Home / Journals / IASC / Vol.39, No.4, 2024
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Automated Angle Detection for Industrial Production Lines Using Combined Image Processing Techniques

    Pawat Chunhachatrachai1,*, Chyi-Yeu Lin1,2
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 599-618, 2024, DOI:10.32604/iasc.2024.055385
    Abstract Angle detection is a crucial aspect of industrial automation, ensuring precise alignment and orientation of components in manufacturing processes. Despite the widespread application of computer vision in industrial settings, angle detection remains an underexplored domain, with limited integration into production lines. This paper addresses the need for automated angle detection in industrial environments by presenting a methodology that eliminates training time and higher computation cost on Graphics Processing Unit (GPU) from machine learning in computer vision (e.g., Convolutional Neural Networks (CNN)). Our approach leverages advanced image processing techniques and a strategic combination of algorithms, including More >

  • Open AccessOpen Access

    ARTICLE

    Improving Low-Resource Machine Translation Using Reinforcement Learning from Human Feedback

    Liqing Wang*, Yiheng Xiao
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 619-631, 2024, DOI:10.32604/iasc.2024.052971
    Abstract Neural Machine Translation is one of the key research directions in Natural Language Processing. However, limited by the scale and quality of parallel corpus, the translation quality of low-resource Neural Machine Translation has always been unsatisfactory. When Reinforcement Learning from Human Feedback (RLHF) is applied to low-resource machine translation, commonly encountered issues of substandard preference data quality and the higher cost associated with manual feedback data. Therefore, a more cost-effective method for obtaining feedback data is proposed. At first, optimizing the quality of preference data through the prompt engineering of the Large Language Model (LLM), More >

  • Open AccessOpen Access

    ARTICLE

    Data-Oriented Operating System for Big Data and Cloud

    Selwyn Darryl Kessler, Kok-Why Ng*, Su-Cheng Haw*
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 633-647, 2024, DOI:10.32604/iasc.2024.054154
    Abstract Operating System (OS) is a critical piece of software that manages a computer’s hardware and resources, acting as the intermediary between the computer and the user. The existing OS is not designed for Big Data and Cloud Computing, resulting in data processing and management inefficiency. This paper proposes a simplified and improved kernel on an x86 system designed for Big Data and Cloud Computing purposes. The proposed algorithm utilizes the performance benefits from the improved Input/Output (I/O) performance. The performance engineering runs the data-oriented design on traditional data management to improve data processing speed by… More >

  • Open AccessOpen Access

    ARTICLE

    Mathematical Named Entity Recognition Based on Adversarial Training and Self-Attention

    Qiuyu Lai1,2, Wang Kang3, Lei Yang1,2, Chun Yang1,2,*, Delin Zhang2,*
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 649-664, 2024, DOI:10.32604/iasc.2024.051724
    Abstract Mathematical named entity recognition (MNER) is one of the fundamental tasks in the analysis of mathematical texts. To solve the existing problems of the current neural network that has local instability, fuzzy entity boundary, and long-distance dependence between entities in Chinese mathematical entity recognition task, we propose a series of optimization processing methods and constructed an Adversarial Training and Bidirectional long short-term memory-Selfattention Conditional random field (AT-BSAC) model. In our model, the mathematical text was vectorized by the word embedding technique, and small perturbations were added to the word vector to generate adversarial samples, while More >

  • Open AccessOpen Access

    ARTICLE

    A Hierarchical Two-Level Feature Fusion Approach for SMS Spam Filtering

    Hussein Alaa Al-Kabbi1,2, Mohammad-Reza Feizi-Derakhshi1,*, Saeed Pashazadeh3
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 665-682, 2024, DOI:10.32604/iasc.2024.050452
    Abstract SMS spam poses a significant challenge to maintaining user privacy and security. Recently, spammers have employed fraudulent writing styles to bypass spam detection systems. This paper introduces a novel two-level detection system that utilizes deep learning techniques for effective spam identification to address the challenge of sophisticated SMS spam. The system comprises five steps, beginning with the preprocessing of SMS data. RoBERTa word embedding is then applied to convert text into a numerical format for deep learning analysis. Feature extraction is performed using a Convolutional Neural Network (CNN) for word-level analysis and a Bidirectional Long… More >

  • Open AccessOpen Access

    ARTICLE

    Importance-Weighted Transfer Learning for Fault Classification under Covariate Shift

    Yi Pan1, Lei Xie2,*, Hongye Su2
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 683-696, 2024, DOI:10.32604/iasc.2023.038543
    Abstract In the process of fault detection and classification, the operation mode usually drifts over time, which brings great challenges to the algorithms. Because traditional machine learning based fault classification cannot dynamically update the trained model according to the probability distribution of the testing dataset, the accuracy of these traditional methods usually drops significantly in the case of covariate shift. In this paper, an importance-weighted transfer learning method is proposed for fault classification in the nonlinear multi-mode industrial process. It effectively alters the drift between the training and testing dataset. Firstly, the mutual information method is… More >

  • Open AccessOpen Access

    ARTICLE

    Chase, Pounce, and Escape Optimization Algorithm

    Adel Sabry Eesa*
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 697-723, 2024, DOI:10.32604/iasc.2024.053192
    (This article belongs to the Special Issue: AI Powered Human-centric Computing with Cloud/Fog/Edge)
    Abstract While many metaheuristic optimization algorithms strive to address optimization challenges, they often grapple with the delicate balance between exploration and exploitation, leading to issues such as premature convergence, sensitivity to parameter settings, and difficulty in maintaining population diversity. In response to these challenges, this study introduces the Chase, Pounce, and Escape (CPE) algorithm, drawing inspiration from predator-prey dynamics. Unlike traditional optimization approaches, the CPE algorithm divides the population into two groups, each independently exploring the search space to efficiently navigate complex problem domains and avoid local optima. By incorporating a unique search mechanism that integrates More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Layer Feature Extraction with Deformable Convolution for Fabric Defect Detection

    Jielin Jiang1,2,3,4,*, Chao Cui1, Xiaolong Xu1,2,3,4, Yan Cui5
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 725-744, 2024, DOI:10.32604/iasc.2024.036897
    Abstract In the textile industry, the presence of defects on the surface of fabric is an essential factor in determining fabric quality. Therefore, identifying fabric defects forms a crucial part of the fabric production process. Traditional fabric defect detection algorithms can only detect specific materials and specific fabric defect types; in addition, their detection efficiency is low, and their detection results are relatively poor. Deep learning-based methods have many advantages in the field of fabric defect detection, however, such methods are less effective in identifying multi-scale fabric defects and defects with complex shapes. Therefore, we propose… More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Transfer Learning Approach for Addressing Yaw Pose Variation to Improve Face Recognition Performance

    M. Jayasree1, K. A. Sunitha2,*, A. Brindha1, Punna Rajasekhar3, G. Aravamuthan3, G. Joselin Retnakumar1
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 745-764, 2024, DOI:10.32604/iasc.2024.052983
    Abstract Identifying faces in non-frontal poses presents a significant challenge for face recognition (FR) systems. In this study, we delved into the impact of yaw pose variations on these systems and devised a robust method for detecting faces across a wide range of angles from 0° to ±90°. We initially selected the most suitable feature vector size by integrating the Dlib, FaceNet (Inception-v2), and “Support Vector Machines (SVM)” + “K-nearest neighbors (KNN)” algorithms. To train and evaluate this feature vector, we used two datasets: the “Labeled Faces in the Wild (LFW)” benchmark data and the “Robust… More >

  • Open AccessOpen Access

    ARTICLE

    Ensemble Modeling for the Classification of Birth Data

    Fiaz Majeed1, Abdul Razzaq Ahmad Shakir1, Maqbool Ahmad2, Shahzada Khurram3, Muhammad Qaiser Saleem4, Muhammad Shafiq5,*, Jin-Ghoo Choi5, Habib Hamam6,7,8,9,10, Osama E. Sheta11
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 765-781, 2024, DOI:10.32604/iasc.2023.034029
    Abstract Machine learning (ML) and data mining are used in various fields such as data analysis, prediction, image processing and especially in healthcare. Researchers in the past decade have focused on applying ML and data mining to generate conclusions from historical data in order to improve healthcare systems by making predictions about the results. Using ML algorithms, researchers have developed applications for decision support, analyzed clinical aspects, extracted informative information from historical data, predicted the outcomes and categorized diseases which help physicians make better decisions. It is observed that there is a huge difference between women… More >

Per Page:

Share Link