Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Efficient Data Augmentation Techniques for Improved Classification in Limited Data Set of Oral Squamous Cell Carcinoma

    Wael Alosaimi1,*, M. Irfan Uddin2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1387-1401, 2022, DOI:10.32604/cmes.2022.018433

    Abstract Deep Learning (DL) techniques as a subfield of data science are getting overwhelming attention mainly because of their ability to understand the underlying pattern of data in making classifications. These techniques require a considerable amount of data to efficiently train the DL models. Generally, when the data size is larger, the DL models perform better. However, it is not possible to have a considerable amount of data in different domains such as healthcare. In healthcare, it is impossible to have a substantial amount of data to solve medical problems using Artificial Intelligence, mainly due to ethical issues and the privacy… More >

  • Open Access

    ARTICLE

    Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption

    Gang Xu1,2, Fan Yun1, Xiu-Bo Chen3,*, Shiyuan Xu1, Jingzhong Wang1, Tao Shang4, Yan Chang5, Mianxiong Dong6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 531-541, 2022, DOI:10.32604/iasc.2022.028264

    Abstract Secure multi-party computation has been playing a fundamental role in terms of classical cryptography. Quantum homomorphic encryption (QHE) could compute the encrypted data without decryption. At present, most protocols use a semi-honest third party (TP) to protect participants’ secrets. We use a quantum homomorphic encryption scheme instead of TP to protect the privacy of parties. Based on quantum homomorphic encryption, a secure multi-party quantum summation scheme is proposed in which N participants can delegate a server with strong quantum computing power to assist computation. By delegating the computation and key update processes to a server and a semi-honest key center,… More >

  • Open Access

    ARTICLE

    Influencing Factors Analysis of Rehabilitation for Patients with Spinal Cord Injury

    Min Rao1, Yufeng Li1,*, Hongye Liu2, Isabel Wang3, Yongjun Ren4

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 455-466, 2022, DOI:10.32604/iasc.2022.027694

    Abstract The aim of spinal cord injury rehabilitation is to increase the independent ability of patients, so that patients can return to society and live a creative life. Regaining independence living is the primary goal of rehabilitation. Rehabilitation of patients with spinal cord injury is a long and lengthy process, which needs comprehensive dimensions support from medical workers, family members, and social support. At present, medical institutions and researchers mainly focus on the level of physical recovery and the treatment of complications in patients with spinal cord injury and pay less attention to social factors during the rehabilitation treatment of patients.… More >

  • Open Access

    ARTICLE

    Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data

    Ling Wang1, Shan Ji2, Zhaokang Wang3, Xiaowan Wang4,*, Ghulam Mohiuddin5, Yongjun Ren1

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 221-234, 2022, DOI:10.32604/iasc.2022.027536

    Abstract As the data scale exceeds the petabyte level, more and more users outsource their local databases to third-party service providers to save local storage costs and avoid cumbersome local data management. However, because third-party service providers are not fully trusted, they may leak outsourced data and bring security risks to the personal privacy of data users. The service provider may also return incorrect or incomplete query results to the data user. Therefore, in this paper, we propose a Lightweight and Verifiable Multi-keyword Query Scheme for the integrity verification of multi-keyword query of outsourced data. This scheme supports multi-keyword query integrity… More >

  • Open Access

    ARTICLE

    End-to-end Handwritten Chinese Paragraph Text Recognition Using Residual Attention Networks

    Yintong Wang1,2,*, Yingjie Yang2, Haiyan Chen3, Hao Zheng1, Heyou Chang1

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 371-388, 2022, DOI:10.32604/iasc.2022.027146

    Abstract Handwritten Chinese recognition which involves variant writing style, thousands of character categories and monotonous data mark process is a long-term focus in the field of pattern recognition research. The existing methods are facing huge challenges including the complex structure of character/line-touching, the discriminate ability of similar characters and the labeling of training datasets. To deal with these challenges, an end-to-end residual attention handwritten Chinese paragraph text recognition method is proposed, which uses fully convolutional neural networks as the main structure of feature extraction and employs connectionist temporal classification as a loss function. The novel residual attention gate block is more… More >

  • Open Access

    ARTICLE

    Movie Recommendation Algorithm Based on Ensemble Learning

    Wei Fang1,2,*, Yu Sha1, Meihan Qi1, Victor S. Sheng3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 609-622, 2022, DOI:10.32604/iasc.2022.027067

    Abstract With the rapid development of personalized services, major websites have launched a recommendation module in recent years. This module will recommend information you are interested in based on your viewing history and other information, thereby improving the economic benefits of the website and increasing the number of users. This paper has introduced content-based recommendation algorithm, K-Nearest Neighbor (KNN)-based collaborative filtering (CF) algorithm and singular value decomposition-based (SVD) collaborative filtering algorithm. However, the mentioned recommendation algorithms all recommend for a certain aspect, and do not realize the recommendation of specific movies input by specific users which will cause the recommended content… More >

  • Open Access

    ARTICLE

    Negative Emotions Sensitive Humanoid Robot with Attention-Enhanced Facial Expression Recognition Network

    Rongrong Ni1, Xiaofeng Liu1,*, Yizhou Chen1, Xu Zhou1, Huili Cai1, Loo Chu Kiong2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 149-164, 2022, DOI:10.32604/iasc.2022.026813

    Abstract Lonely older adults and persons restricted in movements are apt to cause negative emotions, which is harmful to their mental health. A humanoid robot with audiovisual interactions is presented, which can correspondingly output positive facial expressions to relieve human's negative facial expressions. The negative emotions are identified through an attention-enhanced facial expression recognition (FER) network. The network is firstly trained on MMEW macro-and micro-expression databases to discover expression-related features. Then, macro-expression recognition tasks are performed by fine-tuning the trained models on several benchmarking FER databases, including CK+ and Oulu-CASIA. A transformer network is introduced to process the sequential features engineered… More >

  • Open Access

    ARTICLE

    Hybrid Invasive Weed Improved Grasshopper Optimization Algorithm for Cloud Load Balancing

    K. Naveen Durai*, R. Subha, Anandakumar Haldorai

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 467-483, 2022, DOI:10.32604/iasc.2022.026020

    Abstract In cloud computing, the processes of load balancing and task scheduling are major concerns as they are the primary mechanisms responsible for executing tasks by allocating and utilizing the resources of Virtual Machines (VMs) in a more optimal way. This problem of balancing loads and scheduling tasks in the cloud computing scenario can be categorized as an NP-hard problem. This problem of load balancing needs to be efficiently allocated tasks to VMs and sustain the trade-off among the complete set of VMs. It also needs to maintain equilibrium among VMs with the objective of maximizing throughput with a minimized time… More >

  • Open Access

    ARTICLE

    Analysis of Brushless DC Motor Using Enhanced Fopid Controller with ALO Algorithm

    K. Prathibanandhi1,*, R. Ramesh2, C. Yaashuwanth3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 543-557, 2022, DOI:10.32604/iasc.2022.025860

    Abstract The delivery of combined benefits of Alternating Current (AC) motor and Direct Current (DC) Motor makes the Brushless Direct Current (BLDC) motors as a unique feature in numerous industrial applications. The possibilities of running the motor at very high speed with extensive operating life span of BLDC with miniature and its compact design make it an un-ignorable option for Electrical Engineers. With many advantages, till managing as well as controlling the speed of BLDC is complicated. This work is intended to come up with an effective control of speed of the motor through Torque Ripple Minimization Route and an Enhanced-Fractional… More >

  • Open Access

    ARTICLE

    Self-Balancing Vehicle Based on Adaptive Neuro-Fuzzy Inference System

    M. L. Ramamoorthy1, S. Selvaperumal2,*, G. Prabhakar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 485-497, 2022, DOI:10.32604/iasc.2022.025824

    Abstract The scope of this research is to design and fuse the sensors used in the self-balancing vehicle through Adaptive Neuro-Fuzzy Inference systems (ANFIS) algorithm to optimize the output. The self-balancing vehicle is a wheeled inverted pendulum, which is extremely complex, nonlinear and unstable. Homogeneous and Heterogeneous sensors are involved in this sensor fusion research to identify the best feasible value among them. The data fusion algorithm present inside the controller of the self-balancing vehicle makes the inputs of the homogeneous sensors and heterogeneous sensors separately for ameliorate surrounding perception. Simulation is performed by modeling the sensors in Simulink. The outcomes… More >

Displaying 8481-8490 on page 849 of 22225. Per Page