple users through Shamir's secret sharing scheme. The encrypted documents are stored using the Interplanetary file system (IPFS), ensuring integrity through content-based addressing. And blockchain-based smart contracts manage access permissions and document retrieval, ensuring access is only granted when a predefined number of participants agree. We implement our system using the Ethereum blockchain and IPFS and evaluated its performance against other types of DMSs. The experimental results demonstrate that the proposed DDMS significantly enhances security and integrity compared to three types of DMSs. While the system introduces a reasonable performance overhead, particularly with larger documents, it effectively prevents unauthorized access and tampering. For instance, the proposed system incurs approximately 12 s (1.2%) overhead when handling an 8GB document compared to the P2 system, but ensures tamper-proof access control and document integrity. As a result, the proposed DDMS addresses the critical security vulnerabilities found in conventional DMSs by decentralizing document access and leveraging blockchain and decentralized storage. This approach offers a robust solution for secure, tamper-resistant document management, making it suitable for organizations requiring high levels of confidentiality and document integrity.