Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (55)
  • Open Access

    ARTICLE

    A New Flower Pollination Algorithm Strategy for MPPT of Partially Shaded Photovoltaic Arrays

    Muhannad J. Alshareef*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.046722

    Abstract Photovoltaic (PV) systems utilize maximum power point tracking (MPPT) controllers to optimize power output amidst varying environmental conditions. However, the presence of multiple peaks resulting from partial shading poses a challenge to the tracking operation. Under partial shade conditions, the global maximum power point (GMPP) may be missed by most traditional maximum power point tracker. The flower pollination algorithm (FPA) and particle swarm optimization (PSO) are two examples of metaheuristic techniques that can be used to solve the issue of failing to track the GMPP. This paper discusses and resolves all issues associated with using the standard FPA method as… More >

  • Open Access

    ARTICLE

    LC-NPLA: Label and Community Information-Based Network Presentation Learning Algorithm

    Shihu Liu, Chunsheng Yang*, Yingjie Liu

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.040818

    Abstract Many network presentation learning algorithms (NPLA) have originated from the process of the random walk between nodes in recent years. Despite these algorithms can obtain great embedding results, there may be also some limitations. For instance, only the structural information of nodes is considered when these kinds of algorithms are constructed. Aiming at this issue, a label and community information-based network presentation learning algorithm (LC-NPLA) is proposed in this paper. First of all, by using the community information and the label information of nodes, the first-order neighbors of nodes are reconstructed. In the next, the random walk strategy is improved… More >

  • Open Access

    ARTICLE

    Driving Activity Classification Using Deep Residual Networks Based on Smart Glasses Sensors

    Narit Hnoohom1, Sakorn Mekruksavanich2, Anuchit Jitpattanakul3,4,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.033940

    Abstract Accidents are still an issue in an intelligent transportation system, despite developments in self-driving technology (ITS). Drivers who engage in risky behavior account for more than half of all road accidents. As a result, reckless driving behaviour can cause congestion and delays. Computer vision and multimodal sensors have been used to study driving behaviour categorization to lessen this problem. Previous research has also collected and analyzed a wide range of data, including electroencephalography (EEG), electrooculography (EOG), and photographs of the driver’s face. On the other hand, driving a car is a complicated action that requires a wide range of body… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Digital Image Forgery Detection Using Transfer Learning

    Emad Ul Haq Qazi1,*, Tanveer Zia1, Muhammad Imran2, Muhammad Hamza Faheem1

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.041181

    Abstract Deep learning is considered one of the most efficient and reliable methods through which the legitimacy of a digital image can be verified. In the current cyber world where deepfakes have shaken the global community, confirming the legitimacy of a digital image is of great importance. With the advancements made in deep learning techniques, now we can efficiently train and develop state-of-the-art digital image forensic models. The most traditional and widely used method by researchers is convolution neural networks (CNN) for verification of image authenticity but it consumes a considerable number of resources and requires a large dataset for training.… More >

  • Open Access

    ARTICLE

    Abstractive Arabic Text Summarization Using Hyperparameter Tuned Denoising Deep Neural Network

    Ibrahim M. Alwayle1, Hala J. Alshahrani2, Saud S. Alotaibi3, Khaled M. Alalayah1, Amira Sayed A. Aziz4, Khadija M. Alaidarous1, Ibrahim Abdulrab Ahmed5, Manar Ahmed Hamza6,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.034718

    Abstract Abstractive text summarization is crucial to produce summaries of natural language with basic concepts from large text documents. Despite the achievement of English language-related abstractive text summarization models, the models that support Arabic language text summarization are fewer in number. Recent abstractive Arabic summarization models encounter different issues that need to be resolved. Syntax inconsistency is a crucial issue resulting in the low-accuracy summary. A new technique has achieved remarkable outcomes by adding topic awareness in the text summarization process that guides the module by imitating human awareness. The current research article presents Abstractive Arabic Text Summarization using Hyperparameter Tuned… More >

  • Open Access

    ARTICLE

    Coverless Image Steganography System Based on Maze Game Generation

    Al Hussien Seddik Saad1, Mohammed S. Reda2, Gamal M. Behery2, Ahmed A. El-harby2, Mohammed Baz3, Ahmed Ismail Ebada2, Mohamed Abouhawwash4,5,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.032084

    Abstract The trend of digital information transformation has become a topic of interest. Many data are threatening; thus, protecting such data from attackers is considered an essential process. Recently, a new methodology for data concealing has been suggested by researchers called coverless steganography. Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image. This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the other traditional systems. The system… More >

  • Open Access

    ARTICLE

    News Modeling and Retrieving Information: Data-Driven Approach

    Elias Hossain1, Abdullah Alshahrani2, Wahidur Rahman3,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2022.029511

    Abstract This paper aims to develop Machine Learning algorithms to classify electronic articles related to this phenomenon by retrieving information and topic modelling. The Methodology of this study is categorized into three phases: the Text Classification Approach (TCA), the Proposed Algorithms Interpretation (PAI), and finally, Information Retrieval Approach (IRA). The TCA reflects the text preprocessing pipeline called a clean corpus. The Global Vectors for Word Representation (Glove) pre-trained model, FastText, Term Frequency-Inverse Document Frequency (TF-IDF), and Bag-of-Words (BOW) for extracting the features have been interpreted in this research. The PAI manifests the Bidirectional Long Short-Term Memory (Bi-LSTM) and Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    Deep Learning Model for News Quality Evaluation Based on Explicit and Implicit Information

    Guohui Song1,2, Yongbin Wang1,*, Jianfei Li1, Hongbin Hu1

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.041873

    Abstract Recommending high-quality news to users is vital in improving user stickiness and news platforms’ reputation. However, existing news quality evaluation methods, such as clickbait detection and popularity prediction, are challenging to reflect news quality comprehensively and concisely. This paper defines news quality as the ability of news articles to elicit clicks and comments from users, which represents whether the news article can attract widespread attention and discussion. Based on the above definition, this paper first presents a straightforward method to measure news quality based on the comments and clicks of news and defines four news quality indicators. Then, the dataset… More >

  • Open Access

    ARTICLE

    Ash Detection of Coal Slime Flotation Tailings Based on Chromatographic Filter Paper Sampling and Multi-Scale Residual Network

    Wenbo Zhu1, Neng Liu1, Zhengjun Zhu2,*, Haibing Li1, Weijie Fu1, Zhongbo Zhang1, Xinghao Zhang1

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.041860

    Abstract The detection of ash content in coal slime flotation tailings using deep learning can be hindered by various factors such as foam, impurities, and changing lighting conditions that disrupt the collection of tailings images. To address this challenge, we present a method for ash content detection in coal slime flotation tailings. This method utilizes chromatographic filter paper sampling and a multi-scale residual network, which we refer to as MRCN. Initially, tailings are sampled using chromatographic filter paper to obtain static tailings images, effectively isolating interference factors at the flotation site. Subsequently, the MRCN, consisting of a multi-scale residual network, is… More >

  • Open Access

    ARTICLE

    Real-Time Spammers Detection Based on Metadata Features with Machine Learning

    Adnan Ali1, Jinlong Li1, Huanhuan Chen1, Uzair Aslam Bhatti2, Asad Khan3,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.041645

    Abstract Spammer detection is to identify and block malicious activities performing users. Such users should be identified and terminated from social media to keep the social media process organic and to maintain the integrity of online social spaces. Previous research aimed to find spammers based on hybrid approaches of graph mining, posted content, and metadata, using small and manually labeled datasets. However, such hybrid approaches are unscalable, not robust, particular dataset dependent, and require numerous parameters, complex graphs, and natural language processing (NLP) resources to make decisions, which makesspammer detection impractical for real-time detection. For example, graph mining requires neighbors’ information,… More >

Displaying 21-30 on page 3 of 55. Per Page