The aims of this paper to explore the dynamics of the vector-host disease with saturated treatment function. Initially, we formulate the model by considering three different classes for human and two for the vector population. The use of the treatment function in the model and their brief analysis for the case of disease-free and endemic case are briefly shown. We show that the basic reproduction number (<or >) than unity, the disease-free and endemic cases are stable locally and globally. Further, we apply the optimal control technique by choosing four control variables in order to maximize the population of susceptible and recovered human and to minimize the population of infected humans and vector. We discuss the results in details of the optimal controls model and show their existence. Furthermore, we solve the optimality system numerically in connection with the system of no control and the optimal control characterization together with adjoint system, and consider a set of different controls to simulate the models. The considerable best possible strategy that can best minimize the infection in human infected individuals is the use of all controls simultaneously. Finally, we conclude that the work with effective control strategies.
Citation: Muhammad Altaf Khan, Navid Iqbal, Yasir Khan, Ebraheem Alzahrani. A biological mathematical model of vector-host disease with saturated treatment function and optimal control strategies[J]. Mathematical Biosciences and Engineering, 2020, 17(4): 3972-3997. doi: 10.3934/mbe.2020220
[1] | Gheorghe Craciun, Baltazar Aguda, Avner Friedman . Mathematical Analysis Of A Modular Network Coordinating The Cell Cycle And Apoptosis. Mathematical Biosciences and Engineering, 2005, 2(3): 473-485. doi: 10.3934/mbe.2005.2.473 |
[2] | Floriane Lignet, Vincent Calvez, Emmanuel Grenier, Benjamin Ribba . A structural model of the VEGF signalling pathway: Emergence of robustness and redundancy properties. Mathematical Biosciences and Engineering, 2013, 10(1): 167-184. doi: 10.3934/mbe.2013.10.167 |
[3] | Cicely K. Macnamara, Mark A. J. Chaplain . Spatio-temporal models of synthetic genetic oscillators. Mathematical Biosciences and Engineering, 2017, 14(1): 249-262. doi: 10.3934/mbe.2017016 |
[4] | Alexis B. Cook, Daniel R. Ziazadeh, Jianfeng Lu, Trachette L. Jackson . An integrated cellular and sub-cellular model of cancer chemotherapy and therapies that target cell survival. Mathematical Biosciences and Engineering, 2015, 12(6): 1219-1235. doi: 10.3934/mbe.2015.12.1219 |
[5] | Bojie Yang, Zhuoqin Yang . Deterministic and stochastic approaches to a minimal model for the transition from autophagy to apoptosis. Mathematical Biosciences and Engineering, 2024, 21(2): 3207-3228. doi: 10.3934/mbe.2024142 |
[6] | Kewei Ni, Gaozhong Sun . The identification of key biomarkers in patients with lung adenocarcinoma based on bioinformatics. Mathematical Biosciences and Engineering, 2019, 16(6): 7671-7687. doi: 10.3934/mbe.2019384 |
[7] | Li-Bing Wang, Liang Feng, Jing He, Bo Liu, Jian-Guang Sun . MiR-125a-5p inhibits the proliferation and invasion of breast cancer cells and induces apoptosis by targeting GAB2. Mathematical Biosciences and Engineering, 2019, 16(6): 6923-6933. doi: 10.3934/mbe.2019347 |
[8] | Juenu Yang, Fang Yan, Haihong Liu . Dynamic behavior of the p53-Mdm2 core module under the action of drug Nutlin and dual delays. Mathematical Biosciences and Engineering, 2021, 18(4): 3448-3468. doi: 10.3934/mbe.2021173 |
[9] | Olga Vasilyeva, Tamer Oraby, Frithjof Lutscher . Aggregation and environmental transmission in chronic wasting disease. Mathematical Biosciences and Engineering, 2015, 12(1): 209-231. doi: 10.3934/mbe.2015.12.209 |
[10] | Tao Chen, Zhiming Li, Ge Zhang . Analysis of a COVID-19 model with media coverage and limited resources. Mathematical Biosciences and Engineering, 2024, 21(4): 5283-5307. doi: 10.3934/mbe.2024233 |
The aims of this paper to explore the dynamics of the vector-host disease with saturated treatment function. Initially, we formulate the model by considering three different classes for human and two for the vector population. The use of the treatment function in the model and their brief analysis for the case of disease-free and endemic case are briefly shown. We show that the basic reproduction number (<or >) than unity, the disease-free and endemic cases are stable locally and globally. Further, we apply the optimal control technique by choosing four control variables in order to maximize the population of susceptible and recovered human and to minimize the population of infected humans and vector. We discuss the results in details of the optimal controls model and show their existence. Furthermore, we solve the optimality system numerically in connection with the system of no control and the optimal control characterization together with adjoint system, and consider a set of different controls to simulate the models. The considerable best possible strategy that can best minimize the infection in human infected individuals is the use of all controls simultaneously. Finally, we conclude that the work with effective control strategies.
Nowadays, identity authentication is needed on many occasions such as door access control system, registration system and online payment. Traditional identity authentication, like passwords can not meet our requirements any more. In recent years, bio-metric authentication technology has become more and more popular, such as fingerprint authentication, face recognition and iris recognition. However fingerprints are easy to forge and the system always fails to recognize the right person when the fingers are wet or injured. The same problem happens to face recognition if glasses or masks are worn. Iris recognition is safe enough but many people feel embarrassed when they are in front of cameras. Therefore, some researchers proposed vein authentication to solve these problems. In 1992, researchers of Hokkaido University demonstrated that the vein pattern of human body was unique to a specific individual and even twins also had different vein patterns [8]. Therefore vein pattern can be used for authentication. Moreover, vein recognition has many advantages over other biometric authentication technologies. Since veins are hidden inside the body, they are difficult to forge. They aren't affected by race or skin discolorations. What's more, veins don't change followed by age [11,4]. Finger vein [3], hand vein [7] and hand-dorsa vein [16] have already been utilized for identity authentication. This paper proposes a wrist vein recognition system due to its unique advantages. With the development of portable and wearable devices, wearable vein authentication device is preferred. The wrist is a convenient part of our body to wear the device and wrist vein is easy to be acquired. Thus, it is of great significance to study the wrist vein recognition. Wrist vein is not so clear as finger and hand vein. Therefore, features selection and the way to ex-tract features are very important. Many different features are adopted in finger and hand vein recognition system. Sugandhi [13] chose center line of the vein as features. Kumar [9] extracted bifurcation and endings as features while Cross [2] considered every vascular segment as a vector that had position and angle. However, all of the features mentioned above need image segmentation. Image segmentation is a complex and time-consuming process. In addition, some vein information may be lost during image segmentation. Global features of vein image represent the images well and they can be extracted without image segmentation. Li [10] used modified invariant moments as characteristic features. Hsu [5] used modified 2-directional 2-demensional principal component analysis to obtain eigenvalues, which was a low dimensional representation of vein pattern features. Global features of vein image can be extracted without image segment and thinning. For this reason, the wrist vein recognition is simpler and faster. Moreover, the system which selects the global features has good robustness. In this paper, the principal component analysis is adopted to extract wrist vein global features. Which algorithm should be chosen to classify the features? Matching method is the most common recognition algorithm in vein recognition system. Yang [18] adopted nearest center classifier. Wu [17] used minimum directional code matching method and nearest neighbor classifier was adopted by Yang [19]. Whereas, intelligent classification algorithms are seldom used in the vein recognition system, mainly because the speed of the intelligent classification algorithms is far slower than required. Recently, a new classification algorithm namely Two-hidden-layer Extreme Learning Machine (TELM) was proposed by Qu [12]. The algorithm can achieve high accuracy at a fast speed. In this paper, TELM is adopted to classify the wrist vein images. The flow chat of the proposed system is shown in Figure 1.
The rest of this paper is organized as follows. Wrist vein images obtaining method is introduced in Section Ⅱ. Section Ⅲ presents image preprocessing and features extraction. Image classification and recognition are introduced in Section Ⅳ. Experiment results and discussions are shown in Section Ⅴ. Finally, conclusion and prospect are given in Section Ⅵ.
Since vein patterns are hidden inside the body, they can't be seen under visible light. However, they can be captured with a camera which is sensitive to infrared light. Wang [15] described that veins absorb almost all the near infrared light while tissues reflect the near infrared light. Under infrared light, the vein regions become dimmer than tissue regions. Therefore, wrist vein pattern can be obtained under infrared light.
Infrared light source is adopted by many researchers. However, if the infrared light source illuminates skin directly, there are many bright spots in the obtained images. The quality of obtained images is so poor that it is difficult to extract vein patterns in these images. In contrast, natural light is uniform. There are no bright spots in the images which are obtained under natural light. Moreover, natural light also contains infrared light. Only infrared light is left if natural light is filtered by infrared filter. From this point, natural light and infrared filter are equivalent to infrared light. This situation is shown in Figure 2.
To obtain a high quality wrist vein image, the web camera and infrared filter are used. The camera used in this work is a simple charge coupled device (CCD). The number of its pixels is 30M. The original web camera is not able to obtain the wrist vein patterns because only visible lights can transform the lens of the camera. It should be reformed with an infrared filter. A circular infrared filter is selected in this paper. Its diameter and thickness are 18mm and 2mm respectively. If the natural light is filtered by it, only 800-1000nm wavelength infrared light is left. Nature light is turned into infrared light by the infrared filter. The details to reform the camera are described as follows:
• The original filter of the web camera is removed. There is a filter in the original web camera. Only visible light can pass through this filter. The original filter should be removed to allow infrared light in so that clear vein images can be obtained.
• The lens of the web camera is covered with the infrared filter mentioned above. All natural light can transmit through the camera lens after the original filter is removed. However, only infrared light is needed. Therefore, the lens is covered with an infrared filter. The reformed camera is able to obtain vein patterns.
A small wrist vein images database is established in this paper. A total of 500 wrist vein images are collected from 10 persons. Fifty images are taken from each person. Different images are obtained under different illumination environment conditions, so the database can test the robustness of the system in some degree. The size of each image is 640×480 and the gray scale values range from 0 to 255. Figure 3 shows three of the obtained wrist vein images. Wrist vein patterns of different persons are quite different from each other.
The obtained vein images contain not only vein regions but also background, tissue regions and other noises. These noises interfere with features extraction and classification. Therefore, it is necessary to preprocess the original images. In this paper, image preprocessing process includes occupation of the region of interest, gray normalization and contrast enhancement.
1) Occupation of the region of interest
Only the vein pattern region is needed. Background and tissue regions should be cut off. The region of interest is obtained by cutting off the edges of the image. The obtained regions of interest are shown in Figure 4.
2) Gray normalization
The images of the same wrist are different under different light intensities, since their gray value ranges are different. The gray values of images under strong light are higher than gray values of images under weak light. Different images of the same wrist may be classified into different categories. The gray scale values are normalized to address this issue.
The gray scale values of original images range from 0 to 255. The values are normalized according to
I′(i,j)=I(i,j)Imax | (1) |
where
3) Contrast enhancement
The gray scale values of muscle tissue are enlarged while the gray scale values of vessels are reduced, thus increasing the contrast between vessels and muscle. In this paper, Histogram stretching method is adopted to enhance image contrast. The gray values of transformed image can be calculated according to the following equation:
I′(i,j)={0,0≤I(i,j)<a0.5b−a[I(i,j)−a],a≤I(i,j)<b0.5c−b[I(i,j)−b]+0.5,b≤I(i,j)<c1,I(i,j)≥c | (2) |
where
The features selection is an important step. It highly affects the accuracy of the recognition system. In this paper, global features are selected to enhance the accuracy and robustness of the system. In addition, the global features can be obtained without image segmentation and thinning.
The PCA is an excellent technique to reduce the dimensionality of the feature space. It finds the linear subspaces which best represent the input data and extracts representative features by projecting the data into orthogonal subspaces. In this work, the input data are wrist vein images. The PCA extracts features which contain the most relevant information of wrist vein images.
Given an image data matrix
X=A˜B | (3) |
where
The selection of classification algorithm is extremely important for the wrist vein recognition system. Both high accuracy and speed are necessary. Extreme Learning Machine (ELM) [17] is a single-hidden layer feedforward neural network and it has been widely used due to its good generalization performance and fast learning speed [18,19]. Based on the ELM, TELM was proposed by Qu [15]. TELM has two hidden layers, which is obviously different from the original ELM. It inherits the advantages of the original ELM. As a kind of feedforward neural network, TELM is able to approximate model artificial phenomena and complex nonlinear mappings directly from the input data, which are difficult to deal with using classical techniques. Given a certain number of training data, TELM is able to provide models for the problem with fast speed. Unlike traditional learning algorithms, TELM avoids a time-consuming iterative training procedure by randomly choosing hidden nodes and analytically determining the output weights. What's more, it can achieve higher accuracy than original ELM. In the next section, TELM is adopted to classify wrist vein images.
This system includes two stages: registration and recognition. The new users should input their wrist vein data into the system, namely registration stage. After learning from the input data, the system is able to recognize images of the same user, namely recognition stage. These two stages correspond to training and testing stage in TELM. The workflow and network structure of TELM are shown in Figure 7 and Figure 8 respectively. These two stages are described as follows.
1) Registration
Input: Features of
• The connection weight matrix between the input layer and the first hidden layer
• Estimate weight matrix between the second hidden layer and the output layer
• Estimate the expected output of the second hidden layer
• Determine the parameters of the second hidden layer
• Obtain the actual output of the second hidden layer
• Calculate the weight matrix between the second hidden layer and the output layer
Output:
2) Recognition
Input: Features of
Calculate the recognition result
Output:
It can be concluded that this system works according to the following procedures. Firstly, train the TELM with features of training vein images. Secondly, save the parameters of the TELM. Thirdly, input features of testing vein images and calculate the recognition results.
The performance of the proposed system is evaluated on the wrist vein image database established in Section 2. The size of image is 640*480. 33 images of per person are chosen as training samples, and the other 17 images of per person act as testing samples. In this paper, the proposed system is compared with Extreme Learning Machine (ELM), Support Vector Machine (SVM) and Naive Bayes (NB). The performances of them are evaluated by testing accuracy, recognition time (per image), false reject rate (FRR) and false accept rate (FAR).
In TELM and ELM, sigmoid is chosen as the activation function. All the experiments are carried out in MATLAB R2014a computational environments running on a computer with a 2.81 GHZ AMD Athlon(tm)II 2 240 processor. Three different experiments have been carried out to verify the effectiveness of the proposed wrist vein image recognition method.
First, the performance of TELM and ELM with different number of hidden neurons is compared. The number of hidden neurons ranges from 1 to 60, and 50 trials are carried out on each number of hidden neuron. The average testing accuracies of TELM and ELM are shown in Figure 9. The average testing accuracies of TELM are higher than ELM from 3 to 60. In addition, the testing accuracy of TELM reaches 1 when the number of hidden neurons is more than 20.
Second, the effectiveness of gray normalization is verified. In this part, the number of hidden neurons of TELM and ELM is set to 19. TELM with and without gray normalization are tested 50 times and the mean accuracies are shown in Table 1. As shown, TELM with gray normalization achieves higher accuracy than TELM without gray normalization, which demonstrates that gray normalization is helpful for wrist vein image recognition.
TELM with gray normalization | TELM without gray normalization |
99.58±0.0671% | 94.39±0.4271% |
Third, TELM is compared with four other popular classifiers. The number of hidden neurons of TELM and ELM is still set to 19 in this part. The performances of the four algorithms are shown in Table 2. All the values in Table 1 are the mean values of 50 trials. It can be concluded that TELM achieves the highest testing accuracy. Besides, FRR and FAR of TELM are the lowest. Therefore the proposed system is accurate and reliable. Though the recognition time of TELM is not the shortest, it is comparable with the other three algorithms. The testing accuracy of ELM is lower than TELM, while ELM is faster than TELM. The reason is TELM has one more hidden layer. Just for this reason, TELM is able to deal with bigger data than ELM. What's more, we can conclude from Table 1 that SVM is the fastest but not accurate enough. SVM is fast because it need not train many parameters iteratively. Compared with SVM, NB achieves higher testing accuracy, while its recognition time is much longer.
Algorithm name | Accuracy (%) | Ttraining(ms) | Ttesting(ms) | FRR | FAR |
TELM | 99.58±0.0671 | 8.1555 | 0.0177 | 0.42% | 0.74% |
ELM | 96.35±0.0595 | 2.9158 | 0.0156 | 3.65% | 1.57% |
SVM | 91.40±0.0592 | 0.0109 | 0.0097 | 8.60% | 10.25% |
NB | 96.21±0.1005 | 0.0139 | 0.1548 | 3.79% | 2.54% |
A wrist vein recognition system is designed in this paper. It contains image obtaining, image pre-processing, features extraction and image classification. Firstly, a special camera is reformed to obtain wrist vein images. Unlike common vein acquisition devices, it can obtain clear vein patterns without infrared light source. Secondly, the obtained images are simply preprocessed. Image segmentation and thinning are avoided in this paper. Thirdly, global features are extracted with PCA. Most redundant information of vein images is eliminated in this step, so it takes little time to recognize the image. Finally, a fast and accurate learning algorithm TELM is adopted as a classifier. TELM and other three algorithms are tested on the obtained dataset. Experiment results show that TELM is the most accurate. Though, it is not the fastest, its recognition time is satisfactory. In conclusion, the proposed system can be applied in real time identity authentication system.
The proposed wrist vein recognition system will be tested on other database and it will be used in wearable recognition devices in the future. Since these devices are portable, they can be used to recognize and locate the user at the same time. Therefore, wrist vein recognition will have promising application prospect.
We acknowledge financial support by National Natural Science Foundation of China (61473266,61673404,61305080, and U1304602), China Postdoctoral Science Foundation (No.2014M552013), Project supported by the Research Award Fund for Outstanding Young Teachers in Henan Provincial Institutions of Higher Education of China (2014GGJS-004) and Program for Science and Technology Innovation Talents in Universities of Henan Province in China (16HASTIT041).
[1] | http://www.who.int/mediacentre/factsheets/fs387/en/ |
[2] |
N. Surapol, T. Korkiatsakul, I. M. Tang, Dynamical model for determining human susceptibility to dengue fever, Am. J. Appl. Sci., 8 (2011), 1101. doi: 10.3844/ajassp.2011.1101.1106
![]() |
[3] | M. Rafiq, M. O. Ahmad, Numerical modeling of dengue disease with incubation period of virus, Pak. J. Eng. Appl. Sci., (2016). |
[4] |
R. Rebeca, L. M. Harrison, R. A. Salas, D. Tovar, A. Nisalak, C. Ramos, et al., Origins of dengue type 2 viruses associated with increased pathogenicity in the Americas, Virology, 230 (1997), 244-251. doi: 10.1006/viro.1997.8504
![]() |
[5] | R. Ronald, The prevention of malaria, (2012). |
[6] |
W. Hui-Ming, X. Z. Li, M. Martcheva, An epidemic model of a vector-borne disease with direct transmission and time delay, J. Math. Anal. Appl., 342 (2008), 895-908. doi: 10.1016/j.jmaa.2007.12.058
![]() |
[7] | F. Zhilan, J. X. Velasco-Hernndez, Competitive exclusion in a vector-host model for the dengue fever, J. Math. Biol., 35 (1997), 523-544. |
[8] |
Q. Zhipeng, Dynamical behavior of a vector-host epidemic model with demographic structure, Comput. Math. Appl., 56 (2008), 3118-3129. doi: 10.1016/j.camwa.2008.09.002
![]() |
[9] | W. Viroj, Unusual mode of transmission of dengue, J. Inf. Devel. Coun., 4 (2009), 51-54. |
[10] | G. S. Mohammed, A. B. Gumel, M. R. Abu Bakar, Backward bifurcations in dengue transmission dynamics, Math. Biosci., 215 (2008), 11-25. |
[11] | C. Liming, X. Li, Analysis of a simple vector-host epidemic model with direct transmission, Disc. Dyna. Nat. Soc., 2010 (2010). |
[12] |
M. Derouich, A. Boutayeb, Mathematical modelling and computer simulations of Dengue fever, App. Math. Comput., 177 (2006), 528-544. doi: 10.1016/j.amc.2005.11.031
![]() |
[13] |
F. B. Agusto, M. A. Khan, Optimal control strategies for dengue transmission in Pakistan, Math. Biosci., 305 (2018), 102-121. doi: 10.1016/j.mbs.2018.09.007
![]() |
[14] | E. Lourdes, C. Vargas, A model for dengue disease with variable human population, J. Math. Bio., 38 (1999), 220-240. |
[15] | A. A. Lashari, S. Aly, K. Hattaf, G. Zaman, I. H. Jung, X. Z. Li, Presentation of malaria epidemics using multiple optimal controls, J. Appl. Math., 2012 (2012). |
[16] | A. A. Lashari, K. Hattaf, G. Zaman, A delay differential equation model of a vector borne disease with direct transmission, Int. J. Ecol. Econ. Stat., (27), (2012), 25-35. |
[17] | A. A. Lashari, K. Hattaf, G. Zaman G, X. Z. Li, Backward bifurcation and optimal control of a vector borne disease, Appl. Math. Infor. Sci., 7 (2013), 301-309. |
[18] |
L. Zhou, M. Fan, Dynamics of an SIR epidemic model with limited resources visited, Nonl. Anal. Real. World. Appl., 13 (2012), 312-324. doi: 10.1016/j.nonrwa.2011.07.036
![]() |
[19] | C. H. Li, A. M. Yousef, Bifurcation analysis of a network-based SIR epidemic model with saturated treatment function, Chaos An Interdiscipl. J Nonl. Sci., 29(2019), 10.1063/1.5079631. |
[20] | K. Hattaf, Y. Yang, Global dynamics of an age-structured viral infection model with general incidence function and absorptionm, Int. J. Biomath., 11, (2018), https://doi.org/10.1142/S1793524518500651. |
[21] |
P. Jia, C. Wang, G. Zhang, J. Ma, A rumor spreading model based on two propagation channels in social networks, Phys. A Statist. Mechan. Appl., 524 (2019), 342-353. doi: 10.1016/j.physa.2019.04.163
![]() |
[22] | J. Yang, X. Wang, Threshold dynamics of an SIR model with nonlinear incidence rate and agedependent susceptibility, Complexity, 2018 (2018). |
[23] | G. Birkhoff, G. C. Rota, Ordinary Differential Eqnarrays [M1]. Boston: Ginn (1982). |
[24] |
V. D. D. Pauline, J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission, Math. Biosci, 180 (2002), 29-48. doi: 10.1016/S0025-5564(02)00108-6
![]() |
[25] |
C. Castillo-Chavez, B. Song, Dynamical models of tuberculosis and their applications, Math. Biosci. Eng., 1 (2004), 361-404. doi: 10.3934/mbe.2004.1.361
![]() |
[26] | L. Salle, P. Joseph, The stability of dynamical systems, Soc. Indus. Appl. Math., 1976. |
[27] |
Y. Li. Michael, J. S. Muldowney, A geometric approach to global-stability problems, Siam. J. Math. Anal., 27 (1996), 1070-1083. doi: 10.1137/S0036141094266449
![]() |
[28] |
R. H. Martin, Logarithmic norms and projections applied to linear differential systems, J. Math. Anal. Appl., 45 (1974), 432-454. doi: 10.1016/0022-247X(74)90084-5
![]() |
[29] | K. O. Okosun, R. Smith, Optimal control analysis of malaria-schistosomiasis co-infection dynamics, Math. Biosci. Eng., 14 (2017), 377-405. |
[30] |
K. O. Okosun, O. D. Makinde, A co-infection model of malaria and cholera diseases with optimal control, Math. Biosci., 258 (2014), 19-32. doi: 10.1016/j.mbs.2014.09.008
![]() |
[31] |
S. F. Saddiq, M. A. Khan, S. Islam, G. Zaman, I. I. H. Jung, et al. Optimal control of an epidemic model of leptospirosis with nonlinear saturated incidences, Ann. Res. Rev. Bio., 4 (2014), 560. doi: 10.9734/ARRB/2014/6378
![]() |
[32] |
M. A. Khan, R. Khan, Y. Khan, S. Islam, A mathematical analysis of Pine Wilt disease with variable population size and optimal control strategies, Chaos Solit. Fract., 108 (2018), 205-217. doi: 10.1016/j.chaos.2018.02.002
![]() |
[33] | M. A. Khan, K. Ali, E. Bonyah, K. O. Okosun, S. Islam & A. Khan, Mathematical modeling and stability analysis of Pine Wilt Disease with optimal control, Sci. Rep., 7 (2017), 3115. |
[34] | F. H. Wendell, R. W. Rishel, Deterministic and stochastic optimal control, 1, Springer Science & Business Media, 2012. |
[35] | F. K. Renee, S. Lenhart, J. S. McNally, Optimizing chemotherapy in an HIV model, Elec. J. Diff. Eqn., 32, (1998), 1-12. |
[36] | L. S. Pontryagin, F. Moscow, Y. E. F. Mishchenko, et al, The mathematical theory of optimal processes, (1962). |
1. | Mahesh B, N Anbuselvan, , 2022, STABILITY IMPROVEMENT OF UPFC WITH FUEL CELL USING CONTROLLERS (PID AND FIS) BY ELIMINATING THE HARMONICS, 978-1-6654-6071-2, 1, 10.1109/MACS56771.2022.10022995 | |
2. | P. Rupesh, M.K.Mariam Bee, 2022, MRI image categorization and identification of brain tumours based on bandlet transforms utilising neural networks as opposed to support vector machine classifier, 978-1-6654-6071-2, 1, 10.1109/MACS56771.2022.10023065 | |
3. | M. Iswariya, T. Yuvaraj, 2022, Voltage profile improvement in distribution networks using DSTATCOM and UPQC by reducing power loss, 978-1-6654-6071-2, 1, 10.1109/MACS56771.2022.10022844 | |
4. | Kurra Lakshmi, R Nanamran, 2022, Development of Wavelet Packet Transform based Image Fusion Technique with Improved PSNR on Medical Images for Simultaneous Evaluation in Comparison with Wavelet Transform based Image Fusion Technique, 978-1-6654-6071-2, 1, 10.1109/MACS56771.2022.10022487 | |
5. | Kaseer Khan, Jianjun Ni, Fatima Ali Tabba, Soobia Saeed, 2024, chapter 8, 9798369389393, 239, 10.4018/979-8-3693-8939-3.ch008 | |
6. | Muhammad Syahrizal, Soeb Aripin, Dito Putro Utomo, M. Mesran, S. Sarwandi, Nelly Astuti Hasibuan, 2024, 3067, 0094-243X, 020048, 10.1063/5.0207998 | |
7. | Kaseer Khan, Soobia Saeed, Fatima Ali Tabba, 2024, chapter 9, 9798369389393, 263, 10.4018/979-8-3693-8939-3.ch009 | |
8. | Shunhu Hou, Yaoyao Dong, Yuhai Li, Qingqing Yan, Mengtao Wang, Shengliang Fang, Multi-domain-fusion deep learning for automatic modulation recognition in spatial cognitive radio, 2023, 13, 2045-2322, 10.1038/s41598-023-37165-2 | |
9. | Soobia Saeed, Fatima Ali Tabba, Manzoor Hussain, 2025, chapter 8, 9798369361351, 189, 10.4018/979-8-3693-6135-1.ch008 |
TELM with gray normalization | TELM without gray normalization |
99.58±0.0671% | 94.39±0.4271% |
Algorithm name | Accuracy (%) | Ttraining(ms) | Ttesting(ms) | FRR | FAR |
TELM | 99.58±0.0671 | 8.1555 | 0.0177 | 0.42% | 0.74% |
ELM | 96.35±0.0595 | 2.9158 | 0.0156 | 3.65% | 1.57% |
SVM | 91.40±0.0592 | 0.0109 | 0.0097 | 8.60% | 10.25% |
NB | 96.21±0.1005 | 0.0139 | 0.1548 | 3.79% | 2.54% |
TELM with gray normalization | TELM without gray normalization |
99.58±0.0671% | 94.39±0.4271% |
Algorithm name | Accuracy (%) | Ttraining(ms) | Ttesting(ms) | FRR | FAR |
TELM | 99.58±0.0671 | 8.1555 | 0.0177 | 0.42% | 0.74% |
ELM | 96.35±0.0595 | 2.9158 | 0.0156 | 3.65% | 1.57% |
SVM | 91.40±0.0592 | 0.0109 | 0.0097 | 8.60% | 10.25% |
NB | 96.21±0.1005 | 0.0139 | 0.1548 | 3.79% | 2.54% |