Home / Journals / IASC / Vol.27, No.3, 2021
Special Issues
  • Open AccessOpen Access

    ARTICLE

    CMMI Compliant Workflow Models to Establish Configuration Management Integrity in Software SMEs

    Islam Ali1, Musawwer Khan1, Waqar Mehmood1, Wasif Nisar1, Waqar Aslam2, Muhammad Qaiser Saleem3, Majzoob K. Omer3, Muhammad Shafiq4,*
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 605-623, 2021, DOI:10.32604/iasc.2021.014639 - 01 March 2021
    (This article belongs to the Special Issue: Soft Computing Methods for Innovative Software Practices)
    Abstract Capability Maturity Model Integration (CMMI) is a world-renowned framework for software process improvement, which specifies “What-To-Do” in terms of requirements. However, it leaves the “How-To-Do” part regarding implementation to implementers. The software industry especially software SMEs (SSMEs) faces difficulties in implementing the Specific Practices (SPs) of Various Process Areas (PAs). Configuration Management Process Area (CM-PA) is usually ignored despite its acknowledged importance in the software development process. Establishing integrity is one of the three Specific Goals (SGs) that CMMI ver. 1.3 requires for successful implementation of CM-PA. This goal is achieved through the implementation of… More >

  • Open AccessOpen Access

    ARTICLE

    Computational Intelligence Approach for Municipal Council Elections Using Blockchain

    Fatmah Baothman*, Kawther Saeedi, Khulood Aljuhani, Safaa Alkatheri, Mashael Almeatani, Nourah Alothman
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 625-639, 2021, DOI:10.32604/iasc.2021.014827 - 01 March 2021
    (This article belongs to the Special Issue: Computational Intelligence for Internet of Medical Things and Big Data Analytics)
    Abstract Blockchain is an innovative technology that disrupts different industries and offers decentralized, secure, and immutable platforms. Its first appearance is connected with monetary cryptocurrency transactions, followed by adaptation in several domains. We believe that blockchain can provide a reliable environment by utilizing its unique characteristics to offer a more secure, costless, and robust mechanism suitable for a voting application. Although the technology has captured the interest of governments worldwide, blockchain as a service is still limited due to lack of application development experience, technology complexity, and absence of standardized design, architecture, and best practices. Therefore,… More >

  • Open AccessOpen Access

    ARTICLE

    Impact of COVID-19 Pandemic: A Cybersecurity Perspective

    Mohammed Baz1, Hosam Alhakami2, Alka Agrawal3, Abdullah Baz4, Raees Ahmad Khan3,*
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 641-652, 2021, DOI:10.32604/iasc.2021.015845 - 01 March 2021
    Abstract Inspite of the world being at a complete standstill in the wake of unprecedented health emergency of COVID-19 pandemic, people have managed to retain their digital interactions through Information Technology. Cloud networks, departmental servers, data centres, and the digital devices have ensured that businesses and industries as well as workers across the world remain associated with each other and are connected to the organizations’ data. In such a scenario, the requirements placed on digital frames have increased rapidly. While this has proved to be a boon in the combat against the spread of Coronavirus, alarming… More >

  • Open AccessOpen Access

    ARTICLE

    Economic Shocks of Covid-19: Can Big Data Analytics Help Connect the Dots

    Hakimah Yaacob, Qaisar Ali*, Nur Anissa Sarbini, Abdul Nasir Rani, Zaki Zaini, Nurul Nabilah Ali, Norliza Mahalle
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 653-668, 2021, DOI:10.32604/iasc.2021.015442 - 01 March 2021
    (This article belongs to the Special Issue: Soft Computing Technologies for COVID 19 Assessment, Analysis and Control)
    Abstract Since the beginning of the Covid-19 pandemic, big data analytics (BDA) remains a signatory medium in the battle against it. Governments and policymakers alike are yet to leverage on this scalable technology in an attempt to curb the economic effects of Covid-19. The primary objective of this study is to leverage on BDA to identify economic shocks, and propose a strategic solution for economic recovery in ASEAN member states (AMS). The findings of this study suggest that BDA techniques, frameworks, and architectures are effective tools in predicting and tracking economic shocks, as well as in… More >

  • Open AccessOpen Access

    ARTICLE

    Weed Recognition for Depthwise Separable Network Based on Transfer Learning

    Yanlei Xu1, Yuting Zhai1, Bin Zhao1, Yubin Jiao2, ShuoLin Kong1, Yang Zhou1,*, Zongmei Gao3
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 669-682, 2021, DOI:10.32604/iasc.2021.015225 - 01 March 2021
    Abstract For improving the accuracy of weed recognition under complex field conditions, a weed recognition method using depthwise separable convolutional neural network based on deep transfer learning was proposed in this study. To improve the model classification accuracy, the Xception model was refined by using model transferring and fine-tuning. Specifically, the weight parameters trained by ImageNet data set were transferred to the Xception model. Then a global average pooling layer replaced the full connection layer of the Xception model. Finally, the XGBoost classifier was added to the top layer of the model to output results. The… More >

  • Open AccessOpen Access

    ARTICLE

    A Multi-Agent Stacking Ensemble Hybridized with Vaguely Quantified Rough Set for Medical Diagnosis

    Ali M. Aseere1,*, Ayodele Lasisi2
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 683-699, 2021, DOI:10.32604/iasc.2021.014811 - 01 March 2021
    Abstract In the absence of fast and adequate measures to combat them, life-threatening diseases are catastrophic to human health. Computational intelligent algorithms characterized by their adaptability, robustness, diversity, and recognition abilities allow for the diagnosis of medical diseases. This enhances the decision-making process of physicians. The objective is to predict and classify diseases accurately. In this paper, we proposed a multi-agent stacked ensemble classifier based on a vaguely quantified rough set, simple logistic algorithm, sequential minimal optimization (SMO), and JRip. The vaguely quantified rough set (VQRS) is used for feature selection and eradicating noise in the More >

  • Open AccessOpen Access

    ARTICLE

    Detection of COVID-19 Enhanced by a Deep Extreme Learning Machine

    Aaqib Inam1,*, Zhuli1, Ayesha Sarwar1, Salah-ud-din2, Ayesha Atta3, Iftikhar Naaseer4, Shahan Yamin Siddiqui5,6, Muhammad Adnan Khan7
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 701-712, 2021, DOI:10.32604/iasc.2021.014235 - 01 March 2021
    (This article belongs to the Special Issue: Machine Learning and Computational Methods for Disease Detection and Prediction)
    Abstract The outbreak of coronavirus disease 2019 (COVID-19) has had a tremendous effect on daily life and a great impact on the economy of the world. More than 200 countries have been affected. The diagnosis of coronavirus is a major challenge for medical experts. Early detection is one of the most effective ways to reduce the mortality rate and increase the chance of successful treatment. At this point in time, no antiviral drugs have been approved for use, and clinically approved vaccines have only recently become available in some countries. Hybrid artificial intelligence computer-aided systems for… More >

  • Open AccessOpen Access

    ARTICLE

    PTS-PAPR Reduction Technique for 5G Advanced Waveforms Using BFO Algorithm

    Arun Kumar1, Manoj Gupta1, Dac-Nhuong Le2,3,*, Ayman A. Aly4
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 713-722, 2021, DOI:10.32604/iasc.2021.015793 - 01 March 2021
    (This article belongs to the Special Issue: Recent Advances in Intelligent Systems and Communication)
    Abstract Non-orthogonal multiple access (NOMA) will play an imperative part in an advanced 5G radio arrangement, owing to its numerous benefits such as improved spectrum adeptness, fast data rate, truncated spectrum leakage, and, so on. So far, NOMA undergoes from peak to average power ratio (PAPR) problem, which shrinks the throughput of the scheme. In this article, we propose a hybrid method, centered on the combination of advanced Partial transmission sequence (PTS), Selective mapping (SLM), and bacteria foraging optimization (BFO), known as PTS-BFO and SLM-PTS. PTS and SLM are utilized at the sender side and divide More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning in Detecting Schizophrenia: An Overview

    Gurparsad Singh Suri1, Gurleen Kaur1, Sara Moein2,*
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 723-735, 2021, DOI:10.32604/iasc.2021.015049 - 01 March 2021
    Abstract Schizophrenia (SZ) is a mental heterogeneous psychiatric disorder with unknown cause. Neuroscientists postulate that it is related to brain networks. Recently, scientists applied machine learning (ML) and artificial intelligence for the detection, monitoring, and prognosis of a range of diseases, including SZ, because these techniques show a high performance in discovering an association between disease symptoms and disease. Regions of the brain have significant connections to the symptoms of SZ. ML has the power to detect these associations. ML interests researchers because of its ability to reduce the number of input features when the data More >

  • Open AccessOpen Access

    ARTICLE

    Low Complexity Decoding Algorithm for Uplink SCMA Based on Aerial Spherical Decoding

    Xiaohong Ji1, Junjun Du1, Guoqing Jia1,*, Weidong Fang2,3
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 737-746, 2021, DOI:10.32604/iasc.2021.013009 - 01 March 2021
    Abstract As a new non-orthogonal multiple access technology for 5G massive machine type communication scenario, the sparse code multiple access (SCMA) has greatly improved the spectrum efficiency due to the high connection density. SCMA combines QAM (Quadrature Amplitude Modulation) modulation and sparse spreading into a codebook set to obtain forming gain. The user binary bit data is directly mapped into multi-dimensional codewords in the transmitter. The receiver uses the message passing algorithm (MPA) for multi-user detection to achieve efficient decoding. However, MPA is a good solution for SCMA, though its high complexity limits the application in… More >

  • Open AccessOpen Access

    ARTICLE

    Mammographic Image Classification Using Deep Neural Network for Computer-Aided Diagnosis

    Charles Arputham1,*, Krishnaraj Nagappan2, Lenin Babu Russeliah3, AdalineSuji Russeliah4
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 747-759, 2021, DOI:10.32604/iasc.2021.012077 - 01 March 2021
    Abstract Breast cancer detection is a crucial topic in the healthcare sector. Breast cancer is a major reason for the increased mortality rate in recent years among women, specifically in developed and underdeveloped countries around the world. The incidence rate is less in India than in developed countries, but awareness must be increased. This paper focuses on an efficient deep learning-based diagnosis and classification technique to detect breast cancer from mammograms. The model includes preprocessing, segmentation, feature extraction, and classification. At the initial level, Laplacian filtering is applied to identify the portions of edges in mammogram… More >

  • Open AccessOpen Access

    ARTICLE

    Secure and Energy Efficient Data Transmission Model for WSN

    Anuj Kumar Singh1, Mohammed Alshehri2,*, Shashi Bhushan3, Manoj Kumar3, Osama Alfarraj4, Kamal Raj Pardarshani5
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 761-769, 2021, DOI:10.32604/iasc.2021.012806 - 01 March 2021
    Abstract Wireless sensor networks (WSNs) have been used in numerous delicate checking, observation, and surveillance systems that use sensitive data. When a WSN utilizes various data clustering techniques, data is moved to the cluster head (CH) of the corresponding cluster area. Cluster Head further communicates the information to the sink node. In a WSN, a network owner (NO) does not validate a sensor before connecting to the network, so faulty nodes may likely attach to the network to sense the data and attempt to release the information to unauthorized persons. Further, a malicious node may become… More >

  • Open AccessOpen Access

    ARTICLE

    Maximizing Throughput in Wireless Multimedia Sensor Network using Soft Computing Techniques

    Krishnan Muthumayil1,*, Thangaiyan Jayasankar2, Nagappan Krishnaraj3, Mohamed Yacin Sikkandar4, Prakash Nattanmai Balasubramanian5, Chokkalingam Bharatiraja6
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 771-784, 2021, DOI:10.32604/iasc.2021.012462 - 01 March 2021
    Abstract Wireless Multimedia Sensor Networks (WMSN) provides valuable information for scalar data, images, audio, and video processing in monitoring and surveillance applications. Multimedia streaming, however, is highly challenging for networks as energy restriction sensor nodes limit the potential data transmission bandwidth and lead to reduced throughput. WMSN’s two key design challenges, which can be achieved by the clustering process, are energy efficiency and throughput maximization. The use of the clustering technique helps to organise the sensor nodes into clusters, and between each cluster a cluster head (CH) will be chosen. This paper introduces a new Artificial… More >

  • Open AccessOpen Access

    ARTICLE

    A Big Data Approach to Black Friday Sales

    Mazhar Javed Awan1,2,*, Mohd Shafry Mohd Rahim2, Haitham Nobanee3,4,5, Awais Yasin6, Osamah Ibrahim Khalaf7, Umer Ishfaq2
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 785-797, 2021, DOI:10.32604/iasc.2021.014216 - 01 March 2021
    Abstract Retail companies recognize the need to analyze and predict their sales and customer behavior against their products and product categories. Our study aims to help retail companies create personalized deals and promotions for their customers, even during the COVID-19 pandemic, through a big data framework that allows them to handle massive sales volumes with more efficient models. In this paper, we used Black Friday sales data taken from a dataset on the Kaggle website, which contains nearly 550,000 observations analyzed with 10 features: qualitative and quantitative. The class label is purchases and sales (in U.S.… More >

  • Open AccessOpen Access

    ARTICLE

    Threshold Parameters Selection for Empirical Mode Decomposition-Based EMG Signal Denoising

    Hassan Ashraf1, Asim Waris1,*, Syed Omer Gilani1, Muhammad Umair Tariq1, Hani Alquhayz2
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 799-815, 2021, DOI:10.32604/iasc.2021.014765 - 01 March 2021
    (This article belongs to the Special Issue: Computational Intelligence for Internet of Medical Things and Big Data Analytics)
    Abstract Empirical Mode Decomposition (EMD) is a data-driven and fully adaptive signal decomposition technique to decompose a signal into its Intrinsic Mode Functions (IMF). EMD has attained great attention due to its capabilities to process a signal in the frequency-time domain without altering the signal into the frequency domain. EMD-based signal denoising techniques have shown great potential to denoise nonlinear and nonstationary signals without compromising the signal’s characteristics. The denoising procedure comprises three steps, i.e., signal decomposition, IMF thresholding, and signal reconstruction. Thresholding is performed to assess which IMFs contain noise. In this study, Interval Thresholding… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Model Fuzzy Formation Control of UAV Quadrotors

    Abdul-Wahid A. Saif1, Mohammad Ataur-Rahman1, Sami Elferik1, Muhammad F. Mysorewala1, Mujahed Al-Dhaifallah1,*, Fouad Yacef2
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 817-834, 2021, DOI:10.32604/iasc.2021.015932 - 01 March 2021
    (This article belongs to the Special Issue: Recent Trends in Computational Methods for Differential Equations)
    Abstract In this paper, the formation control problem of a group of unmanned air vehicle (UAV) quadrotors is solved using the Takagi–Sugeno (T–S) multi-model approach to linearize the nonlinear model of UAVs. The nonlinear model sof the quadrotor is linearized first around a set of operating points using Taylor series to get a set of local models. Our approach’s novelty is in considering the difference between the nonlinear model and the linearized ones as disturbance. Then, these linear models are interpolated using the fuzzy T–S approach to approximate the entire nonlinear model. Comparison of the nonlinear… More >

  • Open AccessOpen Access

    ARTICLE

    Analyzing the Implications of COVID-19 Pandemic: Saudi Arabian Perspective

    Shakeel Ahmed*, Abdulaziz Alhumam
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 835-851, 2021, DOI:10.32604/iasc.2021.015789 - 01 March 2021
    Abstract Most of the patients diagnosed with COVID-19 pandemic usually suffer from mild-to-serious respiratory illness and become stable without any specific care. In fact, in some countries like India the mortality rate is as low. Those who are amongst the most vulnerable groups are the elderly and the ones with chronic ailments like diabetes, heart ailments, and respiratory ailments. However, apart from the impact on the physical health of the patients, this disease has had a more debilitating affect on the mental as well as emotional well-being of the people. Due to continuous watching and protection… More >

  • Open AccessOpen Access

    ARTICLE

    Design and Development of Collaborative AR System for Anatomy Training

    Chung Le Van1, Trinh Hiep Hoa1, Nguyen Minh Duc1, Vikram Puri1, Tung Sanh Nguyen2, Dac-Nhuong Le3,4,*
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 853-871, 2021, DOI:10.32604/iasc.2021.013732 - 01 March 2021
    (This article belongs to the Special Issue: Machine Learning and Computational Methods for Disease Detection and Prediction)
    Abstract Background: Augmented Reality (AR) incorporates both real and virtual objects in real-time environments and allows single and multi-users to interact with 3D models. It is often tricky to adopt multi-users in the same environment because of the devices’ latency and model position accuracy in displaying the models simultaneously. Method: To address this concern, we present a multi-user sharing technique in the AR of the human anatomy that increases learning with high quality, high stability, and low latency in multiple devices. Besides, the multi-user interactive display (HoloLens) merges with the human body anatomy application (AnatomyNow) to… More >

  • Open AccessOpen Access

    ARTICLE

    A Fast and Accurate Vascular Tissue Simulation Model Based on Point Primitive Method

    Xiaorui Zhang1,2,*, Hailun Wu1, Wei Sun1, Aiguo Song3, Sunil Kumar Jha4
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 873-889, 2021, DOI:10.32604/iasc.2021.013541 - 01 March 2021
    Abstract Virtual surgery simulation is indispensable for virtual vascular interventional training system, which provides the doctor with visual scene between catheter and vascular. Soft tissue deformation, as the most significant part, determines the success or failure of the virtual surgery simulation. However, most soft tissue deformation model cannot simultaneously meet the requirement of high deformation accuracy and real-time interaction. To solve the challenge mentioned above, this paper proposes a fast and accurate vascular tissue simulation model based on point primitive method. Firstly, the proposed model simulates a deformation of the internal structure of the vascular tissue… More >

  • Open AccessOpen Access

    ARTICLE

    A Learning-based Static Malware Detection System with Integrated Feature

    Zhiguo Chen1,*, Xiaorui Zhang1,2, Sungryul Kim3
    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 891-908, 2021, DOI:10.32604/iasc.2021.016933 - 01 March 2021
    Abstract The rapid growth of malware poses a significant threat to the security of computer systems. Analysts now need to examine thousands of malware samples daily. It has become a challenging task to determine whether a program is a benign program or malware. Making accurate decisions about the program is crucial for anti-malware products. Precise malware detection techniques have become a popular issue in computer security. Traditional malware detection uses signature-based strategies, which are the most widespread method used in commercial anti-malware software. This method works well against known malware but cannot detect new malware. To… More >

Per Page:

Share Link