Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    A Robust Model for Translating Arabic Sign Language into Spoken Arabic Using Deep Learning

    Khalid M. O. Nahar1, Ammar Almomani2,3,*, Nahlah Shatnawi1, Mohammad Alauthman4

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2037-2057, 2023, DOI:10.32604/iasc.2023.038235 - 21 June 2023

    Abstract This study presents a novel and innovative approach to automatically translating Arabic Sign Language (ATSL) into spoken Arabic. The proposed solution utilizes a deep learning-based classification approach and the transfer learning technique to retrain 12 image recognition models. The image-based translation method maps sign language gestures to corresponding letters or words using distance measures and classification as a machine learning technique. The results show that the proposed model is more accurate and faster than traditional image-based models in classifying Arabic-language signs, with a translation accuracy of 93.7%. This research makes a significant contribution to the More >

  • Open Access

    ARTICLE

    A Novel Fuzzy Inference System-Based Endmember Extraction in Hyperspectral Images

    M. R. Vimala Devi, S. Kalaivani*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2459-2476, 2023, DOI:10.32604/iasc.2023.038183 - 21 June 2023

    Abstract Spectral unmixing helps to identify different components present in the spectral mixtures which occur in the uppermost layer of the area owing to the low spatial resolution of hyperspectral images. Most spectral unmixing methods are globally based and do not consider the spectral variability among its endmembers that occur due to illumination, atmospheric, and environmental conditions. Here, endmember bundle extraction plays a major role in overcoming the above-mentioned limitations leading to more accurate abundance fractions. Accordingly, a two-stage approach is proposed to extract endmembers through endmember bundles in hyperspectral images. The divide and conquer method… More >

  • Open Access

    ARTICLE

    Atrous Convolution-Based Residual Deep CNN for Image Dehazing with Spider Monkey–Particle Swarm Optimization

    CH. Mohan Sai Kumar*, R. S. Valarmathi

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1711-1728, 2023, DOI:10.32604/iasc.2023.038113 - 21 June 2023

    Abstract Image dehazing is a rapidly progressing research concept to enhance image contrast and resolution in computer vision applications. Owing to severe air dispersion, fog, and haze over the environment, hazy images pose specific challenges during information retrieval. With the advances in the learning theory, most of the learning-based techniques, in particular, deep neural networks are used for single-image dehazing. The existing approaches are extremely computationally complex, and the dehazed images are suffered from color distortion caused by the over-saturation and pseudo-shadow phenomenon. However, the slow convergence rate during training and haze residual is the two… More >

  • Open Access

    ARTICLE

    A PERT-BiLSTM-Att Model for Online Public Opinion Text Sentiment Analysis

    Mingyong Li, Zheng Jiang*, Zongwei Zhao, Longfei Ma

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2387-2406, 2023, DOI:10.32604/iasc.2023.037900 - 21 June 2023

    Abstract As an essential category of public event management and control, sentiment analysis of online public opinion text plays a vital role in public opinion early warning, network rumor management, and netizens’ personality portraits under massive public opinion data. The traditional sentiment analysis model is not sensitive to the location information of words, it is difficult to solve the problem of polysemy, and the learning representation ability of long and short sentences is very different, which leads to the low accuracy of sentiment classification. This paper proposes a sentiment analysis model PERT-BiLSTM-Att for public opinion text… More >

  • Open Access

    ARTICLE

    An OP-TEE Energy-Efficient Task Scheduling Approach Based on Mobile Application Characteristics

    Hai Wang*, Xuan Hao, Shuo Ji*, Jie Zheng, Yuhui Ma, Jianfeng Yang

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1621-1635, 2023, DOI:10.32604/iasc.2023.037898 - 21 June 2023

    Abstract Trusted Execution Environment (TEE) is an important part of the security architecture of modern mobile devices, but its secure interaction process brings extra computing burden to mobile devices. This paper takes open portable trusted execution environment (OP-TEE) as the research object and deploys it to Raspberry Pi 3B, designs and implements a benchmark for OP-TEE, and analyzes its program characteristics. Furthermore, the application execution time, energy consumption and energy-delay product (EDP) are taken as the optimization objectives, and the central processing unit (CPU) frequency scheduling strategy of mobile devices is dynamically adjusted according to the More >

  • Open Access

    ARTICLE

    Improved Control in Single Phase Inverter Grid-Tied PV System Using Modified PQ Theory

    Nur Fairuz Mohamed Yusof1, Dahaman Ishak2, Muhammad Ammirrul Atiqi Mohd Zainuri3,*, Muhammad Najwan Hamidi2, Zuhair Muhammed Alaas4, Mohamed Mostafa Ramadan Ahmed5

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2441-2457, 2023, DOI:10.32604/iasc.2023.037778 - 21 June 2023

    Abstract Grid-connected reactive-load compensation and harmonic control are becoming a central topic as photovoltaic (PV) grid-connected systems diversified. This research aims to produce a high-performance inverter with a fast dynamic response for accurate reference tracking and a low total harmonic distortion (THD) even under nonlinear load applications by improving its control scheme. The proposed system is expected to operate in both stand-alone mode and grid-connected mode. In stand-alone mode, the proposed controller supplies power to critical loads, alternatively during grid-connected mode provide excess energy to the utility. A modified variable step incremental conductance (VS-InCond) algorithm is… More >

  • Open Access

    ARTICLE

    Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model

    Mohammad S. Al-kahtani1, Zahid Mehmood2,3,*, Tariq Sadad4, Islam Zada5, Gauhar Ali6, Mohammed ElAffendi6

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2279-2290, 2023, DOI:10.32604/iasc.2023.037673 - 21 June 2023

    Abstract Cybersecurity threats are increasing rapidly as hackers use advanced techniques. As a result, cybersecurity has now a significant factor in protecting organizational limits. Intrusion detection systems (IDSs) are used in networks to flag serious issues during network management, including identifying malicious traffic, which is a challenge. It remains an open contest over how to learn features in IDS since current approaches use deep learning methods. Hybrid learning, which combines swarm intelligence and evolution, is gaining attention for further improvement against cyber threats. In this study, we employed a PSO-GA (fusion of particle swarm optimization (PSO) More >

  • Open Access

    ARTICLE

    Intelligent Financial Fraud Detection Using Artificial Bee Colony Optimization Based Recurrent Neural Network

    T. Karthikeyan1,*, M. Govindarajan1, V. Vijayakumar2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1483-1498, 2023, DOI:10.32604/iasc.2023.037606 - 21 June 2023

    Abstract Frauds don’t follow any recurring patterns. They require the use of unsupervised learning since their behaviour is continually changing. Fraudsters have access to the most recent technology, which gives them the ability to defraud people through online transactions. Fraudsters make assumptions about consumers’ routine behaviour, and fraud develops swiftly. Unsupervised learning must be used by fraud detection systems to recognize online payments since some fraudsters start out using online channels before moving on to other techniques. Building a deep convolutional neural network model to identify anomalies from conventional competitive swarm optimization patterns with a focus… More >

  • Open Access

    ARTICLE

    Recapitulation Web 3.0: Architecture, Features and Technologies, Opportunities and Challenges

    Amtul Waheed, Bhawna Dhupia*, Sultan Mesfer Aldossary

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1609-1620, 2023, DOI:10.32604/iasc.2023.037539 - 21 June 2023

    Abstract Tim Berners-Lee developed the internet at CERN in early 1990 with fundamental technologies such as HTML, URL, and HTTP which became the foundation of the web. The contemporary web we use today has been much advanced over a period of time ever since the innovation of the World Wide Web was introduced. The static web was the first version of the web, which was the read-only web. Succeeding development in web technology is web 3.0 which is a distributed and decentralized web with emerging technologies. This article emphasizes the comparison of important details with the… More >

  • Open Access

    ARTICLE

    Marketing Model Analysis of Fashion Communication Based on the Visual Analysis of Neutrosophic Systems

    Fangyu Ye1, Xiaoshu Xu2,*, Yunfeng Zhang3, Yan Ye4, Jingyu Dai5,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1257-1274, 2023, DOI:10.32604/iasc.2023.037057 - 21 June 2023

    Abstract In order to Improvement the Neutrosophic sets as effective tools to deal with uncertain and inconsistent information. The research takes methodology of combined single-valued neutrosophic rough set and multi-scale decision systems. This paper proposes the optimal scale selection and reduction algorithms based on multi-scale single-valued neutrosophic dominance rough set model. User requirements were analyzed using KJ method to construct a hierarchical model. According to the statistics of representative studies from China and the West, we found that, on the one hand, classical theory has been expanded and supplemented in fashion culture communication and marketing. The… More >

Displaying 9131-9140 on page 914 of 31589. Per Page