Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Color Contrast Enhancement on Pap Smear Images Using Statistical Analysis

    Nadzirah Nahrawi1, Wan Azani Mustafa2,3,*, Siti Nurul Aqmariah Mohd Kanafiah1, Mohd Yusoff Mashor1

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 431-438, 2021, DOI:10.32604/iasc.2021.018635

    Abstract In the conventional cervix cancer diagnosis, the Pap smear sample images are taken by using a microscope,causing the cells to be hazy and afflicted by unwanted noise. The captured microscopic images of Pap smear may suffer from some defects such as blurring or low contrasts. These problems can hide and obscure the important cervical cell morphologies, leading to the risk of false diagnosis. The quality and contrast of the Pap smear images are the primary keys that could affect the diagnosis’ accuracy. The paper's main objective is to propose the best contrast enhancement to eliminate contrast problems in images and… More >

  • Open Access

    ARTICLE

    Security Empowered System-on-Chip Selection for Internet of Things

    Ramesh Krishnamoorthy*, Kalimuthu Krishnan

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 403-418, 2021, DOI:10.32604/iasc.2021.018560

    Abstract Due to the rapid growth of embedded devices, the selection of System-on-Chip (SoC) has a stronger influence to enable hardware security in embedded system design. System-on-chip (SoC) devices consist of one or more CPUs through wide-ranging inbuilt peripherals for designing a system with less cost. The selection of SoC is more significant to determine the suitability for secured application development. The design space analysis of symmetric key approaches including rivest cipher (RC5), advanced encryption standard (AES), data encryption standard (DES), international data encryption algorithm (IDEA), elliptic curve cryptography (ECC), MX algorithm, and the secure hash algorithm (SHA-256) are compared to… More >

  • Open Access

    ARTICLE

    Binaural Speech Separation Algorithm Based on Deep Clustering

    Lin Zhou1,*, Kun Feng1, Tianyi Wang1, Yue Xu1, Jingang Shi2

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 527-537, 2021, DOI:10.32604/iasc.2021.018414

    Abstract Neutral network (NN) and clustering are the two commonly used methods for speech separation based on supervised learning. Recently, deep clustering methods have shown promising performance. In our study, considering that the spectrum of the sound source has time correlation, and the spatial position of the sound source has short-term stability, we combine the spectral and spatial features for deep clustering. In this work, the logarithmic amplitude spectrum (LPS) and the interaural phase difference (IPD) function of each time frequency (TF) unit for the binaural speech signal are extracted as feature. Then, these features of consecutive frames construct feature map,… More >

  • Open Access

    ARTICLE

    Conveyor Belt Detection Based on Deep Convolution GANs

    Xiaoli Hao1,*, Xiaojuan Meng1, Yueqin Zhang1, Jindong Xue2, Jinyue Xia3

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 601-613, 2021, DOI:10.32604/iasc.2021.017963

    Abstract The belt conveyor is essential in coal mine underground transportation. The belt properties directly affect the safety of the conveyor. It is essential to monitor that the belt works well. Traditional non-contact detection methods are usually time-consuming, and they only identify a single instance of damage. In this paper, a new belt-tear detection method is developed, characterized by two time-scale update rules for a multi-class deep convolution generative adversarial network. To use this method, only a small amount of image data needs to be labeled, and batch normalization in the generator must be removed to avoid artifacts in the generated… More >

  • Open Access

    ARTICLE

    Person Re-Identification Based on Joint Loss and Multiple Attention Mechanism

    Yong Li, Xipeng Wang*

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 563-573, 2021, DOI:10.32604/iasc.2021.017926

    Abstract Person re-identification (ReID) is the use of computer vision and machine learning techniques to determine whether the pedestrians in the two images under different cameras are the same person. It can also be regarded as a matching retrieval task for person targets in different scenes. The research focuses on how to obtain effective person features from images with occlusion, angle change, and target attitude change. Based on the present difficulties and challenges in ReID, the paper proposes a ReID method based on joint loss and multi-attention network. It improves the person re-identification algorithm based on global characteristics, introduces spatial attention… More >

  • Open Access

    ARTICLE

    Game-Theory Based Graded Diagnosis Strategies of Craniocerebral Injury

    Yiming Liu1, Ke Chen1, Lanzhen Bian2, Lei Ren3, Jing Hu4,*, Jinyue Xia5

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 553-561, 2021, DOI:10.32604/iasc.2021.017391

    Abstract Craniocerebral injury is a common surgical emergency in children. It has the highest mortality and disability rate, and the second highest incidence rate. Accidental injuries due to falls, sports and traffic accidents are the main causes of craniocerebral injury. In recent years, the incidence rate of craniocerebral injury in children has continued to rise, which injury stretches out the limited medical resources. Moreover, it is very difficult to deal with complex craniocerebral trauma in the hospital of county town, in which is not rich in medical resources because of the lack of experienced doctors and nurses. In addition, some children… More >

  • Open Access

    ARTICLE

    An Adversarial Network-based Multi-model Black-box Attack

    Bin Lin1, Jixin Chen2, Zhihong Zhang3, Yanlin Lai2, Xinlong Wu2, Lulu Tian4, Wangchi Cheng5,*

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 641-649, 2021, DOI:10.32604/iasc.2021.016818

    Abstract Researches have shown that Deep neural networks (DNNs) are vulnerable to adversarial examples. In this paper, we propose a generative model to explore how to produce adversarial examples that can deceive multiple deep learning models simultaneously. Unlike most of popular adversarial attack algorithms, the one proposed in this paper is based on the Generative Adversarial Networks (GAN). It can quickly produce adversarial examples and perform black-box attacks on multi-model. To enhance the transferability of the samples generated by our approach, we use multiple neural networks in the training process. Experimental results on MNIST showed that our method can efficiently generate… More >

  • Open Access

    ARTICLE

    Fault Detection Algorithms for Achieving Service Continuity in Photovoltaic Farms

    Sherif S. M. Ghoneim1,*, Amr E. Rashed2, Nagy I. Elkalashy1

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 467-479, 2021, DOI:10.32604/iasc.2021.016681

    Abstract This study uses several artificial intelligence approaches to detect and estimate electrical faults in photovoltaic (PV) farms. The fault detection approaches of random forest, logistic regression, naive Bayes, AdaBoost, and CN2 rule induction were selected from a total of 12 techniques because they produced better decisions for fault detection. The proposed techniques were designed using distributed PV current measurements, plant current, plant voltage, and power. Temperature, radiation, and fault resistance were treated randomly. The proposed classification model was created using the Orange platform. A classification tree was visualized, consisting of seven nodes and four leaves, with a depth of four… More >

  • Open Access

    ARTICLE

    AttEF: Convolutional LSTM Encoder-Forecaster with Attention Module for Precipitation Nowcasting

    Wei Fang1,2,*, Lin Pang1, Weinan Yi1, Victor S. Sheng3

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 453-466, 2021, DOI:10.32604/iasc.2021.016589

    Abstract Precipitation nowcasting has become an essential technology underlying various public services ranging from weather advisories to citywide rainfall alerts. The main challenge facing many algorithms is the high non-linearity and temporal-spatial complexity of the radar image. Convolutional Long Short-Term Memory (ConvLSTM) is appropriate for modeling spatiotemporal variations as it integrates the convolution operator into recurrent state transition functions. However, the technical characteristic of encoding the input sequence into a fixed-size vector cannot guarantee that ConvLSTM maintains adequate sequence representations in the information flow, which affects the performance of the task. In this paper, we propose Attention ConvLSTM Encoder-Forecaster(AttEF) which allows… More >

  • Open Access

    ARTICLE

    Improved Algorithm Based on Decision Tree for Semantic Information Retrieval

    Zhe Wang1,2, Yingying Zhao1, Hai Dong3, Yulong Xu1,*, Yali Lv1

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 419-429, 2021, DOI:10.32604/iasc.2021.016434

    Abstract The quick retrieval of target information from a massive amount of information has become a core research area in the field of information retrieval. Semantic information retrieval provides effective methods based on semantic comprehension, whose traditional models focus on multiple rounds of detection to differentiate information. Since a large amount of information must be excluded, retrieval efficiency is low. One of the most common methods used in classification, the decision tree algorithm, first selects attributes with higher information entropy to construct a decision tree. However, the tree only matches words on the grammatical level and does not consider the semantic… More >

Displaying 11331-11340 on page 1134 of 22248. Per Page