Computational Intelligence最新文献

筛选
英文 中文
A Deformable Convolutional Neural Network for Video Super-Resolution 用于视频超分辨率的可变形卷积神经网络
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-05-03 DOI: 10.1111/coin.70052
Xi Chen, Qi Zhang, Kai Liu, Yong Zhang
{"title":"A Deformable Convolutional Neural Network for Video Super-Resolution","authors":"Xi Chen,&nbsp;Qi Zhang,&nbsp;Kai Liu,&nbsp;Yong Zhang","doi":"10.1111/coin.70052","DOIUrl":"https://doi.org/10.1111/coin.70052","url":null,"abstract":"<div>\u0000 \u0000 <p>Convolutional Neural Networks used deep architectures to achieve deep feature extraction in video super-resolution. However, they suffered from challenges of rapid motion and complex scenes in video super-resolution. In this paper, we present a deformable convolutional neural network for video super-resolution (DVSRNet). DVSRNet mainly contains forward and backward feature propagation blocks (FPBs), feature enhancement blocks (FEBs), a feature fusion block (FFB), and a reconstruction block (RB). FPBs can leverage temporal sequence information to capture rich temporal dimensional information in video super-resolution. To restore detailed information, an optical flow technique guided a CNN to align the obtained structural information of different frames to reduce motion-induced blur and artifacts. To address deformable videos from motioned objects, two FEBs utilized deformable convolutions to adaptively correct misaligned objects to improve spatial continuity of videos. To improve reliability of obtained videos, an FFB is used to integrate relations of different video frames from forward and backward propagations. Finally, an RB via upsampling operations and a residual learning technique is used to construct high-quality videos. Experimental results demonstrate that our DVSRNet exhibits superior performance on multiple public datasets for video super-resolution. Its codes can be available at https://github.com/leyoukai/DVSRNet.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143901086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-05-02 DOI: 10.1111/coin.70054
{"title":"RETRACTION","authors":"","doi":"10.1111/coin.70054","DOIUrl":"https://doi.org/10.1111/coin.70054","url":null,"abstract":"<p><b>RETRACTION</b>: <span>K. Dhanasekaran</span>, <span>P. Anandan</span>, <span>N. Kumaratharan</span>, “ <span>A Robust Image Steganography Using Teaching Learning Based Optimization Based Edge Detection Model for Smart Cities</span>,” <i>Computational Intelligence</i> <span>36</span> no. 3 (<span>2000</span>): <span>1275</span>–<span>1289</span>, https://doi.org/10.1111/coin.12348.</p><p>The above article, published online on 28 May 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143897013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-05-02 DOI: 10.1111/coin.70056
{"title":"RETRACTION","authors":"","doi":"10.1111/coin.70056","DOIUrl":"https://doi.org/10.1111/coin.70056","url":null,"abstract":"<p><b>RETRACTION:</b> <span>G. Karthick</span>, <span>G. Mapp</span>, <span>F. Kammueller</span>, <span>M. Aiash</span>, “ <span>Modeling and Verifying a Resource Allocation Algorithm for Secure Service Migration for Commercial Cloud Systems</span>,” <i>Computational Intelligence</i> <span>38</span> no. 3 (<span>2022</span>): <span>811</span>–<span>828</span>, https://doi.org/10.1111/coin.12421.</p><p>The above article, published online on 09 February 2021 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143897063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-05-02 DOI: 10.1111/coin.70055
{"title":"RETRACTION","authors":"","doi":"10.1111/coin.70055","DOIUrl":"https://doi.org/10.1111/coin.70055","url":null,"abstract":"<p><b>RETRACTION:</b> <span>K. Abuhasel</span>, “ <span>Machine Learning Approach to Handle Data-Driven Model for Simulation and Forecasting of the Cone Crusher Output in the Stone Crushing Plant</span>,” <i>Computational Intelligence</i> <span>37</span> no. 3 (<span>2021</span>): <span>1098</span>–<span>1110</span>, https://doi.org/10.1111/coin.12338.</p><p>The above article, published online on 17 May 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143897014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-05-02 DOI: 10.1111/coin.70058
{"title":"RETRACTION","authors":"","doi":"10.1111/coin.70058","DOIUrl":"https://doi.org/10.1111/coin.70058","url":null,"abstract":"<p>\u0000 <b>RETRACTION:</b> <span>S.S.M. Shah</span>, <span>S. Meganathan</span>, “ <span>Machine Learning Approach for Power Consumption Model Based on Monsoon Data for Smart Cities Applications</span>,” <i>Computational Intelligence</i> <span>37</span> no. 3 (<span>2021</span>): <span>1309</span>–<span>1321</span>, https://doi.org/10.1111/coin.12368.</p><p>The above article, published online on 09 July 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70058","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143897065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-05-02 DOI: 10.1111/coin.70057
{"title":"Retraction","authors":"","doi":"10.1111/coin.70057","DOIUrl":"https://doi.org/10.1111/coin.70057","url":null,"abstract":"<p><b>RETRACTION:</b> <span>M. Shu</span>, <span>S. Wu</span>, <span>T. Wu</span>, <span>Z Qiao</span>, <span>N. Wang</span>, <span>F. Xu</span>, <span>A. Shanthini</span>, <span>B. Muthu</span>, “ <span>Efficient Energy Consumption System Using Heuristic Renewable Demand Energy Optimization in Smart City</span>,” <i>Computational Intelligence</i> <span>38</span> no. 3 (<span>2002</span>): <span>784</span>–<span>800</span>, https://doi.org/10.1111/coin.12412.</p><p>The above article, published online on 19 October 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 3","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143897064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethinking Correlation Filter Trackers for Small Unmanned Aircraft Systems 对小型无人机系统相关滤波跟踪器的再思考
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-04-21 DOI: 10.1111/coin.70053
Wei Liu, Shuang Wu, Xin Yun, Youfa Liu
{"title":"Rethinking Correlation Filter Trackers for Small Unmanned Aircraft Systems","authors":"Wei Liu,&nbsp;Shuang Wu,&nbsp;Xin Yun,&nbsp;Youfa Liu","doi":"10.1111/coin.70053","DOIUrl":"https://doi.org/10.1111/coin.70053","url":null,"abstract":"<div>\u0000 \u0000 <p>To achieve spatiotemporal continuity or some sparsity for robust tracking, most current discriminative correlation filter (DCF) methods introduce new regularization terms or self-adaption hyperparameters to restrict the trackers. However, regardless of the validity of the pseudo-Gaussian label, previous DCF trackers generally suffer from aberrance, mismatching. In this work, we rethink the DCF tracker from the label matching and propose a label approximation DCF tracker (LACF) focusing on analyzing the commonly used Gaussian pseudo labels in the DCF. Specifically, based on the assumption that the same objects should contain a similar response between two frames, we construct a new pseudo label that combines the original pseudo-Gaussian labels and the previous response map. On the other hand, we introduce a windowing strategy to focus the DCF model on matching crucial labels for the right position. The experimental results demonstrate that LACF significantly achieves competitive performance for real-time CPU small unmanned aircraft tracking.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 2","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143852771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety Monitoring of Machine Learning Perception Functions: A Survey 机器学习感知功能的安全监控:调查
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-04-20 DOI: 10.1111/coin.70032
Raul Sena Ferreira, Joris Guérin, Kevin Delmas, Jérémie Guiochet, Hélène Waeselynck
{"title":"Safety Monitoring of Machine Learning Perception Functions: A Survey","authors":"Raul Sena Ferreira,&nbsp;Joris Guérin,&nbsp;Kevin Delmas,&nbsp;Jérémie Guiochet,&nbsp;Hélène Waeselynck","doi":"10.1111/coin.70032","DOIUrl":"https://doi.org/10.1111/coin.70032","url":null,"abstract":"<p>Machine Learning (ML) models, such as deep neural networks, are widely applied in autonomous systems to perform complex perception tasks. New dependability challenges arise when ML predictions are used in safety-critical applications, like autonomous cars and surgical robots. Thus, the use of fault tolerance mechanisms, such as safety monitors, is essential to ensure the safe behavior of the system despite the occurrence of faults. This paper presents an extensive literature review on safety monitoring of perception functions using ML in a safety-critical context. In this review, we structure the existing literature to highlight key factors to consider when designing such monitors: threat identification, requirements elicitation, detection of failure, reaction, and evaluation. We also highlight the ongoing challenges associated with safety monitoring and suggest directions for future research.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 2","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70032","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143852911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vitamin D Analysis for Sustainable Healthcare in Inner London Borough 内伦敦区可持续医疗的维生素 D 分析
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-04-16 DOI: 10.1111/coin.70050
Sandra Fernando, Viktor Sowinski-Mydlarz, Subeksha Shrestha, Sunila Maharjan, Duncan Stewart, Dee Bhakta, Gary McLean, Sarah Illingworth
{"title":"Vitamin D Analysis for Sustainable Healthcare in Inner London Borough","authors":"Sandra Fernando,&nbsp;Viktor Sowinski-Mydlarz,&nbsp;Subeksha Shrestha,&nbsp;Sunila Maharjan,&nbsp;Duncan Stewart,&nbsp;Dee Bhakta,&nbsp;Gary McLean,&nbsp;Sarah Illingworth","doi":"10.1111/coin.70050","DOIUrl":"https://doi.org/10.1111/coin.70050","url":null,"abstract":"<p>Vitamin D is vital for bone health, immune system support, and muscle function. Deficiency in Vitamin D is widespread, with up to 65% of individuals in certain populations, including Black students at London Metropolitan University, UK, being affected. This study focuses on the need for a deeper understanding of Vitamin D prescription patterns, specifically within an inner London borough, using advanced data analytics. Previous analysis, such as ones conducted by \u0000OpenPrescribing.net, has investigated NHS prescription data but lacked a focused examination on Vitamin D. Our study introduces a novel computational approach, integrating NHS datasets from 2013 to 2023. We developed a web-hosted dashboard using Python, Flask, Cesium, PowerBI, and libraries such as Pandas, Scikit-learn to provide real-time data visualization and predictive analytics. Our methodology involved API-driven ingestion of large-scale data, focusing on Vitamin D prescriptions in a borough, and mapping this against patient numbers. We used feature manipulation and model training to gain insights into prescription counts, dosages, medication types, and formulations. This interactive platform supports dynamic reporting through PowerBI and Cesium. Our findings reveal significant variations in prescription patterns among GP surgeries influenced by socioeconomic factors. This interdisciplinary project, in future collaboration with local GP federations, United Kingdom, enhances computational health data analysis and aims to inform better prescription practices and healthcare policies, ultimately improving policy practice and public health outcomes.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 2","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143836340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Attention-Based Bidirectional Recurrent Neural Network for Human Action Recognition 基于卷积注意的人类动作识别双向递归神经网络
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-04-15 DOI: 10.1111/coin.70049
Aditya Mahamkali, Manvitha Gali, Soumya Ranjan Jena, Velagapudi Sreenivas
{"title":"Convolutional Attention-Based Bidirectional Recurrent Neural Network for Human Action Recognition","authors":"Aditya Mahamkali,&nbsp;Manvitha Gali,&nbsp;Soumya Ranjan Jena,&nbsp;Velagapudi Sreenivas","doi":"10.1111/coin.70049","DOIUrl":"https://doi.org/10.1111/coin.70049","url":null,"abstract":"<div>\u0000 \u0000 <p>Human activity recognition (HAR) technology plays a major role in today's world and is used in detecting human actions and poses in real-time. In the past, researchers employed statistical machine learning methods to build and extract attributes of various movements manually. However, typical techniques are becoming increasingly ineffective in the face of exponentially increasing waveform data that lacks unambiguous principles. With the advancement of deep learning technology, manual feature extraction is no longer required, and performance on challenging human activity recognition problems can be improved. However, various deep learning models have problems such as time consumption, inaccuracy, and the vanishing gradient problem. Therefore, to solve these problems, the proposed study used a deep convolutional attention-based bidirectional recurrent neural network to detect human activities in the provided samples. The input images are first pre-processed using an adaptive bilateral filtering approach to improve their quality and remove image noise. Then, the crucial features are recovered using the convolutional neural network (CNN) based encoder-decoder model. Finally, a deep convolutional attention-based bidirectional recurrent neural network is used to identify human activities. The model recognizes human actions with higher effectiveness and lower latency. The human behaviors are identified using the HMDB51 dataset. The proposed model acquired the highest accuracy of 95.46%, which is 10.51% superior to multi-layer perceptron (MLP), 6.99% superior to CNN, 12.76% superior to long short-term memory (LSTM), 5.59% superior to Bidirectional LSTM (BiLSTM), and 4.82% superior to CNN-LSTM, respectively.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 2","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143835766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信