Abstract
A portrait recognition system can play an important role in emergency evacuation in mass emergencies. This paper designed a portrait recognition system, analyzed the overall structure of the system and the method of image preprocessing, and used the Single Shot MultiBox Detector (SSD) algorithm for portrait detection. It also designed an improved algorithm combining principal component analysis (PCA) with linear discriminant analysis (LDA) for portrait recognition and tested the system by applying it in a shopping mall to collect and monitor the portrait and establish a data set. The results showed that the missing detection rate and false detection rate of the SSD algorithm were 0.78 and 2.89%, respectively, which were lower than those of the AdaBoost algorithm. Comparisons with PCA, LDA, and PCA + LDA algorithms demonstrated that the recognition rate of the improved PCA + LDA algorithm was the highest, which was 95.8%, the area under the receiver operating characteristic curve was the largest, and the recognition time was the shortest, which was 465 ms. The experimental results show that the improved PCA + LDA algorithm is reliable in portrait recognition and can be used for emergency evacuation in mass emergencies.
1 Introduction
Portrait recognition refers to a technology that analyzes human face images through computer technology and extracts useful information to identify the identity. Compared with traditional features such as fingerprint [1], iris [2], and DNA [3], a portrait has the characteristics of naturalness, convenience, noncontact, etc. Portrait recognition has been extensively applied in fields such as attendance management [4], security prevention and control [5], and medical and health [6]; therefore, portrait recognition technology has become the focus of researchers. Lenc and Král [7] designed a fully automatic face recognition system that used the Kepenekci approach based on Scale Invariant Feature Transform (SIFT) and carried out experiments on three standard data sets. The results showed that the method had relatively high confidence. Neto et al. [8] designed a real-time face recognition system for blind and amblyopic people, using a variant of the K-nearest neighbor algorithm. The results showed that the method was superior to the traditional face recognition method and required fewer computing resources. Rashid et al. [9] preprocessed images with histogram equalization and median filter and extracted features by Gabor wavelet transform. They reduced the dimension of the features by principal component analysis (PCA), recognized human images by the support vector machine (SVM), and verified the accuracy and robustness of the system through the experiment on the Yale data set. Subiyanto et al. [10] designed a method combining the genetic algorithm with the PCA algorithm for face recognition in a smart home security system, compared it with other portrait recognition methods, and found that the accuracy of the proposed method reached 90%. Xu et al. [11] proposed a Gist feature and probabilistic cooperative representation (ProCRC)-based face recognition algorithm, carried out experiments on the ORL and extended YaleB database, and found that this method had a high face recognition rate. Varadarajan et al. [12] preprocess the data by combining chirp Z transform (CZT) with the Goertzel algorithm and selected features using the exponential binary particle swarm optimization (EBPSO) algorithm. The performance of the method was verified by a test on four benchmark face databases. Wang et al. [13] designed a face recognition algorithm based on Haar-Like features and Gentle Adaboost feature selection via sparse representation. They found through experiments that this method had a higher recognition rate than traditional algorithms. In the actual police work, the collected portrait is often affected by posture, expression, lighting, shooting angle, etc. [14], which brings some difficulties to the follow-up work. The recognition accuracy of portrait recognition needs further improvement. Therefore, this paper designed a portrait recognition system based on deep learning, used the Single Shot Multibox Detector (SSD) algorithm for portrait detection and the improved PCA + linear discriminant analysis (LDA) method for portrait recognition, and verified the reliability of the system by experiments on the actual data set. This work provides some theoretical support for the further application of the improved PCA + LDA algorithm in practice. This study verified the applicability of algorithms such as the SSD algorithm in portrait recognition. The designed system can be applied to helping police works in emergency evacuation in mass emergencies.
2 Portrait recognition system
2.1 Application of portrait recognition
In police work, with the wide application of high-definition monitoring (Figure 1), the level of portrait recognition has been gradually improved so that it can play a good role in more fields and provide reliable support for target recognition, monitoring, positioning, etc. [15]. The specific application scope includes:
recognition of identification photo: all law enforcement departments can identify the authenticity of a suspect’s certificate to understand the real identity of the holder;
surveillance and arrest: the police can monitor and arrest escaping criminals in some important places such as airport, station, bank, etc. to improve working efficiency;
security verification: in some important places, the image recognition system can store the images of people in and out to improve security;
emergency handling: in the face of mass emergencies, the police can quickly understand the details of the trapped people.

High-definition monitoring in the command center of a public security bureau.
This paper mainly studied the application of the portrait recognition system for emergency evacuation in mass emergencies. If there is a mass emergency, it is often necessary for police officers to organize emergency evacuation to avoid further development of the situation. In an emergency, the scene often has poor signal and difficult evacuation for various reasons. Therefore, in the process of evacuation, it needs a high-level portrait recognition system to analyze the images in the video surveillance and recognize and detect portraits to help the police to confirm the identity of the trapped people and evacuate in time. The system can ensure the efficiency and safety of police work and improve people’s satisfaction.
In order to achieve a high level of evacuation and rescue and ensure the timely rescue of the trapped people and the personal security of the rescuers, we need a high-level portrait recognition system to achieve the confirmation of personnel information by detecting and identifying portrait targets in video surveillance.
2.2 Overall structure of the system
The portrait recognition system needs to capture the monitored image through accessing the high-definition monitoring and send it to the back-end server through the network for real-time detection and recognition of the portrait to confirm the identity of the portrait. In the system designed in this study, the router is connected with the external network, and the high-definition monitoring equipment and server are connected with the router. The server can receive the video image data transmitted by the monitoring in real-time through the IP address and can also respond to the request of the external network to ensure that the system can be accessed in any scene through the Internet. In emergency evacuation in mass emergencies, the places that need emergency evacuation are monitored through high-definition monitoring, and the identity of the people who need to be evacuated can be quickly obtained through portrait monitoring and identification after getting the images transmitted by the system.
The overall structure of the system mainly includes the following parts:
Image preprocessing: in order to facilitate the follow-up work of portrait recognition, the collected video image needs to be preprocessed. In this study, the portrait is geometrically normalized using the bilinear interpolation method [16] to correct the portrait at different distances. Then, the image is denoised by the Wiener filtering algorithm [17]. Finally, the contrast of the portrait is improved by histogram equalization [18] to make the difference between different features more significant.
Portrait detection: portrait detection means determining the position and size of the portrait in an image and circling it with a rectangular box to provide services for the subsequent portrait feature extraction and recognition. In this study, the SSD algorithm [19] is used. Based on deep learning, it is a one-stage general object detection algorithm proposed in BCCV2016 and has a good detection performance for objects of different sizes.
Portrait recognition: portrait recognition refers to extracting features after detecting the location of the portrait and comparing the features with the features in the database to obtain the recognition result. This study designed an improved feature extraction method combining PCA with LDA and used SVM as a classifier to realize portrait recognition.
2.3 Portrait detection algorithm
The SSD algorithm takes VGG16 as the basic model and adds a new convolution layer to obtain more feature maps. The SSD algorithm takes images in a size of 300 × 300 as inputs, replaces FC6 and FC7 in VGG16 with a convolution layer, and adds a recognition layer after Conv7 to perform down-sampling. In the Conv4_3 layer, there is a classifier layer for extracting the feature map. Every feature map is used as the input of the detection layer to predict the target. Then, the default boxes are defined in the detection layer to complete the prediction of the target. In the system designed in this paper, six feature maps of different scales are used.
In the aspect of the loss function, the SSD algorithm needs two operations: one is to classify the target, and the other is to regress the frame of the candidate box. The loss function can be written as:
where N refers to the number of positive samples of a priori box,
2.4 Portrait recognition algorithm
The PCA method is also known as K-L transform [20], which takes the minimum mean square error as the criterion and projects the features of a high-level space into a low dimensional space to ensure that the reduced data can effectively represent the original data, so as to improve the operation speed. However, this method can only reconstruct the original samples and cannot achieve a good classification of samples. Therefore, this paper improves the traditional PCA method and combines it with the LDA method [21].
In order to reduce the influence of uneven illumination on portrait recognition, first, PCA is improved based on standard deviation and local mean. First, the dark area in the portrait is determined. It is assumed that the global mean of the portrait is E g and the local mean value is E s.
and k 0 is a constant smaller than 1; it means this part is dark and needs enhancement. If the area to be enhanced is
where
where δ refers to the amplification gray coefficient, η and y are stretching contrast coefficients, and
After portrait enhancement, the PCA + LDA method is used for feature extraction. It is assumed that the training sample is
where m is the number of pixels and N is the number of images, then the training sample matrix can be written as:
where C stands for the number of classes.
All the images in the sample are transformed into column vectors, and two values are calculated, i.e., the intra-class average image of every kind of image:
and the population average image:
Then, the two difference images are calculated:
and
The covariance matrix of the difference is calculated:
The nonzero feature value τ of
Then, the accumulative contribution rate is calculated:
The first r feature vectors are selected as the subspace of PCA:
The input image, x, μ i , and μ are projected to the subspace of PCA, then
and
The three values in LDA are calculated:
intra-class scatter matrix:
population intra-class scatter matrix:
inter-class scatter matrix:
According to Fisher criterion, the best projection space is obtained:
According to the Lagrange method,
The first p feature vectors are selected as the subspace of LDA:
The feature spaces of PCA and LDA are fused:
For any column vector x, in the fused feature space, its projection relationship is written as:
In portrait recognition, the training image and the test image are projected into the fused feature space, respectively, and classified by the SVM classifier to obtain the result of portrait recognition.
3 Results
3.1 Experimental environment and data set
The system test environment was Intel®Core(TM)i5 CPU M540@2.53 GHz. The size of the memory was 2.00 G. The operating system was Windows7. It was implemented in Microsoft Visual C++ 6.0 integrated development environment. Intel open-source visual library OpenCv2.2 was used.
The system was applied in a shopping mall. The mall was equipped with high-definition cameras for monitoring. The collected videos were processed. The obtained images were used for human image recognition. The obtained monitoring images were sorted and processed manually, and the names of people were added manually. Finally, 12,015 images in a JPG format of 250 × 250 were obtained, involving 4,952 people.
The data set used in the portrait detection experiment included one thousand images randomly selected from the 12,015 images. The 1,000 original portraits were taken as positive samples; then, the 1,000 images were randomly cut to produce 1,000 non-portrait samples as negative samples. There were 2,000 images for the portrait detection experiment.
The data set used in the portrait recognition experiment included 6,000 pairs of portraits randomly selected from the portrait detection data set, including 3,000 pairs of positive samples, i.e., matched portraits, labeled as 1, and 3,000 pairs of negative samples, i.e., non-matched portraits, labeled as 0.
3.2 Portrait test results
The performance of the SSD algorithm used in this study was compared with the Adaboost algorithm [22] by the established data set, and the results are shown in Table 1.
Comparison of portrait detection performance
Missing rate (%) | False detection rate (%) | |
---|---|---|
The Adaboost algorithm | 5.43 | 3.56 |
The SSD algorithm | 0.78 | 2.89 |
It was seen from Table 1 that the missing detection rate of the Adaboost algorithm was 5.43%, the missing detection rate of the SSD algorithm was 0.78%, which was 4.65% lower than the Adaboost algorithm; the false detection rate of the Adaboost algorithm was 3.56%, and the false detection rate of the SSD algorithm was 2.89%, which was 0.67% lower than the Adaboost algorithm. It showed that the SSD algorithm had a better performance in portrait detection and could accurately detect the portrait in the image, which provides a reference for subsequent portrait recognition.
3.3 Portrait recognition results
The performance of PCA, LDA, PCA + LDA, and improved PCA + LDA algorithms was compared to verify the effectiveness of the algorithm designed in this study. The classifier was SVM in the four algorithms. The recognition rates of different algorithms are shown in Figure 2.

Comparison of recognition rate between algorithms.
It was seen from Figure 2 that when the PCA algorithm was used for portrait recognition, the recognition rate of the algorithm was only 79.3%; when the LDA algorithm was used, the recognition rate was 80.1%, which was not high; when PCA and LDA algorithms were combined, the recognition rate was 88.6%, which was significantly higher than the former two algorithms; the improved PCA + LDA algorithm had a recognition rate of 95.8%, which was 7.2% higher than the PCA + LDA algorithm. The above results showed that the algorithm was further improved after improving the PCA algorithm.
The performance of different algorithms was analyzed through the receiver operating characteristic (ROC) curve. The larger the area under the ROC curve was, the higher the reliability of the algorithm was. The results are shown in Figure 3.

The ROC curve of different algorithms.
It was seen from Figure 3 that the ROC curve of the improved PCA + LDA algorithm was the closest to the top left corner and had the largest area under the curve, followed by the PCA + LDA algorithm and the PCA algorithm. The results showed that the improved PCA + LDA algorithm had the highest algorithm and best performance among the four algorithms.
It was seen from Figure 4 that the recognition time of PCA or LDA alone was 934 and 876 ms, respectively; after combining PCA and LDA algorithms, the recognition time was reduced to 543 ms, which was much better than the former two algorithms; after further improving the PCA algorithm, the recognition time was 465 ms, which was 14.36% shorter than the PCA + LDA algorithm. In practical application, the improved PCA + LDA algorithm had a higher response speed and a better performance in emergency evacuation in mass emergencies.

Comparison of recognition time between algorithms.
4 Discussion
With the continuous development of science and technology, the efficiency of police work has been greatly improved. More and more advanced technical means have been applied to police works. Methods such as data mining [23] and artificial intelligence [24] have made great contributions to realizing high-efficiency and high-level police work. In aspects such as file management, data analysis, and identity authentication [25], the portrait recognition system plays a very important role in police work.
This paper mainly designed a portrait recognition system for emergency evacuation in mass emergencies, used the SSD method for portrait detection, proposed an improved PCA + LDA algorithm for portrait recognition, and established an actual data set to test the improved algorithm. The experimental results showed that the SSD algorithm had a lower missing detection rate and false detection rate in portrait detection than the Adaboost algorithm, indicating that the SSD algorithm achieved a better portrait recognition result. When the PCA algorithm or the LDA algorithm was used alone, the features extracted still had large dimensions, which led to a lower recognition rate and long recognition time. Emergency evacuation in mass emergencies has a high requirement on the timeliness of the system, i.e., the shorter the recognition time is, the better the progress of the evacuation work is. It was seen from Figure 4 that after the combination of PCA and LDA algorithm, the recognition rate rose to more than 85%, and the operation time reduced to about 500 ms, which showed that the combination of PCA and LDA algorithms realized the effective complementarity of two different algorithms and improved the portrait recognition performance. Finally, the PCA algorithm was further improved. The recognition rate and recognition time of the improved PCA + LDA algorithm were 95.8% and 465 ms, respectively. It showed that the improved PCA + LDA algorithm had a good performance and could be popularized and applied in practice.
This article has some shortcomings that need to be solved in future works, although it obtained some results from the research on portrait recognition system:
The performance of the detection and recognition algorithm should be further enhanced;
More experiments can be carried out on larger experimental data sets;
The performance of the system can be tested in more environments.
5 Conclusion
In this paper, a high-performance portrait recognition system was designed to solve the problem of portrait recognition in emergency evacuation in mass emergencies. The SSD algorithm was used for portrait detection, and the improved PCA + LDA algorithm combined with the SVM classifier was used for portrait recognition. An experiment was carried out on the actual data set. It was found that the PCA + LDA algorithm had a good performance in detection and recognition and could be further promoted and applied in practice to make contributions to the design of portrait recognition systems in police works.
-
Conflict of interest: Author states no conflict of interest.
References
[1] Ghali F, Ali N, Yousif A. Fingerprint recognition. IOP Conf Ser Mater Sci Eng. 2020;928:032078.10.1088/1757-899X/928/3/032078Search in Google Scholar
[2] De Marsico M, Petrosino A, Ricciardi S. Iris recognition through machine learning techniques: a survey. Pattern Recogn Lett. 2016;82:106–15.10.1016/j.patrec.2016.02.001Search in Google Scholar
[3] Dickerson RE, Chiu TK. Helix bending as a factor in protein/DNA recognition. Biopolymers. 2015;44:361–403.10.1002/(SICI)1097-0282(1997)44:4<361::AID-BIP4>3.0.CO;2-XSearch in Google Scholar
[4] Li YL, Chen YS, Wang GP. Face recognition attendance system based on PCA approach. Comput Aided Draft Des Manuf. 2016;26:8–12.Search in Google Scholar
[5] Kosalendra E, Leema G, Muni VPK, Kartheek I, Madhivanan ML, Hemanth Kumar C. Intelligent car anti-theft system through face recognition using Raspberry Pi and global positioning system. Int J Anal Exp Modal Anal. 2020;12:1017–21.Search in Google Scholar
[6] Deepa S, Chamundeeswari VV. Genetic based face recognition for healthcare applications. J Med Imag Health In. 2020;10:593–603.10.1166/jmihi.2020.2965Search in Google Scholar
[7] Lenc L, Král P. Automatic face recognition system based on the SIFT features. Comput Electr Eng. 2015;46:256–72.10.1016/j.compeleceng.2015.01.014Search in Google Scholar
[8] Neto LB, Grijalva F, Maike VRML, Martini LC, Florencio D, Baranauskas MCC, et al. A kinect-based wearable face recognition system to aid visually impaired users. IEEE Trans Hum-Mach Syst. 2017;47:52–64.10.1109/THMS.2016.2604367Search in Google Scholar
[9] Rashid SJ, Abdullah AI, Shihab MA. Face recognition system based on gabor wavelets transform, principal component analysis and support vector machine. Int J Adv Sci Eng Inf Tech. 2020;10:959.10.18517/ijaseit.10.3.8247Search in Google Scholar
[10] Subiyanto S, Priliyana D, Riyadani ME, Iksan N, Wibawanto H. Face recognition system with PCA-GA algorithm for smart home door security using Rasberry Pi. J Tech Sys Comput. 2020;8:210–6.10.14710/jtsiskom.2020.13590Search in Google Scholar
[11] Xu Y, Liu B, Mi Q. A face recognition algorithm based on Gist feature and probabilistic collaborative representation. J Opt Laser. 2017;28:1365–71.Search in Google Scholar
[12] Varadarajan KK, Suhasini PR, Manikantan K, Ramachandran S. Face recognition using block based feature extraction with CZT and goertzel-algorithm as a preprocessing technique. Proc Comput Sci. 2015;46:1458–67.10.1016/j.procs.2015.02.065Search in Google Scholar
[13] Wang QW, Ying ZL, Huang LW. Face recognition algorithm based on Haar-like features and gentle adaboost feature selection via sparse representation. Appl Mech Mater. 2015;742:299–302.10.4028/www.scientific.net/AMM.742.299Search in Google Scholar
[14] Singh NA, Kumar MB, Bala MC. Face recognition system based on SURF and LDA technique. Int J Intell Syst Tech Appl. 2016;8:13–9.10.5815/ijisa.2016.02.02Search in Google Scholar
[15] Reddy N, Rao M, Satyanarayana C. A novel face recognition system by the combination of multiple feature descriptors. Int Arab J Inf Techn. 2019;16:669–76.Search in Google Scholar
[16] Zhou RG, Hu W, Fan P, Ian H. Quantum realization of the bilinear interpolation method for NEQR. Sci Rep. 2017;7:2511.10.1038/s41598-017-02575-6Search in Google Scholar
[17] Marks LD. Wiener-filter enhancement of noisy HREM images. Ultramicroscopy. 2016;62:43–52.10.1016/0304-3991(95)00085-2Search in Google Scholar
[18] Lim SH, Isa NAM, Ooi CH, Toh KKV. A new histogram equalization method for digital image enhancement and brightness preservation. Signal Image Video Process. 2015;9:675–89.10.1007/s11760-013-0500-zSearch in Google Scholar
[19] Liu W, ANguelov D, Erhan D, Szegedy C, Reed S, Fu CY, et al. SSD: single shot MultiBox detector. Lect Notes Comput Sci. 2016;9905:21–37.10.1007/978-3-319-46448-0_2Search in Google Scholar
[20] Faucon F, Dusfour I, Gaude T, Navratil V, Boyer F, Chandre F, et al. Identifying genomic changes associated with insecticide resistance in the dengue mosquito Aedes aegypti by deep targeted sequencing. Genome Res. 2015;25:1347–59.10.1101/gr.189225.115Search in Google Scholar PubMed PubMed Central
[21] Sharma A, Paliwal KK. Linear discriminant analysis for the small sample size problem: an overview. Int J Mach Learn Cyb. 2015;6:443–54.10.1007/s13042-013-0226-9Search in Google Scholar
[22] Ghimire D, Lee J. Geometric feature-based facial expression recognition in image sequences using multi-class AdaBoost and support vector machines. Sensors. 2016;13:7714–34.10.3390/s130607714Search in Google Scholar PubMed PubMed Central
[23] Egbert S. Predictive policing and the platformization of police work. Surveill Soc. 2019;17:83–8.10.24908/ss.v17i1/2.12920Search in Google Scholar
[24] Sikora P, Malina L, Kiac M, Martinasek Z, Riha K, Prinosil J, et al. Artificial intelligence-based surveillance system for railway crossing traffic. IEEE Sens J. 2020;1.10.1109/JSEN.2020.3031861Search in Google Scholar
[25] Chopin J, Caneppele S. Geocoding child sexual abuse: an explorative analysis on journey to crime and to victimization from French police data. Child Abuse Negl. 2019;91:116–30.10.1016/j.chiabu.2019.03.001Search in Google Scholar PubMed
© 2021 Ke Xu, published by De Gruyter
This work is licensed under the Creative Commons Attribution 4.0 International License.
Articles in the same Issue
- Research Articles
- Best Polynomial Harmony Search with Best β-Hill Climbing Algorithm
- Face Recognition in Complex Unconstrained Environment with An Enhanced WWN Algorithm
- Performance Modeling of Load Balancing Techniques in Cloud: Some of the Recent Competitive Swarm Artificial Intelligence-based
- Automatic Generation and Optimization of Test case using Hybrid Cuckoo Search and Bee Colony Algorithm
- Hyperbolic Feature-based Sarcasm Detection in Telugu Conversation Sentences
- A Modified Binary Pigeon-Inspired Algorithm for Solving the Multi-dimensional Knapsack Problem
- Improving Grey Prediction Model and Its Application in Predicting the Number of Users of a Public Road Transportation System
- A Deep Level Tagger for Malayalam, a Morphologically Rich Language
- Identification of Biomarker on Biological and Gene Expression data using Fuzzy Preference Based Rough Set
- Variable Search Space Converging Genetic Algorithm for Solving System of Non-linear Equations
- Discriminatively trained continuous Hindi speech recognition using integrated acoustic features and recurrent neural network language modeling
- Crowd counting via Multi-Scale Adversarial Convolutional Neural Networks
- Google Play Content Scraping and Knowledge Engineering using Natural Language Processing Techniques with the Analysis of User Reviews
- Simulation of Human Ear Recognition Sound Direction Based on Convolutional Neural Network
- Kinect Controlled NAO Robot for Telerehabilitation
- Robust Gaussian Noise Detection and Removal in Color Images using Modified Fuzzy Set Filter
- Aircraft Gearbox Fault Diagnosis System: An Approach based on Deep Learning Techniques
- Land Use Land Cover map segmentation using Remote Sensing: A Case study of Ajoy river watershed, India
- Towards Developing a Comprehensive Tag Set for the Arabic Language
- A Novel Dual Image Watermarking Technique Using Homomorphic Transform and DWT
- Soft computing based compressive sensing techniques in signal processing: A comprehensive review
- Data Anonymization through Collaborative Multi-view Microaggregation
- Model for High Dynamic Range Imaging System Using Hybrid Feature Based Exposure Fusion
- Characteristic Analysis of Flight Delayed Time Series
- Pruning and repopulating a lexical taxonomy: experiments in Spanish, English and French
- Deep Bidirectional LSTM Network Learning-Based Sentiment Analysis for Arabic Text
- MAPSOFT: A Multi-Agent based Particle Swarm Optimization Framework for Travelling Salesman Problem
- Research on target feature extraction and location positioning with machine learning algorithm
- Swarm Intelligence Optimization: An Exploration and Application of Machine Learning Technology
- Research on parallel data processing of data mining platform in the background of cloud computing
- Student Performance Prediction with Optimum Multilabel Ensemble Model
- Bangla hate speech detection on social media using attention-based recurrent neural network
- On characterizing solution for multi-objective fractional two-stage solid transportation problem under fuzzy environment
- Deep Large Margin Nearest Neighbor for Gait Recognition
- Metaheuristic algorithms for one-dimensional bin-packing problems: A survey of recent advances and applications
- Intellectualization of the urban and rural bus: The arrival time prediction method
- Unsupervised collaborative learning based on Optimal Transport theory
- Design of tourism package with paper and the detection and recognition of surface defects – taking the paper package of red wine as an example
- Automated system for dispatching the movement of unmanned aerial vehicles with a distributed survey of flight tasks
- Intelligent decision support system approach for predicting the performance of students based on three-level machine learning technique
- A comparative study of keyword extraction algorithms for English texts
- Translation correction of English phrases based on optimized GLR algorithm
- Application of portrait recognition system for emergency evacuation in mass emergencies
- An intelligent algorithm to reduce and eliminate coverage holes in the mobile network
- Flight schedule adjustment for hub airports using multi-objective optimization
- Machine translation of English content: A comparative study of different methods
- Research on the emotional tendency of web texts based on long short-term memory network
- Design and analysis of quantum powered support vector machines for malignant breast cancer diagnosis
- Application of clustering algorithm in complex landscape farmland synthetic aperture radar image segmentation
- Circular convolution-based feature extraction algorithm for classification of high-dimensional datasets
- Construction design based on particle group optimization algorithm
- Complementary frequency selective surface pair-based intelligent spatial filters for 5G wireless systems
- Special Issue: Recent Trends in Information and Communication Technologies
- An Improved Adaptive Weighted Mean Filtering Approach for Metallographic Image Processing
- Optimized LMS algorithm for system identification and noise cancellation
- Improvement of substation Monitoring aimed to improve its efficiency with the help of Big Data Analysis**
- 3D modelling and visualization for Vision-based Vibration Signal Processing and Measurement
- Online Monitoring Technology of Power Transformer based on Vibration Analysis
- An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
- Application of data mining technology in detecting network intrusion and security maintenance
- Research on transformer vibration monitoring and diagnosis based on Internet of things
- An improved association rule mining algorithm for large data
- Design of intelligent acquisition system for moving object trajectory data under cloud computing
- Design of English hierarchical online test system based on machine learning
- Research on QR image code recognition system based on artificial intelligence algorithm
- Accent labeling algorithm based on morphological rules and machine learning in English conversion system
- Instance Reduction for Avoiding Overfitting in Decision Trees
- Special section on Recent Trends in Information and Communication Technologies
- Special Issue: Intelligent Systems and Computational Methods in Medical and Healthcare Solutions
- Arabic sentiment analysis about online learning to mitigate covid-19
- Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
- Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language
- An optimization of color halftone visual cryptography scheme based on Bat algorithm
- Identification of efficient COVID-19 diagnostic test through artificial neural networks approach − substantiated by modeling and simulation
- Toward agent-based LSB image steganography system
- A general framework of multiple coordinative data fusion modules for real-time and heterogeneous data sources
- An online COVID-19 self-assessment framework supported by IoMT technology
- Intelligent systems and computational methods in medical and healthcare solutions with their challenges during COVID-19 pandemic
Articles in the same Issue
- Research Articles
- Best Polynomial Harmony Search with Best β-Hill Climbing Algorithm
- Face Recognition in Complex Unconstrained Environment with An Enhanced WWN Algorithm
- Performance Modeling of Load Balancing Techniques in Cloud: Some of the Recent Competitive Swarm Artificial Intelligence-based
- Automatic Generation and Optimization of Test case using Hybrid Cuckoo Search and Bee Colony Algorithm
- Hyperbolic Feature-based Sarcasm Detection in Telugu Conversation Sentences
- A Modified Binary Pigeon-Inspired Algorithm for Solving the Multi-dimensional Knapsack Problem
- Improving Grey Prediction Model and Its Application in Predicting the Number of Users of a Public Road Transportation System
- A Deep Level Tagger for Malayalam, a Morphologically Rich Language
- Identification of Biomarker on Biological and Gene Expression data using Fuzzy Preference Based Rough Set
- Variable Search Space Converging Genetic Algorithm for Solving System of Non-linear Equations
- Discriminatively trained continuous Hindi speech recognition using integrated acoustic features and recurrent neural network language modeling
- Crowd counting via Multi-Scale Adversarial Convolutional Neural Networks
- Google Play Content Scraping and Knowledge Engineering using Natural Language Processing Techniques with the Analysis of User Reviews
- Simulation of Human Ear Recognition Sound Direction Based on Convolutional Neural Network
- Kinect Controlled NAO Robot for Telerehabilitation
- Robust Gaussian Noise Detection and Removal in Color Images using Modified Fuzzy Set Filter
- Aircraft Gearbox Fault Diagnosis System: An Approach based on Deep Learning Techniques
- Land Use Land Cover map segmentation using Remote Sensing: A Case study of Ajoy river watershed, India
- Towards Developing a Comprehensive Tag Set for the Arabic Language
- A Novel Dual Image Watermarking Technique Using Homomorphic Transform and DWT
- Soft computing based compressive sensing techniques in signal processing: A comprehensive review
- Data Anonymization through Collaborative Multi-view Microaggregation
- Model for High Dynamic Range Imaging System Using Hybrid Feature Based Exposure Fusion
- Characteristic Analysis of Flight Delayed Time Series
- Pruning and repopulating a lexical taxonomy: experiments in Spanish, English and French
- Deep Bidirectional LSTM Network Learning-Based Sentiment Analysis for Arabic Text
- MAPSOFT: A Multi-Agent based Particle Swarm Optimization Framework for Travelling Salesman Problem
- Research on target feature extraction and location positioning with machine learning algorithm
- Swarm Intelligence Optimization: An Exploration and Application of Machine Learning Technology
- Research on parallel data processing of data mining platform in the background of cloud computing
- Student Performance Prediction with Optimum Multilabel Ensemble Model
- Bangla hate speech detection on social media using attention-based recurrent neural network
- On characterizing solution for multi-objective fractional two-stage solid transportation problem under fuzzy environment
- Deep Large Margin Nearest Neighbor for Gait Recognition
- Metaheuristic algorithms for one-dimensional bin-packing problems: A survey of recent advances and applications
- Intellectualization of the urban and rural bus: The arrival time prediction method
- Unsupervised collaborative learning based on Optimal Transport theory
- Design of tourism package with paper and the detection and recognition of surface defects – taking the paper package of red wine as an example
- Automated system for dispatching the movement of unmanned aerial vehicles with a distributed survey of flight tasks
- Intelligent decision support system approach for predicting the performance of students based on three-level machine learning technique
- A comparative study of keyword extraction algorithms for English texts
- Translation correction of English phrases based on optimized GLR algorithm
- Application of portrait recognition system for emergency evacuation in mass emergencies
- An intelligent algorithm to reduce and eliminate coverage holes in the mobile network
- Flight schedule adjustment for hub airports using multi-objective optimization
- Machine translation of English content: A comparative study of different methods
- Research on the emotional tendency of web texts based on long short-term memory network
- Design and analysis of quantum powered support vector machines for malignant breast cancer diagnosis
- Application of clustering algorithm in complex landscape farmland synthetic aperture radar image segmentation
- Circular convolution-based feature extraction algorithm for classification of high-dimensional datasets
- Construction design based on particle group optimization algorithm
- Complementary frequency selective surface pair-based intelligent spatial filters for 5G wireless systems
- Special Issue: Recent Trends in Information and Communication Technologies
- An Improved Adaptive Weighted Mean Filtering Approach for Metallographic Image Processing
- Optimized LMS algorithm for system identification and noise cancellation
- Improvement of substation Monitoring aimed to improve its efficiency with the help of Big Data Analysis**
- 3D modelling and visualization for Vision-based Vibration Signal Processing and Measurement
- Online Monitoring Technology of Power Transformer based on Vibration Analysis
- An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
- Application of data mining technology in detecting network intrusion and security maintenance
- Research on transformer vibration monitoring and diagnosis based on Internet of things
- An improved association rule mining algorithm for large data
- Design of intelligent acquisition system for moving object trajectory data under cloud computing
- Design of English hierarchical online test system based on machine learning
- Research on QR image code recognition system based on artificial intelligence algorithm
- Accent labeling algorithm based on morphological rules and machine learning in English conversion system
- Instance Reduction for Avoiding Overfitting in Decision Trees
- Special section on Recent Trends in Information and Communication Technologies
- Special Issue: Intelligent Systems and Computational Methods in Medical and Healthcare Solutions
- Arabic sentiment analysis about online learning to mitigate covid-19
- Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
- Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language
- An optimization of color halftone visual cryptography scheme based on Bat algorithm
- Identification of efficient COVID-19 diagnostic test through artificial neural networks approach − substantiated by modeling and simulation
- Toward agent-based LSB image steganography system
- A general framework of multiple coordinative data fusion modules for real-time and heterogeneous data sources
- An online COVID-19 self-assessment framework supported by IoMT technology
- Intelligent systems and computational methods in medical and healthcare solutions with their challenges during COVID-19 pandemic