Computational Intelligence最新文献

筛选
英文 中文
Retraction 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-24 DOI: 10.1111/coin.70107
{"title":"Retraction","authors":"","doi":"10.1111/coin.70107","DOIUrl":"https://doi.org/10.1111/coin.70107","url":null,"abstract":"<p><b>RETRACTION</b>: <span>X. Xie</span>, <span>R. Lin</span>, <span>B. Yu</span>, <span>W. Wen</span>, <span>F. Gu</span>, <span>C. B. Sivaparthipan</span>, and <span>T. Vadivel</span>, “ <span>Internet of Things Assisted Radio Frequency Identification Based Mine Safety Management Platform</span>,” <i>Computational Intelligence</i> <span>37</span>, no. <span>3</span> (<span>2021</span>): <span>1322</span>–<span>1337</span>, https://doi.org/10.1111/coin.12369.</p><p>The above article, published online on 14 September 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70107","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-24 DOI: 10.1111/coin.70108
{"title":"Retraction","authors":"","doi":"10.1111/coin.70108","DOIUrl":"https://doi.org/10.1111/coin.70108","url":null,"abstract":"<p><b>RETRACTION</b>: <span>Y. He</span>, “ <span>Study on the Algorithm for Smart Community Sensor Network Routing with Adaptive Optimization via Cluster Head Election</span>,” <i>Computational Intelligence</i> <span>36</span> no. <span>4</span> (<span>2020</span>): <span>1663</span>–<span>1671</span>, https://doi.org/10.1111/coin.12304.</p><p>The above article, published online on 28 February 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-24 DOI: 10.1111/coin.70104
{"title":"Retraction","authors":"","doi":"10.1111/coin.70104","DOIUrl":"https://doi.org/10.1111/coin.70104","url":null,"abstract":"<p><b>RETRACTION</b>: <span>J. Jiang</span>, “ <span>Sustainable Achievement Efficiency of Transport Energy Consumption Based on Indicator Analysis</span>,” <i>Computational Intelligence</i> <span>37</span>, no. <span>3</span> (<span>2021</span>): <span>1268</span>–<span>1285</span>, https://doi.org/10.1111/coin.12366.</p><p>The above article, published online on 02 July 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors have been informed of the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction 收缩
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-24 DOI: 10.1111/coin.70105
{"title":"Retraction","authors":"","doi":"10.1111/coin.70105","DOIUrl":"https://doi.org/10.1111/coin.70105","url":null,"abstract":"<p><b>RETRACTION</b>: <span>B. S. Kandula</span>, <span>P. V. Kalluru</span>, and <span>S. P. Inty</span>, “ <span>Design of Area Efficient VLSI Architecture for Carry Select Adder Using Logic Optimization Technique</span>,” <i>Computational Intelligence</i> <span>37</span> no. <span>3</span> (<span>2021</span>): <span>1155</span>–<span>1165</span>, https://doi.org/10.1111/coin.12347.</p><p>The above article, published online on 27 May 2020 in Wiley Online Library (wileyonlinelibrary.com) has been retracted by agreement between the journal Editor-in-Chief, Diana Inkpen; and Wiley Periodicals LLC. The article was published as part of a guest-edited issue. Following an investigation by the publisher, all parties have concluded that this article was accepted solely on the basis of a compromised peer review process. The editors have therefore decided to retract the article. The authors do not agree with the retraction.</p>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1111/coin.70105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ship Trajectory Prediction Method Based on Multi-Layer Recurrent Neural Network Structure and AIS Data Driven 基于多层递归神经网络结构和AIS数据驱动的船舶轨迹预测方法
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-16 DOI: 10.1111/coin.70079
Jiatong Li, Xiang Wang, Jin Chen, Duan Zhu, Cong Zhang, Zuguo Chen, Yi Huang
{"title":"Ship Trajectory Prediction Method Based on Multi-Layer Recurrent Neural Network Structure and AIS Data Driven","authors":"Jiatong Li,&nbsp;Xiang Wang,&nbsp;Jin Chen,&nbsp;Duan Zhu,&nbsp;Cong Zhang,&nbsp;Zuguo Chen,&nbsp;Yi Huang","doi":"10.1111/coin.70079","DOIUrl":"https://doi.org/10.1111/coin.70079","url":null,"abstract":"<div>\u0000 \u0000 <p>In the current era, improving the intelligence level of vessels and ensuring the construction of a safer and more reliable maritime traffic environment has become an extremely crucial task. And intelligent vessel trajectory prediction undoubtedly impacts the intelligent navigation and collision avoidance systems of vessels. However, unfortunately, in the past few decades, the analysis work on massive trajectory data has been relatively scarce. At the same time, whether the current research focus on vessel trajectory prediction is short-term or long-term, it has led to the situation that the accuracy of trajectory prediction is far from satisfactory. In view of this, this study innovatively introduces a data-driven Long Short-Term Memory (LSTM) approach for the Automatic Identification System (AIS). This method realizes the accurate prediction of the entire vessel trajectory through the fusion of forward and reverse sub-networks (named FRA-LSTM here). Specifically, the forward sub-network in our proposed method cleverly combines LSTM with an attention mechanism to accurately extract key factors from the forward past trajectory data. Correspondingly, the reverse sub-network organically integrates the attention mechanism with a Bidirectional LSTM (BiLSTM) to simultaneously mine the unique characteristics of the backward historical trajectory data. Finally, the features output by the forward and reverse sub-networks are combined so as to successfully construct the final expected trajectory. After a large number of comprehensive and in-depth tests, we are delighted to find that compared with BiLSTM and Seq2Seq, the method proposed in this study has achieved an average increase of 96.8% and 86.5% regarding the accuracy of short-term and mid-term trajectory prediction respectively. More importantly, in the domain of long-term trajectory prediction, the average accuracy of our method is as high as 90.1% higher than that of BiLSTM and Seq2Seq, showing excellent performance advantages.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144646957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Predictive Model for Information Diffusion Combining Individual Association and Group Influence 结合个体关联和群体影响的信息扩散预测模型
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-13 DOI: 10.1111/coin.70093
Haohan Ma, Chao Liu
{"title":"A Predictive Model for Information Diffusion Combining Individual Association and Group Influence","authors":"Haohan Ma,&nbsp;Chao Liu","doi":"10.1111/coin.70093","DOIUrl":"https://doi.org/10.1111/coin.70093","url":null,"abstract":"<div>\u0000 \u0000 <p>Micro-level prediction of information diffusion aims to predict the next user to participate in the diffusion process, and it is an important task in the field of social network analysis. However, the existing research has two main issues. On one hand, they rely solely on social relationships to learn users' social homophily, leading to an insufficient capture of complex diffusion relationships among users. On the other hand, they overlook the impact of group influence on cascade diffusion, which limits predictive performance. To address the above issues, this study proposes a predictive model for Information Diffusion combining Individual Association and Group Influence, denoted by IGIDP. First, a user diffusion association graph is constructed based on cascade sequences, using a Graph Convolutional Network (GCN) to learn users' structural features. A gated fusion mechanism is then employed to enhance feature representation for better learning of the impact of user diffusion relationships on cascades. Next, a hypergraph is built through user-cascade interactions, and a hypergraph attention network is introduced to learn users' global interaction feature representations. Then, a novel Transformer variant is designed to capture both individual user and group effects on cascade diffusion. Finally, a decoder provides the diffusion probability for each user. Experimental results on four public, real-world datasets show that the IGIDP model achieves improvements in Hits@<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>k</mi>\u0000 </mrow>\u0000 <annotation>$$ k $$</annotation>\u0000 </semantics></math> and Map@<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>k</mi>\u0000 </mrow>\u0000 <annotation>$$ k $$</annotation>\u0000 </semantics></math> by 0.42%–20.94% and 1.66%–25.20%, respectively.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144615029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Object Detection and Tracking System on Unmanned Aerial Vehicles for Surveillance Applications Using RegionViT-Based Adaptive Multi-Scale YOLOv8 基于区域维数自适应多尺度YOLOv8的无人机监视动态目标检测与跟踪系统
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-10 DOI: 10.1111/coin.70101
Venkateswara Raju Yallamraju, Selvaganesan Jana
{"title":"Dynamic Object Detection and Tracking System on Unmanned Aerial Vehicles for Surveillance Applications Using RegionViT-Based Adaptive Multi-Scale YOLOv8","authors":"Venkateswara Raju Yallamraju,&nbsp;Selvaganesan Jana","doi":"10.1111/coin.70101","DOIUrl":"https://doi.org/10.1111/coin.70101","url":null,"abstract":"<div>\u0000 \u0000 <p>In general, the object detection mechanism recognizes target objects in the image frames, and the tracking mechanism helps to capture the movement of target objects in diverse frames. Recent developments in Artificial Intelligence (AI) have enabled us to build computers, robots, and automated tools that are mostly designed for performing tasks and generating decisions without human assistance. The drones called Unmanned Aerial Vehicles (UAVs) are employed for many kinds of objectives, including parcel shipping, rescue operations, recognizing objects, and monitoring. Object detection and tracking systems are crucial for UAVs because they help to optimally capture moving objects, areas, and threats for enhancing security, surveillance, and awareness at an earlier stage. Also, they help to ultimately predict the category and location of UAVs from the video frames. Many researchers have developed diverse object detection and tracking methods on UAVs; yet, it is complex for continuously monitoring small objects in the gathered data, and it is affected by noise and blurriness due to the motion of UAVs. One of the greatest challenging duties for UAVs is object recognition and tracking since it needs precise, swift, and cost-effective object detection and tracking. Pre-trained networks are required for the detection of objects based on deep learning. Mismatches between the pre-trained and the target domain network areas create problems in object detection. With the aim of resolving these issues, a deep learning-assisted UAV control mechanism is developed in this research work by performing detection and tracking of objects. The developed model is helpful in improving rescue operations in disaster areas and security surveillance. At first, the input videos are accumulated from benchmark sources. From the videos, the resolution of the images is studied for an accurate object detection procedure. Next, the detection and tracking of the object are done via the developed Region Vision Transformer-based Adaptive Multi-scale You Only Look Once v8 (RV-AMYOLOv8). The parameters fromYOLOv8 are optimized using the Fitness-based Random Variable for Elk Herd Optimizer (FRVEHO) for enhancing the performance. The quantitative outcomes of the implemented approach help to analyze the suggested network's performance with conventional techniques. Here, the developed method attains 96% accuracy and 95% of precision measure to demonstrate its better performance than the existing methods. This object detection is helpful for analyzing the surrounding obstacles while controlling the UAVs.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144598389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does Linguistic Relativity Hypothesis Apply on ChatGPT Responses? Yes, It Does 语言相对论假说是否适用于聊天答题?是的,有
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-10 DOI: 10.1111/coin.70103
Partha Pratim Ray
{"title":"Does Linguistic Relativity Hypothesis Apply on ChatGPT Responses? Yes, It Does","authors":"Partha Pratim Ray","doi":"10.1111/coin.70103","DOIUrl":"https://doi.org/10.1111/coin.70103","url":null,"abstract":"<div>\u0000 \u0000 <p>We present the first comprehensive, end-to-end quantitative evaluation of the linguistic relativity hypothesis in AI-generated text, using ChatGPT-4o mini to generate responses to 10 culturally salient prompts across 13 typologically diverse languages. Semantic shifts were quantified using pairwise cosine similarity scores computed from multilingual MiniLM sentence embeddings. A one-way analysis of variance (ANOVA) reveals statistically significant variation in semantic alignment across language pairs, with <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>F</mi>\u0000 <mo>(</mo>\u0000 <mn>77</mn>\u0000 <mo>,</mo>\u0000 <mn>702</mn>\u0000 <mo>)</mo>\u0000 <mo>=</mo>\u0000 <mn>2</mn>\u0000 <mo>.</mo>\u0000 <mn>153</mn>\u0000 </mrow>\u0000 <annotation>$$ Fleft(77,702right)=2.153 $$</annotation>\u0000 </semantics></math>, <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>p</mi>\u0000 <mo>=</mo>\u0000 <mn>2</mn>\u0000 <mo>.</mo>\u0000 <mn>29</mn>\u0000 <mo>×</mo>\u0000 <mn>1</mn>\u0000 <msup>\u0000 <mrow>\u0000 <mn>0</mn>\u0000 </mrow>\u0000 <mrow>\u0000 <mo>−</mo>\u0000 <mn>7</mn>\u0000 </mrow>\u0000 </msup>\u0000 </mrow>\u0000 <annotation>$$ p=2.29times 1{0}^{-7} $$</annotation>\u0000 </semantics></math>, and effect size <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <msup>\u0000 <mrow>\u0000 <mi>η</mi>\u0000 </mrow>\u0000 <mrow>\u0000 <mn>2</mn>\u0000 </mrow>\u0000 </msup>\u0000 <mo>=</mo>\u0000 <mn>0</mn>\u0000 <mo>.</mo>\u0000 <mn>191</mn>\u0000 </mrow>\u0000 <annotation>$$ {eta}^2=0.191 $$</annotation>\u0000 </semantics></math>. These results are further supported by a non-parametric Kruskal–Wallis test yielding <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>H</mi>\u0000 <mo>=</mo>\u0000 <mn>176</mn>\u0000 <mo>.</mo>\u0000 <mn>208</mn>\u0000 </mrow>\u0000 <annotation>$$ H=176.208 $$</annotation>\u0000 </semantics></math>, <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>p</mi>\u0000 <mo>=</mo>\u0000 <mn>9</mn>\u0000 <mo>.</mo>\u0000 <mn>59</mn>\u0000 <mo>×</mo>\u0000 <mn>1</mn>\u0000 <msup>\u0000 <mrow>\u0000 ","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144598683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SparseMult: A Sparse Tensor Decomposition Model for Knowledge Graph Link Prediction SparseMult:知识图链接预测的稀疏张量分解模型
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-09 DOI: 10.1111/coin.70097
Zhiwen Xie, Runjie Zhu, Meng Zhang, Jin Liu
{"title":"SparseMult: A Sparse Tensor Decomposition Model for Knowledge Graph Link Prediction","authors":"Zhiwen Xie,&nbsp;Runjie Zhu,&nbsp;Meng Zhang,&nbsp;Jin Liu","doi":"10.1111/coin.70097","DOIUrl":"https://doi.org/10.1111/coin.70097","url":null,"abstract":"<div>\u0000 \u0000 <p>Knowledge graphs (KGs) have shown great power in many downstream natural language processing (NLP) tasks, such as recommendation system and question answering. Despite the large amount of knowledge facts in KGs, KGs still suffer from an issue of incompleteness, namely, lots of relations between entities are missing. Link prediction, also known as knowledge graph completion (KGC), aims to predict missing relations between entities. The models based on tensor decomposition, such as Rescal and DistMult, are promising to solve the link prediction task. However, previous Rescal model lacks the ability to scale to large KGs due to the large amount of parameters. DistMult simplifies Rescal by using diagonal matrices to represent relations, while it suffers from the limitation of dealing with antisymmetric relations. To address these problems, in this paper, we propose a SparseMult model, which is a novel tensor decomposition model based on sparse relation matrix. Specifically, we view KGs as 3D tensors and decompose them as entity vectors and relation matrices. To reduce the number of parameters in relation matrices, we represent each relation matrix as a sparse block diagonal matrix. Thus, the complexity of relation matrices grow linearly with the embedding size, making it able to scale up to large KGs. Moreover, we analyze the ability of modeling different relation patterns and show that our SparseMult is capable to model symmetry, antisymmetry, and inversion relations. We conduct extensive experiments on three widely used benchmark datasets FB15k-237, WN18RR, and CCKS2021 KGs. Experimental results demonstrate that our SparseMult model outperforms most of the state-of-the-art methods.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144582373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalizing and Classifying From Few Samples: A Comprehension of Approaches to Few-Shot Visual Learning 少数样本泛化与分类:对少数镜头视觉学习方法的理解
IF 1.8 4区 计算机科学
Computational Intelligence Pub Date : 2025-07-04 DOI: 10.1111/coin.70098
Nadeem Yousuf Khanday, Shabir Ahmad Sofi
{"title":"Generalizing and Classifying From Few Samples: A Comprehension of Approaches to Few-Shot Visual Learning","authors":"Nadeem Yousuf Khanday,&nbsp;Shabir Ahmad Sofi","doi":"10.1111/coin.70098","DOIUrl":"https://doi.org/10.1111/coin.70098","url":null,"abstract":"<div>\u0000 \u0000 <p>Unlike traditional machine learning techniques, few-shot learning (FSL) represents a paradigm aimed at acquiring new tasks from just a handful of labeled examples. The challenge in FSL lies in its requirement for models to generalize effectively from a small dataset to previously unseen examples. Various approaches have been developed for FSL, encompassing techniques such as metric learning, meta-learning, and hybrid methods, among others. These approaches have found success in numerous computer vision tasks, including image and video classification, object detection, object segmentation, robotics, natural language processing, and various real-world applications such as medical diagnosis and self-driving cars. This comprehensive survey offers an in-depth exploration of recent advancements and the current state-of-the-art in FSL. The study presents a thorough examination of different FSL approaches, categorizing them primarily into meta-learning and non-meta-learning methods. It also delves into benchmark datasets for FSL, highlights existing research challenges, and explores the diverse applications of FSL. Furthermore, the survey identifies and discusses open research challenges within the field of FSL.</p>\u0000 </div>","PeriodicalId":55228,"journal":{"name":"Computational Intelligence","volume":"41 4","pages":""},"PeriodicalIF":1.8,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144558122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信