Year:

  1. Face Recognition Algorithm Based on Stack Denoising and Self-Encoding LBP.Mohd Dilshad Ansari, Mudassir Khan & Yanjing Lu - 2022 - Journal of Intelligent Systems 31 (1):501-510.
    To optimize the weak robustness of traditional face recognition algorithms, the classification accuracy rate is not high, the operation speed is slower, so a face recognition algorithm based on local binary pattern and stacked autoencoder is proposed. The advantage of LBP texture structure feature of the face image as the initial feature of sparse autoencoder learning, use the unified mode LBP operator to extract the histogram of the blocked face image, connect to form the LBP features of the entire image. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2. A Secure Framework for IoT-Based Smart Climate Agriculture System: Toward Blockchain and Edge Computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists of various sensors (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3. Construction of a Financial Default Risk Prediction Model Based on the LightGBM Algorithm.Vipin Balyan & Bo Gao - 2022 - Journal of Intelligent Systems 31 (1):767-779.
    The construction of a financial risk prediction model has become the need of the hour due to long-term and short-term violations in the financial market. To reduce the default risk of peer-to-peer companies and promote the healthy and sustainable development of the P2P industry, this article uses a model based on the LightGBM algorithm to analyze a large number of sample data from Renrendai, which is a representative platform of the P2P industry. This article explores the base LightGBM model along (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. Implementation of the Spark Technique in a Matrix Distributed Computing Algorithm.Korhan Cengiz & Ying Wang - 2022 - Journal of Intelligent Systems 31 (1):660-671.
    Two analyzes of Spark engine performance strategies to implement the Spark technique in a matrix distributed computational algorithm, the multiplication of a sparse multiplication operational test model. The dimensions of the two input sparse matrices have been fixed to 30,000 × 30,000, and the density of the input matrix have been changed. The experimental results show that when the density reaches about 0.3, the original dense matrix multiplication performance can outperform the sparse-sparse matrix multiplication, which is basically consistent with the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5. A Hidden Markov Optimization Model for Processing and Recognition of English Speech Feature Signals.Yinchun Chen - 2022 - Journal of Intelligent Systems 31 (1):716-725.
    Speech recognition plays an important role in human–computer interaction. The higher the accuracy and efficiency of speech recognition are, the larger the improvement of human–computer interaction performance. This article briefly introduced the hidden Markov model -based English speech recognition algorithm and combined it with a back-propagation neural network to further improve the recognition accuracy and reduce the recognition time of English speech. Then, the BPNN-combined HMM algorithm was simulated and compared with the HMM algorithm and the BPNN algorithm. The results (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. CRNet: Context Feature and Refined Network for Multi-Person Pose Estimation.Zhihua Chen & Lanfei Zhao - 2022 - Journal of Intelligent Systems 31 (1):780-794.
    Multi-person pose estimation is a challenging problem. Bottom-up methods have been greatly studied because the prediction speed of top-down methods is related to the number of people in the input image, making these methods difficult to apply in real-time environments. To solve the problems of scale sensitivity and quantization error in bottom-up methods, it is necessary to have a model that can predict multi-scale keypoints and refine quantization error. To achieve this, we propose context feature and refined network for multi-person (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7. Masking and Noise Reduction Processing of Music Signals in Reverberant Music.Ye Cheng & Shenghuan Zhang - 2022 - Journal of Intelligent Systems 31 (1):420-427.
    Noise will be inevitably mixed with music signals in the recording process. To improve the quality of music signals, it is necessary to reduce noise as much as possible. This article briefly introduces noise, the masking effect, and the spectral subtraction method for reducing noise in reverberant music. The spectral subtraction method was improved by the human ear masking effect to enhance its noise reduction performance. Simulation experiments were carried out on the traditional and improved spectral subtraction methods. The results (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8. Application of Visual Elements in Product Paper Packaging Design: An Example of the “Squirrel” Pattern.Menghan Ding - 2022 - Journal of Intelligent Systems 31 (1):104-112.
    For product packaging, the visual elements in it can further enhance the appeal of the package to customers. This article briefly introduces visual elements and packaging design and made an example analysis with the gift packaging design of Squirrel Design Studio. In the case study, the packaging design of the studio’s mirror, storage bag, and puzzle was rated by hierarchical analysis and questionnaires, and the packaging design was analyzed based on the rating results. A convolutional neural network was also used (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  9.  1
    Image Retrieval Based on Weighted Nearest Neighbor Tag Prediction.Xiancheng Ding, Dayang Jiang & Qi Yao - 2022 - Journal of Intelligent Systems 31 (1):589-600.
    With the development of communication and computer technology, the application of big data technology has become increasingly widespread. Reasonable, effective, and fast retrieval methods for querying information from massive data have become an important content of current research. This article provides an image retrieval method based on the weighted nearest neighbor label prediction for the problem of automatic image annotation and keyword image retrieval. In order to improve the performance of the test method, scientific experimental verification was implemented. The nearest (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10. Topology Optimization of Computer Communication Network Based on Improved Genetic Algorithm.Kayhan Zrar Ghafoor, Jilei Zhang, Yuhong Fan & Hua Ai - 2022 - Journal of Intelligent Systems 31 (1):651-659.
    The topology optimization of computer communication network is studied based on improved genetic algorithm, a network optimization design model based on the establishment of network reliability maximization under given cost constraints, and the corresponding improved GA is proposed. In this method, the corresponding computer communication network cost model and computer communication network reliability model are established through a specific project, and the genetic intelligence algorithm is used to solve the cost model and computer communication network reliability model, respectively. It has (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  6
    Deep Learning Approach to Text Analysis for Human Emotion Detection From Big Data.Jia Guo - 2022 - Journal of Intelligent Systems 31 (1):113-126.
    Emotional recognition has arisen as an essential field of study that can expose a variety of valuable inputs. Emotion can be articulated in several means that can be seen, like speech and facial expressions, written text, and gestures. Emotion recognition in a text document is fundamentally a content-based classification issue, including notions from natural language processing and deep learning fields. Hence, in this study, deep learning assisted semantic text analysis has been proposed for human emotion detection using big data. Emotion (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12. Extractive Summarization of Malayalam Documents Using Latent Dirichlet Allocation: An Experience.Sumam Mary Idicula, David Peter Suseelan & Manju Kondath - 2022 - Journal of Intelligent Systems 31 (1):393-406.
    Automatic text summarization extracts information from a source text and presents it to the user in a condensed form while preserving its primary content. Many text summarization approaches have been investigated in the literature for highly resourced languages. At the same time, ATS is a complicated and challenging task for under-resourced languages like Malayalam. The lack of a standard corpus and enough processing tools are challenges when it comes to language processing. In the absence of a standard corpus, we have (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. Trip Generation Modeling for a Selected Sector in Baghdad City Using the Artificial Neural Network.Mohammed Qadir Ismael & Safa Ali Lafta - 2022 - Journal of Intelligent Systems 31 (1):356-369.
    This study is planned with the aim of constructing models that can be used to forecast trip production in the Al-Karada region in Baghdad city incorporating the socioeconomic features, through the use of various statistical approaches to the modeling of trip generation, such as artificial neural network and multiple linear regression. The research region was split into 11 zones to accomplish the study aim. Forms were issued based on the needed sample size of 1,170. Only 1,050 forms with responses were (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  14. State Feedback Based on Grey Wolf Optimizer Controller for Two-Wheeled Self-Balancing Robot.Wesam M. Jasim - 2022 - Journal of Intelligent Systems 31 (1):511-519.
    The two-wheeled self-balancing robot is based on the axletree and inverted pendulum. Its balancing problem requires a control action. To speed up the response of the robot and minimize the steady state error, in this article, a grey wolf optimizer method is proposed for TWSBR control based on state space feedback control technique. The controller stabilizes the balancing robot and minimizes the overshoot value of the system. The dynamic model of the system is derived based on Euler formula and linearized (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15. Implementation of Network Information Security Monitoring System Based on Adaptive Deep Detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using the data conversion (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  16. Cognitive Prediction of Obstacle's Movement for Reinforcement Learning Pedestrian Interacting Model.Masaomi Kimura & Thanh-Trung Trinh - 2022 - Journal of Intelligent Systems 31 (1):127-147.
    Recent studies in pedestrian simulation have been able to construct a highly realistic navigation behaviour in many circumstances. However, when replicating the close interactions between pedestrians, the replicated behaviour is often unnatural and lacks human likeness. One of the possible reasons is that the current models often ignore the cognitive factors in the human thinking process. Another reason is that many models try to approach the problem by optimising certain objectives. On the other hand, in real life, humans do not (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  1
    Data Mining Applications in University Information Management System Development.Ashima Kukkar, Amit Sharma, Juntao Fan & Minshun Zhang - 2022 - Journal of Intelligent Systems 31 (1):207-220.
    Nowadays, the modern management is promoted to resolve the issue of unreliable information transmission and to provide work efficiency. The basic aim of the modern management is to be more effective in the role of the school to train talents and serve the society. This article focuses on the application of data mining in the development of information management system in universities and colleges. DM provides powerful approaches for a variety of educational areas. Due to the large amount of student (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18. Automatic Control of Computer Application Data Processing System Based on Artificial Intelligence.Ashima Kukkar, Amit Sharma, Lixia Hao & Hong Wang - 2022 - Journal of Intelligent Systems 31 (1):177-192.
    To shorten the travel time and improve comfort, the automatic train driving system is considered to replace manual driving. In this article, an automatic control method of computer application data-processing system based on artificial intelligence is proposed. An automatic train operation introduced the structure and function of an autopilot system, optimized the train running on the target curve, introduced the basic principle of fuzzy generalized predictive control algorithm, and combined with the characteristics of ATO system design the speed controller based (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  19. Conception and Realization of an IoT-Enabled Deep CNN Decision Support System for Automated Arrhythmia Classification.James Kurian, Midhun Muraleedharan Sylaja & Ann Varghese - 2022 - Journal of Intelligent Systems 31 (1):407-419.
    Arrhythmias are irregular heartbeats that may be life-threatening. Proper monitoring and the right care at the right time are necessary to keep the heart healthy. Monitoring electrocardiogram patterns on continuous monitoring devices is time-consuming. An intense manual inspection by caregivers is not an option. In addition, such an inspection could result in errors and inter-variability. This article proposes an automated ECG beat classification method based on deep neural networks to aid in the detection of cardiac arrhythmias. The data collected by (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20. A Comparative Study of Different Neural Networks in Predicting Gross Domestic Product.Han Lai - 2022 - Journal of Intelligent Systems 31 (1):601-610.
    Gross domestic product can well reflect the development of the economy, and predicting GDP can help better grasp the future economic trends. In this article, three different neural network models, the genetic algorithm – back-propagation neural network model, the particle swarm optimization – Elman neural network model, and the bat algorithm – long short-term memory model, were analyzed based on neural networks. The GDP data of Sichuan province from 1992 to 2020 were collected to compare the performance of the three (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Venture Financing Risk Assessment and Risk Control Algorithm for Small and Medium-Sized Enterprises in the Era of Big Data.Jiehui Li - 2022 - Journal of Intelligent Systems 31 (1):611-622.
    The existing risk assessment and control methods of enterprise risk financing have a large error in mobile data, which leads to inaccurate risk assessment results and low-risk optimization control efficiency. In order to improve the accuracy of risk financing risk assessment for small and medium-sized enterprises and risk control optimization efficiency, this article proposes risk assessment and risk control algorithms for SMEs in the era of big data. Through verifying the information of the loan application and supplementing the data during (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  22. Suitability Evaluation Method of Urban and Rural Spatial Planning Based on Artificial Intelligence.Xiaopeng Li - 2022 - Journal of Intelligent Systems 31 (1):245-259.
    In order to realize the sustainable development of urban overall space, aiming at the increasingly serious environmental problems in the process of contemporary rapid urbanization, based on the relationship between urban and rural space and environmental capacity, a suitability evaluation method of urban and rural spatial planning based on artificial intelligence is proposed. This paper constructs the theoretical system of sustainable development evaluation of urban and rural spatial resources and uses artificial intelligence technology to reasonably select evaluation factors and standardize (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  23. Research on Intelligent Interactive Music Information Based on Visualization Technology.Ningjie Liao - 2022 - Journal of Intelligent Systems 31 (1):289-297.
    Combining images with music is a music visualization to deepen the knowledge and understanding of music information. This study briefly introduced the concept of music visualization and used a convolutional neural network and long short-term memory to pair music and images for music visualization. Then, an emotion classification loss function was added to the loss function to make full use of the emotional information in music and images. Finally, simulation experiments were performed. The results showed that the improved deep learning-based (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  24. Personalized Recommendation System Based on Social Tags in the Era of Internet of Things.Jianshun Liu, Wenkai Ma, Gui Li & Jie Dong - 2022 - Journal of Intelligent Systems 31 (1):681-689.
    With the rapid development of the Internet, recommendation systems have received widespread attention as an effective way to solve information overload. Social tagging technology can both reflect users’ interests and describe the characteristics of the items themselves, making group recommendation thus becoming a recommendation technology in urgent demand nowadays. In traditional tag-based recommendation systems, the general processing method is to calculate the similarity and then rank the recommended items according to the similarity. Without considering the influence of continuous user behavior, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  25.  1
    Writing Assistant Scoring System for English Second Language Learners Based on Machine Learning.Jianlan Lyu - 2022 - Journal of Intelligent Systems 31 (1):271-288.
    To reduce the workload of paper evaluation and improve the fairness and accuracy of the evaluation process, a writing assistant scoring system for English as a Foreign Language learners is designed based on the principle of machine learning. According to the characteristics of the data processing process and the advantages and disadvantages of the Browser/server structure, the equipment structure design of the project online evaluation teaching auxiliary system is further optimized. The panda method is used to read the data, the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  26. Large-Scale Timetabling Problems with Adaptive Tabu Search.Maha Mahmood, Ali Al-Kubaisi & Fouad H. Awad - 2022 - Journal of Intelligent Systems 31 (1):168-176.
    Timetabling problems are specific types of scheduling problems that deal with assigning certain events to the timeslots. This assigning is subject to certain hard constraints that should be achieved to get a feasible timetable and soft constraints that must meet as many as possible during forming a feasible schedule. This paper introduces an adaptive tabu search. Eleven benchmark datasets of the year 2002 are applied to show the effectiveness of the introduced algorithm. These datasets consist of 5-small, 5-medium, and 1-large (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27. PUC: Parallel Mining of High-Utility Itemsets with Load Balancing on Spark.Geetha Maiya, Harish Sheeranalli Venkatarama & Anup Bhat Brahmavar - 2022 - Journal of Intelligent Systems 31 (1):568-588.
    Distributed programming paradigms such as MapReduce and Spark have alleviated sequential bottleneck while mining of massive transaction databases. Of significant importance is mining High Utility Itemset that incorporates the revenue of the items purchased in a transaction. Although a few algorithms to mine HUIs in the distributed environment exist, workload skew and data transfer overhead due to shuffling operations remain major issues. In the current study, Parallel Utility Computation algorithm has been proposed with novel grouping and load balancing strategies for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  28. Crime Reporting and Police Controlling: Mobile and Web-Based Approach for Information-Sharing in Iraq.Jawad Kadhim Mezaal, Nabeel Salih Ali, Ahmed Hazim Alhilali & Thamer Alameri - 2022 - Journal of Intelligent Systems 31 (1):726-738.
    Crimes are increasing in our society as a serious worldwide issue. Fast reporting of crimes is a significantly important area in anticrime. This problem is visible in Iraq as people avoid information-sharing due to the lack of trust in the security system despite some contact lines between citizens and police in Iraq. Furthermore, there has been a little empirical study in this field. We proposed a multi-approach for crime reporting and police control to address these issues. First, this study has (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  1
    Cat Swarm Optimization Algorithm Based on the Information Interaction of Subgroup and the Top-N Learning Strategy.Wang Miao, Yu Haipeng & Li Songyang - 2022 - Journal of Intelligent Systems 31 (1):489-500.
    Because of the lack of interaction between seeking mode cats and tracking mode cats in cat swarm optimization, its convergence speed and convergence accuracy are affected. An information interaction strategy is designed between seeking mode cats and tracking mode cats to improve the convergence speed of the CSO. To increase the diversity of each cat, a top-N learning strategy is proposed during the tracking process of tracking mode cats to improve the convergence accuracy of the CSO. On ten standard test (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. Research on Data Mining Method of Network Security Situation Awareness Based on Cloud Computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  1
    Hessenberg Factorization and Firework Algorithms for Optimized Data Hiding in Digital Images.Salama A. Mostafa, Jamal N. Hasoon, Muhanad Tahrir Younis & Methaq Talib Gaata - 2022 - Journal of Intelligent Systems 31 (1):440-453.
    Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium. First, the color of the image is separated into three components. Consequently, the discrete wavelet transform is applied to each component to obtain four bands, resulting in 12 bands in total. By omitting the low–low band from each component, a new square matrix is formed from the rest bands to be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. Convex Optimization for Additive Noise Reduction in Quantitative Complex Object Wave Retrieval Using Compressive Off-Axis Digital Holographic Imaging.Anith Nelleri & B. Lokesh Reddy - 2022 - Journal of Intelligent Systems 31 (1):706-715.
    Image denoising is one of the important problems in the research field of computer vision, artificial intelligence, 3D vision, and image processing, where the fundamental aim is to recover the original image features from a noisy contaminated image. The camera sensor additive noise present in the holographic recording process reduces the quality of the retrieved image. Even though various techniques have been developed to minimize the noise in digital holography, the noise reduction still remains a challenging task. This article presents (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. Interactive 3D Reconstruction Method of Fuzzy Static Images in Social Media.Xiaomei Niu - 2022 - Journal of Intelligent Systems 31 (1):806-816.
    Because the traditional social media fuzzy static image interactive three-dimensional reconstruction method has the problem of poor reconstruction completeness and long reconstruction time, the social media fuzzy static image interactive 3D reconstruction method is proposed. For preprocessing the fuzzy static image of social media, the Harris corner detection method is used to extract the feature points of the preprocessed fuzzy static image of social media. According to the extraction results, the parameter estimation algorithm of contrast divergence is used to learn (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  34. Short-Term Prediction of Parking Availability in an Open Parking Lot.Vijay Paidi - 2022 - Journal of Intelligent Systems 31 (1):541-554.
    The parking of cars is a globally recognized problem, especially at locations where there is a high demand for empty parking spaces. Drivers tend to cruise additional distances while searching for empty parking spaces during peak hours leading to problems, such as pollution, congestion, and driver frustration. Providing short-term predictions of parking availability would facilitate the driver in making informed decisions and planning their arrival to be able to choose parking locations with higher availability. Therefore, the aim of this study (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. A Study on Automatic Correction of English Grammar Errors Based on Deep Learning.Mengyang Qin - 2022 - Journal of Intelligent Systems 31 (1):672-680.
    Grammatical error correction is an important element in language learning. In this article, based on deep learning, the application of the Transformer model in GEC was briefly introduced. Then, in order to improve the performance of the model on GEC, it was optimized by a generative adversarial network. Experiments were conducted on two data sets. It was found that the performance of the GAN-combined Transformer model was significantly improved compared to the Transformer model. The F 0.5 value of the optimized (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36. Machine Translation of English Speech: Comparison of Multiple Algorithms.Yonghong Qin & Yijun Wu - 2022 - Journal of Intelligent Systems 31 (1):159-167.
    In order to improve the efficiency of the English translation, machine translation is gradually and widely used. This study briefly introduces the neural network algorithm for speech recognition. Long short-term memory, instead of traditional recurrent neural network, was used as the encoding algorithm for the encoder, and RNN as the decoding algorithm for the decoder. Then, simulation experiments were carried out on the machine translation algorithm, and it was compared with two other machine translation algorithms. The results showed that the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. The Application of Neural Network Algorithm and Embedded System in Computer Distance Teach System.Qin Qiu - 2022 - Journal of Intelligent Systems 31 (1):148-158.
    The computer distance teaching system teaches through the network, and there is no entrance threshold. Any student who is willing to study can log in to the network computer distance teaching system for study at any free time. Neural network has a strong self-learning ability and is an important part of artificial intelligence research. Based on this study, a neural network-embedded architecture based on shared memory and bus structure is proposed. By looking for an alternative method of exp function to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  1
    Trainable Watershed-Based Model for Cornea Endothelial Cell Segmentation.Mohd Shafry Mohd Rahim & Ahmed Saifullah Sami - 2022 - Journal of Intelligent Systems 31 (1):370-392.
    Segmentation of the medical image plays a significant role when it comes to diagnosis using computer aided system. This article focuses on the human corneal endothelium’s health, which is one of the filed research interests, especially in the human cornea. Various pathological environments fasten the extermination of the endothelial cells, which in turn decreases the cell density in an abnormal manner. Dead cells worsen the hexagonal design. The mutilated endothelial cells can no longer revive back and that gives room for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  39.  1
    IoT-Enabled Edge Computing Model for Smart Irrigation System.A. N. Sigappi & S. Premkumar - 2022 - Journal of Intelligent Systems 31 (1):632-650.
    Precision agriculture is a breakthrough in digital farming technology, which facilitates the application of precise and exact amount of input level of water and fertilizer to the crop at the required time for increasing the yield. Since agriculture relies on direct rainfall than irrigation and the prediction of rainfall date is easily available from web source, the integration of rainfall prediction with precision agriculture helps to regulate the water consumption in farms. In this work, an edge computing model is developed (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40. Behavior Feature Extraction Method of College Students’ Social Network in Sports Field Based on Clustering Algorithm.Haiou Sun & Yonggang Wang - 2022 - Journal of Intelligent Systems 31 (1):477-488.
    In order to improve the integrity of the social network behavior feature extraction results for sports college students, this study proposes to be based on the clustering algorithm. This study analyzes the social network information dissemination mechanism in the field of college students’ sports, obtains the real-time social behavior data in the network environment combined with the analysis results, and processes the obtained social network behavior data from two aspects of data cleaning and de-duplication. Using clustering algorithm to determine the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  1
    Emotional Information Transmission of Color in Image Oil Painting.Weifei Tian - 2022 - Journal of Intelligent Systems 31 (1):428-439.
    To enhance the emotional communication of image oil painting art and better analyze the image oil painting art, this article puts forward the research on color emotional information communication in image oil painting art. First, starting from the artistic characteristics of color and its embodiment in various oil painting art forms, this article expounds the relationship and the significance between color language and emotional expression. Then, it summarizes the development of color in image oil painting from a macro perspective and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Research on an English Translation Method Based on an Improved Transformer Model.Xin Tuo & Hongxia Li - 2022 - Journal of Intelligent Systems 31 (1):532-540.
    With the expansion of people’s needs, the translation performance of traditional models is increasingly unable to meet current demands. This article mainly studied the Transformer model. First, the structure and principle of the Transformer model were briefly introduced. Then, the model was improved by a generative adversarial network to improve the translation effect of the model. Finally, experiments were carried out on the linguistic data consortium dataset. It was found that the average Bilingual Evaluation Understudy value of the improved Transformer (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  43. College Music Teaching and Ideological and Political Education Integration Mode Based on Deep Learning.Liyan Wang, Jingwen Liu, Suhua Zhao & Xiaoshu Wang - 2022 - Journal of Intelligent Systems 31 (1):466-476.
    In order to highlight the role of music teaching in the teaching of ideological and political courses, this study puts forward research on the integration of music teaching and ideological and political teaching. This study analyzes the promotion and necessity of college music teaching to ideological and political work, constructs a fusion model of college music teaching and ideological and political work, introduces deep learning methods, and weakens the influence of errors in the data of college music teaching and ideological (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  1
    A Study of an Intelligent Algorithm Combining Semantic Environments for the Translation of Complex English Sentences.Ping Wang - 2022 - Journal of Intelligent Systems 31 (1):623-631.
    In order to improve the translation quality of complex English sentences, this paper investigated unknown words. First, two baseline models, the recurrent neural machine translation model and the transformer model, were briefly introduced. Then, the unknown words were identified and replaced based on WordNet and the semantic environment and input to the neural machine translation model for translation. Finally, experiments were conducted on several National Institute of Standards and Technology datasets. It was found that the transformer model significantly outperformed the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  45. Dynamic Evaluation of College English Writing Ability Based on AI Technology.Xuezhong Wu - 2022 - Journal of Intelligent Systems 31 (1):298-309.
    To accurately evaluate and improve college students’ English writing ability, this article proposes a dynamic evaluation method of college English writing ability based on artificial intelligence technology. First, a dynamic evaluation model of college English writing ability is constructed. Second, the index system of English writing dynamic evaluation model is established. Based on this, the dynamic evaluation of college English writing ability is realized. The experimental results show that the design method in this paper can effectively realize the dynamic evaluation (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  1
    Application of Mining Algorithm in Personalized Internet Marketing Strategy in Massive Data Environment.Gang Yang & Qianqian Pan - 2022 - Journal of Intelligent Systems 31 (1):237-244.
    Internet marketing requires a personalized marketing strategy. In this study, the application of data mining in personalized Internet marketing was studied. Based on the mining algorithm, a personalized marketing method was designed. Through the calculation of frequent closed item sets and support counts of positive and negative samples, the interval with a high success rate for marketing was obtained. With performance analysis, it was found that the success rate of the marketing method proposed in this study improved 8% compared with (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47. An FCM Clustering Algorithm Based on the Identification of Accounting Statement Whitewashing Behavior in Universities.Qihao Yang - 2022 - Journal of Intelligent Systems 31 (1):345-355.
    The traditional recognition method of whitewash behavior of accounting statements needs to analyze a large number of special data samples. The learning rate of the algorithm is low, resulting in low recognition accuracy. To solve the aforementioned problems, this article proposes a method to identify the whitewash behavior of university accounting statements based on the FCM clustering algorithm. This article analyzes the motivation of university accounting statement whitewashing behavior, studies the common means of statement whitewashing, and establishes a fuzzy set (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. Intelligent Terminal Security Technology of Power Grid Sensing Layer Based Upon Information Entropy Data Mining.Zhibin Yang, Gang Wang, Shuheng Xu, Yaodong Tao, Defeng Chen & Shuai Ren - 2022 - Journal of Intelligent Systems 31 (1):817-834.
    The power grid is an important connection between power sources and users, responsible for supplying and distributing electric energy to users. Modern power grids are widely distributed and large in scale, and their security faces new problems and challenges. Information entropy theory is an objective weighting method that compares the information order of each evaluation index to judge the weight value. With the wide application of entropy theory in various disciplines, the subject of introducing entropy into the power system has (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  49. Eurasian Oystercatcher Optimiser: New Meta-Heuristic Algorithm.Mohammed Yousif, Farah Maath Jasim, Wisam K. Jummar & Ahmad Salim - 2022 - Journal of Intelligent Systems 31 (1):332-344.
    Modern optimisation is increasingly relying on meta-heuristic methods. This study presents a new meta-heuristic optimisation algorithm called Eurasian oystercatcher optimiser. The EOO algorithm mimics food behaviour of Eurasian oystercatcher in searching for mussels. In EOO, each bird in the population acts as a search agent. The EO changes the candidate mussel according to the best solutions to finally eat the best mussel. A balance must be achieved among the size, calories, and energy of mussels. The proposed algorithm is benchmarked on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  2
    On the Correction of Errors in English Grammar by Deep Learning.Xiaorui Yue & Yanghui Zhong - 2022 - Journal of Intelligent Systems 31 (1):260-270.
    Using computer programs to correct English grammar can improve the efficiency of English grammar correction, improve the effect of error correction, and reduce the workload of manual error correction. In order to deal with and solve the problem of loss evaluation mismatch in the current mainstream machine translation, this study proposes the application of the deep learning method to propose an algorithm model with high error correction performance. Therefore, the framework of confrontation learning network is introduced to continuously improve the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  51. Automatic Recognition Method of Installation Errors of Metallurgical Machinery Parts Based on Neural Network.Bo Zhan & Hailong Cui - 2022 - Journal of Intelligent Systems 31 (1):321-331.
    The installation error of metallurgical machinery parts is one of the common sources of errors in mechanical equipment. Because the installation error of different parts has different influences on different mechanical equipment, a simple linear formula cannot be used to identify the installation error. In the past, the manual recognition method and the touch recognition method lack of error information analysis, which leads to inaccurate recognition results. To improve the problem, an automatic recognition method based on the neural network for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  52. Supervision Method of Indoor Construction Engineering Quality Acceptance Based on Cloud Computing.Jian Zhang - 2022 - Journal of Intelligent Systems 31 (1):795-805.
    As an important part of Chinese economy, the construction industry has a great contribution to the economy, and plays an important role in the Chinese economic development. Therefore, it has certain research significance for the quality acceptance supervision method of construction engineering. This article takes Shenzhen S project as an example, combined with cloud computing, discusses the quality acceptance and supervision methods of indoor construction projects. In the introduction to the technical part, this article first briefly introduces the definition of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  53. A Novel Fingerprint Recognition Method Based on a Siamese Neural Network.Yang Zhang, Lingyi Huang, Shanshan Gu, Jianpeng Yu, Xiao Wu, Lixin Zhai, Xiaomin Tian, Zhong Yang, Yizhi Wang & Zihao Li - 2022 - Journal of Intelligent Systems 31 (1):690-705.
    Fingerprint recognition is the most widely used identification method at present. However, it still falls short in terms of cross-platform and algorithmic complexity, which exerts a certain effect on the migration of fingerprint data and the development of the system. The conventional image recognition methods require offline standard databases constructed in advance for image access efficiency. The database can provide a pre-processed image via a specific method that probably is compatible merely with the specific recognition algorithm. Then, the specific recognition (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  54.  1
    Edge Detail Enhancement Algorithm for High-Dynamic Range Images.Qidan Zhu & Lanfei Zhao - 2022 - Journal of Intelligent Systems 31 (1):193-206.
    Existing image enhancement methods have problems of a slow data transmission and poor conversion effect, resulting in a low image-recognition rate and recognition efficiency. To solve these problems and improve the recognition accuracy and recognition efficiency of image features, this study proposes an edge detail enhancement algorithm for a high-dynamic range image. The original image is transformed by Fourier transform, and the low-frequency and high-frequency images are obtained by the frequency-domain Gaussian filtering and inverse Fourier transform. The low-frequency image is (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  55. Image Denoising Algorithm of Social Network Based on Multifeature Fusion.Qidan Zhu & Lanfei Zhao - 2022 - Journal of Intelligent Systems 31 (1):310-320.
    A social network image denoising algorithm based on multifeature fusion is proposed. Based on the multifeature fusion theory, the process of social network image denoising is regarded as the fitting process of neural network, and a simple and efficient convolution neural structure of multifeature fusion is constructed for image denoising. The gray features of social network image are collected, and the gray values are denoising and cleaning. Based on the image features, multiple denoising is carried out to ensure the accuracy (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  56. Evaluation Model of Multimedia-Aided Teaching Effect of Physical Education Course Based on Random Forest Algorithm.Hongbo Zhuang & Gang Liu - 2022 - Journal of Intelligent Systems 31 (1):555-567.
    The multimedia technology and computer technology supported by the development of modern science and technology provide an important platform for the development of college physical education teaching activities. To better play the role of network auxiliary teaching platform in college sports teaching and improve the effectiveness of college sports teaching, the construction method of multimedia auxiliary teaching effect evaluation model based on the random number forest algorithm is proposed. Through the specification of the random forest algorithm and the optimization of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
 Previous issues
  
Next issues