Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (756)
  • Open Access

    ARTICLE

    Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm

    Slim Ben Chaabane1,2,*, Rafika Harrabi1,2, Anas Bushnag1, Hassene Seddik2

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 201-214, 2022, DOI:10.32604/jai.2022.032850

    Abstract Biometrics represents the technology for measuring the characteristics of the human body. Biometric authentication currently allows for secure, easy, and fast access by recognizing a person based on facial, voice, and fingerprint traits. Iris authentication is one of the essential biometric methods for identifying a person. This authentication type has become popular in research and practical applications. Unlike the face and hands, the iris is an internal organ, protected and therefore less likely to be damaged. However, the number of helpful information collected from the iris is much greater than the other biometric human organs. This work proposes a new… More >

  • Open Access

    ARTICLE

    Modeling for application data with 3D spatiale feature in MADS

    Chamseddine Zaki1 , Mohamed Ayet1,2, Allah Bilel Soussi2

    Revue Internationale de Géomatique, Vol.29, No.3, pp. 255-262, 2019, DOI:10.3166/rig.2019.00086

    Abstract A conceptual spatiotemporal data model must be able to offer users a semantic richness of expression to meet their diverse needs concerning the modeling of spatio-temporal data. The conceptual spatiotemporal data model must be able to represent the objects, relationships and events that can occur in a field of study, track data history, support the multirepresentation of these data, and represent temporal and spatial data with two and three dimensions features. The model must also allow the assignment of different types of constraints to relations and provide a complete orthogonality between dimensions and concepts. The MADS model meets several requirements… More >

  • Open Access

    ARTICLE

    A Fault Feature Extraction Model in Synchronous Generator under Stator Inter-Turn Short Circuit Based on ACMD and DEO3S

    Yuling He, Shuai Li, Chao Zhang*, Xiaolong Wang

    Structural Durability & Health Monitoring, Vol.17, No.2, pp. 115-130, 2023, DOI:10.32604/sdhm.2023.022317

    Abstract This paper proposed a new diagnosis model for the stator inter-turn short circuit fault in synchronous generators. Different from the past methods focused on the current or voltage signals to diagnose the electrical fault, the stator vibration signal analysis based on ACMD (adaptive chirp mode decomposition) and DEO3S (demodulation energy operator of symmetrical differencing) was adopted to extract the fault feature. Firstly, FT (Fourier transform) is applied to the vibration signal to obtain the instantaneous frequency, and PE (permutation entropy) is calculated to select the proper weighting coefficients. Then, the signal is decomposed by ACMD, with the instantaneous frequency and… More >

  • Open Access

    ARTICLE

    PF-YOLOv4-Tiny: Towards Infrared Target Detection on Embedded Platform

    Wenbo Li, Qi Wang*, Shang Gao

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 921-938, 2023, DOI:10.32604/iasc.2023.038257

    Abstract Infrared target detection models are more required than ever before to be deployed on embedded platforms, which requires models with less memory consumption and better real-time performance while considering accuracy. To address the above challenges, we propose a modified You Only Look Once (YOLO) algorithm PF-YOLOv4-Tiny. The algorithm incorporates spatial pyramidal pooling (SPP) and squeeze-and-excitation (SE) visual attention modules to enhance the target localization capability. The PANet-based-feature pyramid networks (P-FPN) are proposed to transfer semantic information and location information simultaneously to ameliorate detection accuracy. To lighten the network, the standard convolutions other than the backbone network are replaced with depthwise… More >

  • Open Access

    ARTICLE

    Optimizing Spatial Relationships in GCN to Improve the Classification Accuracy of Remote Sensing Images

    Zimeng Yang, Qiulan Wu, Feng Zhang*, Xuefei Chen, Weiqiang Wang, Xueshen Zhang

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 491-506, 2023, DOI:10.32604/iasc.2023.037558

    Abstract Semantic segmentation of remote sensing images is one of the core tasks of remote sensing image interpretation. With the continuous development of artificial intelligence technology, the use of deep learning methods for interpreting remote-sensing images has matured. Existing neural networks disregard the spatial relationship between two targets in remote sensing images. Semantic segmentation models that combine convolutional neural networks (CNNs) and graph convolutional neural networks (GCNs) cause a lack of feature boundaries, which leads to the unsatisfactory segmentation of various target feature boundaries. In this paper, we propose a new semantic segmentation model for remote sensing images (called DGCN hereinafter),… More >

  • Open Access

    ARTICLE

    Online Markov Blanket Learning with Group Structure

    Bo Li1, Zhaolong Ling1, Yiwen Zhang1,*, Yong Zhou1, Yimin Hu2, Haifeng Ling3

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 33-48, 2023, DOI:10.32604/iasc.2023.037267

    Abstract Learning the Markov blanket (MB) of a given variable has received increasing attention in recent years because the MB of a variable predicts its local causal relationship with other variables. Online MB Learning can learn MB for a given variable on the fly. However, in some application scenarios, such as image analysis and spam filtering, features may arrive by groups. Existing online MB learning algorithms evaluate features individually, ignoring group structure. Motivated by this, we formulate the group MB learning with streaming features problem, and propose an Online MB learning with Group Structure algorithm, OMBGS, to identify the MB of… More >

  • Open Access

    ARTICLE

    A New Hybrid Feature Selection Sequence for Predicting Breast Cancer Survivability Using Clinical Datasets

    E. Jenifer Sweetlin*, S. Saudia

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 343-367, 2023, DOI:10.32604/iasc.2023.036742

    Abstract This paper proposes a hybrid feature selection sequence complemented with filter and wrapper concepts to improve the accuracy of Machine Learning (ML) based supervised classifiers for classifying the survivability of breast cancer patients into classes, living and deceased using METABRIC and Surveillance, Epidemiology and End Results (SEER) datasets. The ML-based classifiers used in the analysis are: Multiple Logistic Regression, K-Nearest Neighbors, Decision Tree, Random Forest, Support Vector Machine and Multilayer Perceptron. The workflow of the proposed ML algorithm sequence comprises the following stages: data cleaning, data balancing, feature selection via a filter and wrapper sequence, cross validation-based training, testing and… More >

  • Open Access

    ARTICLE

    MTC: A Multi-Task Model for Encrypted Network Traffic Classification Based on Transformer and 1D-CNN

    Kaiyue Wang1, Jian Gao1,2,*, Xinyan Lei1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 619-638, 2023, DOI:10.32604/iasc.2023.036701

    Abstract Traffic characterization (e.g., chat, video) and application identification (e.g., FTP, Facebook) are two of the more crucial jobs in encrypted network traffic classification. These two activities are typically carried out separately by existing systems using separate models, significantly adding to the difficulty of network administration. Convolutional Neural Network (CNN) and Transformer are deep learning-based approaches for network traffic classification. CNN is good at extracting local features while ignoring long-distance information from the network traffic sequence, and Transformer can capture long-distance feature dependencies while ignoring local details. Based on these characteristics, a multi-task learning model that combines Transformer and 1D-CNN for… More >

  • Open Access

    ARTICLE

    An Efficient Approach Based on Remora Optimization Algorithm and Levy Flight for Intrusion Detection

    Abdullah Mujawib Alashjaee*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 235-254, 2023, DOI:10.32604/iasc.2023.036247

    Abstract With the recent increase in network attacks by threats, malware, and other sources, machine learning techniques have gained special attention for intrusion detection due to their ability to classify hundreds of features into normal system behavior or an attack attempt. However, feature selection is a vital preprocessing stage in machine learning approaches. This paper presents a novel feature selection-based approach, Remora Optimization Algorithm-Levy Flight (ROA-LF), to improve intrusion detection by boosting the ROA performance with LF. The developed ROA-LF is assessed using several evaluation measures on five publicly available datasets for intrusion detection: Knowledge discovery and data mining tools competition,… More >

  • Open Access

    ARTICLE

    Semi-Supervised Clustering Algorithm Based on Deep Feature Mapping

    Xiong Xu1, Chun Zhou2,*, Chenggang Wang1, Xiaoyan Zhang2, Hua Meng2

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 815-831, 2023, DOI:10.32604/iasc.2023.034656

    Abstract Clustering analysis is one of the main concerns in data mining. A common approach to the clustering process is to bring together points that are close to each other and separate points that are away from each other. Therefore, measuring the distance between sample points is crucial to the effectiveness of clustering. Filtering features by label information and measuring the distance between samples by these features is a common supervised learning method to reconstruct distance metric. However, in many application scenarios, it is very expensive to obtain a large number of labeled samples. In this paper, to solve the clustering… More >

Displaying 1-10 on page 1 of 756. Per Page  

Share Link