Skip to main content

International Journal of Machine Learning and Cybernetics OnlineFirst articles

Open Access 21.05.2024 | Original Article

Leveraging text mining and analytic hierarchy process for the automatic evaluation of online courses

This study introduced a multi-criteria decision-making methodology leveraging text mining and analytic hierarchy process (AHP) for online course quality evaluation based on students’ feedback texts. First, a hierarchical structure of online course …

verfasst von:
Xieling Chen, Haoran Xie, Xiaohui Tao, Fu Lee Wang, Jie Cao

21.05.2024 | Original Article

The construction of multi-granularity generalized one-sided concept lattices

Formal concept analysis (FCA) is an important analytical tool for cognitive science. The generalized one-sided concept lattice extends the classical concept lattice, which considers the order between the attributes values. The structure of …

verfasst von:
Zhimin Shao, Zhiyong Hu, Mengmeng Lv, Mingwen Shao, Rui Guo, Shidong Zhang

20.05.2024 | Original Article

SAPDA: Significant Areas Preserved Data Augmentation

Data Augmentation is an essential technology for improving the performance of deep learning models. However, the semantic information change in current data augmentation methods may impair the model performance, especially in randomly …

verfasst von:
Xueyuan Zhang, Li Quan, Yongliang Yang

19.05.2024 | Original Article

KAT: knowledge-aware attentive recommendation model integrating two-terminal neighbor features

Due to its ability to effectively address the cold start and sparsity problems in collaborative filtering, knowledge graph is commonly used as auxiliary information in recommendation systems. However, the existing recommendation algorithms based …

verfasst von:
Tianqi Liu, Xinxin Zhang, Wenzheng Wang, Weisong Mu

18.05.2024 | Original Article

A self-attention dynamic graph convolution network model for traffic flow prediction

Precise and reliable traffic predictions play a vital role in contemporary traffic management, particularly within complex traffic networks. Currently, the approach which utilizes static graph convolution with recurrent neural networks for traffic …

verfasst von:
Kaili Liao, Wuneng Zhou, Wanpeng Wu

18.05.2024 | Original Article

HFCCW: A Novel Hybrid Filter-Clustering-Coevolutionary Wrapper Feature Selection Approach for Network Anomaly Detection

Network anomaly detection (NAD) is a crucial Artificial Intelligence (AI)-based security solution for protecting computer networks. However, analyzing high-dimensional data is a significant impediment for NAD systems. The process of Feature …

verfasst von:
Niharika Sharma, Bhavna Arora

17.05.2024 | Original Article

Unified deep learning model for multitask representation and transfer learning: image classification, object detection, and image captioning

The application of deep learning has demonstrated impressive performance in computer vision tasks such as object detection, image classification, and image captioning. Though most models excel at performing single vision or language tasks …

verfasst von:
Leta Yobsan Bayisa, Weidong Wang, Qingxian Wang, Chiagoziem C. Ukwuoma, Hirpesa Kebede Gutema, Ahmed Endris, Turi Abu

16.05.2024 | Original Article

Teaching content recommendations in music appreciation courses via graph embedding learning

The traditional music appreciation course teaching model relies on questionnaires or manual decision-making to determine teaching content, which is time-consuming and easily reduces student satisfaction and teaching quality. How to use artificial …

verfasst von:
Dugang Liu, Xiaolin Lin, Lingjie Li, Zishan Ming

16.05.2024 | Original Article

A Chinese named entity recognition model: integrating label knowledge and lexicon information

Chinese named entity recognition (CNER) is one of the important tasks in the field of information extraction. And different divisions of CNER for text processing units can be generally classified into character granularity and word granularity.

verfasst von:
Yihan Yuan, Qinghua Zhang, Xiong Zhou, Man Gao

15.05.2024 | Original Article

Improved dense residual network with the coordinate and pixel attention mechanisms for helmet detection

Helmet detection in road surveillance images has become increasingly important with the increasing number of accidents involving two-wheeled electric vehicles and motorcycles. However, small detection targets and complex road environments make …

verfasst von:
Jiang Mi, Jingrui Luo, Haixia Zhao, Xingguo Huang

14.05.2024 | Original Article

Image retrieval by aggregating deep orientation structure features

Aggregating deep features for image retrieval has shown excellent performance in terms of accuracy. However, exploring visual perception properties to activate the dormant discriminative cues of deep convolutional feature maps has received little …

verfasst von:
Fen Lu, Guang-Hai Liu

14.05.2024 | Original Article

Link prediction based on depth structure in social networks

Link prediction is an important task in social network analysis. Considering that the properties of nodes in social networks are generally inaccurate, it is more reliable and effective to use the network structure features to predict the links in …

verfasst von:
Jie Yang, Yu Wu

14.05.2024 | Original Article

A novel ORESTE approach for MAGDM incorporating probabilistic interval-valued linguistic information: case studies in higher education quality and the energy industry

Multi-attribute group decision making (MAGDM) is a pivotal tool in diverse evaluations. However, existing approaches often overlook attribute ambiguity and interrelationships, leading to unreliable outcomes. This article introduces a novel MAGDM …

verfasst von:
Jing Guo, Xianjun Zhu, Hui Li

13.05.2024 | Original Article

Hybrid architecture for mitigating DDoS and other intrusions in SDN-IoT using MHDBN-W deep learning model

The Internet of Things (IoT) connects billions of devices. However, because of its heterogeneous system and broad connectivity, it is vulnerable to various intrusion challenges, resulting in data and financial loss. The IoT environment must be …

verfasst von:
M. Revathi, S. Kiruthika Devi

13.05.2024 | Original Article

Concept drift detection methods based on different weighting strategies

The distribution of data often evolves over time, necessitating classifiers to adjust in order to maintain optimal classification accuracy. This phenomenon, termed “concept drift”, poses a significant challenge. Detectors specifically designed for …

verfasst von:
Meng Han, Dongliang Mu, Ang Li, Shujuan Liu, Zhihui Gao

11.05.2024 | Original Article

Domain generalization person re-identification via style adaptation learning

Domain generalization person re-identification (DG Re-ID) aims to deploy a Re-ID model trained on multiple source domains to unseen domains without adaptation, which is a practical and challenging problem. Due to the significant drop in …

verfasst von:
Yingchun Guo, Xinsheng Dou, Ye Zhu, Xinyao Wang

11.05.2024 | Original Article

Local descriptor-based spatial cross attention network for few-shot learning

Few-shot learning aims to classify novel images based on a small number of labeled examples. While recent work has shown promise using local descriptors, existing methods generally classify local descriptors independently, which potentially can …

verfasst von:
Jiamin Huang, Lina Zhao, Hongwei Yang

11.05.2024 | Original Article

Relabeling and policy distillation of hierarchical reinforcement learning

Hierarchical reinforcement learning (HRL) is a promising method to extend traditional reinforcement learning to solve more complex tasks. HRL can solve the problems of long-term reward sparsity and credit assignment. However, the existing HRL …

verfasst von:
Qijie Zou, Xiling Zhao, Bing Gao, Shuang Chen, Zhiguo Liu, Zhejie Zhang

09.05.2024 | Original Article

Meta-DPSTL: meta learning-based differentially private self-taught learning

Self-taught learning models are successfully applied to improve the target model’s performance in different low-resource environments. In this setting, features are learned using unlabeled instances in the source domain; thereafter, the learned …

verfasst von:
Upendra Pratap Singh, Indrajeet Kumar Sinha, Krishna Pratap Singh, Shekhar Verma

09.05.2024 | Original Article

Double-quantitative multi-granularity kernel fuzzy rough sets model and its application in rheumatoid arthritis risk assessment

The medical big data of combined Chinese and western medicine diagnosis and treatment (CCWMDT) is difficult to be used effectively in clinical medical decision-making because of its complex structure and multi-source storage. In this paper, we …

verfasst von:
Xianjun Dai, Bingzhen Sun, Juncheng Bai, Jin Ye, Xiaoli Chu