Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Short Text Entity Disambiguation Algorithm Based on Multi-Word Vector Ensemble

    Qin Zhang1, Xuyu Xiang1,*, Jiaohua Qin1, Yun Tan1, Qiang Liu1, Neal N. Xiong2

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 227-241, 2021, DOI:10.32604/iasc.2021.017648

    Abstract With the rapid development of network media, the short text has become the main cover of information dissemination by quickly disseminating relevant entity information. However, the lack of context in the short text can easily lead to ambiguity, which will greatly reduce the efficiency of obtaining information and seriously affect the user’s experience, especially in the financial field. This paper proposed an entity disambiguation algorithm based on multi-word vector ensemble and decision to eliminate the ambiguity of entities and purify text information in information processing. First of all, we integrate a variety of unsupervised pre-trained word vector models as vector… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment

    K. Kalaivani*, M. Chinnadurai

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 1-15, 2021, DOI:10.32604/iasc.2021.017515

    Abstract Fog computing extends the concept of cloud computing by providing the services of computing, storage, and networking connectivity at the edge between data centers in cloud computing environments and end devices. Having the intelligence at the edge enables faster real-time decision-making and reduces the amount of data forwarded to the cloud. When enhanced by fog computing, the Internet of Things (IoT) brings low latency and improves real time and quality of service (QoS) in IoT applications of augmented reality, smart grids, smart vehicles, and healthcare. However, both cloud and fog computing environments are vulnerable to several kinds of attacks that… More >

  • Open Access

    ARTICLE

    Strategies for Reducing the Spread of COVID-19 Based on an Ant-Inspired Framework

    Ghassan Ahmed Ali*

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 351-360, 2021, DOI:10.32604/iasc.2021.017453

    Abstract Many living organisms respond to pandemics using strategies such as isolation. This is true, for example, of social insects, for whom the spread of disease can pose a high risk to colony survival. In light of such behaviors, the present study investigated a different way of developing strategies to mitigate the effects of the coronavirus pandemic. Specifically, we considered the strategies ants use to handle epidemics and limit disease spread within colonies. To enhance our understanding of these strategies, we explored ants’ social systems and how they specifically respond to infectious diseases. The early warning threshold system reflects the importance… More >

  • Open Access

    ARTICLE

    Exploiting Rich Event Representation to Improve Event Causality Recognition

    Gaigai Jin1, Junsheng Zhou1,*, Weiguang Qu1, Yunfei Long2, Yanhui Gu1

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 161-173, 2021, DOI:10.32604/iasc.2021.017440

    Abstract Event causality identification is an essential task for information extraction that has attracted growing attention. Early researchers were accustomed to combining the convolutional neural network or recurrent neural network models with external causal knowledge, but these methods ignore the importance of rich semantic representation of the event. The event is more structured, so it has more abundant semantic representation. We argue that the elements of the event, the interaction of the two events, and the context between the two events can enrich the event’s semantic representation and help identify event causality. Therefore, the effective semantic representation of events in event… More >

  • Open Access

    ARTICLE

    Deep Learning Anomaly Detection Based on Hierarchical Status-Connection Features in Networked Control Systems

    Jianming Zhao1,2,3,4, Peng Zeng1,2,3,4,*, Chunyu Chen1,2,3,4, Zhiwei Dong5, Jongho Han6

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 337-350, 2021, DOI:10.32604/iasc.2021.016966

    Abstract As networked control systems continue to be widely used in large-scale industrial productions, industrial cyber-attacks have become an inevitable problem that can cause serious damage to critical infrastructures. In practice, industrial intrusion detection has been widely acknowledged to detect abnormal communication behaviors. However, unlike traditional IT systems, networked control systems have their own communication characteristics due to specific industrial communication protocols. Thus, simple cyber-attack modeling is inadequate and impractical for high-efficiency intrusion detection because the characteristics of network control systems are less considered. Based on the status information and transmission connection in industrial communication data payloads, which can properly express… More >

  • Open Access

    ARTICLE

    Main Factor Selection Algorithm and Stability Analysis of Regional FDI Statistics

    Juan Huang1, Bifang Zhou1, Huajun Huang2,*, Dingwen Qing1, Neal N. Xiong3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 303-318, 2021, DOI:10.32604/iasc.2021.016953

    Abstract There are various influencing factors in regional FDI (foreign direct investment) and it is difficult to identify the main influencing factors. For this reason, a main factor selection algorithm is proposed in this article for the main factors affecting regional FDI statistics by analyzing the regional economic characteristics and the possible influencing factors in the regional FDI. Then, an example is used to illustrate its effectiveness and its stability. Firstly, the characteristics of regional economy and the regional FDI data are introduced to develop the main factor selection algorithm based on the adaptive Lasso problem for the regional FDI and… More >

  • Open Access

    ARTICLE

    A Multi-Task Network for Cardiac Magnetic Resonance Image Segmentation and Classification

    Jing Peng1,2,4, Chaoyang Xia2, Yuanwei Xu3, Xiaojie Li2, Xi Wu2, Xiao Han1,4, Xinlai Chen5, Yucheng Chen3, Zhe Cui1,4,*

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 259-272, 2021, DOI:10.32604/iasc.2021.016749

    Abstract Cardiomyopathy is a group of diseases that affect the heart and can cause serious health problems. Segmentation and classification are important for automating the clinical diagnosis and treatment planning for cardiomyopathy. However, this automation is difficult because of the poor quality of cardiac magnetic resonance (CMR) imaging data and varying dimensions caused by movement of the ventricle. To address these problems, a deep multi-task framework based on a convolutional neural network (CNN) is proposed to segment the left ventricle (LV) myocardium and classify cardiopathy simultaneously. The proposed model consists of a longitudinal encoder–decoder structure that obtains high- and low-level features… More >

  • Open Access

    ARTICLE

    Intrusion Detection Using a New Hybrid Feature Selection Model

    Adel Hamdan Mohammad*

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 65-80, 2021, DOI:10.32604/iasc.2021.016140

    Abstract Intrusion detection is an important topic that aims at protecting computer systems. Besides, feature selection is crucial for increasing the performance of intrusion detection. This paper employs a new hybrid feature selection model for intrusion detection. The implemented model uses Grey Wolf Optimization (GWO) and Particle Swarm Optimization (PSO) algorithms in a new manner. In addition, this study introduces two new models called (PSO-GWO-NB) and (PSO-GWO-ANN) for feature selection and intrusion detection. PSO and GWO show emergent results in feature selection for several purposes and applications. This paper uses PSO and GWO to select features for the intrusion detection system.… More >

  • Open Access

    ARTICLE

    Research and Development of a Brain-Controlled Wheelchair for Paralyzed Patients

    Mohammad Monirujjaman Khan1,*, Shamsun Nahar Safa1, Minhazul Hoque Ashik1, Mehedi Masud2, Mohammed A. AlZain3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 49-64, 2021, DOI:10.32604/iasc.2021.016077

    Abstract Smart wheelchairs play a significant role in supporting disabled people. Individuals with motor function impairments due to some disorders such as strokes or multiple sclerosis face frequent moving difficulties. Hence, they need constant support from an assistant. This paper presents a brain-controlled wheelchair model to assist disabled and paralyzed patients. The wheelchair is controlled by interpreting Electroencephalogram (EEG) signals, also known as brain waves. In the EEG technique, an electrode cap is positioned on the user’s scalp to receive EEG signals, which are detected and transformed by the Arduino microcontroller into motion commands, which drive the wheelchair. The proposed wheelchair… More >

  • Open Access

    ARTICLE

    A Smart Comparative Analysis for Secure Electronic Websites

    Sobia Wassan1, Chen Xi1,*, Nz Jhanjhi2, Hassan Raza3

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 187-199, 2021, DOI:10.32604/iasc.2021.015859

    Abstract Online banking is an ideal method for conducting financial transactions such as e-commerce, e-banking, and e-payments. The growing popularity of online payment services and payroll systems, however, has opened new pathways for hackers to steal consumers’ information and money, a risk which poses significant danger to the users of e-commerce and e-banking websites. This study uses the selection method of the entire e-commerce and e-banking website dataset (Chi-Squared, Gini index, and main learning algorithm). The results of the analysis suggest the identification and comparison of machine learning and deep learning algorithm performance on binary category labels (legal, fraudulent) between similar… More >

Displaying 1271-1280 on page 128 of 1767. Per Page