17 results on '"Lin, Jerry Chun-Wei"'
Search Results
2. Artificial intelligence of medical things for disease detection using ensemble deep learning and attention mechanism.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Yazidi, Anis, Srivastava, Gautam, and Lin, Jerry Chun‐Wei
- Subjects
ARTIFICIAL intelligence ,DEEP learning ,DISTRIBUTED sensors - Abstract
In this paper, we present a novel paradigm for disease detection. We build an artificial intelligence based system where various biomedical data are retrieved from distributed and homogeneous sensors. We use different deep learning architectures (VGG16, RESNET, and DenseNet) with ensemble learning and attention mechanisms to study the interactions between different biomedical data to detect and diagnose diseases. We conduct extensive testing on biomedical data. The results show the benefits of using deep learning technologies in the field of artificial intelligence of medical things to diagnose diseases in the healthcare decision‐making process. For example, the disease detection rate using the proposed methodology achieves 92%, which is greatly improved compared to the higher‐level disease detection models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Suspicious activity detection using deep learning in secure assisted living IoT environments
- Author
-
Vallathan, G., John, A., Thirumalai, Chandrasegar, Mohan, SenthilKumar, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Published
- 2021
- Full Text
- View/download PDF
4. An algorithm for overlapping chromosome segmentation based on region selection.
- Author
-
Liu, Xiangbin, Wang, Sisi, Lin, Jerry Chun-Wei, and Liu, Shuai
- Subjects
COMPUTATIONAL intelligence ,CHROMATIDS ,HEURISTIC algorithms ,ARTIFICIAL intelligence ,CHROMOSOME analysis ,KARYOTYPES ,CHROMOSOMES - Abstract
Chromosome images are commonly used in karyotype analysis to diagnose chromosomal diseases. However, there are often chromosome adhesion and overlaps in chromosome images, so effective chromosome segmentation is conducive to smooth karyotype analysis. To date, some progress has been made in automatic chromosome segmentation, and existing methods can be used to segment overlapping chromosomes in most cases. However, when two or more overlapping regions are too close to each other in the image of overlapping chromosomes, the existing segmentation methods adjust the non-overlapping regions that do not belong to the overlapping region, resulting in incomplete segmentation of chromatids. Therefore, we use a heuristic algorithm to solve this problem from the point of view of mathematics and geometry to improve the segmentation of overlapping chromosomes. Starting from chromosome images, the existing problems and solutions are explained and displayed in the way of visualized interpretable image features, which helps to better understand the algorithm. Our method achieves 92.86% splicing accuracy and 90.44% overall segmentation accuracy on open datasets. The experimental results show that our method can effectively improve the problem of incorrect chromosome segmentation when two or more overlapping parts of overlapping chromosomes are too close to each other. It can accelerate the development of artificial intelligence in computational pathology and provide patients with more accurate medical services. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. When explainable AI meets IoT applications for supervised learning.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
DEEP learning ,SUPERVISED learning ,ARTIFICIAL intelligence ,INTERNET of things ,EVOLUTIONARY computation ,IMAGE databases - Abstract
This paper introduces a novel and complete framework for solving different Internet of Things (IoT) applications, which explores eXplainable AI (XAI), deep learning, and evolutionary computation. The IoT data coming from different sensors is first converted into an image database using the Gamian angular field. The images are trained using VGG16, where XAI technology and hyper-parameter optimization are introduced. Thus, analyzing the impact of the different input values in the output and understanding the different weights of a deep learning model used in the learning process helps us to increase interpretation of the overall process of IoT systems. Extensive testing was conducted to demonstrate the performance of our developed model on two separate IoT datasets. Results show the efficiency of the proposed approach compared to the baseline approaches in terms of both runtime and accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Integrated Artificial Intelligence in Data Science.
- Author
-
Lin, Jerry Chun-Wei, Tomasiello, Stefania, and Srivastava, Gautam
- Subjects
ARTIFICIAL intelligence ,DATA science ,OPTIMIZATION algorithms ,MACHINE learning ,JOB analysis - Abstract
This document discusses the integration of artificial intelligence (AI) in data science and its potential to create a better society. It highlights the benefits of AI in various domains such as science, medicine, technology, and social sciences. The document also addresses the challenges of integrating multiple AI technologies from different fields and the open issues in this emerging field. The special issue presented in the document includes 22 papers covering topics such as job advertisement analysis, malware detection, image enhancement, machine learning techniques, and optimization algorithms. The authors declare no conflicts of interest. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
7. Temporal positional lexicon expansion for federated learning based on hyperpatism detection.
- Author
-
Ahmed, Usman, Lin, Jerry Chun‐Wei, and Srivastava, Gautam
- Subjects
- *
COINCIDENCE , *HOLOCENE Epoch , *ARTIFICIAL intelligence , *LEXICON , *INFORMATION sharing , *PUBLISHED articles , *SECURE Sockets Layer (Computer network protocol) , *SUPERVISED learning - Abstract
Internet‐based information exchange has resulted in the propagation of false and misleading information, which is highly detrimental to individuals and humankind. Due to the speed and volume of social media news production, supervised artificial intelligence algorithms require many annotated data, which is difficult, costly, and time‐consuming. To address this issue, we offer a novel federated semi‐supervised framework based on self‐ensembling that utilizes the linguistic and stylometric information of annotated news articles and searches for hidden patterns in unlabeled data to denoise labels. Self‐ensembling predicts the labels of unlabeled data by using the outcomes of network‐in‐training from earlier epochs. These cumulative predictions should be a stronger predictor for unknown labels than the output of the most recent training epoch; hence, they may be utilized as a substitute for the labels of unlabeled data. The approach is distinctive in collecting all of the outputs from the neural network's past training periods. It utilizes them as an unsupervised target against which to assess the current output prediction of unlabeled articles. We intend to create a dataset centred on denoising to forward the study. The dataset is mapped using (1) the shifting focus time from published news articles and (2) the semi‐supervised method based on coincidence contexts for a neural contrast embedding model for learning low‐dimensional continuous vectors that generate a focus time‐based query in sequential news articles for temporal comprehension. The model achieved 0.83% F‐measure with lexicon expansion semi‐supervised learning. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. Towards an Advanced Deep Learning for the Internet of Behaviors: Application to Connected Vehicles.
- Author
-
MEZAIR, TINHINANE, DJENOURI, YOUCEF, BELHADI, ASMA, SRIVASTAVA, GAUTAM, and LIN, JERRY CHUN-WEI
- Subjects
DEEP learning ,ARTIFICIAL intelligence ,INTERNET ,INTERNET of things ,BIG data ,VEHICLES - Abstract
In recent years, intensive research has been conducted to enable people to live more comfortably. Developments in the Internet of Things (IoT), big data, and artificial intelligence have taken this type of research to a new level and led to the emergence of the Internet of Behaviors (IoB), which analyzes behavioral patterns. However, current IoB technologies are not capable of handling heterogeneous data. While it is quite common to have different formats of sensor data for the same behavioral observation, the use of these different data formats can significantly help to obtain a more accurate classification of the observation. Another limitation is that existing IoB deep learning models rely on inefficient hyperparameter tuning strategies. In this paper, we present an Advanced Deep Learning framework for IoB (ADLIoB) applied to connected vehicles. Several deep learning architectures are employed in this framework: CNN, Graph CNN (GCNN), and LSTM are used to train sensor data of different formats. In addition, a branch-and-bound technique is used to intelligently select hyperparameters. To validate ADLIoB, experiments were conducted on four databases for connected vehicles. The results clearly show that ADLIoB is superior to the baseline solutions in terms of both accuracy and runtime. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization.
- Author
-
Alterazi, Hassan A., Kshirsagar, Pravin R., Manoharan, Hariprasath, Selvarajan, Shitharth, Alhebaishi, Nawaf, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
PARTICLE swarm optimization ,ANT algorithms ,INTERNET of things ,INTERNET protocol address ,INTERNET security ,INTERNET protocols - Abstract
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network's external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
10. Secure Collaborative Augmented Reality Framework for Biomedical Informatics.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
AUGMENTED reality ,MEDICAL informatics ,INTELLIGENT agents ,DEEP learning ,ARTIFICIAL intelligence ,MEDICAL technology ,MULTIAGENT systems - Abstract
Augmented reality is currently of interest in biomedical health informatics. At the same time, several challenges have appeared, in particular with the rapid progress of smart sensor technologies, and medical artificial intelligence. This yields the necessity of new needs in biomedical health informatics. Collaborative learning and privacy are just some of the challenges of augmented reality technology in biomedical health informatics. This paper introduces a novel secure collaborative augmented reality framework for biomedical health informatics-based applications. Distributed deep learning is performed across a multi-agent system platform. The privacy strategy is then developed for ensuring better communications of the different intelligent agents in the system. In this research work, a system of multiple agents is created for the simulation of the collective behaviours of the smart components of biomedical health informatics. Augmented reality is also incorporated for better visualization of medical patterns. A novel privacy strategy based on blockchain is investigated for ensuring the confidentiality of the learning process. Experiments are conducted on real use cases of the biomedical segmentation process. Our strong experimental analysis reveals the strength of the proposed framework when directly compared to state-of-the-art biomedical health informatics solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Sensor data fusion for the industrial artificial intelligence of things.
- Author
-
Djenouri, Youcef, Belhadi, Asma, Srivastava, Gautam, Houssein, Essam H., and Lin, Jerry Chun‐Wei
- Subjects
ARTIFICIAL intelligence ,MULTISENSOR data fusion ,MANUFACTURING processes ,KNOWLEDGE graphs ,INTELLIGENT sensors ,DEEP learning - Abstract
The emergence of smart sensors, artificial intelligence, and deep learning technologies yield artificial intelligence of things, also known as the AIoT. Sophisticated cooperation of these technologies is vital for the effective processing of industrial sensor data. This paper introduces a new framework for addressing the different challenges of the AIoT applications. The proposed framework is an intelligent combination of multi‐agent systems, knowledge graphs and deep learning. Deep learning architectures are used to create models from different sensor‐based data. Multi‐agent systems can be used for simulating the collective behaviours of the smart sensors using IoT settings. The communication among different agents is realized by integrating knowledge graphs. Different optimizations based on constraint satisfaction as well as evolutionary computation are also investigated. Experimental analysis is undertaken to compare the methodology presented to state‐of‐the‐art AIoT technologies. We show through experimentation that our designed framework achieves good performance compared to baseline solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
12. Speech Emotion Recognition Enhanced Traffic Efficiency Solution for Autonomous Vehicles in a 5G-Enabled Space–Air–Ground Integrated Intelligent Transportation System.
- Author
-
Tan, Liang, Yu, Keping, Lin, Long, Cheng, Xiaofan, Srivastava, Gautam, Lin, Jerry Chun-Wei, and Wei, Wei
- Abstract
Speech emotion recognition (SER) is becoming the main human–computer interaction logic for autonomous vehicles in the next generation of intelligent transportation systems (ITSs). It can improve not only the safety of autonomous vehicles but also the personalized in-vehicle experience. However, current vehicle-mounted SER systems still suffer from two major shortcomings. One is the insufficient service capacity of the vehicle communication network, which is unable to meet the SER needs of autonomous vehicles in next-generation ITSs in terms of the data transmission rate, power consumption, and latency. Second, the accuracy of SER is poor, and it cannot provide sufficient interactivity and personalization between users and vehicles. To address these issues, we propose an SER-enhanced traffic efficiency solution for autonomous vehicles in a 5G-enabled space–air–ground integrated network (SAGIN)-based ITS. First, we convert the vehicle speech information data into spectrograms and input them into an AlexNet network model to obtain the high-level features of the vehicle speech acoustic model. At the same time, we convert the vehicle speech information data into text information and input it into the Bidirectional Encoder Representations from Transformers (BERT) model to obtain the high-level features of the corresponding text model. Finally, these two sets of high-level features are cascaded together to obtain fused features, which are sent to a softmax classifier for emotion matching and classification. Experiments show that the proposed solution can improve not only the SAGIN’s service capabilities, resulting in a large capacity, high bandwidth, ultralow latency, and high reliability, but also the accuracy of vehicle SER as well as the performance, practicality, and user experience of the ITS [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
13. Actionable Pattern-Driven Analytics and Prediction.
- Author
-
Lin, Jerry Chun-Wei and Chen, Chun-Hao
- Subjects
STREAMING video & television ,PRODUCTION scheduling ,ARTIFICIAL intelligence ,ELECTRIC power consumption ,APPLIED sciences ,FORECASTING - Abstract
The fourth paper [[4]] builds an effective system, called the personality-driven course decision assistant, to help students determine the courses they should select by mining and filtering learners' personality patterns. In addition to traditional methods for mining interesting patterns, several machine learning and optimization methods have been proposed in artificial intelligence to find interesting patterns and retrieve that information in a reasonable time, or in a big data environment. Pattern-driven analytics and mining has received a lot of attention in the last two decades, because information discovered in data can be used to support decision and strategy making. [Extracted from the article]
- Published
- 2021
- Full Text
- View/download PDF
14. Mining of skyline patterns by considering both frequent and utility constraints.
- Author
-
Lin, Jerry Chun-Wei, Yang, Lu, Fournier-Viger, Philippe, and Hong, Tzung-Pei
- Subjects
- *
DATA mining , *COMPUTATIONAL acoustics , *ARTIFICIAL intelligence , *ARTIFICIAL neural networks , *COMPUTER simulation , *DECISION making - Abstract
Abstract Association-rule mining (ARM) or frequent itemset mining (FIM) is the most fundamental task in knowledge discovery, which is used to find the occurrence frequency of the item/sets in transactional database. The other factors such as weight, interestingness or unit profit of the items are not considered whether in ARM or FIM. To reveal more information, high-utility itemset mining (HUIM) was designed to consider both quantity and unit profit of items to discover the high-utility itemsets (HUIs). Several algorithms for FIM or HUIM were extensively studied but fewer works concern both frequency and utility together to provide better solutions in decision-making. In the past, the SKYMINE algorithm was designed to find the skyline frequent-utility patterns (SFUPs). A SFUP is a non-dominated pattern, in which each solution dominates the others by considering the aspects of frequency and utility. The SKYMINE algorithm needs, however, amounts of computation to level-wisely discover the SFUPs. In this paper, an efficient utility-list structure is used instead of the UP-tree structure used in SKYMINE to mine the SFUPs. Two algorithms are respectively designed by using the depth-first search (called SKYFUP-D) and breath-first search (SKYFUP-B) to mine the SFUPs. An efficient structure is also designed to record the maximal utility of the potential itemsets, thus reducing the computations for finding the SFUPs in the search space. Extensive experiments are conducted on several real-world and simulated datasets and the results indicate that the designed two algorithms have better performance than that of the state-of-the-art SKYMINE algorithm in terms of runtime, memory usage, search space size and the scalability. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
15. Editorial on "recent advances in logistics transportation with autonomous systems".
- Author
-
Díaz, Vicente García, Lin, Jerry Chun-Wei, and Molinera, Juan Antonio Morente
- Subjects
- *
AUTONOMOUS vehicles , *ARTIFICIAL intelligence , *ARTIFICIAL neural networks , *RECURRENT neural networks , *ENERGY management , *LOGISTICS - Abstract
Autonomous transportation in logistics is the prime focus, with further deep dive into its application across various aspects of the supply chain. In the next article, the authors present an optimized least square support vector machine to improve load forecasting in autonomous vehicles. The next article presents a predictive traffic model and intelligent energy management systems for autonomous vehicles. [Extracted from the article]
- Published
- 2021
- Full Text
- View/download PDF
16. Energy grid management system with anomaly detection and Q-learning decision modules.
- Author
-
Syu, Jia-Hao, Srivastava, Gautam, Fojcik, Marcin, Cupek, Rafał, and Lin, Jerry Chun-Wei
- Subjects
- *
ANOMALY detection (Computer security) , *ENERGY management , *ENERGY subsidies , *ARTIFICIAL intelligence , *ENERGY security , *LEARNING Management System - Abstract
Stability and security issues in energy management have become widespread research topics, in which artificial intelligence techniques are often embedded in management systems to efficiently manage the smart grid. In this paper, we propose an energy grid management system with anomaly detection and Q-learning decision modules (EMSAD). The anomaly detection module is a multitask learning network that simultaneously classifies suppliers and predicts actual supply quantities. The Q-learning decision module then determines the operating reserve and subsidies to manage the energy grid. Experimental results show that the proposed anomaly detection module has an excellent performance in classifying malicious suppliers with F1-scores from 73.3% to 100.0%. The robustness evaluation also shows that EMSAD maintains high performance even in unseen environments without fine-tuning. Thus, the simulation results demonstrate the security, efficiency, transferability, and robustness of the proposed EMSAD in smart grid energy management. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Explainable Artificial Intelligence for Cybersecurity.
- Author
-
Sharma, Deepak Kumar, Mishra, Jahanavi, Singh, Aeshit, Govil, Raghav, Srivastava, Gautam, and Lin, Jerry Chun-Wei
- Subjects
- *
ARTIFICIAL intelligence , *INTERNET security , *TRUST , *MACHINE learning - Abstract
Recently, numerous Machine Learning (ML) algorithms have been applied in many areas of cybersecurity. However, most of these systems can only be seen as a black box to users. To improve our understanding of such systems, adversarial machine learning approaches can be used. The main features are detected by analyzing the extent of such changes, which helps in identifying the main reasons for misclassification. In this paper, the presented approach has obtained satisfactory results that accurately explains the reasons for misclassifications. Some features of the presented method can be applied to any classifier with defined gradients without the need for modifications. The proposed model can be extended to perform more diagnoses and it can be used for a deeper analysis of systems, obtaining more than 95% accuracy classification on the used datasets in the experiments. [Display omitted] • Explains misclassifications by data-driven AI models using an adversarial approach. • Compute the minimum number of changes to input features required. • Increased average classification accuracy by 2.5% post modification. • Designed a black-box attack to test the correctness and trustworthiness. • Used explanation maps to examine the effectiveness of attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.