Loading [MathJax]/jax/output/SVG/jax.js
Research article

Improved wolf swarm optimization with deep-learning-based movement analysis and self-regulated human activity recognition

  • Received: 20 January 2023 Revised: 04 March 2023 Accepted: 17 March 2023 Published: 27 March 2023
  • MSC : 68Q32, 68T40, 90C25, 92D30

  • A wide variety of applications like patient monitoring, rehabilitation sensing, sports and senior surveillance require a considerable amount of knowledge in recognizing physical activities of a person captured using sensors. The goal of human activity recognition is to identify human activities from a collection of observations based on the behavior of subjects and the surrounding circumstances. Movement is examined in psychology, biomechanics, artificial intelligence and neuroscience. To be specific, the availability of pervasive devices and the low cost to record movements with machine learning (ML) techniques for the automatic and quantitative analysis of movement have resulted in the growth of systems for rehabilitation monitoring, user authentication and medical diagnosis. The self-regulated detection of human activities from time-series smartphone sensor datasets is a growing study area in intelligent and smart healthcare. Deep learning (DL) techniques have shown enhancements compared to conventional ML methods in many fields, which include human activity recognition (HAR). This paper presents an improved wolf swarm optimization with deep learning based movement analysis and self-regulated human activity recognition (IWSODL-MAHAR) technique. The IWSODL-MAHAR method aimed to recognize various kinds of human activities. Since high dimensionality poses a major issue in HAR, the IWSO algorithm is applied as a dimensionality reduction technique. In addition, the IWSODL-MAHAR technique uses a hybrid DL model for activity recognition. To further improve the recognition performance, a Nadam optimizer is applied as a hyperparameter tuning technique. The experimental evaluation of the IWSODL-MAHAR approach is assessed on benchmark activity recognition data. The experimental outcomes outlined the supremacy of the IWSODL-MAHAR algorithm compared to recent models.

    Citation: Tamilvizhi Thanarajan, Youseef Alotaibi, Surendran Rajendran, Krishnaraj Nagappan. Improved wolf swarm optimization with deep-learning-based movement analysis and self-regulated human activity recognition[J]. AIMS Mathematics, 2023, 8(5): 12520-12539. doi: 10.3934/math.2023629

    Related Papers:

    [1] Kaihong Zhao . Global stability of a novel nonlinear diffusion online game addiction model with unsustainable control. AIMS Mathematics, 2022, 7(12): 20752-20766. doi: 10.3934/math.20221137
    [2] Yasir Nadeem Anjam, Asma Arshad, Rubayyi T. Alqahtani, Muhammad Arshad . Unveiling the dynamics of drug transmission: A fractal-fractional approach integrating criminal law perspectives. AIMS Mathematics, 2024, 9(5): 13102-13128. doi: 10.3934/math.2024640
    [3] Xuechao Zhang, Yuhan Hu, Shichang Lu, Haomiao Guo, Xiaoyan Wei, Jun li . Dynamic analysis and control of online information dissemination model considering information beneficiaries. AIMS Mathematics, 2025, 10(3): 4992-5020. doi: 10.3934/math.2025229
    [4] Asaf Khan, Gul Zaman, Roman Ullah, Nawazish Naveed . Optimal control strategies for a heroin epidemic model with age-dependent susceptibility and recovery-age. AIMS Mathematics, 2021, 6(2): 1377-1394. doi: 10.3934/math.2021086
    [5] Zifu Fan, Kexin Fan, Wei Zhang . Research on the data integration strategy of local governments and enterprises under central government subsidies. AIMS Mathematics, 2022, 7(6): 10143-10164. doi: 10.3934/math.2022564
    [6] Hongshuang Wang, Sida Kang, Yuhan Hu . Dynamic analysis and optimal control of rumor propagation models considering different education levels and hesitation mechanisms. AIMS Mathematics, 2024, 9(8): 20089-20117. doi: 10.3934/math.2024979
    [7] Jamilu Adamu, Kanikar Muangchoo, Abbas Ja'afaru Badakaya, Jewaidu Rilwan . On pursuit-evasion differential game problem in a Hilbert space. AIMS Mathematics, 2020, 5(6): 7467-7479. doi: 10.3934/math.2020478
    [8] Sayed Saber, Azza M. Alghamdi, Ghada A. Ahmed, Khulud M. Alshehri . Mathematical Modelling and optimal control of pneumonia disease in sheep and goats in Al-Baha region with cost-effective strategies. AIMS Mathematics, 2022, 7(7): 12011-12049. doi: 10.3934/math.2022669
    [9] Jun Wang, Dan Wang, Yuan Yuan . Research on low-carbon closed-loop supply chain strategy based on differential games-dynamic optimization analysis of new and remanufactured products. AIMS Mathematics, 2024, 9(11): 32076-32101. doi: 10.3934/math.20241540
    [10] Rami Amira, Mohammed Salah Abdelouahab, Nouressadat Touafek, Mouataz Billah Mesmouli, Hasan Nihal Zaidi, Taher S. Hassan . Nonlinear dynamic in a remanufacturing duopoly game: spectral entropy analysis and chaos control. AIMS Mathematics, 2024, 9(3): 7711-7727. doi: 10.3934/math.2024374
  • A wide variety of applications like patient monitoring, rehabilitation sensing, sports and senior surveillance require a considerable amount of knowledge in recognizing physical activities of a person captured using sensors. The goal of human activity recognition is to identify human activities from a collection of observations based on the behavior of subjects and the surrounding circumstances. Movement is examined in psychology, biomechanics, artificial intelligence and neuroscience. To be specific, the availability of pervasive devices and the low cost to record movements with machine learning (ML) techniques for the automatic and quantitative analysis of movement have resulted in the growth of systems for rehabilitation monitoring, user authentication and medical diagnosis. The self-regulated detection of human activities from time-series smartphone sensor datasets is a growing study area in intelligent and smart healthcare. Deep learning (DL) techniques have shown enhancements compared to conventional ML methods in many fields, which include human activity recognition (HAR). This paper presents an improved wolf swarm optimization with deep learning based movement analysis and self-regulated human activity recognition (IWSODL-MAHAR) technique. The IWSODL-MAHAR method aimed to recognize various kinds of human activities. Since high dimensionality poses a major issue in HAR, the IWSO algorithm is applied as a dimensionality reduction technique. In addition, the IWSODL-MAHAR technique uses a hybrid DL model for activity recognition. To further improve the recognition performance, a Nadam optimizer is applied as a hyperparameter tuning technique. The experimental evaluation of the IWSODL-MAHAR approach is assessed on benchmark activity recognition data. The experimental outcomes outlined the supremacy of the IWSODL-MAHAR algorithm compared to recent models.



    With the development of the times and the progress of science and technology, online games have become a new means of entertainment. While people enjoy the happiness brought by online games, more and more people are addicted to it, especially teenagers. On September 29, 2020, China Internet Network Information Center (CNNIC) released the 46th statistical report on China's Internet development in Beijing[1]. By June 2020, the number of online game users has reached 540 million. The proportion of game addicts in China has reached 27.5%. Among them, 30.5 percent of teenagers are addicted to online games.

    Teenagers are being in a critical period of growth and development, and their discrimination ability is not enough. Some bad information in the game will cause them to deviate from their values, and even lead to illegal acts such as theft and violence. At the same time, indulging in games consumes energy, delays studies, and also leads to mental decadence and physical weakness[2]. Using medical methods, American scientists have found that the brain waves of internet addicts are exactly the same as those of drug addicts, which proved that online game addiction is indeed "internet opium" and "electronic heroin". Teenagers are obsessed with online games, which is tantamount to taking drugs[3].

    It is found that the lack of family education is the key factor of teenagers' online game addiction. Parents' neglect, rudeness, doting, excessive care and inability to take care of their children can lead to teenagers' over dependence on online games. In addition, single-parent families and left-behind children are more likely to indulge in online games[4]. Therefore, family education plays a very key role in the growth of teenagers. And the online games have a strong infectious, because many games have such a setting: players need to form a team to enter the game, and there are rich returns by inviting new people to join the game[5].

    In recent years, the use of mathematical models to simulate infectious diseases has played an important role in analyzing disease control processes[6,7,8,9]. Many scholars applied the research methods of infectious diseases to many other infectious problems, such as smoking, drinking, rumors, game addiction, etc[10,11,12,13,14,15,16,17,18,19,20,21,22,23]. Sharomi [10] provided a rigorous mathematical study to assess the dynamics of smoking and its impact on community public health. The difference in transmission between light and heavy smokers was taken into account, and the incidence was β(S1+ψS2)N. Huo et al. [11] proposed a new SAITS alcoholism model on networks, which divided alcoholism into mild alcoholism and severe alcoholism. The authors studied the dynamical properties of the unweighted network model, including the basic reproduction number, the existence and stability of the equilibria. Zhao et al. [12] discussed a new rumor-truth mixed propagation model and developed an isolation-conversion strategy to minimize the influence of rumor. Li and Guo [13] studied an online game addiction model with positive and negative media reports. The authors considered for the first time that the media have positive and negative effects in the process of game transmission, which is an important difference from the process of infectious disease transmission. Viriyapong and Sookpiam [14] established a deterministic online game addiction model based on the situation of teenagers' addiction in Thailand, and studied the dynamic properties of the model. Through the numerical simulation, it is concluded that the effectiveness of family education is an important factor to reduce the R0, which is of great help to reduce the number of Thai children and adolescents with online game addiction.

    In recent years, the optimal control theory is more and more widely used in infectious diseases dynamics[24,25,26,27,28]. Khan et al. [18] developed and used a mathematical model to explore the effect of treatment on the dynamics of hepatitis B infection, and obtained the optimal control strategy by combining vaccine, isolation and treatment. Ullah et al. [19] established a deterministic model to study the dynamics and possible control of tuberculosis, estimated the parameter values of confirmed tuberculosis cases reported in Khyber Pakhtunkhwa, Pakistan from 2002 to 2017, and obtained a set of control measures that can be used to eliminate tuberculosis infection in the community. Pang et al. [20] proposed a new mathematical model without any control strategies to investigate the dynamic behaviors of smoking, applied a concrete example to calculate the incremental cost-effectiveness ratio and analyzed all possible combinations of two control measures.

    In real life, in addition to family education, we also have means of isolation and treatment to reduce the number of teenagers addicted to games[29,30]. Based on the investigation of the problems in reality and inspired by the above literature, we establish a new online game addiction model with considering family education. The following are the main differences between this paper and previous works.

    (i) In order to escape from the unpleasant reality, the probability of falling into game addiction will be greater for teenagers who lack family education factors. Thus, in this paper the susceptible groups are divided into two categories: susceptible teenagers without family education S1 and susceptible teenagers with family education S2. Their infection rates are different when they come into contact with infected people. And the infected teenagers are also divided into two categories: game addicted teenagers without family education I1 and game addicted teenagers with family education I2. Their addiction degree and withdrawal ratio are different.

    (ii) Different from the previous literatures, we not only consider the influence of family education on the problem of game addiction, but also take into account the important control means such as isolation and treatment of teenagers addicted to games in reality. This makes the analysis of game addiction more close to the objective reality.

    (iii) We will not only make qualitative analysis on the model, but also make further quantitative simulation analysis on it. In order to find the optimal control strategy, we study the control results and cost-benefit analysis under different combination strategies.

    The healthy growth of young people concerns the future of mankind. At present, the problem of adolescent game addiction has broken out in many parts of the world, and more and more scholars have begun to pay attention to this serious problem. The use of mathematical modeling to analyze adolescent addiction is an important method [13,14,18,19,20,21,22,31]. Inspired by references [14,31] and combined with the control strategies of game addiction, a new mathematical model of game addiction with considering family education is established in this paper.

    The organizational structure of this rest work is as follows. The online game addiction model and its basic properties are shown in section 2. The basic reproduction number R0 and the equilibria are given in section 3. The stability analysis of Addiction-Free Equilibrium is discussed in section 4. The optimal control problem is shown in section 5. The global sensitivity analysis is presented in section 6. Numerical simulation with detailed discussion is given in section 7. The results are summarized and possible suggestions and suggestions are given in section 8.

    In recent years, mathematical modeling method has gained wide attention, and it has been applied to explore the complex dynamics of some real world problems. These models can be used to develop appropriate control strategies to eradicate the disease. Some numerical simulations using these models can predict the spread of the disease. And the threshold of epidemic outbreak can also be obtained from the results of these simulations. The model of infectious disease based on fractional derivative is another effective method to study the dynamics of infectious disease. The mathematical model based on fractional differential equation has memory effect and non-local property, so we have a deeper understanding of the phenomenon. For more information, please refer to [32,33,34,35,36].

    As the lack of family education is crucial to the influence of teenagers' addiction to games, we further consider the factors of family education on the basis of literature [35]. The susceptible population was divided into those who lacked home schooling and those who did not. And among them, the proportion of addicted games is not the same.

    So we divide the total population into six compartments: namely the susceptible people with lack of family education (S1), that is, people who lack family education and spend less than 5 hours on playing games every day[31]. The susceptible people with normal family education (S2), that is, people who have family education and spend less than 5 hours on playing games every day. The infected people with lack of family education (I1), that is, people who lack family education and play games for more than 5 hours per day. The infected people with perfect family education (I2), that is, people who have family education and play games for more than 5 hours per day. The professional people (P), that is, people who are E-sports players or engaged in game related career. The quitting people (Q), that is, people who are no longer addicted to online games. So we have

    N(t)=S1(t)+S2(t)+I1(t)+I2(t)+P(t)+Q(t). (2.1)

    The population flow among those compartments is shown in Figure 1.

    Figure 1.  Transfer diagram of model.

    The transfer diagram leads to the following system of ordinary differential equations:

    {S1(t)=(1m)μN+ξ2S2β1S1α1I1+α2I2N(μ+ξ1)S1,S2(t)=mμN+ξ1S1β2S2α1I1+α2I2N(μ+ξ2)S2,I1(t)=β1S1α1I1+α2I2N+w1I2(μ+v1+v2+v3)I1,I2(t)=β2S2α1I1+α2I2N+v3I1(μ+w1+w2+w3)I2,P(t)=v1I1+w2I2(δ+μ)P,Q(t)=v2I1+w3I2+δPμQ. (2.2)

    In system (2.2), 1m denotes the proportion of teenagers who lack education from their families; μ is the natural birth rate and death rate; ξ1 is the rate of progression to S2 from S1; ξ2 is the rate of progression to S1 from S2; β1 is the proportion of S1 transformed into I1 after contacting addicts; β2 is the proportion of S2 transformed into I2 after contacting addicts; α1 is the transmission rate for contact with I1; α2 is the transmission rate for contact with I2; v1 represents the proportion of I1 who become P; v2 represents the proportion of I1 who become Q; v3 represents the proportion of I1 who become I2; w1 represents the proportion of I2 who become I1; w2 represents the proportion of I2 who become P; w3 represents the proportion of I2 who become Q; δ denotes the quitting rate of P;

    From the practical point of view, we can know that the number of people in each warehouse is nonnegative. So we first prove that the solution is nonnegative. System (2.2) can be rewritten in the form of the following matrix

    X=G(X), (2.3)

    where X=(S1,S2,I1,I2,P,Q)TR6 and G(X) is given by

    G(X)=(G1(X)G2(X)G3(X)G4(X)G5(X)G6(X))=((1m)μN+ξ2S2β1S1α1I1+α2I2N(μ+ξ1)S1mμN+ξ1S1β2S2α1I1+α2I2N(μ+ξ2)S2β1S1α1I1+α2I2N+w1I2(μ+v1+v2+v3)I1β2S2α1I1+α2I2N+v3I1(μ+w1+w2+w3)I2v1I1+w2I2(δ+μ)Pv2I1+w3I2+δPμQ). (2.4)

    So we have,

    Gi(X)|Xi(t)=00,    i=1,2,3,4,5,6.

    From the initial value of system (2.2) and the components of matrix G are nonnegative, we can know that all the solutions of the system are remaining in a positive region. Because of Σ6i=1Gi(x)=0, N(t) is a constant denoted by N. We set

    Ω={(S1,S2,I1,I2,P,Q)R6+ | S1+S2+I1+I2+P+Q=N}. (2.5)

    It is a positive invariant set of system (2.2). The dissipative and the global attractor are still in Ω.

    The basic reproduction number R0 represents "the average number of new infections directly caused by an infected case during his entire infectious period, in a wholly susceptible population". It is a key concept in epidemiology, and is inarguably 'one of the foremost and most valuable ideas that mathematical thinking has brought to epidemic theory'[37].

    Obviously, system (2.2) has Addiction-Free Equilibrium, which is written down as the following

    E0=(N(mμ+μ+ξ2)μ+ξ1+ξ2,N(ξ1+μm)μ+ξ1+ξ2,0,0,0,0). (3.1)

    Next, we obtain the basic reproduction number R0 by using the classical method of next generation matrix. (For details, please refer to reference [38]). Letting x=(I1,I2,P,Q,S1,S2)T, then system (2.2) can be written as

    dxdt=F(x)V(x), (3.2)

    where

    F(x)=(β1S1α1I1+α2I2Nβ2S2α1I1+α2I2N0000),V(x)=(w1I2+(μ+v1+v2+v3)I1v3I1+(μ+w1+w2+w3)I2v1I1w2I2+(δ+μ)Pv2I1w3I2δP+μQ(m1)μNξ2S2+β1S1α1I1+α2I2N+(μ+ξ1)S1mμNξ1S1+β2S2α1I1+α2I2N+(μ+ξ2)S2).

    The Jacobian matrices of F(x) and V(x) at the Addiction-Free Equilibrium E0 are

    DF(E0)=(F2×2000),DV(E0)=(V2×20J1J2),

    where

    F2×2=(β1α1(mμ+μ+ξ2)μ+ξ1+ξ2β1α2(mμ+μ+ξ2)μ+ξ1+ξ2β2α1(mμ+ξ1)μ+ξ1+ξ2β2α2(mμ+ξ1)μ+ξ1+ξ2),V2×2=(μ+v1+v2+v3w1v3μ+w1+w2+w3),
    J1=(v1w2v2w3β1α1(mμ+μ+ξ2)μ+ξ1+ξ2β1α2(mμ+μ+ξ2)μ+ξ1+ξ2β2α1(mμ+ξ1)μ+ξ1+ξ2β2α2(mμ+ξ1)μ+ξ1+ξ2),J2=(δ+μ000δμ0000μ+ξ1ξ200ξ1μ+ξ2).

    Following Driessche et al.[38], the basic reproduction number, denoted by R0, is given by

    R0=ρ(FV1)=β1d2(α1k4+α2v3)+β2d3(α2k3+α1w1)d1(k3k4v3w1),

    where ρ(A) denotes the spectral radius of a matrix A, d1=μ+ξ1+ξ2, d2=μmμ+ξ2, d3=ξ1+mμ, k3=μ+v1+v2+v3 and k4=μ+w1+w2+w3.

    The Addiction Equilibrium E=(S1,S2,I1,I2,P,Q) of system (2.2) is determined by equations:

    (1m)μN+ξ2S2β1S1α1I1+α2I2Nk1S1=0,mμN+ξ1S1β2S2α1I1+α2I2Nk2S2=0,β1S1α1I1+α2I2N+w1I2k3I1=0,β2S2α1I1+α2I2N+v3I1k4I2=0,v1I1+w2I2k5P=0,v2I1+w3I2+δPμQ=0,

    where k1=μ+ξ1, k2=μ+ξ2, k3=μ+v1+v2+v3, k4=μ+w1+w2+w3 and k5=δ+μ. By solving the equations, we have

    S1=b1I1+b2I2b3,S2=a1I1+a2I2a3,I1=β1β2(a2b3b2a3)(λ0)2(w1β2a3+k4β1b3)λ0β1β2(a1b2b1a2)(λ0)2+(v3β1b2+w1β2a1+k3β2a2+k4β1b1)λ0+(v3w1k3k4),I2=β1β2(a3b1b3a1)(λ0)2(k3β2a3+v3β1b3)λ0β1β2(a1b2b1a2)(λ0)2+(v3β1b2+w1β2a1+k3β2a2+k4β1b1)λ0+(v3w1k3k4),P=v1I1+w2I2k5,Q=(k5v2+δv1)I1+(k5w3+δw2)I2μk5,

    where

    a1=ξ1k3k1v3ξ1ξ2k1k2,a2=k1k4ξ1w1ξ1ξ2k1k2,a3=ξ1(1m)μN+k1mμNξ1ξ2k1k2,b1=k2k3ξ2v3ξ1ξ2k1k2,b2=ξ2k4k2w1ξ1ξ2k1k2,b3=k2(1m)μN+ξ2mμNξ1ξ2k1k2,λ0=α1I1+α2I2N.

    Substituting the expression of I1 and I2 into λ0, we get a quadratic equation after simplification.

    F1(λ0)2+F2λ0+F3=0,

    where

    F1=Nβ1β2(k1k2ξ1ξ2)(k3k4v3w1)μ2(μ+ξ1+ξ2)2,F2=N{(β1k2+β2k1)(k3k4w1v3)μβ1β2[α1mw1+α1k4(1m)+mα2k3+α2(1m)]}μ(μ+ξ1+ξ2),F3=N(k3k4v3w1)(1R0).

    We know F1 is positive and F3 is negative when R0>1. Combined with Theorem 2 in [40], we can get the following theorem.

    Theorem 1. In the model (2.2), there exists an Addiction-Free Equilibrium E0=(N(mμ+μ+ξ2)μ+ξ1+ξ2,N(ξ1+μm)μ+ξ1+ξ2,0,0,0,0). And model (2) has:

    (i) If F3<0, then model (2) has a unique Addiction Equilibrium if R0>1,

    (ii) If F2<0, F3=0 or (F2)24F1F3=0, then model (2) has a unique Addiction Equilibrium,

    (iii) If F3>0, F2<0 and (F2)24F1F3>0 then model (2) has two Addiction Equilibrium,

    (iv) Otherwise no endemic equilibrium exists.

    We denote a vector x=(I1,I2,P,Q,S1,S2)T and

    f(x)=(β1S1α1I1+α2I2N+w1I2k3I1β2S2α1I1+α2I2N+v3I1k4I2v1I1+w2I2k5Pv2I1+w3I2+δPμQ(1m)μN+ξ2S2β1S1α1I1+α2I2Nk1S1mμN+ξ1S1β2S2α1I1+α2I2Nk2S2). (4.1)

    So the Jacobian matrix of f(x) about vector x is as the following:

    J=f(x)x=(β1α1S1Nk3β1α2S1N+w100β1α1I1+α2I2N0β2α1S2N+v3β2α2S2Nk4000β2α1I1+α2I2Nv1w2k5000v2w3δμ00β1α1S1Nβ1α2S1N00β1α1I1+α2I2Nk1ξ2β2α1S2Nβ2α2S2N00ξ1β2α1I1+α2I2Nk2).

    Theorem 2. For the system (2.2), the Addiction-Free Equilibrium E0 is Locally Asymptotically Stable (LAS) if R0<1.

    Proof. Since

    J(E0)=(β1α1mμ+μ+ξ2μ+ξ1+ξ2k3β1α2mμ+μ+ξ2μ+ξ1+ξ2+w10000β2α1ξ1+mμμ+ξ1+ξ2+v3β2α2ξ1+mμμ+ξ1+ξ2k40000v1w2k5000v2w3δμ00β1α1mμ+μ+ξ2μ+ξ1+ξ2β1α2mμ+μ+ξ2μ+ξ1+ξ200k1ξ2β2α1ξ1+mμμ+ξ1+ξ2β2α2ξ1+mμμ+ξ1+ξ200ξ1k2)=(M0J3J4),

    where

    M=(β1α1mμ+μ+ξ2μ+ξ1+ξ2k3β1α2mμ+μ+ξ2μ+ξ1+ξ2+w1β2α1ξ1+mμμ+ξ1+ξ2+v3β2α2ξ1+mμμ+ξ1+ξ2k4).

    It is easily known that the eigenvalues of J4 are λ1=k5,  λ2=λ3=μ,  λ4=k1ξ2 and they are all negative. The characteristic equation of characteristic matrix of M is

    A1λ2+A2λ+A3=0,

    where

    A1=d21,A2=d21(k3+k4)β2α2d3d1β1α1d1d2,A3=d21k3k4β2α2d3d1k3β1α1d1d2k4+d21w1v3+β2α1w1d1d3β1α2v3d1d2,

    and

    d1=μ+ξ1+ξ2,d2=μm+μ+ξ2,d3=ξ1+μm.

    Let's replace R0 with the following shorthand.

    R0=β1d2(α1k4+α2v3)+β2d3(α2k3+α1w1)d1(k3k4v3w1).

    Due to 0<R0<1, so we have

    A1>0,A2>0,A3>0.

    So the real part of all eigenvalues of M are negative, the Addiction-Free Equilibrium (AFE) E0 is LAS. The proof is completed.

    Theorem 3. For the system (2.2), the Addiction-Free Equilibrium E0 is Globally Asymptotically Stable (GAS) if R0<1.

    Proof. We introduce the Lyapunov function V as follows:

    V(t)=I1(t)+I2(t).

    So

    V(t)=β1S1α1I1+α2I2N+w1I2k3I1+β2S2α1I1+α2I2N+v3I1k4I2 =I1[β1S1α1Nk3+β2S2α1N+v3]+I2[β1S1α2N+w1+β2S2α2Nk4] =I1[β1α1d2d1k3+β2α1d3d1+v3]+I2[β1α2d2d1+w1+β2α2d3d1k4] =I1[β1α1d2d1k3d1+β2α1d3d1v3d1]+I2[β1α2d2+d1w1d1+β2α2d3d1k4d1] +I1d1[β1α1d2k4d1k3k4k4+β2α1d3w1d1v3w1w1] +I2d1[β1α2d2v3+d1w1v3v3+β2α2d3k3d1k4k3k3] =I1d1k4w1[w1(β1α1d2k4d1k3k4)+k4(β2d3α1w1+d1v3w1)] +I2d1v3k3[k3(β1α2d2v3+d1v3w1)+v3(β2α2d3k3d1k4k3)] <I1d1k4w1[β1α1d2k4d1k3k4+β2d3α1w1+d1v3w1] +I2d1v3k3[β1α2d2v3+d1v3w1+β2α2d3k3d1k4k3] <I1d1k4w1(R01)[d1(k3k4v3w1)]+I2d1v3k3(R01)[d1(k3k4v3w1)].

    Because 0<R0<1, we can obtain the conclusion that V(t)0. Due to the LaSalles Invariance Principle[39], the Addiction-Free Equilibrium E0 is Globally Asymptotically Stable.

    In order to explore how to better control or inhibit the problem of game addiction, we add three control means (family education u1, isolation u2,u3, treatment u4,u5) on the basis of system (2.2), and get the following new state system.

    {S1(t)=(1m)μN+ξ2S2(1u2)β1S1α1I1+α2I2N(μ+ξ1+θ1u1)S1,S2(t)=mμN+(ξ1+θ1u1)S1(1u3)β2S2α1I1+α2I2N(μ+ξ2)S2,I1(t)=(1u2)β1S1α1I1+α2I2N+w1I2(μ+v1+v2+v3+θ2u4)I1,I2(t)=(1u3)β2S2α1I1+α2I2N+v3I1(μ+w1+w2+w3+θ3u5)I2,P(t)=v1I1+w2I2(δ+μ)P,Q(t)=(v2+θ2u4)I1+(w3+θ3u5)I2+δPμQ, (5.1)

    where θ1 indicates the proportion of susceptible people in adolescence who lack family education are transformed into normal susceptible people under the communication and education of family members; θ2 and θ3 respectively indicate the proportion of addicts who lack family education and normal family addicts who quit the game through formal treatment. The control variables U(t)=(u1,u2,u3,u4,u5)Λ are bounded and measured with

    Λ={(u1,u2,u3,u4,u5)|ui(t) is Lebesgue measurable on [0,1], i=1,2,3,4,5}. (5.2)

    Our control goal is not only to minimize the number of game addicts, but also to keep the cost as low as possible. So we consider this objective function

    J(u1,u2,u3,u4,u5)=tf0[A1I1+A2I2+B12u21+B22u22+B32u23+B42u24+B52u25]dt, (5.3)

    where A1,A2 are the weight coefficients relate to addicts. The constants B1,B2,B3,B4,B5 are the weight coefficients of the control variables u1,u2,u3,u4 and u5. Thus we need to find the optimal control such that

    J(u1,u2,u3,u4,u5)=min(u1,u2,u3,u4,u5)ΛJ(u1,u2,u3,u4,u5). (5.4)

    Through the Pontryagin's maximum principle[40], we consider the Hamiltonian function as follows

    H=A1I1+A2I2+B12u21+B22u22+B32u23+B42u24+B52u25+λ1[(1m)μN+ξ2S2(1u2)β1S1α1I1+α2I2N(μ+ξ1+θ1u1)S1]+λ2[mμN+(ξ1+θ1u1)S1(1u3)β2S2α1I1+α2I2N(μ+ξ2)S2]+λ3[(1u2)β1S1α1I1+α2I2N+w1I2(μ+v1+v2+v3+θ2u4)I1]+λ4[(1u3)β2S2α1I1+α2I2N+v3I1(μ+w1+w2+w3+θ3u5)I2]+λ5[v1I1+w2I2(δ+μ)P]+λ6[(v2+θ2u4)I1+(w3+θ3u5)I2+δPμQ],

    where λi (i=1,2,3,4,5,6) are the adjoint variables that satisfy this following adjoint system.

    λ1(t)=HS1(t)=λ1[(1u2)β1α1I1+α2I2N+μ+ξ1+θ1u1]λ2(ξ1+θ1u1)λ3(1u2)β1α1I1+α2I2N, (5.5)
    λ2(t)=HS2(t)=λ1ξ2+λ2[(1u3)β2α1I1+α2I2N+μ+ξ2]λ4(1u3)β2α1I1+α2I2N, (5.6)
    λ3(t)=HI1(t)=A1+λ1(1u2)β1S1α1N+λ2(1u3)β2S2α1Nλ3[(1u2)β1S1α1N(μ+v1+v2+v3+θ2u4)]λ4[(1u3)β2S2α1N+v3]λ5v1λ6(v2+θ2u4), (5.7)
    λ4(t)=HI2(t)=A2+λ1[(1u2)β1S1α2N]+λ2[(1u3)β2S2α2N]λ3[(1u2)β1S1α2N+w1]λ4[(1u3)β2S2α2N(μ+w1+w2+w3+θ3u5)]λ5w2λ6(w3+θ3u5), (5.8)
    λ5(t)=HP(t)=λ5(μ+δ)λ6δ, (5.9)
    λ6(t)=HQ(t)=λ6μ. (5.10)

    The corresponding terminal condition of the above adjoint system is

    λi(tf)=0,i=1,2,3,4,5,6, (5.11)

    and the optimal controls u1,u2,u3,u4,u5 are given by

    ui=max{0,min{umax,uci}},i=1,2,3,4,5,

    where

    uc1=(λ1λ2)θ1S1B1,uc2=(λ3λ1)β1S1(α1I1+α2I2)B2Nuc3=(λ4λ2)β2S2(α1I1+α2I2)B3N,uc4=(λ3λ6)θ2I1B4,uc5=(λ4λ6)θ3I2B5.

    In this section, we will study global sensitivity analysis (SA) of the model's base reproduction number R0 to identify those model parameters that have the greatest impact on disease dynamics. Global sensitivity analysis is used to quantify the uncertainty in a mathematical model. The most effective combination of methods is to quantify the sensitivity of the model parameters using numerical simulation results of Latin hypercube sampling (LHS) and partial rank correlation coefficient (PRCC). LHS is a layered sampling technique without substitution that allows efficient analysis of variations in each parameter within an uncertain range. PRCC measures the strength of the relationship between the output results and parameters of the model, and indicates the degree of influence of each parameter on the results. To generate the LHS matrix, all model parameters are uniformly distributed. Referring to relevant literatures[13,14,31], we assume that the baseline values of all parameters are: m=0.8, μ=0.04, ξ1=0.05, ξ2=0.15, β1=0.7, β2=0.45, α1=0.4, α2=0.55, v1=0.05, v2=0.08, v3=0.05, w1=0.15, w2=0.15, w3=0.1, δ=0.25. We then ran a total of 1,000 simulations. PRCC values and corresponding P-values of each parameter in R0 of model (2.2) are shown in Figure 2 and Table 1.

    Figure 2.  Global sensitivity analysis and PRCC values for R0 of model (2).
    Table 1.  PRCC and p values of various parameters relative to R0.
    Parameter Description PRCC p values
    m Proportion of adolescents who do not lack family education -0.034930 0.272941
    μ Natural birth rate and death rate 0.276473 0.000000
    ξ1 Rate of progression to S2 from S1 -0.322041 0.000000
    ξ2 Rate of progression to S1 from S2 0.104569 0.001002
    β1 Proportion of S1 transformed into I1 after contacting addicts 0.100724 0.001532
    β2 Proportion of S2 transformed into I2 after contacting addicts -0.274462 0.000000
    α1 Contact rate with I1 -0.257937 0.000000
    α2 Contact rate with I2 -0.035295 0.267957
    v1 Rate of moving from I1 to P 0.161219 0.000000
    v2 Quitting rate of I1 -0.030155 0.343962
    v3 Rate of moving from I1 to I2 0.152900 0.000001
    w1 Rate of moving from I2 to I1 -0.216609 0.000000
    w2 Rate of moving from I2 to P -0.068203 0.032155
    w3 Quitting rate of I2 -0.029274 0.358249

     | Show Table
    DownLoad: CSV

    The larger the absolute value of PRCC of the parameter is, the greater its influence on the basic regeneration number is. And R0 is more sensitive to the parameter with smaller p value. As can be seen from Figure 2, μ, ξ2, β1, v1 and v3 have large positive PRCC values, while ξ1, β2, α1 and w1 have large negative PRCC values. If we want to lower the R0 value to control the spread of the game, we can lower the parameter with a positive PRCC value, or increase the parameter with a negative PRCC value.

    Figures 39 show the influence of different model parameters on R0 value. And we can see what happens to R0 when the parameters change. In Figure 3 we can see that R0 increases as m and μ increase. In Figure 4 we can see that R0 decreases as ξ1 increases and increases as ξ2 increases. In Figures 5 and 6, we can see that R0 increases as β1, β2, α1 and α2 increases. In Figure 7 we can see that R0 decreases as v1 and v2 increase. In Figure 8, we can see that R0 decreases as v3 increases and increases as w1 increases. Figure 9 reflects that R0 decreases with the increase of w2 and w3. All of this information tells us that we can control the spread of the game by taking corresponding measures in our lives.

    Figure 3.  Behavior of R0 versus the parameters m and μ.
    Figure 4.  Behavior of R0 versus the parameters ξ1 and ξ2.
    Figure 5.  Behavior of R0 versus the parameters β1 and β2.
    Figure 6.  Behavior of R0 versus the parameters α1 and α2.
    Figure 7.  Behavior of R0 versus the parameters v1 and v2.
    Figure 8.  Behavior of R0 versus the parameters v3 and w1.
    Figure 9.  Behavior of R0 versus the parameters w2 and w3.

    In this section, we use the forward backward sweep method with the fourth order Runge-Kutta scheme to solve the above optimal system. The process of the algorithm is as follows: the first step is to guess a reasonable initial value of the control variable and use the fourth order Runge-Kutta method to solve the state system from front to back according to time. The second step is to solve the adjoint system forwards. The third step is to substitute the obtained state solution and adjoint solution into the expression of the control variables and update the value of the control variables by a convex combination. The fourth step is to continue the iteration with the new control variables until the two adjacent optimal solutions are close enough. For more details of the algorithm, please refer to [41,42,43].

    In order to compare the effect of different control measures, we combine the three control measures and get the following control strategy.

    Scenario 1: Single control strategies

      Strategy A: family education only (u1).

      Strategy B: isolation only (u2,u3).

      Strategy C: treatment only (u4,u5).

    Scenario 2: Double control strategies

      Strategy D: family education (u1) + isolation (u2,u3).

      Strategy E: family education (u1) + treatment (u4,u5).

      Strategy F: isolation (u2,u3) + treatment (u4,u5).

    Scenario 3: Triple control strategies

      Strategy G: family education (u1) + isolation (u2,u3) + treatment (u4,u5).

    The main object of this study is 12–24 years old children and youth in Chinese mainland. According to some relevant statistics[1], we choose the initial value of each warehouse as follows: S1(0)=20, S2(0)=100, I1(0)=5, I2(0)=5, P(0)=2, Q(0)=6(units in million). With the help of [13,14,31], other parameter values we selected are as follows: m=0.8, μ=0.04, ξ1=0.05, ξ2=0.15, β1=0.7, β2=0.45, α1=0.4, α2=0.55, v1=0.05, v2=0.08, v3=0.05, w1=0.15, w2=0.15, w3=0.1, δ=0.25, θ1=0.6, θ2=0.25, θ3=0.5. The weight coefficients of the objective function are as follows: A1=30, A2=10, B1=1, B2=10, B3=10, B4=50, B5=50. As many control measures are very difficult to achieve 100% in the actual implementation process, the control variable ui(t) (i=1,2,3,4,5) are subjected to the constraints[44],

    0ui(t)umax=0.8.

    The implementation of the whole control measures is set at 100 days.

    Scenario 1: Single control strategies

    The population change diagram of I1 and I2 warehouses without control and strategy A, B and C in scenario 1 are shown in Figure 10. In Figure 10 (a), we can see that without the intervention of control measures, the addicts who lack family education I1 will reach the peak in the following period of time, and then gradually tend to be stable. In strategy A, B and C, the number of addicts without family education is significantly reduced. Strategy A is the slowest and strategy C is the fastest. In Figure 10 (b), we can see that without the intervention of control measures, the addicts in normal families I2 will gradually drop to a certain height and then remain stable. I2 in strategy A, B and C will also decrease. Similar to Figure 2 (a), strategy A decreases the slowest and strategy C decreases the fastest.

    Figure 10.  Simulation of the strategy A to C in scenario 1 for: (a) total number of game addicts without family education; (b) total number of game addicts with family education.

    The change of optimal control variables of each control strategy in scenario 1 are shown in Figure 11. In Figure 11 (a), we can see that in strategy A, the intensity of family education u1 needs to be maintained at the maximum value of 0.8 from the beginning to the end. As can be seen from Figure 11 (b) and (c), the control intensity of u2, u3, u4 and u5 is maintained at the maximum intensity of 0.8 at the beginning, and then gradually decreases to 0 from the 38th day, the 18th day, the 16th day and the 6th day respectively.

    Figure 11.  Optimal control strategies in scenario 1.

    From the comparison of strategy A, B, C and without control, we can see that the effect of using strategy A to control is not ideal, which is worse than using strategy B and strategy C. Therefore, we know that it is not enough to rely only on family education in controlling teenagers' game addiction.

    As can be seen from the comparison results in Figure 10, when control measures are used alone, the most effective control measure is the treatment measure. With treatment, teenagers in I1 and I2 who are addicted to video games can be quickly brought back into normal life. In Figure 11 (c), the variation rules of control variables u4 and u5 in strategy C are shown. Compared with treatment u5 for adolescents without lack of family education, treatment u4 for adolescents without lack of family education should last longer at the maximum intensity of 0.8, and then gradually decrease.

    Scenario 2: Double control strategies

    Figure 12 (a) and (b) respectively show the number of game addicts without family education I1 and the number of game addicts with family education I2 of strategy D, E and F in scenario 2. These results are similar to those in strategy B and C, and are ideal.

    Figure 12.  Simulation of the strategy D to F in scenario 2 for: (a) total number of game addicts without family education; (b) total number of game addicts with family education.

    Figure 13 (a) shows the changes in the control variables of strategy D. At the beginning, u1, u2 and u3 kept at the level of 0.8, and then gradually decreased to 0 at the 43rd day, the 19th day and the 25th day, respectively. Figure 13 (b) shows the change of control variables of strategy E. At the beginning, u1, u4 and u5 kept at the level of 0.8, and then gradually decreased to 0 at the 57th day, the 9th day and the 6th day, respectively. Figure 13 (c) shows the changes in the control variables of strategy F. u2, u3, u4 and u5 all kept at the level of 0.8 at the beginning, and then gradually decreased to 0 at the 20th, 7th, 6th and 3rd day, respectively.

    Figure 13.  Optimal control strategies in scenario 2.

    As can be seen from the comparison results in Figure 12, when the two control measures are combined, the most effective control strategy is strategy F (isolation and treatment), which can rapidly reduce the number of people in I1 and I2. From Figure 13 (c), we can see how the strength of each control variable of policy F should change. It can be seen that the control variables u2 and u4 for adolescents with lack of family education will last longer and require greater intensity compared with u3 and u5. It also suggests that in the real world, isolation and treatment programs for gaming addicts should be developed quickly to help teens overcome their addiction.

    Scenario 3: Triple control strategies

    Figure 14 (a) and (b) respectively show the number of game addicts without family education I1 and the number of game addicts with family education I2 of strategy G in scenario 3. In Figure 15, the change process of the control variables of strategy G is shown. All the control variables u1, u2, u3, u4 and u5 were kept at the maximum strength of 0.8 at the beginning, and then gradually decreased to 0 from the 25th day, the 9th day, the 11th day, the 6th day and the 3rd day respectively.

    Figure 14.  Simulation of the strategy G in scenario 3 for: (a) total number of game addicts without family education; (b) total number of game addicts with family education.
    Figure 15.  Optimal control strategies in scenario 3.

    As can be seen from Figure 14, when strategy G is adopted, the number of people in compartment I1 and I2 will decrease rapidly to the end. This is a very desirable result. Figure 15 shows the change rules of each control variable. By comparing with Figure 13(c), we find that the additional control measure, family education u1, needs to be implemented for a longer time and with a greater intensity. This mainly depends on the implementation of family education, which needs to invest a lot of manpower in a certain period of time and rebuild a harmonious family environment through effective communication.

    What we are concerned about is that the number of addicts in the whole control process is as small as possible, but from the image, it is difficult to distinguish the total number of addicts under each strategy. Therefore, we need to further analyze and compare these control strategies from specific data.

    Cost-effectiveness analysis is to evaluate the rationality of the strategy by calculating the incremental cost-effectiveness ratio (ICER) generated in the process of strategy implementation[26,45]. The ICER of strategy A relative to strategy B is defined as follow.

    ICER=TC(B)TC(A)TA(B)TA(A), (7.1)

    where TC(B) denotes the total cost of strategy B in implementation, TA(B) indicates that the total number of averted infectious people in the implementation process of strategy B compared with that without control. The definition expression of the total cost (TC) is as follows

    TC=tf0[C1u1(S1+I1)+C2u2I1+C3u3I2+C4u4I1+C5u5I2]dt, (7.2)

    where C1=2, C2=30, C3=20, C4=50, C5=40 (unit: $). There are several underlying assumptions here.

    (1) C1 is the cost per person per day when family education u1 measure is taken. When the family education measure u1 is implemented, the cost consumed per person per day is C1. It is worth noting that the implementation of family education will not only be applied in the addict without family education I1, but also in the susceptible person without family education S1. This will allow S1 to be converted into S2 as much as possible and reduce the number of people flowing into I1. Family care mainly depends on the communication and understanding between the guardian and the teenagers, so the cost consumption here is relatively small. Let's take C1 = 2.

    (2) C2 and C3 represent the cost per person per day to isolate people in I1 and I2, respectively. The mechanics of game addiction are similar to those of drug addiction. Once the addict is separated from the internet, he will have obvious withdrawal reaction in a short time. In addition, teenagers are in adolescence, easy to appear rebellious psychology and behavior. Therefore, the cost of isolation measures will be relatively high, especially for addicts without family education. Through some social surveys, we assume the cost coefficient C2=30, C3=20.

    (3) C4 and C5 represent pharmacological interventions for I1 and I2, respectively. The Chinese mainland now has more than 100 internet addiction treatment institutions[31]. The clinic doctors and other professionals in the institution carry out comprehensive auxiliary treatment for game addicts, such as drug, physical and skill training. Institutions also set up learning rooms, libraries, painting rooms, gyms, karaoke rooms and so on, through a variety of courses to addiction patients' attention from online to offline, cultivate their various interests, from interaction with the game screen to interpersonal interaction in real life. The treatment cycle is usually 3 months. Through some statistical investigation, we assume that the cost coefficient C4 = 50, C5 = 40.

    The definition expression of the total averted cases (TA) is as follows

    TA=tf0[I1+I2(~I1+~I2)]dt, (7.3)

    where I1,I2 denote the addicts without and with family education of without control respectively, ~I1,~I2 denote the addicts without and with family education of one strategy respectively. tf0(I1+I2)dt is the total number of people infected (TI) in the whole process of without control. We show the value of infection averted ratio (IAR) and incremental cost-effectiveness ratio (ICER) under all control strategies (A to G) in Table 2.

    Table 2.  Cost-effectiveness analysis.
    Strategy Total infectious individuals(TI) Total averted infectious individuals (TA) Infection averted ratio (IAR) Total cost (TC) Incremental cost-effectiveness ratio (ICER)
    Without control 822.9791
    Strategy A 360.995 461.9841 56.1356% 4440.3631 9.6115
    Strategy B 63.6281 759.351 92.2686% 1342.0565 1.7674
    Strategy C 45.5386 777.4405 94.4666% 1519.1446 1.954
    Strategy D 60.8233 762.1559 92.6094% 5318.909 6.9788
    Strategy E 40.1017 782.8774 95.1272% 5479.51 6.9992
    Strategy F 27.6217 795.3575 96.6437% 1401.9382 {1.7627}
    Strategy G 27.4705 795.5087 96.6621% 5110.0695 6.4237

     | Show Table
    DownLoad: CSV

    From the ICER data in the last column of Table 2, we can know that ICER(F) = 1.7627 is the smallest, which means that more people can avoid being addicted to the game with the least cost. When the policy budget is limited, we should choose strategy F as the optimal control strategy.

    From the IAR data of each strategy in Table 2, we can see that strategy G has the largest proportion of avoiding being addicted to the game. When the policy budget is adequate, we should choose strategy G as the optimal control strategy from the perspective of people-oriented, so that as many people as possible can avoid being addicted to the game.

    The lack of family education has a great impact on Teenagers' game addiction. In this paper, a six dimensional nonlinear deterministic online game addiction model considering the impact of lack of family education on teenagers' game addiction was established. By the next generation matrix, we obtained the expression of the basic reproduction number R0. Then some dynamic properties of the model were analyzed. In the analysis of optimal control theory, an optimal system with three control measures was established. Through the Pontryagin's maximum principle, we got the expression of the optimal control pairs.

    In the numerical simulation, the combination of LHS and PRCC is used to perform global sensitivity analysis of the parameters in R0, and the relationship between R0 and all parameters is shown in the graph. We combined the three control measures (family education, isolation and treatment) and simulated the seven control strategies in three scenarios by using the forward backward sweep method with fourth order Runge-Kutta scheme. Then the cost-effectiveness analysis was carried out, and different optimal control strategies under different budget situations were determined through ICER and IAR data under different combination strategies.

    Through the above analysis, we found that the combination of isolation and treatment was the optimal control strategy in the case of limited budget. When the budget was adequate, if the control measures of family education were added, more teenagers could avoid being addicted to online games.

    The authors declare no conflict of interest.



    [1] Y. Wang, S. Cang, H. Yu, A survey on wearable sensor modality centred human activity recognition in health care, Expert Syst. Appl., 137 (2019), 167–190. https://doi.org/10.1016/j.eswa.2019.04.057 doi: 10.1016/j.eswa.2019.04.057
    [2] L. M. Dang, K. Min, H. Wang, M. J. Piran, C. H. Lee, H. Moon, Sensor-based and vision-based human activity recognition: A comprehensive survey, Pattern Recogn., 108 (2020), 107561. https://doi.org/10.1016/j.patcog.2020.107561 doi: 10.1016/j.patcog.2020.107561
    [3] K. A. Ogudo, R. Surendran, O. I. Khalaf, Optimal artificial intelligence based automated skin lesion detection and classification model, Comput. Syst. Sci. Eng., 44 (2023), 693–707. https://doi.org/10.32604/csse.2023.024154 doi: 10.32604/csse.2023.024154
    [4] A. Subasi, M. Radhwan, R. Kurdi, K. Khateeb, IoT based mobile healthcare system for human activity recognition, Proceedings of the 15th learning and technology conference (L & T), Jeddah, Saudi Arabia, (2018), 29–34. https://doi.org/10.1109/LT.2018.8368507
    [5] N. Ahmed, J. I. Rafiq, M. R. Islam, Enhanced human activity recognition based on smartphone sensor data using hybrid feature selection model, Sensors, 20 (2020), 317. https://doi.org/10.3390/s20010317 doi: 10.3390/s20010317
    [6] W. Taylor, S. A. Shah, K. Dashtipour, A. Zahid, Q. H. Abbasi, M. A. Imran, An intelligent non-invasive real-time human activity recognition system for next-generation healthcare, Sensors, 20 (2020), 2653. https://doi.org/10.3390/s20092653 doi: 10.3390/s20092653
    [7] S. Mekruksavanich, A. Jitpattanakul, Biometric user identification based on human activity recognition using wearable sensors: An experiment using deep learning models, Electronics, 10 (2021), 308. https://doi.org/10.3390/electronics10030308 doi: 10.3390/electronics10030308
    [8] V. Bianchi, M. Bassoli, G. Lombardo, P. Fornacciari, M. Mordonini, I. De Munari, IoT wearable sensor and deep learning: An integrated approach for personalized human activity recognition in a smart home environment, IEEE Internet Things, 6 (2019), 8553–8562. https://doi.org/10.1109/JIOT.2019.2920283 doi: 10.1109/JIOT.2019.2920283
    [9] N. Golestani, M. Moghaddam, Human activity recognition using magnetic induction-based motion signals and deep recurrent neural networks, Nat. Commun., 11 (2020), 1–11. https://doi.org/10.1038/s41467-020-15086-2 doi: 10.1038/s41467-020-15086-2
    [10] B. Vidya, P. Sasikumar, Wearable multisensor data fusion approach for human activity recognition using machine learning algorithms, Sensor. Actuat. A-Phys., 341 (2022), 113557. https://doi.org/10.1016/j.sna.2022.113557 doi: 10.1016/j.sna.2022.113557
    [11] M. M. Hassan, M. Z. Uddin, A. Mohamed, A. Almogren, A robust human activity recognition system using smartphone sensors and deep learning, Future Gener. Comp. Sy., 81 (2018), 307–313. https://doi.org/10.1016/j.future.2017.11.029 doi: 10.1016/j.future.2017.11.029
    [12] Y. Jia, Y. Guo, G. Wang, R. Song, G. Cui, X. Zhong, Multi-frequency and multidomain human activity recognition based on SFCW radar using deep learning, Neurocomputing, 444 (2021), 274–287. https://doi.org/10.1016/j.neucom.2020.07.136 doi: 10.1016/j.neucom.2020.07.136
    [13] X. Zhou, W. Liang, I. Kevin, K. Wang, H. Wang, L. T. Yang, et al., Deep-learning-enhanced human activity recognition for Internet of healthcare things, IEEE Internet Things, 7 (2020), 6429–6438. https://doi.org/10.1109/JIOT.2020.2985082 doi: 10.1109/JIOT.2020.2985082
    [14] A. Gumaei, M. M. Hassan, A. Alelaiwi, H. Alsalman, A hybrid deep learning model for human activity recognition using multimodal body sensing data, IEEE Access, 7 (2019), 99152–99160. https://doi.org/10.1109/ACCESS.2019.2927134 doi: 10.1109/ACCESS.2019.2927134
    [15] Z. Chen, L. Zhang, C. Jiang, Z. Cao, W. Cui, WiFi CSI based passive human activity recognition using attention-based BLSTM, IEEE T. Mobile Comput., 18 (2018), 2714–2724. https://doi.org/10.1109/TMC.2018.2878233 doi: 10.1109/TMC.2018.2878233
    [16] D. Thakur, S. Biswas, E. S. Ho, S. Chattopadhyay, Convae-lstm: Convolutional autoencoder long short-term memory network for smartphone-based human activity recognition, IEEE Access, 10 (2022), 4137–4156. https://doi.org/10.1109/ACCESS.2022.3140373 doi: 10.1109/ACCESS.2022.3140373
    [17] S. Wan, L. Qi, X. Xu, C. Tong, Z. Gu, Deep learning models for real-time human activity recognition on smartphones, Mobile Netw. Appl., 25 (2020), 743–755. https://doi.org/10.1007/s11036-019-01445-x doi: 10.1007/s11036-019-01445-x
    [18] H. Guan, B. Tang, X. Zhou, H. Tan, Z. Liang, Y. Li, et al., Reliability analysis of boom of new lifting equipment based on improved wolf swarm algorithm, J. Eng., 2023 (2023). https://doi.org/10.1049/tje2.12202
    [19] A. A. Malibari, S. S. Alotaibi, R. Alshahrani, S. Dhahbi, R. Alabdan, F. N. Al-wesabi, et al., A novel metaheuristic with deep learning enabled intrusion detection system for secured smart environment, Sustain. Energy Techn., 52 (2022), 102312. https://doi.org/10.1016/j.seta.2022.102312 doi: 10.1016/j.seta.2022.102312
    [20] M. H. Alharbi, A. N. Alqefari, Y. A. Alhawday, A. F. Alghammas, A. Hershan, Association of menstrual and reproductive factors with thyroid cancer in Saudi female patients, J. Umm Al-Qura University Medical Sci., 7 (2021), 11–13. https://doi.org/10.54940/ms81150310 doi: 10.54940/ms81150310
    [21] F. Alrowais, S. Althahabi, S. Alotaibi, A. Mohamed, M. A. Hamza, Automated machine learning enabled cyber security threat detection in Internet of things environment, Comput. Syst. Sci. Eng., 45 (2023), 687–700. https://doi.org/10.32604/csse.2023.030188 doi: 10.32604/csse.2023.030188
    [22] S. Rajagopal, T. Thanarajan, Y. Alotaibi, S. Alghamdi, Brain tumor: Hybrid feature extraction based on UNET and 3DCNN, Comput. Syst. Sci. Eng., 45 (2023), 2093–2109. https://doi.org/10.32604/csse.2023.032488 doi: 10.32604/csse.2023.032488
    [23] K. Nagappan, S. Rajendran, Y. Alotaibi, Trust aware Multi-Objective metaheuristic Optimization-Based secure route planning technique for Cluster-Based IIoT environment, IEEE Access, 10 (2022), 112686–112694. https://doi.org/10.1109/ACCESS.2022.3211971 doi: 10.1109/ACCESS.2022.3211971
    [24] M. A. Duhayyim, A. A. Malibari, S. Dhahbi, M. K. Nour, I. Al-Turaiki, Sailfish optimization with deep learning based oral cancer classification model, Comput. Syst. Sci. Eng., 45 (2023), 753–767. https://doi.org/10.32604/csse.2023.030556 doi: 10.32604/csse.2023.030556
    [25] R. Edwards, M. Wood, Branch prioritization motifs in biochemical networks with sharp activation. AIMS Math., 7 (2022), 1115–1146. https://doi.org/10.3934/math.2022066 doi: 10.3934/math.2022066
    [26] A. Q. Khan, Z. Saleem, T. F. Ibrahim, K. Osman, F. M. Alshehri, M. A. El-Moneam, Bifurcation and chaos in a discrete activator-inhibitor system, AIMS Math., 8 (2023), 4551–4574. https://doi.org/10.3934/math.2023225 doi: 10.3934/math.2023225
    [27] https://archive.ics.uci.edu/ml/datasets/Smartphone+Dataset+for+Human+Activity+Recognition+%28HAR%29+in+Ambient+Assisted+Living+%28AAL%29
    [28] Y. Tang, L. Zhang, F. Min, J. He, Multiscale deep feature learning for human activity recognition using wearable sensors, IEEE T. Ind. Electron., 70 (2023), 2106–2116. https://doi.org/10.1109/TIE.2022.3161812 doi: 10.1109/TIE.2022.3161812
    [29] T. Tamilvizhi, R. Surendran, K. Anbazhagan, K. Rajkumar, Quantum behaved particle swarm Optimization-Based deep transfer learning model for sugarcane leaf disease detection and classification, Math. Probl. Eng., 2022 (2022), 3452413. https://doi.org/10.1155/2022/3452413 doi: 10.1155/2022/3452413
    [30] C. Han, L. Zhang, Y. Tang, W. Huang, F. Min, J. He, Human activity recognition using wearable sensors by heterogeneous convolutional neural networks, Expert Syst. Appl., 198 (2022), 116764. https://doi.org/10.1016/j.eswa.2022.116764 doi: 10.1016/j.eswa.2022.116764
    [31] K. Wang, J. He, L. Zhang, Sequential weakly labeled multiactivity localization and recognition on wearable sensors using recurrent attention networks, IEEE T. Hum-Mach. Syst., 51 (2021), 355–364. https://doi.org/10.48550/arXiv.2004.05768 doi: 10.48550/arXiv.2004.05768
  • This article has been cited by:

    1. Shi Yin, Fengyu Guo, Yuanyuan Yu, Yibo Li, Kifayat Ullah, Practical teaching method innovation decisions related to labor and reading at agricultural colleges based on entropy-fuzzy AHP combination weights, 2023, 8, 2473-6988, 7641, 10.3934/math.2023383
    2. Belela Samuel Kotola, Shewafera Wondimagegnhu Teklu, Muhammad Fazal Ijaz, A Mathematical Modeling Analysis of Racism and Corruption Codynamics with Numerical Simulation as Infectious Diseases, 2022, 2022, 1748-6718, 1, 10.1155/2022/9977727
    3. Youming Guo, Tingting Li, Fractional-order modeling and optimal control of a new online game addiction model based on real data, 2023, 10075704, 107221, 10.1016/j.cnsns.2023.107221
    4. Ahmed Alshehri, Saif Ullah, Optimal control analysis of Monkeypox disease with the impact of environmental transmission, 2023, 8, 2473-6988, 16926, 10.3934/math.2023865
    5. Abu Safyan Ali, Shumaila Javeed, Zeshan Faiz, Dumitru Baleanu, Zilin Gao, Mathematical modelling, analysis and numerical simulation of social media addiction and depression, 2024, 19, 1932-6203, e0293807, 10.1371/journal.pone.0293807
    6. Ting-Ting Ding, Shu-Shen Liu, Ze-Jun Wang, Peng Huang, Meng-Ting Tao, Zhong-Wei Gu, A novel mixture sampling strategy combining latin hypercube sampling with optimized one factor at a time method: A case study on mixtures of antibiotics and pesticides, 2024, 461, 03043894, 132568, 10.1016/j.jhazmat.2023.132568
    7. Yanchao Liu, Pengzhou Zhang, Deyu Li, Junpeng Gong, Dynamic analysis and optimum control of a rumor spreading model with multivariate gatekeepers, 2024, 9, 2473-6988, 31658, 10.3934/math.20241522
    8. Yasir Ramzan, Aziz Ullah Awan, Muhammad Ozair, Takasar Hussain, Rahimah Mahat, Innovative strategies for Lassa fever epidemic control: a groundbreaking study, 2023, 8, 2473-6988, 30790, 10.3934/math.20231574
    9. Ling Zhang, Xuewen Tan, Jia Li, Fan Yang, Dynamic analysis and optimal control of leptospirosis based on Caputo fractional derivative, 2024, 19, 1556-1801, 1262, 10.3934/nhm.2024054
    10. Asriani Arsita Asni, Ilham Minggi, Syafruddin Side, Fajar Arwadi, Usman Mulbar, N.Z. Abd Hamid, W.-H. Chen, S. Side, W. Sanusi, M.A. Naufal, Mathematical Model of Celebrity Worship Tendency Among K-Pop Fans in South Sulawesi, 2024, 58, 2271-2097, 01004, 10.1051/itmconf/20245801004
    11. Puntipa Pongsumpun, Jiraporn Lamwong, I-Ming Tang, Puntani Pongsumpun, A modified optimal control for the mathematical model of dengue virus with vaccination, 2023, 8, 2473-6988, 27460, 10.3934/math.20231405
    12. Ahmet Yavuz Karafil, Hüseyin Şahin Uysal, Investigation of factors contributing to university students' addiction to esports games, 2024, 54, 23364912, 10.5507/ag.2024.002
    13. Nikhil Chanauria, Syed Abbas, Impact of Family Education on Online Gambling Addiction: An Age-Structured Modelling Approach, 2024, 0022247X, 129181, 10.1016/j.jmaa.2024.129181
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1980) PDF downloads(133) Cited by(35)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog