Home / Journals / IASC / Vol.31, No.3, 2022
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Classification Similarity Network Model for Image Fusion Using Resnet50 and GoogLeNet

    P. Siva Satya Sreedhar1,*, N. Nandhagopal2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1331-1344, 2022, DOI:10.32604/iasc.2022.020918
    Abstract The current trend in Image Fusion (IF) algorithms concentrate on the fusion process alone. However, pay less attention to critical issues such as the similarity between the two input images, features that participate in the Image Fusion. This paper addresses these two issues by deliberately attempting a new Image Fusion framework with Convolutional Neural Network (CNN). CNN has features like pre-training and similarity score, but functionalities are limited. A CNN model with classification prediction and similarity estimation are introduced as Classification Similarity Networks (CSN) to address these issues. ResNet50 and GoogLeNet are modified as the classification branches of CSN v1,… More >

  • Open AccessOpen Access

    ARTICLE

    Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Asaad Balla1, Mohammad Tahir2, Elfatih A. A. Elsheikh3, F. M. Suliman3
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1345-1360, 2022, DOI:10.32604/iasc.2022.020801
    Abstract Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. The testbed is equipped with real-time attacks using in-house… More >

  • Open AccessOpen Access

    ARTICLE

    A Modelling and Scheduling Tool for Crowd Movement in Complex Network

    Emad Felemban1, Faizan Ur Rehman2,*, Akhlaq Ahmad2, Muhamad Felemban3
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1361-1375, 2022, DOI:10.32604/iasc.2022.020235
    Abstract Managing events pose a unique challenge to the stakeholders and authorities to control the crowd in all three phases of the event (pre, during and post), ensuring crowd safety. One of the fundamental keys to provide crowd safety is to consider the mobility infrastructure hosting the crowd, i.e., routes, areas, entrances and exits. During Hajj, where millions of pilgrims worldwide fulfil the annual event’s rites, mina encampment incorporates pilgrims performing recurring stoning ritual conducted over multi-level Jamarat bridge. Pilgrims mobility through the available complex road network, to and back from the Jamarat bridge, forces upon authorities in charge to set… More >

  • Open AccessOpen Access

    ARTICLE

    IoT and Machine Learning Based Stem Borer Pest Prediction

    Rana Muhammad Nadeem1, Arfan Jaffar2, Rana Muhammad Saleem3,*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1377-1392, 2022, DOI:10.32604/iasc.2022.020680
    (This article belongs to this Special Issue: Soft Computing Methods for Intelligent Automation Systems)
    Abstract Global climatic changes have severe impacts on agricultural productivity. Enhanced pest attacks on crops are one of the major impacts on sustainable developments in agriculture to come up with the needs of the ever-increasing human population. Early warning of a pest attack is important for Integrated Pest Management (IPM) activities to be effective. Early warning of pest attacks is also important for judicious use of pesticides for efficient use of resources for minimal impacts on the environment. Sugarcane is the major cash crop and is also severely affected by different types of pests. This study proposed stem borer attack prediction… More >

  • Open AccessOpen Access

    ARTICLE

    Time-Efficient Fire Detection Convolutional Neural Network Coupled with Transfer Learning

    Hanan A. Hosni Mahmoud, Amal H. Alharbi, Norah S. Alghamdi*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1393-1403, 2022, DOI:10.32604/iasc.2022.020629
    Abstract The detection of fires in surveillance videos are usually done by utilizing deep learning. In Spite of the advances in processing power, deep learning methods usually need extensive computations and require high memory resources. This leads to restriction in real time fire detection. In this research, we present a time-efficient fire detection convolutional neural network coupled with transfer learning for surveillance systems. The model utilizes CNN architecture with reasonable computational time that is deemed possible for real time applications. At the same time, the model will not compromise accuracy for time efficiency by tuning the model with respect to fire… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Detection of Malicious URLs Using Boosting and Lexical Features

    Mohammad Atrees*, Ashraf Ahmad, Firas Alghanim
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1405-1422, 2022, DOI:10.32604/iasc.2022.020229
    Abstract A malicious URL is a link that is created to spread spams, phishing, malware, ransomware, spyware, etc. A user may download malware that can adversely affect the computer by clicking on an infected URL, or might be convinced to provide confidential information to a fraudulent website causing serious losses. These threats must be identified and handled in a decent time and in an effective way. Detection is traditionally done through the blacklist usage method, which relies on keyword matching with previously known malicious domain names stored in a repository. This method is fast and easy to implement, with the advantage… More >

  • Open AccessOpen Access

    ARTICLE

    Real Time Feature Extraction Deep-CNN for Mask Detection

    Hanan A. Hosni Mahmoud, Norah S. Alghamdi, Amal H. Alharbi*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1423-1434, 2022, DOI:10.32604/iasc.2022.020586
    Abstract COVID-19 pandemic outbreak became one of the serious threats to humans. As there is no cure yet for this virus, we have to control the spread of Coronavirus through precautions. One of the effective precautions as announced by the World Health Organization is mask wearing. Surveillance systems in crowded places can lead to detection of people wearing masks. Therefore, it is highly urgent for computerized mask detection methods that can operate in real-time. As for now, most countries demand mask-wearing in public places to avoid the spreading of this virus. In this paper, we are presenting an object detection technique… More >

  • Open AccessOpen Access

    ARTICLE

    IIoT Framework Based ML Model to Improve Automobile Industry Product

    S. Gopalakrishnan1,*, M. Senthil Kumaran2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1435-1449, 2022, DOI:10.32604/iasc.2022.020660
    Abstract In the automotive industry, multiple predictive maintenance units run behind the scenes in every production process to support significant product development, particularly among Accessories Manufacturers (AMs). As a result, they wish to maintain a positive relationship with vehicle manufacturers by providing 100 percent quality assurances for accessories. This is only achievable if they implement an effective anticipatory strategy that prioritizes quality control before and after product development. To do this, many sensors devices are interconnected in the production area to collect operational data (humanity, viscosity, and force) continuously received from machines and sent to backend computers for control operations and… More >

  • Open AccessOpen Access

    ARTICLE

    A Fuzzy MCDM Model of Supplier Selection in Supply Chain Management

    Jui-Chung Kao1, Chia-Nan Wang2,*, Viet Tinh Nguyen3 and Syed Tam Husain3
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1451-1466, 2022, DOI:10.32604/iasc.2022.021778
    (This article belongs to this Special Issue: Fuzzy Sets and Soft Computing)
    Abstract According to a new study by the International Labor Organization (ILO), the COVID-19 pandemic has had a strong impact on the garment industry in the Asia-Pacific region. A sharp drop in retail sales in key export markets has affected workers and businesses across supply chains. To ensure the effectiveness and efficiency of garment supply chain, choosing a sustainable supplier should be a main concern of all businesses. The supplier selection problem in garment industry involves multiple quantitative and qualitative criteria. There have been many research and literatures about the development and application of Multicriteria Decision Making (MCDM) models in solving… More >

  • Open AccessOpen Access

    ARTICLE

    Periodic Solutions for Two Dimensional Quartic Non-Autonomous Differential Equation

    Saima Akram1,*, Allah Nawaz1, Muhammad Bilal Riaz2, Mariam Rehman3
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1467-1482, 2022, DOI:10.32604/iasc.2022.019767
    (This article belongs to this Special Issue: Recent Trends in Computational Methods for Differential Equations)
    Abstract In this article, the maximum possible numbers of periodic solutions for the quartic differential equation are calculated. In this regard, for the first time in the literature, we developed new formulae to determine the maximum number of periodic solutions greater than eight for the quartic equation. To obtain the maximum number of periodic solutions, we used a systematic procedure of bifurcation analysis. We used computer algebra Maple 18 to solve lengthy calculations that appeared in the formulae of focal values as integrations. The newly developed formulae were applied to a variety of polynomials with algebraic and homogeneous trigonometric coefficients of… More >

  • Open AccessOpen Access

    ARTICLE

    Utilization of Deep Learning-Based Crowd Analysis for Safety Surveillance and Spread Control of COVID-19 Pandemic

    Osama S. Faragallah1,*, Sultan S. Alshamrani1, Heba M. El-Hoseny2, Mohammed A. AlZain1, Emad Sami Jaha3, Hala S. El-Sayed4
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1483-1497, 2022, DOI:10.32604/iasc.2022.020330
    Abstract Crowd monitoring analysis has become an important challenge in academic researches ranging from surveillance equipment to people behavior using different algorithms. The crowd counting schemes can be typically processed in two steps, the images ground truth density maps which are obtained from ground truth density map creation and the deep learning to estimate density map from density map estimation. The pandemic of COVID-19 has changed our world in few months and has put the normal human life to a halt due to its rapid spread and high danger. Therefore, several precautions are taken into account during COVID-19 to slowdown the… More >

  • Open AccessOpen Access

    ARTICLE

    Design of Higher Order Matched FIR Filter Using Odd and Even Phase Process

    V. Magesh1,*, N. Duraipandian2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1499-1510, 2022, DOI:10.32604/iasc.2022.020552
    Abstract The current research paper discusses the implementation of higher order-matched filter design using odd and even phase processes for efficient area and time delay reduction. Matched filters are widely used tools in the recognition of specified task. When higher order taps are implemented upon the transposed form of matched filters, it can enhance the image recognition application and its performance in terms of identification and accuracy. The proposed method i.e., odd and even phases’ process of FIR filter can reduce the number of multipliers and adders, used in existing system. The main advantage of using higher order tap-matched filter is… More >

  • Open AccessOpen Access

    ARTICLE

    Quantum Firefly Secure Routing for Fog Based Wireless Sensor Networks

    R. Dayana1,*, G. Maria Kalavathy2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1511-1528, 2022, DOI:10.32604/iasc.2022.020551
    Abstract Wireless Sensor Networks (WSNs) become an integral part of Internet of Things (IoT) and finds their applicability in several domains. As classical WSN faces several issues in service-based IoT applications, fog computing has been introduced in real-time, enabling local data processing and avoid raw data transmission to cloud servers. The Fog-based WSN generally involves advanced nodes, normal nodes, and some Fog Nodes (FN). Though the Fog-based WSN offers several benefits, there is a need to develop an effective trust-based secure routing protocol for data transmission among Cluster Heads (CHs) and FNs. In this view, this paper presents a Quantum Firefly… More >

  • Open AccessOpen Access

    ARTICLE

    A Learning-Based Fault Localization Approach Using Subset of Likely and Dynamic Invariants

    Asadullah Shaikh1,*, Syed Rizwan2, Abdullah Alghamdi1, Noman Islam2, M.A. Elmagzoub1, Darakhshan Syed2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1529-1546, 2022, DOI:10.32604/iasc.2022.021163
    Abstract Fault localization is one of the main tasks of software debugging. Developers spend a lot of time, cost, and effort to locate the faults correctly manually. For reducing this effort, many automatic fault localization techniques have been proposed, which inputs test suites and outputs a sorted list of faulty entities of the program. For further enhancement in this area, we developed a system called SILearning, which is based on invariant analysis. It learns from some existing fixed bugs to locate faulty methods in the program. It combines machine-learned ranking, program invariant differences, and spectrum-based fault localization (SBFL). Using the execution… More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Memetic Algorithm for Feature Selection in Big Data Analytics with MapReduce

    Umanesan Ramakrishnan1,*, Nandhagopal Nachimuthu2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1547-1559, 2022, DOI:10.32604/iasc.2022.017123
    Abstract Recently, various research fields have begun dealing with massive datasets forseveral functions. The main aim of a feature selection (FS) model is to eliminate noise, repetitive, and unnecessary featuresthat reduce the efficiency of classification. In a limited period, traditional FS models cannot manage massive datasets and filterunnecessary features. It has been discovered from the state-of-the-art literature that metaheuristic algorithms perform better compared to other FS wrapper-based techniques. Common techniques such as the Genetic Algorithm (GA) andParticle Swarm Optimization (PSO) algorithm, however, suffer from slow convergence and local optima problems. Even with new generation algorithms such as Firefly heuristic and Fish… More >

  • Open AccessOpen Access

    ARTICLE

    Classification Framework for COVID-19 Diagnosis Based on Deep CNN Models

    Walid El-Shafai1, Abeer D. Algarni2,*, Ghada M. El Banby3, Fathi E. Abd El-Samie1,2, Naglaa F. Soliman2,4
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1561-1575, 2022, DOI:10.32604/iasc.2022.020386
    Abstract Automated diagnosis based on medical images is a very promising trend in modern healthcare services. For the task of automated diagnosis, there should be flexibility to deal with an enormous amount of data represented in the form of medical images. In addition, efficient algorithms that could be adapted according to the nature of images should be used. The importance of automated medical diagnosis has been maximized with the evolution of COVID-19 pandemic. COVID-19 first appeared in China, Wuhan, and then it has exploded in the whole world with a very bad impact on our daily life. The third wave of… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Path Planning for Intelligent UAVs Using Graph Convolution Networks

    Akshya Jothi, P. L. K. Priyadarsini*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1577-1591, 2022, DOI:10.32604/iasc.2022.020974
    Abstract Unmanned Aerial Vehicles (UAVs) are in use for surveillance services in the geographic areas, that are very hard and sometimes not reachable by humans. Nowadays, UAVs are being used as substitutions to manned operations in various applications. The intensive utilization of autonomous UAVs has given rise to many new challenges. One of the vital problems that arise while deploying UAVs in surveillance applications is the Coverage Path Planning(CPP) problem. Given a geographic area, the problem is to find an optimal path/tour for the UAV such that it covers the entire area of interest with minimal tour length. A graph can… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction of Transformer Oil Breakdown Voltage with Barriers Using Optimization Techniques

    Sherif S. M. Ghoneim1,*, Mosleh M. Alharthi1, Ragab A. El-Sehiemy2, Abdullah M. Shaheen3
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1593-1610, 2022, DOI:10.32604/iasc.2022.020464
    Abstract A new procedure to optimally identifying the prediction equation of oil breakdown voltage with the barrier parameters’ effect is presented. The specified equation is built based on the results of experimental works to link the response with the barrier parameters as the inputs for hemisphere-hemisphere electrode gap configuration under AC voltage. The AC HV is applied using HV Transformer Type (PGK HB-100 kV AC) to the high voltage electrode in the presence of a barrier immersed in Diala B insulating oil. The problem is formulated as a nonlinear optimization problem to minimize the error between experimental and estimated breakdown voltages… More >

  • Open AccessOpen Access

    ARTICLE

    Design and Analysis of 4-bit 1.2GS/s Low Power CMOS Clocked Flash ADC

    G. Prathiba1,*, M. Santhi2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1611-1626, 2022, DOI:10.32604/iasc.2022.018975
    Abstract High-quality, high-resolution flash ADCs are used in reliable VLSI (Very Large-Scale Integrated) circuits to minimize the power consumption. An analogue electrical signal is converted into a discrete-valued sequence by these ADCs. This paper proposes a four-bit 1.2GS/s low-power Clocked Flash ADC (C-FADC). A low-power Clocked-Improved Threshold Inverter Quantization (CITIQ) comparator, an Adaptive Bubble Free (ABF) logic circuit, and a compact Binary Encoder (BE) are all part of the presented structure. A clock network in the comparator circuit reduces skew and jitters, while an ABF logic circuit detects and corrects fourth order bubble faults detected from thermometer code, and then the… More >

  • Open AccessOpen Access

    ARTICLE

    Developing Secure Healthcare Video Consultations for Corona Virus (COVID-19) Pandemic

    Mohammed A. AlZain1,*, Jehad F. Al-Amri1, Ahmed I. Sallam2, Emad Sami Jaha3, Sultan S. Alshamrani1, Hala S. El-Sayed4, Osama S. Faragallah1
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1627-1640, 2022, DOI:10.32604/iasc.2022.020137
    Abstract Many health networks became increasingly interactive in implementing a consulting approach to telemedicine before the COVID-19 pandemic. To mitigate patient trafficking and reduce the virus exposure in health centers, several GPs, physicians and people in the video were consulted during the pandemic at the start. Video and smartphone consultations will allow well-insulated and high-risk medical practitioners to maintain their patient care security. Video appointments include diabetes, obesity, hypertension, stroke, mental health, chemotherapy and chronic pain. Many urgent diseases, including an emergency triage for the eye, may also be used for online consultations and triages. The COVID-19 pandemic shows that healthcare… More >

  • Open AccessOpen Access

    ARTICLE

    An Energy Aware Algorithm for Edge Task Offloading

    Ao Xiong1, Meng Chen1,*, Shaoyong Guo1, Yongjie Li2, Yujing Zhao2, Qinghai Ou3, Chuan Liu4, Siwen Xu5, Xiangang Liu6
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1641-1654, 2022, DOI:10.32604/iasc.2022.018881
    Abstract To solve the problem of energy consumption optimization of edge servers in the process of edge task unloading, we propose a task unloading algorithm based on reinforcement learning in this paper. The algorithm observes and analyzes the current environment state, selects the deployment location of edge tasks according to current states, and realizes the edge task unloading oriented to energy consumption optimization. To achieve the above goals, we first construct a network energy consumption model including servers’ energy consumption and link transmission energy consumption, which improves the accuracy of network energy consumption evaluation. Because of the complexity and variability of… More >

  • Open AccessOpen Access

    ARTICLE

    Early Detection of Alzheimer’s Disease Using Graph Signal Processing and Deep Learning

    Himanshu Padole*, S. D. Joshi, Tapan K. Gandhi
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1655-1669, 2022, DOI:10.32604/iasc.2022.021310
    (This article belongs to this Special Issue: Intelligence 4.0: Concepts and Advances in Computational Intelligence)
    Abstract Many methods have been proposed in the literature for diagnosis of Alzheimer's disease (AD) in the early stages, among which the graph-based methods have been more popular, because of their capability to utilize the relational information among different brain regions. Here, we design a novel graph signal processing based integrated AD detection model using multimodal deep learning that simultaneously utilizes both the static and the dynamic brain connectivity based features extracted from resting-state fMRI (rs-fMRI) data to detect AD in the early stages. First, our earlier proposed state-space model (SSM) based graph connectivity dynamics characterization method is used to design… More >

  • Open AccessOpen Access

    ARTICLE

    Fusion-Based Supply Chain Collaboration Using Machine Learning Techniques

    Naeem Ali1, Taher M. Ghazal2,3, Alia Ahmed1, Sagheer Abbas4, M. A. Khan5, Haitham M. Alzoubi6, Umar Farooq7, Munir Ahmad4, Muhammad Adnan Khan8,*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1671-1687, 2022, DOI:10.32604/iasc.2022.019892
    Abstract Supply Chain Collaboration is the network of various entities that work cohesively to make up the entire process. The supply chain organizations’ success is dependent on integration, teamwork, and the communication of information. Every day, supply chain and business players work in a dynamic setting. They must balance competing goals such as process robustness, risk reduction, vulnerability reduction, real financial risks, and resilience against just-in-time and cost-efficiency. Decision-making based on shared information in Supply Chain Collaboration constitutes the recital and competitiveness of the collective process. Supply Chain Collaboration has prompted companies to implement the perfect data analytics functions (e.g., data… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Software Success Through Structural Equation Modeling

    Muhammad Hamid1,*, Furkh Zeshan2, Adnan Ahmad2, Saadia Malik3, Muhammad Saleem4, Nadia Tabassum5, Muhammad Qasim1
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1689-1701, 2022, DOI:10.32604/iasc.2022.020898
    Abstract Determining factors influencing the success of software projects has been the emphasis of extensive research for more than 40 years. However, the majority of research in this domain has focused on developed countries, with little attention paid to underdeveloped and developing countries. The primary objective of this article was to assess the effect of critical elements on the success of software projects in underdeveloped countries (like Pakistan), because enterprise environmental factors and staff working habits, as well as their experience and expertise level, all have an effect on a project's success. For this purpose, data were collected from 339 senior… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Anomaly Detection in Surveillance Videos with Multiple Probabilistic Models Inference

    Zhen Xu1, Xiaoqian Zeng1, Genlin Ji1,*, Bo Sheng2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1703-1717, 2022, DOI:10.32604/iasc.2022.016919
    Abstract Anomaly detection in surveillance videos is an extremely challenging task due to the ambiguous definitions for abnormality. In a complex surveillance scenario, the kinds of abnormal events are numerous and might co-exist, including such as appearance and motion anomaly of objects, long-term abnormal activities, etc. Traditional video anomaly detection methods cannot detect all these kinds of abnormal events. Hence, we utilize multiple probabilistic models inference to detect as many different kinds of abnormal events as possible. To depict realistic events in a scene, the parameters of our methods are tailored to the characteristics of video sequences of practical surveillance scenarios.… More >

  • Open AccessOpen Access

    ARTICLE

    The Role of Emotions Intensity in Helpfulness of Online Physician Reviews

    Adnan Muhammad Shah, KangYoon Lee*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1719-1735, 2022, DOI:10.32604/iasc.2022.019666
    Abstract Online physician reviews (OPRs) critically influence the patients’ consultation decisions on physician rating websites. The increasing number of OPRs contributes to the challenge of information overload. The worth of development needs to be explored further. Based on the OPRs collected from RateMDs and Healthgrades, and Plutchik’s wheel on human emotions framework, the purpose of this study was to examine the impact of emotional intensity (positive and negative) incorporated in OPRs on review helpfulness (RH). The proposed model was empirically tested using data from two physician rating websites and applying a mixed-methods approach (text mining and econometrics). The results suggested that… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Scalability of Image Retrieval Using Visual Fusion of Feature Descriptors

    S. Balammal@Geetha*, R. Muthukkumar, V. Seenivasagam
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1737-1752, 2022, DOI:10.32604/iasc.2022.018822
    Abstract Content-Based Image Retrieval (CBIR) is an approach of retrieving similar images from a large image database. Recently CBIR poses new challenges in semantic categorization of the images. Different feature extraction technique have been proposed to overcome the semantic breach problems, however these methods suffer from several shortcomings. This paper contributes an image retrieval system to extract the local features based on the fusion of scale-invariant feature transform (SIFT) and KAZE. The strength of local feature descriptor SIFT complements global feature descriptor KAZE. SIFT concentrates on the complete region of an image using high fine points of features and KAZE ponders… More >

  • Open AccessOpen Access

    ARTICLE

    A Grey Wolf Optimized 15-Level Inverter Design with Confined Switching Components

    S. Caroline1,*, M. Marsaline Beno2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1753-1769, 2022, DOI:10.32604/iasc.2022.020440
    Abstract Multilevel inverters are a new class of dc-ac converters designed for high-power medium voltage and power applications as they work at high switching frequencies and in renewable applications by avoiding stresses like dv/dt and has low harmonic distortion in their output voltage. In variable speed drives and power generation systems, the use of multilevel inverters is obligatory. To estimate the switching positions in inverter configuration with low harmonic distortion value, a fast sequential optimization algorithm has been established. For harmonic reduction in multilevel inverter design, a hybrid optimization technique combining Firefly and the Genetic algorithm was used. In several real-time… More >

  • Open AccessOpen Access

    ARTICLE

    MRI Image Segmentation of Nasopharyngeal Carcinoma Using Multi-Scale Cascaded Fully Convolutional Network

    Yanfen Guo1,2, Zhe Cui1, Xiaojie Li2,*, Jing Peng1,2, Jinrong Hu2, Zhipeng Yang3, Tao Wu2, Imran Mumtaz4
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1771-1782, 2022, DOI:10.32604/iasc.2022.019785
    Abstract Nasopharyngeal carcinoma (NPC) is one of the most common malignant tumors of the head and neck, and its incidence is the highest all around the world. Intensive radiotherapy using computer-aided diagnosis is the best technique for the treatment of NPC. The key step of radiotherapy is the delineation of the target areas and organs at risk, that is, tumor images segmentation. We proposed the segmentation method of NPC image based on multi-scale cascaded fully convolutional network. It used cascaded network and multi-scale feature for a coarse-to-fine segmentation to improve the segmentation effect. In coarse segmentation, image blocks and data augmentation… More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Routing and Lifetime Performance for Industrial Wireless Sensor Networks

    J. V. Anchitaalagammai1,*, K. Muthumayil2, D. Kamalraj Subramaniam3, Rajesh Verma4, P. Muralikrishnan5, G. Visalaxi6
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1783-1792, 2022, DOI:10.32604/iasc.2022.020967
    Abstract Industrial Wireless Sensor Networks (IWSNs), especially energy resources, are scarce. Since sensor nodes are usually very dense, and the data sampled by the sensor nodes have high redundancy, data aggregation saves energy, reduces the number of transmissions, and eliminates redundancy. Many applications can be used in IIWSNs, and a new technique is introduced to detect multiple sensors embedded in different sensor nodes. Packets created by different applications have different properties. Sensors are resource-constrained devices because it is necessary to find effective reaction analysis methods and transfer sensed data to base stations. Since sensors are resource-constrained devices, efficient topologies require data… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Key Management System Based Lightweight Devices in IoT

    T. Chindrella Priyadharshini1,*, D. Mohana Geetha2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1793-1808, 2022, DOI:10.32604/iasc.2022.020422
    Abstract The Internet of Things (IoT) has changed our lives significantly. Although IoT provides new opportunities, security remains a key concern while providing various services. Existing research methodologies try to solve the security and time-consuming problem also exists. To solve those problems, this paper proposed a Hashed Advanced Encryption Standard (HAES) algorithm based efficient key management system for internet-based lightweight devices in IoT networks. The proposed method is mainly divided into two phases namely Data Owner (DO) and Data User (DU) phase. The DO phase consists of two processes namely authentication and secure data uploading. In authentication, the registration process consists… More >

  • Open AccessOpen Access

    ARTICLE

    TAR-AFT: A Framework to Secure Shared Cloud Data with Group Management

    K. Ambika1,*, M. Balasingh Moses2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1809-1823, 2022, DOI:10.32604/iasc.2022.018580
    Abstract In addition to replacing desktop-based methods, cloud computing is playing a significant role in several areas of data management. The health care industry, where so much data is needed to be handled correctly, is another arena in which artificial intelligence has a big role to play. The upshot of this innovation led to the creation of multiple healthcare clouds. The challenge of data privacy and confidentiality is the same for different clouds. Many existing works has provided security framework to ensure the security of data in clouds but still the drawback on revocation, resisting collusion attack along with privacy of… More >

  • Open AccessOpen Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598
    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile traffic, perform account frauds, track… More >

  • Open AccessOpen Access

    ARTICLE

    Application of XR-Based Virtuality-Reality Coexisting Course

    Chun Xu1,*, Linyue Zhang2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1843-1855, 2022, DOI:10.32604/iasc.2022.020365
    Abstract Significant advances in new emerging technologies such as the 5th generation mobile networks (5G), Expand the reality (XR), and Artificial Intelligence (AI) enable extensive three-dimensional (3D) experience and interaction. The vivid 3D virtual dynamic displays and immersive experiences will become new normal in near future. The XR-based virtuality-reality co-existing classroom goes beyond the limitations of Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR). Such technology also enables integration of the digital and physical worlds and further creates a smart classroom featuring co-existed virtuality and reality. In this paper, we show an application of the XR enabling human-environment interaction.… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling the Spread of COVID-19 by Leveraging Machine and Deep Learning Models

    Muhammad Adnan1, Maryam Altalhi2, Ala Abdulsalam Alarood3, M.Irfan Uddin1,*
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1857-1872, 2022, DOI:10.32604/iasc.2022.020606
    Abstract Corona Virus disease 2019 (COVID-19) has caused a worldwide pandemic of cough, fever, headache, body aches, and respiratory ailments. COVID- 19 has now become a severe disease and one of the leading causes of death globally. Modeling and prediction of COVID-19 have become inevitable as it has affected people worldwide. With the availability of a large-scale universal COVID-19 dataset, machine learning (ML) techniques and algorithms occur to be the best choice for the analysis, modeling, and forecasting of this disease. In this research study, we used one deep learning algorithm called Artificial Neural Network (ANN) and several ML algorithms such… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Online Model for Predicting Diabetes Mellitus

    C. Mallika1,*, S. Selvamuthukumaran2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1873-1885, 2022, DOI:10.32604/iasc.2022.020543
    Abstract Modern healthcare systems have become smart by synergizing the potentials of wireless sensors, the medical Internet of things, and big data science to provide better patient care while decreasing medical expenses. Large healthcare organizations generate and accumulate an incredible volume of data continuously. The already daunting volume of medical information has a massive amount of diagnostic features and logged details of patients for certain diseases such as diabetes. Diabetes mellitus has emerged as along-haul fatal disease across the globe and particularly in developing countries. Exact and early diagnosis of diabetes from big medical data is vital for the deterrence of… More >

  • Open AccessOpen Access

    ARTICLE

    Lyapunov-Redesign and Sliding Mode Controller for Microprocessor Based Transfemoral Prosthesis

    Ali Murtaza1, Muhammad Usman Qadir1, Muhammad Awais Khan1, Izhar ul Haq1,*, Kamran Shah1, Nizar Akhtar2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1887-1899, 2022, DOI:10.32604/iasc.2022.020006
    Abstract Transfemoral prostheses have evolved from mechanical devices to microprocessor-based, electronically controlled knee joints, allowing amputees to regain control of their limbs. For improved amputee experience at varying ambulation rates, these devices provide controlled damping throughout the swing and stance phases of the gait cycle. Commercially available microprocessor-based prosthetic knee (MPK) joints use linear controllers, heuristic-based methods, and finite state machine based algorithms to track the refence gait cycle. However, since the amputee experiences a variety of non-linearities during ambulation, such as uneven terrains, walking backwards and climbing stairs, therefore, traditional controllers produces error, abnormal movements, unstable control system and require… More >

  • Open AccessOpen Access

    ARTICLE

    Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication

    Mustafa Kara1,*, Muhammed Ali Aydın1,2, Hasan Hüseyin Balık1
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1901-1918, 2022, DOI:10.32604/iasc.2022.021309
    Abstract Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP based communications. However, blockchain technology… More >

  • Open AccessOpen Access

    ARTICLE

    Detection and Avoidance of Clone Attack in IoT Based Smart Health Application

    S. Vaishnavi1,*, T. Sethukarasi2
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1919-1937, 2022, DOI:10.32604/iasc.2022.021006
    Abstract The deployment of wireless sensors in the hostile environment makes them susceptible to malicious attacks. One of the most harmful attacks is the clone attack in which a malicious node illegitimately claims the identity of a genuine node in the network and eventually tries to capture the entire network. This attack is also termed as node replication attack. The mobile nature of wireless sensor network (WSN) in smart health environment increases the vulnerability of node replication attack. Since the data involved in smart health system are highly sensitive data, preserving the system from the attack by malicious nodes is a… More >

  • Open AccessOpen Access

    ARTICLE

    Low Cost Autonomous Learning and Advising Smart Home Automation System

    Daniel Chioran*, Honoriu Valean
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1939-1952, 2022, DOI:10.32604/iasc.2022.020649
    Abstract In today’s world, more than ever before, we are fascinated and drawn towards smart autonomous devices that make our lives safer and more comfortable. Devices that aid in reducing our energy consumption are also highly appreciated but often quite expensive to buy. This context is favorable for developing an autonomous smart home automation system (SHAS) with energy-saving potential and low price, making it widely accessible. This paper presents the design and prototype implementation of such a low-cost micro-controller based autonomous SHAS that learns the resident’s work schedule and integrates a wide array of sensors and actuators to automatically control the… More >

  • Open AccessOpen Access

    ARTICLE

    GDPR Compliance IoT Authentication Model for Smart Home Environment

    Hisham Raad Jafer Merzeh1,*, Mustafa Kara2, Muhammed Ali Aydın3, Hasan Hüseyin Balık1
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1953-1970, 2022, DOI:10.32604/iasc.2022.021297
    Abstract The Internet of things (IoT) became quickly one of the most popular and most discussed topics in research. Studies paid attention to the Internet stuff, primarily to new products that aim to achieve greater efficiency and simplicity in life. IoT may cover several fields of the smart environment. Because of the data exposure that occurs when data is transferred via various channels, data protection issues have become a major problem as the company continues to expand. When user privacy and property are taken into consideration, the situation may become much worse. As a result, the authentication process for communicating entities… More >

  • Open AccessOpen Access

    ARTICLE

    Saving the Bandwidth of IPv6 Networks Using the Fields of the Packet Header

    Mosleh M. Abualhaj*, Abdelrahman H. Hussein, Qasem M. Kharma, Qusai Y. Shambour, Sumaya N. Al-Khatib
    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1971-1980, 2022, DOI:10.32604/iasc.2022.021458
    Abstract IPv6 protocol is the future of IP networks due to its large IP address capacity. One of the key consequences of this large capacity is that the IP protocol header has enlarged from 20-byte in IPv4 to 40-byte in IPv6. This will consume a considerable share of the bandwidth (BW) for VoIP applications, which produce small packets in tens of bytes only. To handle this issue, we have introduced an efficient technique to use the superfluous fields in the VoIP packet header, including the IPv6 header, to hold the voice data of the packet. This introduced technique is called the… More >

Per Page:

Share Link