Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    Real-Time Spammers Detection Based on Metadata Features with Machine Learning

    Adnan Ali1, Jinlong Li1, Huanhuan Chen1, Uzair Aslam Bhatti2, Asad Khan3,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.041645

    Abstract Spammer detection is to identify and block malicious activities performing users. Such users should be identified and terminated from social media to keep the social media process organic and to maintain the integrity of online social spaces. Previous research aimed to find spammers based on hybrid approaches of graph mining, posted content, and metadata, using small and manually labeled datasets. However, such hybrid approaches are unscalable, not robust, particular dataset dependent, and require numerous parameters, complex graphs, and natural language processing (NLP) resources to make decisions, which makesspammer detection impractical for real-time detection. For example, graph mining requires neighbors’ information,… More >

  • Open Access

    ARTICLE

    Deep Neural Network Architecture Search via Decomposition-Based Multi-Objective Stochastic Fractal Search

    Hongshang Xu1, Bei Dong1,2,*, Xiaochang Liu1, Xiaojun Wu1,2

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.041177

    Abstract Deep neural networks often outperform classical machine learning algorithms in solving real-world problems. However, designing better networks usually requires domain expertise and consumes significant time and computing resources. Moreover, when the task changes, the original network architecture becomes outdated and requires redesigning. Thus, Neural Architecture Search (NAS) has gained attention as an effective approach to automatically generate optimal network architectures. Most NAS methods mainly focus on achieving high performance while ignoring architectural complexity. A myriad of research has revealed that network performance and structural complexity are often positively correlated. Nevertheless, complex network structures will bring enormous computing resources. To cope… More >

  • Open Access

    ARTICLE

    Interval Type-2 Fuzzy Model for Intelligent Fire Intensity Detection Algorithm with Decision Making in Low-Power Devices

    Emmanuel Lule1,2,*, Chomora Mikeka3, Alexander Ngenzi4, Didacienne Mukanyiligira5

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.037988

    Abstract Local markets in East Africa have been destroyed by raging fires, leading to the loss of life and property in the nearby communities. Electrical circuits, arson, and neglected charcoal stoves are the major causes of these fires. Previous methods, i.e., satellites, are expensive to maintain and cause unnecessary delays. Also, unit-smoke detectors are highly prone to false alerts. In this paper, an Interval Type-2 TSK fuzzy model for an intelligent lightweight fire intensity detection algorithm with decision-making in low-power devices is proposed using a sparse inference rules approach. A free open–source MATLAB/Simulink fuzzy toolbox integrated into MATLAB 2018a is used… More >

  • Open Access

    ARTICLE

    Person Re-Identification with Model-Contrastive Federated Learning in Edge-Cloud Environment

    Baixuan Tang1,2,#, Xiaolong Xu1,2,#, Fei Dai3, Song Wang4,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.036715

    Abstract Person re-identification (ReID) aims to recognize the same person in multiple images from different camera views. Training person ReID models are time-consuming and resource-intensive; thus, cloud computing is an appropriate model training solution. However, the required massive personal data for training contain private information with a significant risk of data leakage in cloud environments, leading to significant communication overheads. This paper proposes a federated person ReID method with model-contrastive learning (MOON) in an edgecloud environment, named FRM. Specifically, based on federated partial averaging, MOON warmup is added to correct the local training of individual edge servers and improve the model’s… More >

  • Open Access

    ARTICLE

    Binary Archimedes Optimization Algorithm for Computing Dominant Metric Dimension Problem

    Basma Mohamed1,*, Linda Mohaisen2, Mohammed Amin1

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.031947

    Abstract In this paper, we consider the NP-hard problem of finding the minimum dominant resolving set of graphs. A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the vertices in B. A resolving set is dominating if every vertex of G that does not belong to B is a neighbor to some vertices in B. The dominant metric dimension of is the cardinality number of the minimum dominant resolving set. The dominant metric dimension is computed by a binary version of the Archimedes optimization algorithm… More >

  • Open Access

    ARTICLE

    A Method of Integrating Length Constraints into Encoder-Decoder Transformer for Abstractive Text Summarization

    Ngoc-Khuong Nguyen1.2, Dac-Nhuong Le1, Viet-Ha Nguyen2, Anh-Cuong Le3,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.037083

    Abstract Text summarization aims to generate a concise version of the original text. The longer the summary text is, the more detailed it will be from the original text, and this depends on the intended use. Therefore, the problem of generating summary texts with desired lengths is a vital task to put the research into practice. To solve this problem, in this paper, we propose a new method to integrate the desired length of the summarized text into the encoder-decoder model for the abstractive text summarization problem. This length parameter is integrated into the encoding phase at each self-attention step and… More >

  • Open Access

    CORRECTION

    Correction: Stock Market Index Prediction Using Machine Learning and Deep Learning Techniques

    Abdus Saboor1,4, Arif Hussain2, Bless Lord Y. Agbley3, Amin ul Haq3,*, Jian Ping Li3, Rajesh Kumar1,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.047463

    Abstract This article has no abstract. More >

  • Open Access

    RETRACTION

    Retraction: Precise Rehabilitation Strategies for Functional Impairment in Children with Cerebral Palsy

    Yaojin Sun1, Nan Jiang1,*, Min Zhu1, Hao Hua2

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.047522

    Abstract This article has no abstract. More >

  • Open Access

    RETRACTION

    Retraction: Fluid Flow and Mixed Heat Transfer in a Horizontal Channel with an Open Cavity and Wavy Wall

    Tohid Adibi1, Shams Forruque Ahmed2,*, Omid Adibi3, Hassan Athari4, Irfan Anjum Badruddin5, Syed Javed5

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.047521

    Abstract This article has no abstract. More >

  • Open Access

    RETRACTION

    Retraction: Marketing Model Analysis of Fashion Communication Based on the Visual Analysis of Neutrosophic Systems

    Fangyu Ye1, Xiaoshu Xu2,*, Yunfeng Zhang3, Yan Ye4, Jingyu Dai5,*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.045930

    Abstract This article has no abstract. More >

Displaying 31-40 on page 4 of 56. Per Page