Home / Journals / IASC / Vol.30, No.2, 2021
  • Open Access

    ARTICLE

    A Multi-Objective Secure Optimal VM Placement in Energy-Efficient Server of Cloud Computing

    Sangeetha Ganesan*, Sumathi Ganesan
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 387-401, 2021, DOI:10.32604/iasc.2021.019024
    Abstract Cloud Computing has been economically famous for sharing the resources of third-party applications. There may be an increase in the exploitation of the prevailing Cloud resources and their vulnerabilities as a result of the aggressive growth of Cloud Computing. In the Cache Side Channel Attack (CSCA), the attackers can leak sensitive information of a Virtual Machine (VM) which is co-located in a physical machine due to inadequate logical isolation. The Cloud Service Provider (CSP) has to modify either at the hardware level to isolate their VM or at the software, level to isolate their applications. The hardware isolation requires changes… More >

  • Open Access

    ARTICLE

    Security Empowered System-on-Chip Selection for Internet of Things

    Ramesh Krishnamoorthy*, Kalimuthu Krishnan
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 403-418, 2021, DOI:10.32604/iasc.2021.018560
    Abstract Due to the rapid growth of embedded devices, the selection of System-on-Chip (SoC) has a stronger influence to enable hardware security in embedded system design. System-on-chip (SoC) devices consist of one or more CPUs through wide-ranging inbuilt peripherals for designing a system with less cost. The selection of SoC is more significant to determine the suitability for secured application development. The design space analysis of symmetric key approaches including rivest cipher (RC5), advanced encryption standard (AES), data encryption standard (DES), international data encryption algorithm (IDEA), elliptic curve cryptography (ECC), MX algorithm, and the secure hash algorithm (SHA-256) are compared to… More >

  • Open Access

    ARTICLE

    Improved Algorithm Based on Decision Tree for Semantic Information Retrieval

    Zhe Wang1,2, Yingying Zhao1, Hai Dong3, Yulong Xu1,*, Yali Lv1
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 419-429, 2021, DOI:10.32604/iasc.2021.016434
    Abstract The quick retrieval of target information from a massive amount of information has become a core research area in the field of information retrieval. Semantic information retrieval provides effective methods based on semantic comprehension, whose traditional models focus on multiple rounds of detection to differentiate information. Since a large amount of information must be excluded, retrieval efficiency is low. One of the most common methods used in classification, the decision tree algorithm, first selects attributes with higher information entropy to construct a decision tree. However, the tree only matches words on the grammatical level and does not consider the semantic… More >

  • Open Access

    ARTICLE

    Color Contrast Enhancement on Pap Smear Images Using Statistical Analysis

    Nadzirah Nahrawi1, Wan Azani Mustafa2,3,*, Siti Nurul Aqmariah Mohd Kanafiah1, Mohd Yusoff Mashor1
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 431-438, 2021, DOI:10.32604/iasc.2021.018635
    Abstract In the conventional cervix cancer diagnosis, the Pap smear sample images are taken by using a microscope,causing the cells to be hazy and afflicted by unwanted noise. The captured microscopic images of Pap smear may suffer from some defects such as blurring or low contrasts. These problems can hide and obscure the important cervical cell morphologies, leading to the risk of false diagnosis. The quality and contrast of the Pap smear images are the primary keys that could affect the diagnosis’ accuracy. The paper's main objective is to propose the best contrast enhancement to eliminate contrast problems in images and… More >

  • Open Access

    ARTICLE

    Visual Saliency Prediction Using Attention-based Cross-modal Integration Network in RGB-D Images

    Xinyue Zhang1, Ting Jin1,*, Mingjie Han1, Jingsheng Lei2, Zhichao Cao3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 439-452, 2021, DOI:10.32604/iasc.2021.018643
    Abstract Saliency prediction has recently gained a large number of attention for the sake of the rapid development of deep neural networks in computer vision tasks. However, there are still dilemmas that need to be addressed. In this paper, we design a visual saliency prediction model using attention-based cross-model integration strategies in RGB-D images. Unlike other symmetric feature extraction networks, we exploit asymmetric networks to effectively extract depth features as the complementary information of RGB information. Then we propose attention modules to integrate cross-modal feature information and emphasize the feature representation of salient regions, meanwhile neglect the surrounding unimportant pixels, so… More >

  • Open Access

    ARTICLE

    AttEF: Convolutional LSTM Encoder-Forecaster with Attention Module for Precipitation Nowcasting

    Wei Fang1,2,*, Lin Pang1, Weinan Yi1, Victor S. Sheng3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 453-466, 2021, DOI:10.32604/iasc.2021.016589
    Abstract Precipitation nowcasting has become an essential technology underlying various public services ranging from weather advisories to citywide rainfall alerts. The main challenge facing many algorithms is the high non-linearity and temporal-spatial complexity of the radar image. Convolutional Long Short-Term Memory (ConvLSTM) is appropriate for modeling spatiotemporal variations as it integrates the convolution operator into recurrent state transition functions. However, the technical characteristic of encoding the input sequence into a fixed-size vector cannot guarantee that ConvLSTM maintains adequate sequence representations in the information flow, which affects the performance of the task. In this paper, we propose Attention ConvLSTM Encoder-Forecaster(AttEF) which allows… More >

  • Open Access

    ARTICLE

    Fault Detection Algorithms for Achieving Service Continuity in Photovoltaic Farms

    Sherif S. M. Ghoneim1,*, Amr E. Rashed2, Nagy I. Elkalashy1
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 467-479, 2021, DOI:10.32604/iasc.2021.016681
    (This article belongs to this Special Issue: Artificial Techniques: Application, Challenges, Performance Improvement of Smart Grid and Renewable Energy Systems)
    Abstract This study uses several artificial intelligence approaches to detect and estimate electrical faults in photovoltaic (PV) farms. The fault detection approaches of random forest, logistic regression, naive Bayes, AdaBoost, and CN2 rule induction were selected from a total of 12 techniques because they produced better decisions for fault detection. The proposed techniques were designed using distributed PV current measurements, plant current, plant voltage, and power. Temperature, radiation, and fault resistance were treated randomly. The proposed classification model was created using the Orange platform. A classification tree was visualized, consisting of seven nodes and four leaves, with a depth of four… More >

  • Open Access

    ARTICLE

    A Resource-constrained Edge IoT Device Data-deduplication Method with Dynamic Asymmetric Maximum

    Ye Yang1, Xiaofang Li2, Dongjie Zhu3,*, Hao Hu3, Haiwen Du4, Yundong Sun4, Weiguo Tian3, Yansong Wang3, Ning Cao1, Gregory M.P. O’Hare5
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 481-494, 2021, DOI:10.32604/iasc.2021.019201
    Abstract Smart vehicles use sophisticated sensors to capture real-time data. Due to the weak communication capabilities of wireless sensors, these data need to upload to the cloud for processing. Sensor clouds can resolve these drawbacks. However, there is a large amount of redundant data in the sensor cloud, occupying a large amount of storage space and network bandwidth. Deduplication can yield cost savings by storing one data copy. Chunking is essential because it can determine the performance of deduplication. Content-Defined Chunking (CDC) can effectively solve the problem of chunk boundaries shifted, but it occupies a lot of computing resources and has… More >

  • Open Access

    ARTICLE

    Research on Viewpoint Extraction in Microblog

    Yabin Xu1,2,*, Shujuan Chen2, Xiaowei Xu3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 495-511, 2021, DOI:10.32604/iasc.2021.018896
    Abstract In order to quickly get the viewpoint of key opinion leaders(KOL) on public events, a method of opinion mining in Weibo is put forward. Firstly, according to the characteristics of Weibo language, the non-viewpoint sentence recognition rule is formulated, and some non-viewpoint sentence is eliminated accordingly. Secondly, based on the constructed FastText-XGBoost viewpoint sentence recognition model, the second classification is carried out to identify the opinion sentence according to the dominant and recessive features of Weibo. Finally, the group of evaluation object and evaluation word is extracted from the opinion sentence, according to our proposed multi-task learning BiLSTM-CRFs model. In… More >

  • Open Access

    ARTICLE

    Intelligent Model Of Ecosystem For Smart Cities Using Artificial Neural Networks

    Tooba Batool1, Sagheer Abbas1, Yousef Alhwaiti2, Muhammad Saleem1, Munir Ahmad1, Muhammad Asif1,*, Nouh Sabri Elmitwally2,3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 513-525, 2021, DOI:10.32604/iasc.2021.018770
    Abstract A Smart City understands the infrastructure, facilities, and schemes open to its citizens. According to the UN report, at the end of 2050, more than half of the rural population will be moved to urban areas. With such an increase, urban areas will face new health, education, Transport, and ecological issues. To overcome such kinds of issues, the world is moving towards smart cities. Cities cannot be smart without using Cloud computing platforms, the Internet of Things (IoT). The world has seen such incredible and brilliant ideas for rural areas and smart cities. While considering the Ecosystem in Smart Cities,… More >

  • Open Access

    ARTICLE

    Binaural Speech Separation Algorithm Based on Deep Clustering

    Lin Zhou1,*, Kun Feng1, Tianyi Wang1, Yue Xu1, Jingang Shi2
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 527-537, 2021, DOI:10.32604/iasc.2021.018414
    Abstract Neutral network (NN) and clustering are the two commonly used methods for speech separation based on supervised learning. Recently, deep clustering methods have shown promising performance. In our study, considering that the spectrum of the sound source has time correlation, and the spatial position of the sound source has short-term stability, we combine the spectral and spatial features for deep clustering. In this work, the logarithmic amplitude spectrum (LPS) and the interaural phase difference (IPD) function of each time frequency (TF) unit for the binaural speech signal are extracted as feature. Then, these features of consecutive frames construct feature map,… More >

  • Open Access

    ARTICLE

    Modeling Habit Patterns Using Conditional Reflexes in Agency

    Qura-Tul-Ain Khan1, Taher M. Ghazal2,3, Sagheer Abbas1, Wasim Ahmad Khan1, Muhammad Adnan Khan5,6, Raed A. Said4, Munir Ahmad1, Muhammad Asif1,*
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 539-552, 2021, DOI:10.32604/iasc.2021.018888
    Abstract For decision-making and behavior dynamics in humans, the principal focus is on cognition. Cognition can be described using cognitive behavior, which has multiple states. This cognitive behavior can be incorporated with one of the internal mental states’ help, which includes desires, beliefs, emotions, intentions, different levels of knowledge, goals, skills, etc. That leads to habit development. Habits are highly refined patterns formed in the unconscious that evolve from conscious skill patterns in the human, and the same process can be implemented in the agency. These habit patterns are the outcomes of many internal values that may vary due to variations… More >

  • Open Access

    ARTICLE

    Game-Theory Based Graded Diagnosis Strategies of Craniocerebral Injury

    Yiming Liu1, Ke Chen1, Lanzhen Bian2, Lei Ren3, Jing Hu4,*, Jinyue Xia5
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 553-561, 2021, DOI:10.32604/iasc.2021.017391
    Abstract Craniocerebral injury is a common surgical emergency in children. It has the highest mortality and disability rate, and the second highest incidence rate. Accidental injuries due to falls, sports and traffic accidents are the main causes of craniocerebral injury. In recent years, the incidence rate of craniocerebral injury in children has continued to rise, which injury stretches out the limited medical resources. Moreover, it is very difficult to deal with complex craniocerebral trauma in the hospital of county town, in which is not rich in medical resources because of the lack of experienced doctors and nurses. In addition, some children… More >

  • Open Access

    ARTICLE

    Person Re-Identification Based on Joint Loss and Multiple Attention Mechanism

    Yong Li, Xipeng Wang*
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 563-573, 2021, DOI:10.32604/iasc.2021.017926
    Abstract Person re-identification (ReID) is the use of computer vision and machine learning techniques to determine whether the pedestrians in the two images under different cameras are the same person. It can also be regarded as a matching retrieval task for person targets in different scenes. The research focuses on how to obtain effective person features from images with occlusion, angle change, and target attitude change. Based on the present difficulties and challenges in ReID, the paper proposes a ReID method based on joint loss and multi-attention network. It improves the person re-identification algorithm based on global characteristics, introduces spatial attention… More >

  • Open Access

    ARTICLE

    Segmentation of the Left Ventricle in Cardiac MRI Using Random Walk Techniques

    Osama S. Faragallah1,*, Ghada Abdel-Aziz2, Hala S. El-sayed3, Gamal G. N. Geweid4,5
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 575-588, 2021, DOI:10.32604/iasc.2021.019023
    Abstract As a regular tool for assessing and diagnosing cardiovascular disease (CVD), medical professionals and health care centers, are highly dependent on cardiac imaging. The purpose of dividing the cardiac images is to paint the inner and outer walls of the heart to divide all or part of the limb’s boundaries. In order to enhance cardiologist in the process of cardiac segmentation, new and accurate methods are needed to divide the selected object, which is the left ventricle (LV). Segmentation techniques aim to provide a fast segmentation process and improve the reliability of the process. In this paper, a comparative study… More >

  • Open Access

    ARTICLE

    CT Segmentation of Liver and Tumors Fused Multi-Scale Features

    Aihong Yu1, Zhe Liu1,*, Victor S. Sheng2, Yuqing Song1, Xuesheng Liu3, Chongya Ma4, Wenqiang Wang1, Cong Ma1
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 589-599, 2021, DOI:10.32604/iasc.2021.019513
    Abstract Liver cancer is one of frequent causes of death from malignancy in the world. Owing to the outstanding advantages of computer-aided diagnosis and deep learning, fully automatic segmentation of computed tomography (CT) images turned into a research hotspot over the years. The liver has quite low contrast with the surrounding tissues, together with its lesion areas are thoroughly complex. To deal with these problems, we proposed effective methods for enhancing features and processed public datasets from Liver Tumor Segmentation Challenge (LITS) for the verification. In this experiment, data pre-processing based on the image enhancement and noise reduction. This study redesigned… More >

  • Open Access

    ARTICLE

    Conveyor Belt Detection Based on Deep Convolution GANs

    Xiaoli Hao1,*, Xiaojuan Meng1, Yueqin Zhang1, Jindong Xue2, Jinyue Xia3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 601-613, 2021, DOI:10.32604/iasc.2021.017963
    Abstract The belt conveyor is essential in coal mine underground transportation. The belt properties directly affect the safety of the conveyor. It is essential to monitor that the belt works well. Traditional non-contact detection methods are usually time-consuming, and they only identify a single instance of damage. In this paper, a new belt-tear detection method is developed, characterized by two time-scale update rules for a multi-class deep convolution generative adversarial network. To use this method, only a small amount of image data needs to be labeled, and batch normalization in the generator must be removed to avoid artifacts in the generated… More >

  • Open Access

    ARTICLE

    AAP4All: An Adaptive Auto Parallelization of Serial Code for HPC Systems

    M. Usman Ashraf1,*, Fathy Alburaei Eassa2, Leon J. Osterweil3, Aiiad Ahmad Albeshri2, Abdullah Algarni2, Iqra Ilyas4
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 615-639, 2021, DOI:10.32604/iasc.2021.019044
    (This article belongs to this Special Issue: Soft Computing Methods for Innovative Software Practices)
    Abstract High Performance Computing (HPC) technologies are emphasizing to increase the system performance across many disciplines. The primary challenge in HPC systems is how to achieve massive performance by minimum power consumption. However, the modern HPC systems are configured by adding the powerful and energy efficient multi-cores/many-cores parallel computing devices such as GPUs, MIC, and FPGA etc. Due to increasing the complexity of one chip many-cores/multi-cores systems, only well-balanced and optimized parallel programming technique is the solution to provide substantial increase in performance under power consumption limitations. Conventionally, the researchers face various barriers while parallelizing their serial code because they don’t… More >

  • Open Access

    ARTICLE

    An Adversarial Network-based Multi-model Black-box Attack

    Bin Lin1, Jixin Chen2, Zhihong Zhang3, Yanlin Lai2, Xinlong Wu2, Lulu Tian4, Wangchi Cheng5,*
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 641-649, 2021, DOI:10.32604/iasc.2021.016818
    Abstract Researches have shown that Deep neural networks (DNNs) are vulnerable to adversarial examples. In this paper, we propose a generative model to explore how to produce adversarial examples that can deceive multiple deep learning models simultaneously. Unlike most of popular adversarial attack algorithms, the one proposed in this paper is based on the Generative Adversarial Networks (GAN). It can quickly produce adversarial examples and perform black-box attacks on multi-model. To enhance the transferability of the samples generated by our approach, we use multiple neural networks in the training process. Experimental results on MNIST showed that our method can efficiently generate… More >

  • Open Access

    ARTICLE

    A Low-Cost 3-Axis Computer Controlled Filament-Winding Pattern Design Method for Composite Elbows

    Guiying Wang1, Xigui Wang1,*, Hong Zhao2, Yinggang Huang1, Jinyong Ju1, E. E Erdun3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 651-662, 2021, DOI:10.32604/iasc.2021.019274
    Abstract The aeronautics and aerospace industries often require special-shaped parts made from lightweight materials with a constant resistance, such as filament winding composite elbows and tees. Filament winding patterns can be realized using numerically controlled filament winding machines. Herein, a 3-axis computer controlled filament winding machine is proposed to solve existing problems with winding of composite elbows such as inconsistent quality, low productivity, and high costs. In this study, a geodesic winding equation for the torus and non-geodesic winding equation for the cylindrical sections of the elbow are provided and the winding angle α’ is optimized. Furthermore, the correspondence relationship between… More >

  • Open Access

    ARTICLE

    Intelligent and Integrated Framework for Exudate Detection in Retinal Fundus Images

    Muhammad Shujaat1, Numan Aslam1, Iram Noreen1, Muhammad Khurram Ehsan1,*, Muhammad Aasim Qureshi1, Aasim Ali1, Neelma Naz2, Imtisal Qadeer3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 663-672, 2021, DOI:10.32604/iasc.2021.019194
    Abstract Diabetic Retinopathy (DR) is a disease of the retina caused by diabetes. The existence of exudates in the retina is the primary visible sign of DR. Early exudate detection can prevent patients from the severe conditions of DR An intelligent framework is proposed that serves two purposes. First, it highlights the features of exudate from fundus images using an image processing approach. Afterwards, the enhanced features are used as input to train Alexnet for the detection of exudates. The proposed framework is comprised on three stages that include pre-processing, image segmentation, and classification. During the pre-processing stage, image quality is… More >

  • Open Access

    ARTICLE

    An Improved Two-stream Inflated 3D ConvNet for Abnormal Behavior Detection

    Jiahui Pan1,2,*, Liangxin Liu1, Mianfen Lin1, Shengzhou Luo1, Chengju Zhou1, Huijian Liao3, Fei Wang1,2
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 673-688, 2021, DOI:10.32604/iasc.2021.020240
    Abstract Abnormal behavior detection is an essential step in a wide range of application domains, such as smart video surveillance. In this study, we proposed an improved two-stream inflated 3D ConvNet network approach based on probability regression for abnormal behavior detection. The proposed approach consists of four parts: (1) preprocessing pretreatment for the input video; (2) dynamic feature extraction from video streams using a two-stream inflated 3D (I3D) ConvNet network; (3) visual feature transfer into a two-dimensional matrix; and (4) feature classification using a generalized regression neural network (GRNN), which ultimately achieves a probability regression. Compared with the traditional methods, two-stream… More >

  • Open Access

    ARTICLE

    Visualization of Reactor Core Based on Triangular Mesh Method

    Wei Lu1, Guanghui Yuan1, Hao Yang2,*, Hongrun Yang1, Xin Zhao3, Qian Zhang4
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 689-699, 2021, DOI:10.32604/iasc.2021.020075
    Abstract In view of the characteristics of the numerical simulation results of the nuclear reactor core, including the regular structures, multiple geometry duplications, large-scale grids, and the demand for refined expression of calculation results, a mesh generation method based on Delaunay triangulation was used to solve the restructuring and visualizing problem of core three-dimensional (3D) data fields. In this work, data processing and visualization of the three-dimensional refined calculation of the core were accomplished, using the triangular mesh model, hash matching algorithm, 3D visualization technology, etc. Descriptions are also given for key issues such as Delaunay triangular mesh construction, the geometric… More >

  • Open Access

    ARTICLE

    Method of Bidirectional LSTM Modelling for the Atmospheric Temperature

    Shuo Liang1, Dingcheng Wang1,*, Jingrong Wu1, Rui Wang1, Ruiqi Wang2
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 701-714, 2021, DOI:10.32604/iasc.2021.020010
    Abstract Atmospheric temperature forecast plays an important role in weather forecast and has a significant impact on human daily and economic life. However, due to the complexity and uncertainty of the atmospheric system, exploring advanced forecasting methods to improve the accuracy of meteorological prediction has always been a research topic for scientists. With the continuous improvement of computer performance and data acquisition technology, meteorological data has gained explosive growth, which creates the necessary hardware support conditions for more accurate weather forecast. The more accurate forecast results need advanced weather forecast methods suitable for hardware. Therefore, this paper proposes a deep learning… More >

  • Open Access

    ARTICLE

    Morphological Feature Aware Multi-CNN Model for Multilingual Text Recognition

    Yujie Zhou1, Jin Liu1,*, Yurong Xie1, Y. Ken Wang2
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 715-733, 2021, DOI:10.32604/iasc.2021.020184
    Abstract Text recognition is a crucial and challenging task, which aims at translating a cropped text instance image into a target string sequence. Recently, Convolutional neural networks (CNN) have been widely used in text recognition tasks as it can effectively capture semantic and structural information in text. However, most existing methods are usually based on contextual clues. If only recognize a single character, the accuracy of these approaches can be reduced. For example, it is difficult to distinguish 0 and O in the traditional CNN network because they are very similar in composition and structure. To solve this problem, we propose… More >

  • Open Access

    ARTICLE

    Performances of K-Means Clustering Algorithm with Different Distance Metrics

    Taher M. Ghazal1,2, Muhammad Zahid Hussain3, Raed A. Said5, Afrozah Nadeem6, Mohammad Kamrul Hasan1, Munir Ahmad7, Muhammad Adnan Khan3,4,*, Muhammad Tahir Naseem3
    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 735-742, 2021, DOI:10.32604/iasc.2021.019067
    Abstract Clustering is the process of grouping the data based on their similar properties. Meanwhile, it is the categorization of a set of data into similar groups (clusters), and the elements in each cluster share similarities, where the similarity between elements in the same cluster must be smaller enough to the similarity between elements of different clusters. Hence, this similarity can be considered as a distance measure. One of the most popular clustering algorithms is K-means, where distance is measured between every point of the dataset and centroids of clusters to find similar data objects and assign them to the nearest… More >

Share Link

WeChat scan