Open Access
ARTICLE
Huiyu Sun*, Ralph Grishman
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1415-1423, 2022, DOI:10.32604/iasc.2022.030794
Abstract Active learning methods which present selected examples from the corpus for annotation provide more efficient learning of supervised relation extraction models, but they leave the developer in the unenviable role of a passive informant. To restore the developer’s proper role as a partner with the system, we must give the developer an ability to inspect the extraction model during development. We propose to make this possible through a representation based on lexicalized dependency paths (LDPs) coupled with an active learner for LDPs. We apply LDPs to both simulated and real active learning with ACE as evaluation and a year’s newswire… More >
Open Access
ARTICLE
S. Hariprasad1,*, T. Deepa1, N. Bharathiraja2
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1425-1440, 2022, DOI:10.32604/iasc.2022.022856
Abstract The Internet of Things (IoT) is a global information and communication technology which aims to connect any type of device to the internet at any time and in any location. Nowadays billions of IoT devices are connected to the world, this leads to easily cause vulnerability to IoT devices. The increasing of users in different IoT-related applications leads to more data attacks is happening in the IoT networks after the fog layer. To detect and reduce the attacks the deep learning model is used. In this article, a hybrid sample selected recurrent neural network-extreme learning machine (hybrid SSRNN-ELM) algorithm that… More >
Open Access
ARTICLE
D. Karthik Prabhu1,*, R. V. Maheswari2, B. Vigneshwaran2
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1441-1454, 2022, DOI:10.32604/iasc.2022.024128
Abstract Measurement and recognition of Partial Discharge (PD) in power apparatus is considered a protuberant tool for condition monitoring and assessing the state of a dielectric system. During operating conditions, PD may occur either in the form of single and multiple patterns in nature. Currently, for PD pattern recognition, deep learning approaches are used. To evaluate spatial order less features from the large-scale patterns, a pre-trained network is used. The major drawback of traditional approaches is that they generate high dimensional data or requires additional steps like dictionary learning and dimensionality reduction. However, in real-time applications, interference incorporated in the measured… More >
Open Access
ARTICLE
Yazeed Yasin Ghadi1, Israr Akhter2, Suliman A. Alsuhibany3, Tamara al Shloul4, Ahmad Jalal2, Kibum Kim5,*
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1455-1471, 2022, DOI:10.32604/iasc.2022.025013
Abstract Event detection systems are mainly used to observe and monitor human behavior via red green blue (RGB) images and videos. Event detection using RGB images is one of the challenging tasks of the current era. Human detection, position and orientation of human body parts in RGB images is a critical phase for numerous systems models. In this research article, the detection of human body parts by extracting context-aware energy features for event recognition is described. For this, silhouette extraction, estimation of human body parts, and context-aware features are extracted. To optimize the context-intelligence vector, we applied an artificial intelligence-based self-organized… More >
Open Access
ARTICLE
Wei Zhou1, Hao Wang2, Ghulam Mohiuddin3, Dan Chen4,*, Yongjun Ren1
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1473-1488, 2022, DOI:10.32604/iasc.2022.029657
Abstract As the basis of cloud computing, distributed storage technology mainly studies how data centers store, organize and manage data. Blockchain has become the most secure solution for cloud storage due to its decentralization and immutability. Consensus mechanism is one of the core technologies of blockchain, which affects the transaction processing capability, security and scalability of blockchain. The current mainstream consensus algorithms such as Proof of Work, Proof of Stake, and Delegated Proof of Stake all have the problem of wasting resources. And with the explosive growth of data, cloud storage nodes store a large amount of redundant data, which inevitably… More >
Open Access
ARTICLE
Joddat Fatima1,*, Amina Jameel2, Muhammad Usman Akram3, Adeel Muzaffar Syed1, Malaika Mushtaq3
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1489-1504, 2022, DOI:10.32604/iasc.2022.025935
Abstract The long twisted fragile tube, termed as spinal cord, can be named as the second vital organ of Central Nervous System (CNS), after brain. In human anatomy, all crucial life activities are controlled by CNS. The spinal cord does not only control the flow of information from the brain to rest of the body, but also takes charge of our reflexes control and the mobility of body. It keeps the body upright and acts as the main support for the flesh and bones. Spine deformity can occur by birth, due to aging, injury or spine surgery. In this research article,… More >
Open Access
ARTICLE
D. Yuvaraj1, S. Shanmuga Priya2,*, M. Braveen3, S. Navaneetha Krishnan4, S. Nachiyappan5, Abolfazl Mehbodniya6, A. Mohamed Uvaze Ahamed7, M. Sivaram8
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1505-1522, 2022, DOI:10.32604/iasc.2022.022151
Abstract Wireless sensor networks are extensively utilized as a communication mechanism in the field of the Internet of Things (IoT). Along with these services, numerous IoT based applications need stabilized transmission or delivery over unbalanced wireless connections. To ensure the stability of data packets delivery, prevailing works exploit diverse geographical routing with multi-hop forwarders in WSNs. Furthermore, critical Denial of Service (DoS) attacks frequently has an impact on these techniques, where an enormous amount of invalid data starts replicating and transmitted to receivers to prevent Wireless Sensor Networks (WSN) communication. In this investigation, a novel adaptive endorsement method is designed by… More >
Open Access
ARTICLE
May A. Al-Otaibi1,*, Hesham Alhumyani1, Saleh Ibrahim2, Alaa M. Abbas2
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1523-1536, 2022, DOI:10.32604/iasc.2022.026161
Abstract Image encryption has attracted a lot of interest as an important security application for protecting confidential image data against unauthorized access. An adversary with the power to manipulate cipher image data can crop part of the image out to prevent decryption or render the decrypted image useless. This is known as the occlusion attack. In this paper, we address a vulnerability to the occlusion attack identified in the medical image encryption framework recently proposed in []. We propose adding a pixel scrambling phase to the framework and show through simulation that the extended framework effectively mitigates the occlusion attack while… More >
Open Access
ARTICLE
T. Vetriselvi1,*, J. Albert Mayan2, K. V. Priyadharshini3, K. Sathyamoorthy4, S. Venkata Lakshmi5, P. Vishnu Raja6
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1537-1551, 2022, DOI:10.32604/iasc.2022.025235
Abstract Recently, the bounteous amount of data/information has been available on the Internet which makes it very complicated to the customers to calculate the preferred data. Because the huge amount of data in a system is mandated to discover the most proper data from the corpus. Content summarization selects and extracts the related sentence depends upon the calculation of the score and rank of the corpus. Automatic content summarization technique translates from the higher corpus into smaller concise description. This chooses the very important level of the texts and implements the complete statistics summary. This paper proposes the novel technique that… More >
Open Access
ARTICLE
Daqing Wu1,2, Jiye Cui1,*, Dan Li3, Romany Fouad Mansour4
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1553-1569, 2022, DOI:10.32604/iasc.2022.028780
Abstract Under the fierce market competition and the demand of low-carbon economy, the freshness of fresh products directly determines the degree of customer satisfaction. Cold chain logistics companies must pay attention to the freshness and carbon emissions of fresh products to obtain better service development. In the cold chain logistics path optimization problem, considering the cost, product freshness and carbon emission environmental factors at the same time, based on the cost-benefit idea, a comprehensive cold chain vehicle routing problem optimization model is proposed to minimize the unit cost of product freshness and the carbon trading mechanism for calculating the cost of… More >