Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    Language-Independent Text Tokenization Using Unsupervised Deep Learning

    Hanan A. Hosni Mahmoud1, Alaaeldin M. Hafez2, Eatedal Alabdulkreem1,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 321-334, 2023, DOI:10.32604/iasc.2023.026235

    Abstract Languages–independent text tokenization can aid in classification of languages with few sources. There is a global research effort to generate text classification for any language. Human text classification is a slow procedure. Consequently, the text summary generation of different languages, using machine text classification, has been considered in recent years. There is no research on the machine text classification for many languages such as Czech, Rome, Urdu. This research proposes a cross-language text tokenization model using a Transformer technique. The proposed Transformer employs an encoder that has ten layers with self-attention encoding and a feedforward sublayer. This model improves the… More >

  • Open Access

    ARTICLE

    Intelligent Vehicular Communication Using Vulnerability Scoring Based Routing Protocol

    M. Ramya Devi*, I. Jasmine Selvakumari Jeya

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 31-45, 2023, DOI:10.32604/iasc.2023.026152

    Abstract Internet of Vehicles (IoV) is an intelligent vehicular technology that allows vehicles to communicate with each other via internet. Communications and the Internet of Things (IoT) enable cutting-edge technologies including such self-driving cars. In the existing systems, there is a maximum communication delay while transmitting the messages. The proposed system uses hybrid Co-operative, Vehicular Communication Management Framework called CAMINO (CA). Further it uses, energy efficient fast message routing protocol with Common Vulnerability Scoring System (CVSS) methodology for improving the communication delay, throughput. It improves security while transmitting the messages through networks. In this research, we present a unique intelligent vehicular… More >

  • Open Access

    ARTICLE

    DeepWalk Based Influence Maximization (DWIM): Influence Maximization Using Deep Learning

    Sonia1, Kapil Sharma1,*, Monika Bajaj2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1087-1101, 2023, DOI:10.32604/iasc.2023.026134

    Abstract Big Data and artificial intelligence are used to transform businesses. Social networking sites have given a new dimension to online data. Social media platforms help gather massive amounts of data to reach a wide variety of customers using influence maximization technique for innovative ideas, products and services. This paper aims to develop a deep learning method that can identify the influential users in a network. This method combines the various aspects of a user into a single graph. In a social network, the most influential user is the most trusted user. These significant users are used for viral marketing as… More >

  • Open Access

    ARTICLE

    Digital Object Architecture for IoT Networks

    Mahmood Al-Bahri1, Abdelhamied Ateya2,3, Ammar Muthanna3, Abeer D. Algarni4, Naglaa F. Soliman4,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 97-110, 2023, DOI:10.32604/iasc.2023.026115

    Abstract The Internet of Things (IoT) is a recent technology, which implies the union of objects, “things”, into a single worldwide network. This promising paradigm faces many design challenges associated with the dramatic increase in the number of end-devices. Device identification is one of these challenges that becomes complicated with the increase of network devices. Despite this, there is still no universally accepted method of identifying things that would satisfy all requirements of the existing IoT devices and applications. In this regard, one of the most important problems is choosing an identification system for all IoT devices connected to the public… More >

  • Open Access

    ARTICLE

    Gaussian PI Controller Network Classifier for Grid-Connected Renewable Energy System

    Ravi Samikannu1,*, K. Vinoth2, Narasimha Rao Dasari3, Senthil Kumar Subburaj4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 983-995, 2023, DOI:10.32604/iasc.2023.026069

    Abstract Multi-port converters are considered as exceeding earlier period decade owing to function in a combination of different energy sources in a single processing unit. Renewable energy sources are playing a significant role in the modern energy system with rapid development. In renewable sources like fuel combustion and solar energy, the generated voltages change due to their environmental changes. To develop energy resources, electric power generation involved huge awareness. The power and output voltages are plays important role in our work but it not considered in the existing system. For considering the power and voltage, Gaussian PI Controller-Maxpooling Deep Convolutional Neural… More >

  • Open Access

    ARTICLE

    Student’s Health Exercise Recognition Tool for E-Learning Education

    Tamara al Shloul1, Madiha Javeed2, Munkhjargal Gochoo3, Suliman A. Alsuhibany4, Yazeed Yasin Ghadi5, Ahmad Jalal2, Jeongmin Park6,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 149-161, 2023, DOI:10.32604/iasc.2023.026051

    Abstract Due to the recently increased requirements of e-learning systems, multiple educational institutes such as kindergarten have transformed their learning towards virtual education. Automated student health exercise is a difficult task but an important one due to the physical education needs especially in young learners. The proposed system focuses on the necessary implementation of student health exercise recognition (SHER) using a modified Quaternion-based filter for inertial data refining and data fusion as the pre-processing steps. Further, cleansed data has been segmented using an overlapping windowing approach followed by patterns identification in the form of static and kinematic signal patterns. Furthermore, these… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Financial Crisis Prediction Model for Small-Medium Sized Industries

    Kavitha Muthukumaran*, K. Hariharanath

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 521-536, 2023, DOI:10.32604/iasc.2023.025968

    Abstract Recently, data science techniques utilize artificial intelligence (AI) techniques who start and run small and medium-sized enterprises (SMEs) to take an influence and grow their businesses. For SMEs, owing to the inexistence of consistent data and other features, evaluating credit risks is difficult and costly. On the other hand, it becomes necessary to design efficient models for predicting business failures or financial crises of SMEs. Various data classification approaches for financial crisis prediction (FCP) have been presented for predicting the financial status of the organization by the use of past data. A major process involved in the design of FCP… More >

  • Open Access

    ARTICLE

    Automated Skin Lesion Diagnosis and Classification Using Learning Algorithms

    A. Soujanya1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 675-687, 2023, DOI:10.32604/iasc.2023.025930

    Abstract Due to the rising occurrence of skin cancer and inadequate clinical expertise, it is needed to design Artificial Intelligence (AI) based tools to diagnose skin cancer at an earlier stage. Since massive skin lesion datasets have existed in the literature, the AI-based Deep Learning (DL) models find useful to differentiate benign and malignant skin lesions using dermoscopic images. This study develops an Automated Seeded Growing Segmentation with Optimal EfficientNet (ARGS-OEN) technique for skin lesion segmentation and classification. The proposed ASRGS-OEN technique involves the design of an optimal EfficientNet model in which the hyper-parameter tuning process takes place using the Flower… More >

  • Open Access

    ARTICLE

    Intelligent MRI Room Design Using Visible Light Communication with Range Augmentation

    R. Priyadharsini*, A. Kunthavai

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 261-279, 2023, DOI:10.32604/iasc.2023.025884

    Abstract Radio waves and strong magnetic fields are used by Magnetic Resonance Imaging (MRI) scanners to detect tumours, wounds and visualize detailed images of the human body. Wi-Fi and other medical devices placed in the MRI procedure room produces RF noise in MRI Images. The RF noise is the result of electromagnetic emissions produced by Wi-Fi and other medical devices that interfere with the operation of the MRI scanner. Existing techniques for RF noise mitigation involve RF shielding techniques which induce eddy currents that affect the MRI image quality. RF shielding techniques are complex and lead to RF leakage. VLC (Visible… More >

  • Open Access

    ARTICLE

    A Novel Technique for Detecting Various Thyroid Diseases Using Deep Learning

    Soma Prathibha1,*, Deepak Dahiya2, C. R. Rene Robin3, Cherukuru Venkata Nishkala4, S. Swedha5

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 199-214, 2023, DOI:10.32604/iasc.2023.025819

    Abstract Thyroid disease is a medical condition caused due to the excess release of thyroid hormone. It is released by the thyroid gland which is in front of the neck just below the larynx. Medical pictures such as X-rays and CT scans can, however, be used to diagnose it. In this proposed model, Deep Learning technology is used to detect thyroid diseases. A Convolution Neural Network (CNN) based modified ResNet architecture is employed to detect five different types of thyroid diseases namely 1. Hypothyroid 2. Hyperthyroid 3. Thyroid cancer 4. Thyroiditis 5. Thyroid nodules. In the proposed work, the training method… More >

Displaying 7621-7630 on page 763 of 22113. Per Page