Home / Journals / IASC / Vol.32, No.2, 2022
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Emotion Recognition with Short-Period Physiological Signals Using Bimodal Sparse Autoencoders

    Yun-Kyu Lee1, Dong-Sung Pae2, Dae-Ki Hong3, Myo-Taeg Lim1, Tae-Koo Kang4,*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 657-673, 2022, DOI:10.32604/iasc.2022.020849
    Abstract With the advancement of human-computer interaction and artificial intelligence, emotion recognition has received significant research attention. The most commonly used technique for emotion recognition is EEG, which is directly associated with the central nervous system and contains strong emotional features. However, there are some disadvantages to using EEG signals. They require high dimensionality, diverse and complex processing procedures which make real-time computation difficult. In addition, there are problems in data acquisition and interpretation due to body movement or reduced concentration of the experimenter. In this paper, we used photoplethysmography (PPG) and electromyography (EMG) to record signals. Firstly, we segmented the… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Quality-of-Service Allocation Scheme for Improving Video Quality over a Wireless Network

    Raed Alsaqour1, Ammar Hadi2, Maha Abdelhaq3,*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 675-692, 2022, DOI:10.32604/iasc.2022.020482
    Abstract The need to ensure the quality of video streaming transmitted over wireless networks is growing every day. Video streaming is typically used for applications that are sensitive to poor quality of service (QoS) due to insufficient bandwidth, packet loss, or delay. These challenges hurt video streaming quality since they affect throughput and packet delivery of the transmitted video. To achieve better video streaming quality, throughput must be high, with minimal packet delay and loss ratios. A current study, however, found that the adoption of the adaptive multiple TCP connections (AM-TCP), as a transport layer protocol, improves the quality of video… More >

  • Open AccessOpen Access

    ARTICLE

    Abnormality Identification in Video Surveillance System using DCT

    A. Balasundaram1,*, Golda Dilip2, M. Manickam3, Arun Kumar Sivaraman4, K. Gurunathan5, R. Dhanalakshmi6, S. Ashokkumar7
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 693-704, 2022, DOI:10.32604/iasc.2022.022241
    (This article belongs to this Special Issue: Deep Neural Network for Intelligent Systems)
    Abstract In the present world, video surveillance methods play a vital role in observing the activities that take place across secured and unsecured environment. The main aim with which a surveillance system is deployed is to spot abnormalities in specific areas like airport, military, forests and other remote areas, etc. A new block-based strategy is represented in this paper. This strategy is used to identify unusual circumstances by examining the pixel-wise frame movement instead of the standard object-based approaches. The density and also the speed of the movement is extorted by utilizing optical flow. The proposed strategy recognizes the unusual movement… More >

  • Open AccessOpen Access

    ARTICLE

    Classification of Parkinson Disease Based on Patient’s Voice Signal Using Machine Learning

    Imran Ahmed1, Sultan Aljahdali2, Muhammad Shakeel Khan1, Sanaa Kaddoura3,*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 705-722, 2022, DOI:10.32604/iasc.2022.022037
    Abstract Parkinson’s disease (PD) is a nervous system disorder first described as a neurological condition in 1817. It is one of the more prevalent diseases in the elderly, and Alzheimer’s is the second most common neurodegenerative illness. It impacts the patient’s movement. Symptoms start gradually with tremors, stiffness in movement, and speech and voice disorders. Researches proved that 89% of patients with Parkinson’s has speech disorder including uncertain articulation, hoarse and breathy voice and monotone pitch. The cause behind this voice change is the reduction of dopamine due to damage of neurons in the substantia nigra responsible for dopamine production. In… More >

  • Open AccessOpen Access

    ARTICLE

    Combining CNN and Grad-Cam for COVID-19 Disease Prediction and Visual Explanation

    Hicham Moujahid1, Bouchaib Cherradi1,2,*, Mohammed Al-Sarem3, Lhoussain Bahatti1, Abou Bakr Assedik Mohammed Yahya Eljialy4, Abdullah Alsaeedi3, Faisal Saeed3
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 723-745, 2022, DOI:10.32604/iasc.2022.022179
    (This article belongs to this Special Issue: New Trends in Artificial Intelligence and Deep learning for Instrumentation, Sensors, and Robotics)
    Abstract With daily increasing of suspected COVID-19 cases, the likelihood of the virus mutation increases also causing the appearance of virulent variants having a high level of replication. Automatic diagnosis methods of COVID-19 disease are very important in the medical community. An automatic diagnosis could be performed using machine and deep learning techniques to analyze and classify different lung X-ray images. Many research studies proposed automatic methods for detecting and predicting COVID-19 patients based on their clinical data. In the leak of valid X-ray images for patients with COVID-19 datasets, several researchers proposed to use augmentation techniques to bypass this limitation.… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Genetic Algorithm for Automated Convolutional Neural Network Design

    Rahul Dubey*, Jitendra Agrawal
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 747-763, 2022, DOI:10.32604/iasc.2022.020975
    Abstract Extracting the features from an image is a cumbersome task. Initially, this task was performed by domain experts through a process known as handcrafted feature design. A deep embedding technique known as convolutional neural networks (CNNs) later solved this problem by introducing the feature learning concept, through which the CNN is directly provided with images. This CNN then learns the features of the image, which are subsequently given as input to the further layers for an intended task like classification. CNNs have demonstrated astonishing performance in several practicable applications in the last few years. Nevertheless, the pursuance of CNNs primarily… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Encrypted Classified Electronic Healthcare Data for Public Cloud Environment

    Kirupa Shankar Komathi Maathavan1,*, Santhi Venkatraman2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 765-779, 2022, DOI:10.32604/iasc.2022.022276
    Abstract The major operation of the blood bank supply chain is to estimate the demand, perform inventory management and distribute adequate blood for the needs. The proliferation of big data in the blood bank supply chain and data management needs an intelligent, automated system to classify the essential data so that the requests can be handled easily with less human intervention. Big data in the blood bank domain refers to the collection, organization, and analysis of large volumes of data to obtain useful information. For this purpose, in this research work we have employed machine learning techniques to find a better… More >

  • Open AccessOpen Access

    ARTICLE

    Realization of Deep Learning Based Embedded Soft Sensor for Bioprocess Application

    V. V. S. Vijaya Krishna1,*, N. Pappa1, S. P. Joy Vasantharani2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 781-794, 2022, DOI:10.32604/iasc.2022.022181
    Abstract Industries use soft sensors for estimating output parameters that are difficult to measure on-line. These parameters can be determined by laboratory analysis which is an offline task. Now a days designing Soft sensors for complex nonlinear systems using deep learning training techniques has become popular, because of accuracy and robustness. There is a need to find pertinent hardware for realizing soft sensors to make it portable and can be used in the place of general purpose PC. This paper aims to propose a new strategy for realizing a soft sensor using deep neural networks (DNN) on appropriate hardware which can… More >

  • Open AccessOpen Access

    ARTICLE

    Robustness Convergence for Iterative Learning Tracking Control Applied to Repetitfs Systems

    Ben Attia Selma*, Ouerfelli Houssem Eddine, Salhi Salah
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 795-810, 2022, DOI:10.32604/iasc.2022.020435
    Abstract This study addressed sufficient conditions for the robust monotonic convergence of repetitive discrete-time linear parameter varying systems, with the parameter variation rate bound. The learning law under consideration is an anticipatory iterative learning control. Of particular interest in this study is that the iterations can eliminate the influence of disturbances. Based on a simple quadratic performance function, a sufficient condition for the proposed learning algorithm is presented in terms of linear matrix inequality (LMI) by imposing a polytopic structure on the Lyapunov matrix. The set of LMIs to be determined considers the bounds on the rate of variation of the… More >

  • Open AccessOpen Access

    ARTICLE

    Cellular Automata Based Energy Efficient Approach for Improving Security in IOT

    P. Hemalatha1,*, K. Dhanalakshmi2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 811-825, 2022, DOI:10.32604/iasc.2022.020973
    Abstract Wireless sensor networks (WSNs) develop IoT (Internet of Things) that carry out an important part and include low-cost intelligent devices to gather information. However, these modern accessories have limitations concerning calculation, time taken for processing, storage capacity, and vitality sources. In addition to such restrictions, the foremost primary challenge for sensor networks is achieving reliable data transfer with the secured transmission in a hostile ambience containing vulnerable nodes. The proposed work initially analyses the relation between deployment configuration, lifetime of the deployed network, and transmission delay with this motivation. Besides, it also introduces a new cellular automata-based scheme for improving… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning Approach for Improvement in Kitsune NID

    Abdullah Alabdulatif1, Syed Sajjad Hussain Rizvi2,*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 827-840, 2022, DOI:10.32604/iasc.2022.021879
    (This article belongs to this Special Issue: Humans and Cyber Security Behaviour)
    Abstract Network intrusion detection is the pressing need of every communication network. Many network intrusion detection systems (NIDS) have been proposed in the literature to cater to this need. In recent literature, plug-and-play NIDS, Kitsune, was proposed in 2018 and greatly appreciated in the literature. The Kitsune datasets were divided into 70% training set and 30% testing set for machine learning algorithms. Our previous study referred that the variants of the Tree algorithms such as Simple Tree, Medium Tree, Coarse Tree, RUS Boosted, and Bagged Tree have reported similar effectiveness but with slight variation inefficiency. To further extend this investigation, we… More >

  • Open AccessOpen Access

    ARTICLE

    Medical Image Transmission Using Novel Crypto-Compression Scheme

    Arwa Mashat1, Surbhi Bhatia2,*, Ankit Kumar3, Pankaj Dadheech3, Aliaa Alabdali4
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 841-857, 2022, DOI:10.32604/iasc.2022.021636
    (This article belongs to this Special Issue: New Trends in Artificial Intelligence and Deep learning for Instrumentation, Sensors, and Robotics)
    Abstract The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of… More >

  • Open AccessOpen Access

    ARTICLE

    Sensor Data Based Anomaly Detection in Autonomous Vehicles using Modified Convolutional Neural Network

    Sivaramakrishnan Rajendar, Vishnu Kumar Kaliappan*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 859-875, 2022, DOI:10.32604/iasc.2022.020936
    Abstract Automated Vehicles (AVs) reform the automotive industry by enabling real-time and efficient data exchange between the vehicles. While connectivity and automation of the vehicles deliver a slew of benefits, they may also introduce new safety, security, and privacy risks. Further, AVs rely entirely on the sensor data and the data from other vehicles too. On the other hand, the sensor data is susceptible to anomalies caused by cyber-attacks, errors, and faults, resulting in accidents and fatalities. Hence, it is essential to create techniques for detecting anomalies and identifying their sources before the wide adoption of AVs. This paper proposes an… More >

  • Open AccessOpen Access

    ARTICLE

    Quality Prediction of Wearable Apps in the Google Play Store

    Shifa Siddiqui1, Muhammad Shahzad Faisal1, Shahzada Khurram2, Azeem Irshad3, Mohammed Baz4, Habib Hamam5, Naeem Iqbal6, Muhammad Shafiq7,*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 877-892, 2022, DOI:10.32604/iasc.2022.022266
    Abstract Play Store reviews play an important role in demonstrating that decisions are made from the user’s perspective, and contain a wealth of knowledge that can be used to understand quality issues and help developers build higher-quality mobile applications. Even for very important information, it can ensure the authenticity of user-generated content. In Play Store, wearable applications were recently launched, and are always open and easy to use, and are gradually being welcomed by users. Driven by popularity and self-interest, profit-incentive developers are developing low-quality applications and hiring robots to exaggerate ratings, reviews, or install counts. This is how spam in… More >

  • Open AccessOpen Access

    ARTICLE

    Forecasting of Trend-Cycle Time Series Using Hybrid Model Linear Regression

    N. Ashwini1,*, V. Nagaveni2, Manoj Kumar Singh3
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 893-908, 2022, DOI:10.32604/iasc.2022.022231
    Abstract Forecasting for a time series signal carrying single pattern characteristics can be done properly using function mapping-based principle by a well-designed artificial neural network model. But the performances degraded very much when time series carried the mixture of different patterns characteristics. The level of difficulty increases further when there is a need to predict far time samples. Among several possible mixtures of patterns, the trend-cycle time series is having its importance because of its occurrence in many real-life applications like in electric power generation, fuel consumption and automobile sales. Over the mixed characteristics of patterns, a neural model, suffered heavily… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Neural Networks for Gun Detection in Public Surveillance

    Erssa Arif1,*, Syed Khuram Shahzad2, Rehman Mustafa1, Muhammad Arfan Jaffar3, Muhammad Waseem Iqbal4
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 909-922, 2022, DOI:10.32604/iasc.2022.021061
    Abstract The conventional surveillance and control system of Closed-Circuit Television (CCTV) cameras require human resource supervision. Almost all the criminal activities take place using weapons mostly handheld gun, revolver, or pistol. Automatic gun detection is a vital requirement now-a-days. The use of real-time object detection system for the improvement of surveillance is a promising application of Convolutional Neural Networks (CNN). We are concerned about the real-time detection of weapons for the surveillance cameras, so we focused on the implementation and comparison of faster approaches such as Region (R-CNN) and Region Fully Convolutional Networks (R-FCN) with feature extractor Visual Geometry Group (VGG)… More >

  • Open AccessOpen Access

    ARTICLE

    Dynamic Sliding Mode Backstepping Control for Vertical Magnetic Bearing System

    Wei-Lung Mao1,*, Yu-Ying Chiu1, Chao-Ting Chu2, Bing-Hong Lin1, Jian-Jie Hung3
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 923-936, 2022, DOI:10.32604/iasc.2022.019555
    Abstract Electromagnets are commonly used as support for machine components and parts in magnetic bearing systems (MBSs). Compared with conventional mechanical bearings, the magnetic bearings have less noise, friction, and vibration, but the magnetic force has a highly nonlinear relationship with the control current and the air gap. This research presents a dynamic sliding mode backstepping control (DSMBC) designed to track the height position of modeless vertical MBS. Because MBS is nonlinear with model uncertainty, the design of estimator should be able to solve the lumped uncertainty. The proposed DSMBC controller can not only stabilize the nonlinear system under mismatched uncertainties,… More >

  • Open AccessOpen Access

    ARTICLE

    Mathematical Design Enhancing Medical Images Formulated by a Fractal Flame Operator

    Rabha W. Ibrahim1,*, Husam Yahya2, Arkan J. Mohammed3, Nadia M. G. Al-Saidi4, Dumitru Baleanu5,6,7
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 937-950, 2022, DOI:10.32604/iasc.2022.021954
    (This article belongs to this Special Issue: New Trends in Artificial Intelligence and Deep learning for Instrumentation, Sensors, and Robotics)
    Abstract The interest in using fractal theory and its applications has grown in the field of image processing. Image enhancement is one of the feature processing tools, which aims to improve the details of an image. The enhancement of digital pictures is a challenging task due to the unforeseeable variation in the quality of the captured images. In this study, we present a mathematical model using a local conformable differential operator (LCDO). The proposed model is formulated by the theory of cantor fractal to generalize the definition of LCDO. The main advantage of utilizing LCDO for image enhancement is its capability… More >

  • Open AccessOpen Access

    ARTICLE

    Domain Name Service Mechanism Based on Master-Slave Chain

    Siyuan Liu1, Shaoyong Guo1,*, Ziwei Hu2, Xin Xu3, Wei Bai2, Ningzhe Xing4, Xuesong Qiu1, Siwen Xu5
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 951-962, 2022, DOI:10.32604/iasc.2022.021202
    Abstract Although the current Domain Name System (DNS) has been able to satisfy the use of network services, there are still many challenges in the future development of the Internet. The centralized management of traditional domain name management systems has many risks, and cannot defend against Distributed Denial of Service (DDoS) attacks and single points of failure. As a decentralized tool, blockchain provides innovative ideas for the improvement of domain name management systems. Starting from the existing network resolution system and combining the application of cross-chain communication in DNS, this paper proposes a domain name resolution service architecture model based on… More >

  • Open AccessOpen Access

    ARTICLE

    Secured Route Selection Using E-ACO in Underwater Wireless Sensor Networks

    S. Premkumar Deepak*, M. B. Mukeshkrishnan
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 963-978, 2022, DOI:10.32604/iasc.2022.022126
    (This article belongs to this Special Issue: AI powered Blockchain-Enabled privacy protected 5G Networks and Beyond)
    Abstract Underwater wireless sensor networks (UWSNs) are promising, emerging technologies for the applications in oceanic research. UWSN contains high number of sensor nodes and autonomous underwater vehicles that are deployed to perform the data transmission in the sea. In UWSN networks, the sensors are placed in the buoyant which are highly vulnerable to selfish behavioural attack. In this paper, the major challenges in finding secure and optimal route navigation in UWSN are identified and in order to address them, Entropy based ACO algorithm (E-ACO) is proposed for secure route selection. Moreover, the Selfish Node Recovery (SNR) using the Grasshopper Optimisation Algorithm… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel COVID-19 Prediction Model with Optimal Control Rates

    Ashraf Ahmed1, Yousef AbuHour2,*, Ammar El-Hassan1
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 979-990, 2022, DOI:10.32604/iasc.2022.020726
    (This article belongs to this Special Issue: Recent Trends in Computational Methods for Differential Equations)
    Abstract The Corona (COVID-19) epidemic has triggered interest in many fields of technology, medicine, science, and politics. Most of the mathematical research in this area focused on analyzing the dynamics of the spread of the virus. In this article, after a review of some current methodologies, a non-linear system of differential equations is developed to model the spread of COVID-19. In order to consider a wide spectrum of scenarios, we propose a susceptible-exposed-infected-quarantined-recovered (SEIQRS)-model which was analyzed to determine threshold conditions for its stability, and the number of infected cases that is an infected person will transmit on a virus to,… More >

  • Open AccessOpen Access

    ARTICLE

    Vision-Aided Path Planning Using Low-Cost Gene Encoding for a Mobile Robot

    Wei-Cheng Wang, Chow-Yong Ng, Rongshun Chen*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 991-1006, 2022, DOI:10.32604/iasc.2022.022067
    Abstract Path planning is intrinsically regarded as a multi-objective optimization problem (MOOP) that simultaneously optimizes the shortest path and the least collision-free distance to obstacles. This work develops a novel optimized approach using the genetic algorithm (GA) to drive the multi-objective evolutionary algorithm (MOEA) for the path planning of a mobile robot in a given finite environment. To represent the positions of a mobile robot as integer-type genes in a chromosome of the GA, a grid-based method is also introduced to relax the complex environment to a simple grid-based map. The system architecture is composed of a mobile robot, embedded with… More >

  • Open AccessOpen Access

    ARTICLE

    COVID-19 Pandemic Prediction and Forecasting Using Machine Learning Classifiers

    Jabeen Sultana1,*, Anjani Kumar Singha2, Shams Tabrez Siddiqui3, Guthikonda Nagalaxmi4, Anil Kumar Sriram5, Nitish Pathak6
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1007-1024, 2022, DOI:10.32604/iasc.2022.021507
    Abstract COVID-19 is a novel virus that spreads in multiple chains from one person to the next. When a person is infected with this virus, they experience respiratory problems as well as rise in body temperature. Heavy breathlessness is the most severe sign of this COVID-19, which can lead to serious illness in some people. However, not everyone who has been infected with this virus will experience the same symptoms. Some people develop cold and cough, while others suffer from severe headaches and fatigue. This virus freezes the entire world as each country is fighting against COVID-19 and endures vaccination doses.… More >

  • Open AccessOpen Access

    ARTICLE

    An Analysis of Perceptual Confusions on Logatome Utterances for Similar Language

    Nur-Hana Samsudin1,*, Mark Lee2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1025-1039, 2022, DOI:10.32604/iasc.2022.022180
    Abstract In a polyglot speech synthesis, it is possible to use one language resource for another language. However, if the adaptation is not implemented carefully, the foreignness of the sound will be too noticeable for the listeners. This paper presents the analysis of respondents’ acceptance of a series of listening tests. The research goal was to find out in the absence of phonemes of a particular language, would it be possible for the phonemes to be replaced with another language’s phonemes. This will be especially beneficial for under-resourced language either in the case for 1) the language has not yet well… More >

  • Open AccessOpen Access

    ARTICLE

    Deformation Expression of Soft Tissue Based on BP Neural Network

    Xiaorui Zhang1,2,*, Xun Sun1, Wei Sun2, Tong Xu1, Pengpai Wang1, Sunil Kumar Jha3
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1041-1053, 2022, DOI:10.32604/iasc.2022.016543
    Abstract This paper proposes a soft tissue grasping deformation model, where BP neural network optimized by the genetic algorithm is used to realize the real-time and accurate interaction of soft tissue grasping during virtual surgery. In the model, the soft tissue epidermis is divided into meshes, and the meshes generate displacements under the action of tension. The relationship between the tension and displacement of the mesh is determined by the proposed cylindrical spiral spring model. The optimized BP neural network is trained based on the sample data of the mesh point and vertical tension, so as to obtain the force and… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Hybrid MPPT Control Strategy for Isolated Solar PV Power System

    D. Sabaripandiyan1,*, H. Habeebullah Sait2, G. Aarthi3
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1055-1070, 2022, DOI:10.32604/iasc.2022.021950
    Abstract The main aspiration of this paper is to improve the efficiency of Solar Photovoltaic (SPV) power system with a new Hybrid controller for standalone/isolated Solar PV applications is proposed. This controller uses the merits of both Adapted Neuro-Fuzzy Inference System (ANFIS) and Perturbation & Observation (P&O) control techniques to concede rapid recovery at dynamic change of environment conditions such as solar irradiation and temperature. The ANFIS strategy itself has the merits over Fuzzy Logic and ANN methods. Conversely, P&O has its simplicity in implementation. Hence a case study for rapid recovery with the proposed controller and conventional P&O control strategy… More >

  • Open AccessOpen Access

    ARTICLE

    Analyzing the Big Data Security Through a Unified Decision-Making Approach

    Abdulaziz Attaallah1, Hassan Alsuhabi2, Sarita Shukla3, Rajeev Kumar3,*, Bineet Kumar Gupta3, Raees Ahmad Khan4
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1071-1088, 2022, DOI:10.32604/iasc.2022.022569
    Abstract The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits. Early disease detection, increased accessibility, and high diagnostic reach have all been made possible by digital healthcare. Despite this remarkable achievement, healthcare data protection has become a serious issue for all parties involved. According to data breach statistics, the healthcare data industry is one of the major threats to cyber criminals. In reality, healthcare data breaches have increased at an alarming rate in recent years.… More >

  • Open AccessOpen Access

    ARTICLE

    Breast Cancer Detection and Classification Using Deep CNN Techniques

    R. Rajakumari1,*, L. Kalaivani2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1089-1107, 2022, DOI:10.32604/iasc.2022.020178
    Abstract Breast cancer is a commonly diagnosed disease in women. Early detection, a personalized treatment approach, and better understanding are necessary for cancer patients to survive. In this work, a deep learning network and traditional convolution network were both employed with the Digital Database for Screening Mammography (DDSM) dataset. Breast cancer images were subjected to background removal followed by Wiener filtering and a contrast limited histogram equalization (CLAHE) filter for image restoration. Wavelet packet decomposition (WPD) using the Daubechies wavelet level 3 (db3) was employed to improve the smoothness of the images. For breast cancer recognition, these preprocessed images were first… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling of Anthrax Disease via Efficient Computing Techniques

    Ali Raza1,2, Dumitru Baleanu3,4, Muhammad Yousaf2, Naeem Akhter2, Syed Kashif Mahmood2, Muhammad Rafiq5,*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1109-1124, 2022, DOI:10.32604/iasc.2022.022643
    Abstract Computer methods have a significant role in the scientific literature. Nowadays, development in computational methods for solving highly complex and nonlinear systems is a hot issue in different disciplines like engineering, physics, biology, and many more. Anthrax is primarily a zoonotic disease in herbivores caused by a bacterium called Bacillus anthracis. Humans generally acquire the disease directly or indirectly from infected animals, or through occupational exposure to infected or contaminated animal products. The outbreak of human anthrax is reported in the Eastern Mediterranean regions like Pakistan, Iran, Iraq, Afghanistan, Morocco, and Sudan. Almost ninety-five percent chances are the transmission of… More >

  • Open AccessOpen Access

    ARTICLE

    Crow Search Algorithm with Improved Objective Function for Test Case Generation and Optimization

    Meena Sharma, Babita Pathik*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1125-1140, 2022, DOI:10.32604/iasc.2022.022335
    Abstract Test case generation and optimization is the foremost requirement of software evolution and test automation. In this paper, a bio-inspired Crow Search Algorithm (CSA) is suggested with an improved objective function to fulfill this requirement. CSA is a nature-inspired optimization method. The improved objective function combines branch distance and predicate distance to cover the critical path on the control flow graph. CSA is a search-based technique that uses heuristic information for automation testing, and CSA optimizers minimize test cases generated by satisfying the objective function. This paper focuses on generating test cases for all paths, including critical paths. The control… More >

  • Open AccessOpen Access

    ARTICLE

    MSM: A Method of Multi-Neighborhood Sampling Matching for Entity Alignment

    Donglei Lu1, Yundong Sun2, Qinrui Dai2, Xiaofang Li3,*, Dongjie Zhu4, Haiwen Du2, Yansong Wang4, Rongning Qu3, Ning Cao1, Gregory M. P. O’Hare5
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1141-1151, 2022, DOI:10.32604/iasc.2022.020218
    Abstract The heterogeneity of knowledge graphs brings great challenges to entity alignment. In particular, the attributes of network entities in the real world are complex and changeable. The key to solving this problem is to expand the neighborhoods in different ranges and extract the neighborhood information efficiently. Based on this idea, we propose Multi-neighborhood Sampling Matching Network (MSM), a new KG alignment network, aiming at the structural heterogeneity challenge. MSM constructs a multi-neighborhood network representation learning method to learn the KG structure embedding. It then adopts a unique sampling and cosine cross-matching method to solve different sizes of neighborhoods and distinct… More >

  • Open AccessOpen Access

    ARTICLE

    A Framework for Mask-Wearing Recognition in Complex Scenes for Different Face Sizes

    Hanan A. Hosni Mahmoud, Amal H. Alharbi, Norah S. Alghamdi*
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1153-1165, 2022, DOI:10.32604/iasc.2022.022359
    Abstract People are required to wear masks in many countries, now a days with the Covid-19 pandemic. Automated mask detection is very crucial to help identify people who do not wear masks. Other important applications is for surveillance issues to be able to detect concealed faces that might be a safety threat. However, automated mask wearing detection might be difficult in complex scenes such as hospitals and shopping malls where many people are at present. In this paper, we present analysis of several detection techniques and their performances. We are facing different face sizes and orientation, therefore, we propose one technique… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Analysis of Low Power Interference Cancellation Architecture for OFDM System

    N. Manikanda Devarajan1,*, S. Thenmozhi2, K. Jayaram3, R. Saravanakumar4
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1167-1178, 2022, DOI:10.32604/iasc.2022.021558
    Abstract Orthogonal Frequency Division Multiplexing (OFDM) is a wireless communication technology that is used for highly reliable and high data rate communication. In a multi-user OFDM system, the interference has occurred in the receiver side between the consecutive OFDM symbols. This interference reduces the performance of the OFDM system. To achieve good quality in received symbols the interference level should be minimized. The conventional cancellation system requires higher interference reduction time and power. These limitations of the conventional interference cancellation architectures for OFDM systems are overcome by proposing efficient and low power interference cancellation architecture. Hence, this paper proposes a novel… More >

  • Open AccessOpen Access

    ARTICLE

    Main Path Analysis to Filter Unbiased Literature

    Muhammad Umair1, Fiaz Majeed1, Muhammad Shoaib2, Muhammad Qaiser Saleem3, Mohmmed S. Adrees3, Abdelrahman Elsharif Karrar4, Shahzada Khurram5, Muhammad Shafiq6,*, Jin-Ghoo Choi6
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1179-1194, 2022, DOI:10.32604/iasc.2022.018952
    (This article belongs to this Special Issue: New Trends in Artificial Intelligence and Deep learning for Instrumentation, Sensors, and Robotics)
    Abstract Citations are references used by researchers to recognize the contributions of researchers in their articles. Citations can be used to discover hidden patterns in the research domain, and can also be used to perform various analyses in data mining. Citation analysis is a quantitative method to identify knowledge dissemination and influence papers in any research area. Citation analysis involves multiple techniques. One of the most commonly used techniques is Main Path Analysis (MPA). According to the specific use of MPA, it has evolved into various variants. Currently, MPA is carried out in different domains, but deep learning in the field… More >

  • Open AccessOpen Access

    ARTICLE

    Heart Sound Analysis for Abnormality Detection

    Zainab Arshad1, Sohail Masood Bhatti2,*, Huma Tauseef3, Arfan Jaffar2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1195-1205, 2022, DOI:10.32604/iasc.2022.022160
    Abstract According to the World Health Organization, 31% death rate in the World is because of cardiovascular diseases like heart arrhythmia and heart failure. Early diagnosis of heart problems may help in timely treatment of the patients and hence control death rate. Heart sounds are good signals of heart health if examined by an expert. Moreover, heart sounds can be analyzed with inexpensive and portable medical devices. Automatic heart sound classification can be very useful in diagnosing heart problems. Major focus of this research is to study the existing techniques for heart sound classification and develop a more sophisticated method. A… More >

  • Open AccessOpen Access

    ARTICLE

    From Similarities to Probabilities: Feature Engineering for Predicting Drugs’ Adverse Reactions

    Nahla H. Barakat*, Ahmed H. ElSabbagh
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1207-1224, 2022, DOI:10.32604/iasc.2022.022104
    Abstract Social media recently became convenient platforms for different groups with common concerns to share their experiences, including Adverse Drug Reactions (ADRs). In this paper, we propose a two stage intelligent algorithm which we call “Simi_to_Prob”, that utilizes social media forums; for ranking ADRs, and evaluating the ADRs prevalence considering different age and gender groups as its first stage. In the second stage, ADRs are predicted utilizing a different data set from the Food and Drug Administration (FDA). In particular, Natural Language Processing (NLP) is used on social media to extract ranked lists of ADRs, which are then validated using novel… More >

  • Open AccessOpen Access

    ARTICLE

    Fine-Grained Bandwidth Estimation for Smart Grid Communication Network

    Jingtang Luo1, Jingru Liao2, Chenlin Zhang3, Ziqi Wang4, Yuhang Zhang2, Jie Xu2,*, Zhengwen Huang5
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1225-1239, 2022, DOI:10.32604/iasc.2022.022812
    Abstract Accurate estimation of communication bandwidth is critical for the sensing and controlling applications of smart grid. Different from public network, the bandwidth requirements of smart grid communication network must be accurately estimated in prior to the deployment of applications or even the building of communication network. However, existing methods for smart grid usually model communication nodes in coarse-grained ways, so their estimations become inaccurate in scenarios where the same type of nodes have very different bandwidth requirements. To solve this issue, we propose a fine-grained estimation method based on multivariate nonlinear fitting. Firstly, we use linear fitting to calculate the… More >

  • Open AccessOpen Access

    ARTICLE

    Synovial Sarcoma Classification Technique Using Support Vector Machine and Structure Features

    P. Arunachalam1, N. Janakiraman1,*, Arun Kumar Sivaraman2, A. Balasundaram3, Rajiv Vincent2, Sita Rani4, Barnali Dey5, A. Muralidhar2, M. Rajesh2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1241-1259, 2022, DOI:10.32604/iasc.2022.022573
    (This article belongs to this Special Issue: Healthcare Intelligence in Cancer Prognosis and Prediction)
    Abstract Digital clinical histopathology technique is used for accurately diagnosing cancer cells and achieving optimal results using Internet of Things (IoT) and blockchain technology. The cell pattern of Synovial Sarcoma (SS) cancer images always appeared as spindle shaped cell (SSC) structures. Identifying the SSC and its prognostic indicator are very crucial problems for computer aided diagnosis, especially in healthcare industry applications. A constructive framework has been proposed for the classification of SSC feature components using Support Vector Machine (SVM) with the assistance of relevant Support Vectors (SVs). This framework used the SS images, and it has been transformed into frequency sub-bands… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Human Detection Using Reinforced Faster-RCNN for Electricity Conservation System

    S. Ushasukhanya*, M. Karthikeyan
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1261-1275, 2022, DOI:10.32604/iasc.2022.022654
    Abstract Electricity conservation systems are designed to conserve electricity to manage the bridge between the high raising demand and the production. Such systems have been so far using sensors to detect the necessity which adds an additional cost to the setup. Closed-circuit Television (CCTV) has been installed in almost everywhere around us especially in commercial places. Interpretation of these CCTV images is being carried out for various reasons to elicit the information from it. Hence a framework for electricity conservation that enables the electricity supply only when required, using existing resources would be a cost effective conservation system. Such a framework… More >

  • Open AccessOpen Access

    ARTICLE

    Service Level Agreement Based Secured Data Analytics Framework for Healthcare Systems

    S. Benila1,*, N. Usha Bhanu2
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1277-1291, 2022, DOI:10.32604/iasc.2022.021920
    Abstract Many physical objects are connected to the internet in this modern day to make things easier to work based on the convenience of the user, which reduces human involvement with the help of Internet of Things (IoT) technology.This aids in the capture of large amounts of data, the interchange of information via the internet, and the remote operation of machines. IoT health data is typically in the form of big data and is frequently coupled with the cloud for secure storage. Cloud technology provides a wide range of technological services via the internet, and it is a highly interoperable and… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Analysis of Two-Stage Optimal Feature-Selection Techniques for Finger Knuckle Recognition

    P. Jayapriya*, K. Umamaheswari
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1293-1308, 2022, DOI:10.32604/iasc.2022.022583
    Abstract Automated biometric authentication attracts the attention of researchers to work on hand-based images to develop applications in forensics science. Finger Knuckle Print (FKP) is one of the hand-based biometrics used in the recognition of an individual. FKP is rich in texture, less in contact and known for its unique features. The dimensionality of the features, extracted from the image, is one of the main problems in pattern recognition. Since selecting the relevant features is an important but challenging task, the feature subset selection is an optimization problem. A reduced number of features results in enhanced classification accuracy. The proposed FKP… More >

  • Open AccessOpen Access

    ARTICLE

    End-to-End Speech Recognition of Tamil Language

    Mohamed Hashim Changrampadi1,*, A. Shahina2, M. Badri Narayanan2, A. Nayeemulla Khan3
    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1309-1323, 2022, DOI:10.32604/iasc.2022.022021
    Abstract Research in speech recognition is progressing with numerous state-of-the-art results in recent times. However, relatively fewer research is being carried out in Automatic Speech Recognition (ASR) for languages with low resources. We present a method to develop speech recognition model with minimal resources using Mozilla DeepSpeech architecture. We have utilized freely available online computational resources for training, enabling similar approaches to be carried out for research in a low-resourced languages in a financially constrained environments. We also present novel ways to build an efficient language model from publicly available web resources to improve accuracy in ASR. The proposed ASR model… More >

Per Page:

Share Link