Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,230)
  • Open Access

    ARTICLE

    Incorporating Stress Status in Suicide Detection through Microblog

    Yuanyuan Xue1,2, Qi Li1, TongWu1, LingFeng1, Liang Zhao3, FengYu3

    Computer Systems Science and Engineering, Vol.34, No.2, pp. 65-78, 2019, DOI:10.32604/csse.2019.34.065

    Abstract Suicide has been a perplexing social problem around the world for a long time. Timely sensing hidden suicide risk and offering effective intervention are highly desirable and valuable for individuals and their families. Psychological studies prove that stress status, suicide-related expressions, and social engagement are reliable predictors of suicide risk. However, existing clinical diagnosis can only provide effective treatments to a restricted number of people because of its limited capacity. With the popular usage of social media like microblogs, a new channel to touch the inner world of many potential suicides arises. In this paper,… More >

  • Open Access

    ARTICLE

    Hyperspectral Mineral Target Detection Based on Density Peak

    Yani Hou, Wenzhong Zhu, Erli Wang

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 805-814, 2019, DOI:10.31209/2019.100000084

    Abstract Hyperspectral remote sensing, with its narrow band imaging, provides the potential for fine identification of ground objects, and has unique advantages in mineral detection. However, the image is nonlinear and the pure pixel is scarce, so using standard spectrum detection will lead to an increase of the number of false alarm and missed detection. The density peak algorithm performs well in high-dimensional space and data clustering with irregular category shape. This paper used the density peak clustering to determine the cluster centers of various categories of images, and took it as the target spectrum, and More >

  • Open Access

    ARTICLE

    Detecting Android Inter-App Data Leakage Via Compositional Concolic Walking

    Tianjun Wu, Yuexiang Yang

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 755-766, 2019, DOI:10.31209/2019.100000079

    Abstract While many research efforts have been around auditing individual android apps, the security issues related to the interaction among multiple apps are less studied. Due to the hidden nature of Inter-App communications, few existing security tools are able to detect such related vulnerable behaviors. This paper proposes to perform overall security auditing using dynamic analysis techniques. We focus on data leakage as it is one of the most common vulnerabilities for Android applications. We present an app auditing system AppWalker, which uses concolic execution on a set of apps. We use static Inter-App taint analysis… More >

  • Open Access

    ARTICLE

    Novel Android Malware Detection Method Based on Multi-dimensional Hybrid Features Extraction and Analysis

    Yue Li1, Guangquan Xu2,3, Hequn Xian1,*, Longlong Rao3, Jiangang Shi4,*

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 637-647, 2019, DOI:10.31209/2019.100000118

    Abstract In order to prevent the spread of Android malware and protect privacy information from being compromised, this study proposes a novel multidimensional hybrid features extraction and analysis method for Android malware detection. This method is based primarily on a multidimensional hybrid features vector by extracting the information of permission requests, API calls, and runtime behaviors. The innovation of this study is to extract greater amounts of static and dynamic features information and combine them, that renders the features vector for training completer and more comprehensive. In addition, the feature selection algorithm is used to further More >

  • Open Access

    ARTICLE

    A Longest Matching Resource Mapping Algorithm with State Compression Dynamic Programming Optimization

    Zhang Min, Teng Haibin, Jiang Ming, Wen Tao, Tang Jingfan

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 625-635, 2019, DOI:10.31209/2019.100000117

    Abstract Mapping from sentence phrases to knowledge graph resources is an important step for applications such as search engines, automatic question answering systems based on acknowledge base and knowledge graphs. The existing solution maps a simple phrase to a knowledge graph resource strictly or approximately from the text. However, it is difficult to detect phrases and map the composite semantic resource. This paper proposes a longest matching resource mapping scheme to solve this problem, namely, to find the longest substring in a sentence that can match the knowledge base resource. Based on this scheme, we propose More >

  • Open Access

    ARTICLE

    The Design and Implementation of a Service Composition System Based on a RESTful API

    Wang Hui1, Sun Guang-Yu2,5, Zhang Qin-Yan2, Liu Kai-Min3, Xi Meng3, Zhang Yuan-Yuan4

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 573-583, 2019, DOI:10.31209/2019.100000112

    Abstract With the current explosion of mobile applications and smart devices, more organizations are beginning to expose Web APIs, which makes APIs more widely used. How can these APIs be managed and utilized safely and effectively for businesses? It is not easy to say. Today's Web services mainly include traditional structured WSDL and unstructured RESTful. A RESTful architecture can effectively constrain and help to achieve a simpler, lighter, and more scalable system. How to uniformly organize and merge RESTful APIs is also a problem to be solved. To solve the above problems, this article has designed More >

  • Open Access

    ARTICLE

    A New Rockburst Experiment Data Compression Storage Algorithm Based on Big Data Technology

    Yu Zhang1,2, Yan-Ge Wang1, Yan-Ping Bai3, Yong-Zhen Li1,4, Zhao-Yong Lv5, Hong-Wei Ding6

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 561-572, 2019, DOI:10.31209/2019.100000111

    Abstract Rockburst phenomenon is a kind of phenomenon that the rock is out and ejected because the mineral was dug out, and the original force balance was destroyed in the process of mineral exploitation. From 2007, GeoLab (abbreviation of State Key Laboratory in China for GeoMechanics and Deep Underground Engineering) had made a series of important achievements in rockburst. Up to now, GeoLab’s rockburst experiment data is reached 800T, and these data may occupy about 2PB hard disk space after analyzed. At this ratio, GeoLab need to buy a new hard disk to save all these… More >

  • Open Access

    ARTICLE

    Balanced GHM Mutiwavelet Transform Based Contrast Enhancement Technique for Dark Images Using Dynamic Stochastic Resonance

    S. Deivalakshmi*, P. Palanisamy1, X. Z. Gao2

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 459-471, 2019, DOI:10.31209/2018.100000001

    Abstract The main aim of this paper is to propose a new technique for enhancing the contrast of dark images using Dynamic Stochastic Resonance (DSR) and Multi Wavelet Transform (MWT), which is computationally more efficient than the conventional methods. In the work, for enhancing the contrast of dark images, the intrinsic noise (darkness) of dark images has been used. The proposed MWT-based DSR scheme (MWT-DSR) can yield better performances in terms of visual information and color preservation than already reported techniques. The desired output response is validated by the Relative Contrast Enhancement Factor (F), Perceptual Quality More >

  • Open Access

    ARTICLE

    The Crime Scene Tools Identification Algorithm Based on GVF‐Harris‐SIFT and KNN

    Nan Pan1, Dilin Pan2, Yi Liu2

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 413-419, 2019, DOI:10.31209/2019.100000103

    Abstract In order to solve the cutting tools classification problem, a crime tool identification algorithm based on GVF-Harris-SIFT and KNN is put forward. The proposed algorithm uses a gradient vector to smooth the gradient field of the image, and then uses the Harris angle detection algorithm to detect the tool angle. After that, the descriptors of the eigenvectors in corresponding feature points were using SIFT to obtained. Finally, the KNN machine learning algorithms is employed to for classification and recognition. The experimental results of the comparison of the cutting tools show the accuracy and reliability of More >

  • Open Access

    ARTICLE

    Hardware Design of Codebook‐Based Moving Object Detecting Method for Dynamic Gesture Recognition

    Ching‐Han Chena, Ching‐Yi Chenb, Nai‐Yuan Liua

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 375-384, 2019, DOI:10.31209/2019.100000099

    Abstract This study introduces a dynamic gesture recognition system applicable in IPTV remote control. In this system, we developed a hardware accelerator for realtime moving object detection. It is able to detect the position of hand block in each frame at high speed. After acquiring the information of hand block, the system can capture the robust dynamic gesture feature with the moving trail of hand block in the continuous images, and input to FNN classifier for starting recognition process. The experimental results show that our method has a good recognition performance, and more applicable to real More >

Displaying 3521-3530 on page 353 of 4230. Per Page