Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,555)
  • Open Access

    ARTICLE

    Experimental Evaluation of Clickbait Detection Using Machine Learning Models

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Abdullah Tariq1

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1335-1344, 2020, DOI:10.32604/iasc.2020.013861

    Abstract The exponential growth of social media has been instrumental in directing the news outlets to rely on the stated platform for the dissemination of news stories. While social media has helped in the fast propagation of breaking news, it also has allowed many bad actors to exploit this medium for political and monetary purposes. With such an intention, tempting headlines, which are not aligned with the content, are being used to lure users to visit the websites that often post dodgy and unreliable information. This phenomenon is commonly known as clickbait. A number of machine learning techniques have been developed… More >

  • Open Access

    ARTICLE

    Feature Point Detection for Repacked Android Apps

    M. A. Rahim Khan*, Manoj Kumar Jain

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1359-1373, 2020, DOI:10.32604/iasc.2020.013849

    Abstract Repacked mobile applications and obfuscation attacks constitute a significant threat to the Android technological ecosystem. A novel method using the Constant Key Point Selection and Limited Binary Pattern Feature (CKPS: LBP) extraction-based Hashing has been proposed to identify repacked Android applications in previous works. Although the approach was efficient in detecting the repacked Android apps, it was not suitable for detecting obfuscation attacks. Additionally, the time complexity needed improvement. This paper presents an optimization technique using Scalable Bivariant Feature Transformation extract optimum feature-points extraction, and the Harris method applied for optimized image hashing. The experiments produced better results than the… More >

  • Open Access

    ARTICLE

    Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet

    Fahd N. Al-Wesabi1,*, Huda G. Iskandar2, Mohammad Alamgeer3, Mokhtar M. Ghilan2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1267-1283, 2020, DOI:10.32604/iasc.2020.013782

    Abstract In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text watermarking and hidden Markov model as a soft computing and natural language processing techniques. In the INLPETWA approach, embedding and detecting the watermark key logically conducted without altering the plain text. Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates them during detection process to detect… More >

  • Open Access

    ARTICLE

    Spam Detection in Reviews Using LSTM-Based Multi-Entity Temporal Features

    Lingyun Xiang1,2,3, Guoqing Guo2, Qian Li4, Chengzhang Zhu5,*, Jiuren Chen6, Haoliang Ma2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1375-1390, 2020, DOI:10.32604/iasc.2020.013382

    Abstract Current works on spam detection in product reviews tend to ignore the temporal relevance among reviews in the user or product entity, resulting in poor detection performance. To address this issue, the present paper proposes a spam detection method that jointly learns comprehensive temporal features from both behavioral and text features in user and product entities. We first extract the behavioral features of a single review, then employ a convolutional neural network (CNN) to learn the text features of this review. We next combine the behavioral features with the text features of each review and train a Long-Short-Term Memory (LSTM)… More >

  • Open Access

    ARTICLE

    Text Detection and Classification from Low Quality Natural Images

    Ujala Yasmeen1, Jamal Hussain Shah1, Muhammad Attique Khan2, Ghulam Jillani Ansari1, Saeed ur Rehman1, Muhammad Sharif1, Seifedine Kadry3, Yunyoung Nam4,*

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1251-1266, 2020, DOI:10.32604/iasc.2020.012775

    Abstract Detection of textual data from scene text images is a very thought-provoking issue in the field of computer graphics and visualization. This challenge is even more complicated when edge intelligent devices are involved in the process. The low-quality image having challenges such as blur, low resolution, and contrast make it more difficult for text detection and classification. Therefore, such exigent aspect is considered in the study. The technology proposed is comprised of three main contributions. (a) After synthetic blurring, the blurred image is preprocessed, and then the deblurring process is applied to recover the image. (b) Subsequently, the standard maximal… More >

  • Open Access

    ARTICLE

    Canny Edge Detection Model in MRI Image Segmentation Using Optimized Parameter Tuning Method

    Meera Radhakrishnan1,*, Anandan Panneerselvam2, Nandhagopal Nachimuthu3

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1185-1199, 2020, DOI:10.32604/iasc.2020.012069

    Abstract Image segmentation is a crucial stage in the investigation of medical images and is predominantly implemented in various medical applications. In the case of investigating MRI brain images, the image segmentation is mainly employed to measure and visualize the anatomic structure of the brain that underwent modifications to delineate the regions. At present, distinct segmentation approaches with various degrees of accurateness and complexities are available. But, it needs tuning of various parameters to obtain optimal results. The tuning of parameters can be considered as an optimization issue using a similarity function in solution space. This paper presents a new Parametric… More >

  • Open Access

    REVIEW

    Progresses of mycobacteriophage-based Mycobacterium tuberculosis detection

    ZICHEN LIU1,#, SIYAO GUO2,3,#, MENGZHI JI1, KAILI SUN1, ZHONGFANG LI4,*, XIANGYU FAN1,*

    BIOCELL, Vol.44, No.4, pp. 683-694, 2020, DOI:10.32604/biocell.2020.011713

    Abstract Tuberculosis (TB) remains a major cause of morbidity and mortality worldwide, particularly in developing countries. A rapid and efficient method for TB diagnosis is indispensable to check the trend of tuberculosis expansion. The emergence of drug-resistant bacteria has increased the challenge of rapid drug resistance tests. Due to its high specificity and sensitivity, bacteriophage-based diagnosis is intensively pursued. In this review, we mainly described mycobacteriophage-based diagnosis in TB detection, especially two prevalent approaches: fluorescent reporter phage and phage amplified biologically assay (PhaB). The rationale of reporter phage is that phage carrying fluorescent genes can infect host bacteria specifically. Phage amplified… More >

  • Open Access

    ARTICLE

    Multi-Object Detection of Chinese License Plate in Complex Scenes

    Dan Liu1,3, Yajuan Wu1, Yuxin He2, Lu Qin2, Bochuan Zheng2,3,*

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 145-156, 2021, DOI:10.32604/csse.2021.014646

    Abstract Multi-license plate detection in complex scenes is still a challenging task because of multiple vehicle license plates with different sizes and classes in the images having complex background. The edge features of high-density distribution and the high curvature features of stroke turning of Chinese character are important signs to distinguish Chinese license plate from other objects. To accurately detect multiple vehicle license plates with different sizes and classes in complex scenes, a multi-object detection of Chinese license plate method based on improved YOLOv3 network was proposed in this research. The improvements include replacing the residual block of the YOLOv3 backbone… More >

  • Open Access

    ARTICLE

    Automatic Channel Detection Using DNN on 2D Seismic Data

    Fahd A. Alhaidari1, Saleh A. Al-Dossary2, Ilyas A. Salih1,*, Abdlrhman M. Salem1, Ahmed S. Bokir1, Mahmoud O. Fares1, Mohammed I. Ahmed1, Mohammed S. Ahmed1

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 57-67, 2021, DOI:10.32604/csse.2021.013843

    Abstract Geologists interpret seismic data to understand subsurface properties and subsequently to locate underground hydrocarbon resources. Channels are among the most important geological features interpreters analyze to locate petroleum reservoirs. However, manual channel picking is both time consuming and tedious. Moreover, similar to any other process dependent on human intervention, manual channel picking is error prone and inconsistent. To address these issues, automatic channel detection is both necessary and important for efficient and accurate seismic interpretation. Modern systems make use of real-time image processing techniques for different tasks. Automatic channel detection is a combination of different mathematical methods in digital image… More >

  • Open Access

    ARTICLE

    Oversampling Methods Combined Clustering and Data Cleaning for Imbalanced Network Data

    Yang Yang1,*, Qian Zhao1, Linna Ruan2, Zhipeng Gao1, Yonghua Huo3, Xuesong Qiu1

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1139-1155, 2020, DOI:10.32604/iasc.2020.011705

    Abstract In network anomaly detection, network traffic data are often imbalanced, that is, certain classes of network traffic data have a large sample data volume while other classes have few, resulting in reduced overall network traffic anomaly detection on a minority class of samples. For imbalanced data, researchers have proposed the use of oversampling techniques to balance data sets; in particular, an oversampling method called the SMOTE provides a simple and effective solution for balancing data sets. However, current oversampling methods suffer from the generation of noisy samples and poor information quality. Hence, this study proposes an oversampling method for imbalanced… More >

Displaying 1291-1300 on page 130 of 1555. Per Page