Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Deep Learning Model for News Quality Evaluation Based on Explicit and Implicit Information

    Guohui Song1,2, Yongbin Wang1,*, Jianfei Li1, Hongbin Hu1

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 275-295, 2023, DOI:10.32604/iasc.2023.041873

    Abstract Recommending high-quality news to users is vital in improving user stickiness and news platforms’ reputation. However, existing news quality evaluation methods, such as clickbait detection and popularity prediction, are challenging to reflect news quality comprehensively and concisely. This paper defines news quality as the ability of news articles to elicit clicks and comments from users, which represents whether the news article can attract widespread attention and discussion. Based on the above definition, this paper first presents a straightforward method to measure news quality based on the comments and clicks of news and defines four news quality indicators. Then, the dataset… More >

  • Open Access

    ARTICLE

    Ash Detection of Coal Slime Flotation Tailings Based on Chromatographic Filter Paper Sampling and Multi-Scale Residual Network

    Wenbo Zhu1, Neng Liu1, Zhengjun Zhu2,*, Haibing Li1, Weijie Fu1, Zhongbo Zhang1, Xinghao Zhang1

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 259-273, 2023, DOI:10.32604/iasc.2023.041860

    Abstract The detection of ash content in coal slime flotation tailings using deep learning can be hindered by various factors such as foam, impurities, and changing lighting conditions that disrupt the collection of tailings images. To address this challenge, we present a method for ash content detection in coal slime flotation tailings. This method utilizes chromatographic filter paper sampling and a multi-scale residual network, which we refer to as MRCN. Initially, tailings are sampled using chromatographic filter paper to obtain static tailings images, effectively isolating interference factors at the flotation site. Subsequently, the MRCN, consisting of a multi-scale residual network, is… More >

  • Open Access

    ARTICLE

    Real-Time Spammers Detection Based on Metadata Features with Machine Learning

    Adnan Ali1, Jinlong Li1, Huanhuan Chen1, Uzair Aslam Bhatti2, Asad Khan3,*

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 241-258, 2023, DOI:10.32604/iasc.2023.041645

    Abstract Spammer detection is to identify and block malicious activities performing users. Such users should be identified and terminated from social media to keep the social media process organic and to maintain the integrity of online social spaces. Previous research aimed to find spammers based on hybrid approaches of graph mining, posted content, and metadata, using small and manually labeled datasets. However, such hybrid approaches are unscalable, not robust, particular dataset dependent, and require numerous parameters, complex graphs, and natural language processing (NLP) resources to make decisions, which makes spammer detection impractical for real-time detection. For example, graph mining requires neighbors’… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Digital Image Forgery Detection Using Transfer Learning

    Emad Ul Haq Qazi1,*, Tanveer Zia1, Muhammad Imran2, Muhammad Hamza Faheem1

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 225-240, 2023, DOI:10.32604/iasc.2023.041181

    Abstract Deep learning is considered one of the most efficient and reliable methods through which the legitimacy of a digital image can be verified. In the current cyber world where deepfakes have shaken the global community, confirming the legitimacy of a digital image is of great importance. With the advancements made in deep learning techniques, now we can efficiently train and develop state-of-the-art digital image forensic models. The most traditional and widely used method by researchers is convolution neural networks (CNN) for verification of image authenticity but it consumes a considerable number of resources and requires a large dataset for training.… More >

  • Open Access

    ARTICLE

    LC-NPLA: Label and Community Information-Based Network Presentation Learning Algorithm

    Shihu Liu, Chunsheng Yang*, Yingjie Liu

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 203-223, 2023, DOI:10.32604/iasc.2023.040818

    Abstract Many network presentation learning algorithms (NPLA) have originated from the process of the random walk between nodes in recent years. Despite these algorithms can obtain great embedding results, there may be also some limitations. For instance, only the structural information of nodes is considered when these kinds of algorithms are constructed. Aiming at this issue, a label and community information-based network presentation learning algorithm (LC-NPLA) is proposed in this paper. First of all, by using the community information and the label information of nodes, the first-order neighbors of nodes are reconstructed. In the next, the random walk strategy is improved… More >

  • Open Access

    ARTICLE

    Deep Neural Network Architecture Search via Decomposition-Based Multi-Objective Stochastic Fractal Search

    Hongshang Xu1, Bei Dong1,2,*, Xiaochang Liu1, Xiaojun Wu1,2

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 185-202, 2023, DOI:10.32604/iasc.2023.041177

    Abstract Deep neural networks often outperform classical machine learning algorithms in solving real-world problems. However, designing better networks usually requires domain expertise and consumes significant time and computing resources. Moreover, when the task changes, the original network architecture becomes outdated and requires redesigning. Thus, Neural Architecture Search (NAS) has gained attention as an effective approach to automatically generate optimal network architectures. Most NAS methods mainly focus on achieving high performance while ignoring architectural complexity. A myriad of research has revealed that network performance and structural complexity are often positively correlated. Nevertheless, complex network structures will bring enormous computing resources. To cope… More >

  • Open Access

    ARTICLE

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System

    Laith Abualigah1,2,3,4,5,6,*, Serdar Ekinci7, Davut Izci7,8, Raed Abu Zitar9

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 169-183, 2023, DOI:10.32604/iasc.2023.040291

    Abstract Efficient speed controllers for dynamic driving tasks in autonomous vehicles are crucial for ensuring safety and reliability. This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. Our approach outperforms existing optimization techniques on benchmark functions, and we demonstrate its effectiveness in controlling cruise control systems with increased flexibility and precision. Our study contributes to the advancement of autonomous vehicle technology by introducing a novel and efficient method for FOPID controller design that can enhance the driving experience while ensuring safety and… More >

  • Open Access

    ARTICLE

    Abstractive Arabic Text Summarization Using Hyperparameter Tuned Denoising Deep Neural Network

    Ibrahim M. Alwayle1, Hala J. Alshahrani2, Saud S. Alotaibi3, Khaled M. Alalayah1, Amira Sayed A. Aziz4, Khadija M. Alaidarous1, Ibrahim Abdulrab Ahmed5, Manar Ahmed Hamza6,*

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 153-168, 2023, DOI:10.32604/iasc.2023.034718

    Abstract Abstractive text summarization is crucial to produce summaries of natural language with basic concepts from large text documents. Despite the achievement of English language-related abstractive text summarization models, the models that support Arabic language text summarization are fewer in number. Recent abstractive Arabic summarization models encounter different issues that need to be resolved. Syntax inconsistency is a crucial issue resulting in the low-accuracy summary. A new technique has achieved remarkable outcomes by adding topic awareness in the text summarization process that guides the module by imitating human awareness. The current research article presents Abstractive Arabic Text Summarization using Hyperparameter Tuned… More >

  • Open Access

    ARTICLE

    Driving Activity Classification Using Deep Residual Networks Based on Smart Glasses Sensors

    Narit Hnoohom1, Sakorn Mekruksavanich2, Anuchit Jitpattanakul3,4,*

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 139-151, 2023, DOI:10.32604/iasc.2023.033940

    Abstract Accidents are still an issue in an intelligent transportation system, despite developments in self-driving technology (ITS). Drivers who engage in risky behavior account for more than half of all road accidents. As a result, reckless driving behaviour can cause congestion and delays. Computer vision and multimodal sensors have been used to study driving behaviour categorization to lessen this problem. Previous research has also collected and analyzed a wide range of data, including electroencephalography (EEG), electrooculography (EOG), and photographs of the driver’s face. On the other hand, driving a car is a complicated action that requires a wide range of body… More >

  • Open Access

    ARTICLE

    Coverless Image Steganography System Based on Maze Game Generation

    Al Hussien Seddik Saad1, Mohammed S. Reda2, Gamal M. Behery2, Ahmed A. El-harby2, Mohammed Baz3, Mohamed Abouhawwash4,5,*, Ahmed Ismail Ebada6

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 125-138, 2023, DOI:10.32604/iasc.2023.032084

    Abstract The trend of digital information transformation has become a topic of interest. Many data are threatening; thus, protecting such data from attackers is considered an essential process. Recently, a new methodology for data concealing has been suggested by researchers called coverless steganography. Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image. This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the other traditional systems. The system… More >

Displaying 11-20 on page 2 of 1767. Per Page