Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Prediction-Based Thunderstorm Path Recovery Method Using CNN-BiLSTM

    Xu Yang1,2, Ling Zhuang1, Yuqiang Sun3, Wenjie Zhang4,5,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1637-1654, 2023, DOI:10.32604/iasc.2023.039879

    Abstract The loss of three-dimensional atmospheric electric field (3DAEF) data has a negative impact on thunderstorm detection. This paper proposes a method for thunderstorm point charge path recovery. Based on the relationship between a point charge and 3DAEF, we derive corresponding localization formulae by establishing a point charge localization model. Generally, point charge movement paths are obtained after fitting time series localization results. However, AEF data losses make it difficult to fit and visualize paths. Therefore, using available AEF data without loss as input, we design a hybrid model combining the convolutional neural network (CNN) and bi-directional long short-term memory (BiLSTM)… More >

  • Open Access

    ARTICLE

    A Novel Ego Lanes Detection Method for Autonomous Vehicles

    Bilal Bataineh*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1941-1961, 2023, DOI:10.32604/iasc.2023.039868

    Abstract Autonomous vehicles are currently regarded as an interesting topic in the AI field. For such vehicles, the lane where they are traveling should be detected. Most lane detection methods identify the whole road area with all the lanes built on it. In addition to having a low accuracy rate and slow processing time, these methods require costly hardware and training datasets, and they fail under critical conditions. In this study, a novel detection algorithm for a lane where a car is currently traveling is proposed by combining simple traditional image processing with lightweight machine learning (ML) methods. First, a preparation… More >

  • Open Access

    ARTICLE

    A Content-Based Medical Image Retrieval Method Using Relative Difference-Based Similarity Measure

    Ali Ahmed1,*, Alaa Omran Almagrabi2, Omar M. Barukab3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2355-2370, 2023, DOI:10.32604/iasc.2023.039847

    Abstract Content-based medical image retrieval (CBMIR) is a technique for retrieving medical images based on automatically derived image features. There are many applications of CBMIR, such as teaching, research, diagnosis and electronic patient records. Several methods are applied to enhance the retrieval performance of CBMIR systems. Developing new and effective similarity measure and features fusion methods are two of the most powerful and effective strategies for improving these systems. This study proposes the relative difference-based similarity measure (RDBSM) for CBMIR. The new measure was first used in the similarity calculation stage for the CBMIR using an unweighted fusion method of traditional… More >

  • Open Access

    ARTICLE

    Predicting Lumbar Spondylolisthesis: A Hybrid Deep Learning Approach

    Deepika Saravagi1, Shweta Agrawal2,*, Manisha Saravagi3, Sanjiv K. Jain4, Bhisham Sharma5, Abolfazl Mehbodniya6,*, Subrata Chowdhury7, Julian L. Webber6

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2133-2151, 2023, DOI:10.32604/iasc.2023.039836

    Abstract Spondylolisthesis is a chronic disease, and a timely diagnosis of it may help in avoiding surgery. Disease identification in x-ray radiographs is very challenging. Strengthening the feature extraction tool in VGG16 has improved the classification rate. But the fully connected layers of VGG16 are not efficient at capturing the positional structure of an object in images. Capsule network (CapsNet) works with capsules (neuron clusters) rather than a single neuron to grasp the properties of the provided image to match the pattern. In this study, an integrated model that is a combination of VGG16 and CapsNet (S-VCNet) is proposed. In the… More >

  • Open Access

    ARTICLE

    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

  • Open Access

    ARTICLE

    Leveraging Vision-Language Pre-Trained Model and Contrastive Learning for Enhanced Multimodal Sentiment Analysis

    Jieyu An1,*, Wan Mohd Nazmee Wan Zainon1, Binfen Ding2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1673-1689, 2023, DOI:10.32604/iasc.2023.039763

    Abstract Multimodal sentiment analysis is an essential area of research in artificial intelligence that combines multiple modes, such as text and image, to accurately assess sentiment. However, conventional approaches that rely on unimodal pre-trained models for feature extraction from each modality often overlook the intrinsic connections of semantic information between modalities. This limitation is attributed to their training on unimodal data, and necessitates the use of complex fusion mechanisms for sentiment analysis. In this study, we present a novel approach that combines a vision-language pre-trained model with a proposed multimodal contrastive learning method. Our approach harnesses the power of transfer learning… More >

  • Open Access

    ARTICLE

    A Trailblazing Framework of Security Assessment for Traffic Data Management

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Neha Yadav4, Syed Anas Ansar5,*, Pawan Kumar Chaurasia4, Alka Agrawal4

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1853-1875, 2023, DOI:10.32604/iasc.2023.039761

    Abstract Connected and autonomous vehicles are seeing their dawn at this moment. They provide numerous benefits to vehicle owners, manufacturers, vehicle service providers, insurance companies, etc. These vehicles generate a large amount of data, which makes privacy and security a major challenge to their success. The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors. This could have a negative impact on how well-liked CAVs are with the general public, give them… More >

  • Open Access

    ARTICLE

    Real-Time CNN-Based Driver Distraction & Drowsiness Detection System

    Abdulwahab Ali Almazroi1,*, Mohammed A. Alqarni2, Nida Aslam3, Rizwan Ali Shah4

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2153-2174, 2023, DOI:10.32604/iasc.2023.039732

    Abstract Nowadays days, the chief grounds of automobile accidents are driver fatigue and distractions. With the development of computer vision technology, a cutting-edge system has the potential to spot driver distractions or sleepiness and alert them, reducing accidents. This paper presents a novel approach to detecting driver tiredness based on eye and mouth movements and object identification that causes a distraction while operating a motor vehicle. Employing the facial landmarks that the camera picks up and sends to classify using a Convolutional Neural Network (CNN) any changes by focusing on the eyes and mouth zone, precision is achieved. One of the… More >

  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). The proposed system employs pre-processing… More >

  • Open Access

    ARTICLE

    An Optimized Implementation of a Novel Nonlinear Filter for Color Image Restoration

    Turki M. Alanazi*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1553-1568, 2023, DOI:10.32604/iasc.2023.039686

    Abstract Image processing is becoming more popular because images are being used increasingly in medical diagnosis, biometric monitoring, and character recognition. But these images are frequently contaminated with noise, which can corrupt subsequent image processing stages. Therefore, in this paper, we propose a novel nonlinear filter for removing “salt and pepper” impulsive noise from a complex color image. The new filter is called the Modified Vector Directional Filter (MVDF). The suggested method is based on the traditional Vector Directional Filter (VDF). However, before the candidate pixel is processed by the VDF, the MVDF employs a threshold and the neighboring pixels of… More >

Displaying 81-90 on page 9 of 1767. Per Page