Home / Journals / IASC / Vol.38, No.2, 2023
Special Issues
  • Open AccessOpen Access

    ARTICLE

    News Modeling and Retrieving Information: Data-Driven Approach

    Elias Hossain1, Abdullah Alshahrani2, Wahidur Rahman3,*
    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 109-123, 2023, DOI:10.32604/iasc.2022.029511 - 05 February 2024
    (This article belongs to the Special Issue: Data Analytics for Business Intelligence: Trends and Applications)
    Abstract This paper aims to develop Machine Learning algorithms to classify electronic articles related to this phenomenon by retrieving information and topic modelling. The Methodology of this study is categorized into three phases: the Text Classification Approach (TCA), the Proposed Algorithms Interpretation (PAI), and finally, Information Retrieval Approach (IRA). The TCA reflects the text preprocessing pipeline called a clean corpus. The Global Vectors for Word Representation (Glove) pre-trained model, FastText, Term Frequency-Inverse Document Frequency (TF-IDF), and Bag-of-Words (BOW) for extracting the features have been interpreted in this research. The PAI manifests the Bidirectional Long Short-Term Memory (Bi-LSTM)… More >

  • Open AccessOpen Access

    ARTICLE

    Coverless Image Steganography System Based on Maze Game Generation

    Al Hussien Seddik Saad1, Mohammed S. Reda2, Gamal M. Behery2, Ahmed A. El-harby2, Mohammed Baz3, Mohamed Abouhawwash4,5,*, Ahmed Ismail Ebada6
    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 125-138, 2023, DOI:10.32604/iasc.2023.032084 - 05 February 2024
    Abstract The trend of digital information transformation has become a topic of interest. Many data are threatening; thus, protecting such data from attackers is considered an essential process. Recently, a new methodology for data concealing has been suggested by researchers called coverless steganography. Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image. This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the… More >

  • Open AccessOpen Access

    ARTICLE

    Driving Activity Classification Using Deep Residual Networks Based on Smart Glasses Sensors

    Narit Hnoohom1, Sakorn Mekruksavanich2, Anuchit Jitpattanakul3,4,*
    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 139-151, 2023, DOI:10.32604/iasc.2023.033940 - 05 February 2024
    Abstract Accidents are still an issue in an intelligent transportation system, despite developments in self-driving technology (ITS). Drivers who engage in risky behavior account for more than half of all road accidents. As a result, reckless driving behaviour can cause congestion and delays. Computer vision and multimodal sensors have been used to study driving behaviour categorization to lessen this problem. Previous research has also collected and analyzed a wide range of data, including electroencephalography (EEG), electrooculography (EOG), and photographs of the driver’s face. On the other hand, driving a car is a complicated action that requires… More >

  • Open AccessOpen Access

    ARTICLE

    Abstractive Arabic Text Summarization Using Hyperparameter Tuned Denoising Deep Neural Network

    Ibrahim M. Alwayle1, Hala J. Alshahrani2, Saud S. Alotaibi3, Khaled M. Alalayah1, Amira Sayed A. Aziz4, Khadija M. Alaidarous1, Ibrahim Abdulrab Ahmed5, Manar Ahmed Hamza6,*
    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 153-168, 2023, DOI:10.32604/iasc.2023.034718 - 05 February 2024
    Abstract Abstractive text summarization is crucial to produce summaries of natural language with basic concepts from large text documents. Despite the achievement of English language-related abstractive text summarization models, the models that support Arabic language text summarization are fewer in number. Recent abstractive Arabic summarization models encounter different issues that need to be resolved. Syntax inconsistency is a crucial issue resulting in the low-accuracy summary. A new technique has achieved remarkable outcomes by adding topic awareness in the text summarization process that guides the module by imitating human awareness. The current research article presents Abstractive Arabic… More >

  • Open AccessOpen Access

    ARTICLE

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System

    Laith Abualigah1,2,3,4,5,6,*, Serdar Ekinci7, Davut Izci7,8, Raed Abu Zitar9
    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 169-183, 2023, DOI:10.32604/iasc.2023.040291 - 05 February 2024
    Abstract Efficient speed controllers for dynamic driving tasks in autonomous vehicles are crucial for ensuring safety and reliability. This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. Our approach outperforms existing optimization techniques on benchmark functions, and we demonstrate its effectiveness in controlling cruise control systems with increased flexibility and precision. Our study contributes to the advancement of autonomous vehicle technology by introducing a novel and efficient method for FOPID controller design that can enhance the driving More >

  • Open AccessOpen Access

    ARTICLE

    Deep Neural Network Architecture Search via Decomposition-Based Multi-Objective Stochastic Fractal Search

    Hongshang Xu1, Bei Dong1,2,*, Xiaochang Liu1, Xiaojun Wu1,2
    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 185-202, 2023, DOI:10.32604/iasc.2023.041177 - 05 February 2024
    (This article belongs to the Special Issue: Artificial Intelligence Algorithm for Industrial Operation Application)
    Abstract Deep neural networks often outperform classical machine learning algorithms in solving real-world problems. However, designing better networks usually requires domain expertise and consumes significant time and computing resources. Moreover, when the task changes, the original network architecture becomes outdated and requires redesigning. Thus, Neural Architecture Search (NAS) has gained attention as an effective approach to automatically generate optimal network architectures. Most NAS methods mainly focus on achieving high performance while ignoring architectural complexity. A myriad of research has revealed that network performance and structural complexity are often positively correlated. Nevertheless, complex network structures will bring… More >

Per Page:

Share Link