Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,827)
  • Open Access

    ARTICLE

    A Deep Transfer Learning Approach for Addressing Yaw Pose Variation to Improve Face Recognition Performance

    M. Jayasree1, K. A. Sunitha2,*, A. Brindha1, Punna Rajasekhar3, G. Aravamuthan3, G. Joselin Retnakumar1

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 745-764, 2024, DOI:10.32604/iasc.2024.052983 - 06 September 2024

    Abstract Identifying faces in non-frontal poses presents a significant challenge for face recognition (FR) systems. In this study, we delved into the impact of yaw pose variations on these systems and devised a robust method for detecting faces across a wide range of angles from 0° to ±90°. We initially selected the most suitable feature vector size by integrating the Dlib, FaceNet (Inception-v2), and “Support Vector Machines (SVM)” + “K-nearest neighbors (KNN)” algorithms. To train and evaluate this feature vector, we used two datasets: the “Labeled Faces in the Wild (LFW)” benchmark data and the “Robust… More >

  • Open Access

    ARTICLE

    Improving Low-Resource Machine Translation Using Reinforcement Learning from Human Feedback

    Liqing Wang*, Yiheng Xiao

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 619-631, 2024, DOI:10.32604/iasc.2024.052971 - 06 September 2024

    Abstract Neural Machine Translation is one of the key research directions in Natural Language Processing. However, limited by the scale and quality of parallel corpus, the translation quality of low-resource Neural Machine Translation has always been unsatisfactory. When Reinforcement Learning from Human Feedback (RLHF) is applied to low-resource machine translation, commonly encountered issues of substandard preference data quality and the higher cost associated with manual feedback data. Therefore, a more cost-effective method for obtaining feedback data is proposed. At first, optimizing the quality of preference data through the prompt engineering of the Large Language Model (LLM), More >

  • Open Access

    ARTICLE

    Mathematical Named Entity Recognition Based on Adversarial Training and Self-Attention

    Qiuyu Lai1,2, Wang Kang3, Lei Yang1,2, Chun Yang1,2,*, Delin Zhang2,*

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 649-664, 2024, DOI:10.32604/iasc.2024.051724 - 06 September 2024

    Abstract Mathematical named entity recognition (MNER) is one of the fundamental tasks in the analysis of mathematical texts. To solve the existing problems of the current neural network that has local instability, fuzzy entity boundary, and long-distance dependence between entities in Chinese mathematical entity recognition task, we propose a series of optimization processing methods and constructed an Adversarial Training and Bidirectional long short-term memory-Selfattention Conditional random field (AT-BSAC) model. In our model, the mathematical text was vectorized by the word embedding technique, and small perturbations were added to the word vector to generate adversarial samples, while More >

  • Open Access

    ARTICLE

    A Hierarchical Two-Level Feature Fusion Approach for SMS Spam Filtering

    Hussein Alaa Al-Kabbi1,2, Mohammad-Reza Feizi-Derakhshi1,*, Saeed Pashazadeh3

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 665-682, 2024, DOI:10.32604/iasc.2024.050452 - 06 September 2024

    Abstract SMS spam poses a significant challenge to maintaining user privacy and security. Recently, spammers have employed fraudulent writing styles to bypass spam detection systems. This paper introduces a novel two-level detection system that utilizes deep learning techniques for effective spam identification to address the challenge of sophisticated SMS spam. The system comprises five steps, beginning with the preprocessing of SMS data. RoBERTa word embedding is then applied to convert text into a numerical format for deep learning analysis. Feature extraction is performed using a Convolutional Neural Network (CNN) for word-level analysis and a Bidirectional Long… More >

  • Open Access

    ARTICLE

    Importance-Weighted Transfer Learning for Fault Classification under Covariate Shift

    Yi Pan1, Lei Xie2,*, Hongye Su2

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 683-696, 2024, DOI:10.32604/iasc.2023.038543 - 06 September 2024

    Abstract In the process of fault detection and classification, the operation mode usually drifts over time, which brings great challenges to the algorithms. Because traditional machine learning based fault classification cannot dynamically update the trained model according to the probability distribution of the testing dataset, the accuracy of these traditional methods usually drops significantly in the case of covariate shift. In this paper, an importance-weighted transfer learning method is proposed for fault classification in the nonlinear multi-mode industrial process. It effectively alters the drift between the training and testing dataset. Firstly, the mutual information method is… More >

  • Open Access

    ARTICLE

    Multi-Layer Feature Extraction with Deformable Convolution for Fabric Defect Detection

    Jielin Jiang1,2,3,4,*, Chao Cui1, Xiaolong Xu1,2,3,4, Yan Cui5

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 725-744, 2024, DOI:10.32604/iasc.2024.036897 - 06 September 2024

    Abstract In the textile industry, the presence of defects on the surface of fabric is an essential factor in determining fabric quality. Therefore, identifying fabric defects forms a crucial part of the fabric production process. Traditional fabric defect detection algorithms can only detect specific materials and specific fabric defect types; in addition, their detection efficiency is low, and their detection results are relatively poor. Deep learning-based methods have many advantages in the field of fabric defect detection, however, such methods are less effective in identifying multi-scale fabric defects and defects with complex shapes. Therefore, we propose… More >

  • Open Access

    ARTICLE

    Ensemble Modeling for the Classification of Birth Data

    Fiaz Majeed1, Abdul Razzaq Ahmad Shakir1, Maqbool Ahmad2, Shahzada Khurram3, Muhammad Qaiser Saleem4, Muhammad Shafiq5,*, Jin-Ghoo Choi5, Habib Hamam6,7,8,9,10, Osama E. Sheta11

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 765-781, 2024, DOI:10.32604/iasc.2023.034029 - 06 September 2024

    Abstract Machine learning (ML) and data mining are used in various fields such as data analysis, prediction, image processing and especially in healthcare. Researchers in the past decade have focused on applying ML and data mining to generate conclusions from historical data in order to improve healthcare systems by making predictions about the results. Using ML algorithms, researchers have developed applications for decision support, analyzed clinical aspects, extracted informative information from historical data, predicted the outcomes and categorized diseases which help physicians make better decisions. It is observed that there is a huge difference between women… More >

  • Open Access

    ARTICLE

    Analyzing the Impact of Scene Transitions on Indoor Camera Localization through Scene Change Detection in Real-Time

    Muhammad S. Alam1,5,*, Farhan B. Mohamed1,3, Ali Selamat2, Faruk Ahmed4, AKM B. Hossain6,7

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 417-436, 2024, DOI:10.32604/iasc.2024.051999 - 11 July 2024

    Abstract Real-time indoor camera localization is a significant problem in indoor robot navigation and surveillance systems. The scene can change during the image sequence and plays a vital role in the localization performance of robotic applications in terms of accuracy and speed. This research proposed a real-time indoor camera localization system based on a recurrent neural network that detects scene change during the image sequence. An annotated image dataset trains the proposed system and predicts the camera pose in real-time. The system mainly improved the localization performance of indoor cameras by more accurately predicting the camera More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779 - 11 July 2024

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

  • Open Access

    ARTICLE

    Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 477-510, 2024, DOI:10.32604/iasc.2024.050726 - 11 July 2024

    Abstract Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications. Nevertheless, existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets, such as preservation and server infrastructure, in a limited number of large-scale worldwide data facilities. Optimizing the deployment of virtual machines (VMs) is crucial in this scenario to ensure system dependability, performance, and minimal latency. A significant barrier in the present scenario is the load distribution, particularly when striving for improved energy consumption in a hypothetical grid computing framework. This design… More >

Displaying 31-40 on page 4 of 1827. Per Page