Home / Journals / IASC / Vol.40, No.1, 2025
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Deep Learning-Based Decision Support System for Predicting Pregnancy Risk Levels through Cardiotocograph (CTG) Imaging Analysis

    Ali Hasan Dakheel1,*, Mohammed Raheem Mohammed1, Zainab Ali Abd Alhuseen1, Wassan Adnan Hashim2,3
    Intelligent Automation & Soft Computing, Vol.40, pp. 195-220, 2025, DOI:10.32604/iasc.2025.061622 - 28 February 2025
    (This article belongs to the Special Issue: Medical Imaging Decision Support Systems Using Deep Learning and Machine Learning Algorithms)
    Abstract The prediction of pregnancy-related hazards must be accurate and timely to safeguard mother and fetal health. This study aims to enhance risk prediction in pregnancy with a novel deep learning model based on a Long Short-Term Memory (LSTM) generator, designed to capture temporal relationships in cardiotocography (CTG) data. This methodology integrates CTG signals with demographic characteristics and utilizes preprocessing techniques such as noise reduction, normalization, and segmentation to create high-quality input for the model. It uses convolutional layers to extract spatial information, followed by LSTM layers to model sequences for superior predictive performance. The overall More >

  • Open AccessOpen Access

    ARTICLE

    Bayesian Stochastic INLA Application to the SIR-SI Model for Investigating Dengue Transmission Dynamics

    Mukhsar1,*, Andi Tenriawaru2, Gusti Ngurah Adhi Wibawa1, Bahriddin Abapihi1, Sitti Wirdhana Ahmad3, I Putu Sudayasa4
    Intelligent Automation & Soft Computing, Vol.40, pp. 177-193, 2025, DOI:10.32604/iasc.2025.058884 - 24 February 2025
    Abstract Despite extensive prevention efforts and research, dengue hemorrhagic fever (DHF) remains a major public health challenge, particularly in tropical regions, with significant social, economic, and health consequences. Statistical models are crucial in studying infectious DHF by providing a structured framework to analyze transmission dynamics between humans (hosts) and mosquitoes (vectors). Depending on the disease characteristics, different stochastic compartmental models can be employed. This research applies Bayesian Integrated Nested Laplace Approximation (INLA) to the SIR-SI model for DHF data. The method delivers accurate parameter estimates, improved computational efficiency, and effective integration with early warning systems. The… More >

  • Open AccessOpen Access

    ARTICLE

    Diagnosing Retinal Eye Diseases: A Novel Transfer Learning Approach

    Mohammed Salih Ahmed1, Atta Rahman2,*, Yahya Alhabboub1, Khalid Alzahrani1, Hassan Baragbah1, Basel Altaha1, Hussein Alkatout1, Sardar Asad Ali Biabani3,4, Rashad Ahmed5, Aghiad Bakry2
    Intelligent Automation & Soft Computing, Vol.40, pp. 149-175, 2025, DOI:10.32604/iasc.2025.059080 - 12 February 2025
    Abstract This study rigorously evaluates the potential of transfer learning in diagnosing retinal eye diseases using advanced models such as YOLOv8, Xception, ConvNeXtTiny, and VGG16. All models were trained on the esteemed RFMiD dataset, which includes images classified into six critical categories: Diabetic Retinopathy (DR), Macular Hole (MH), Diabetic Neuropathy (DN), Optic Disc Changes (ODC), Tesselated Fundus (TSLN), and normal cases. The research emphasizes enhancing model performance by prioritizing recall metrics, a crucial strategy aimed at minimizing false negatives in medical diagnostics. To address the challenge of imbalanced data, we implemented effective preprocessing techniques, including cropping,… More >

  • Open AccessOpen Access

    RETRACTION

    Retraction: The Crime Scene Tools Identification Algorithm Based on GVF-Harris-SIFT and KNN

    Nan Pan1,*, Dilin Pan2, Yi Liu2
    Intelligent Automation & Soft Computing, Vol.40, pp. 147-147, 2025, DOI:10.32604/iasc.2025.062708 - 29 January 2025
    Abstract This article has no abstract. More >

  • Open AccessOpen Access

    RETRACTION

    Retraction: Line Trace Effective Comparison Algorithm Based on Wavelet Domain DTW

    Nan Pan1,*, Yi Liu2, Dilin Pan2, Junbing Qian1, Gang Li3
    Intelligent Automation & Soft Computing, Vol.40, pp. 145-145, 2025, DOI:10.32604/iasc.2025.062707 - 29 January 2025
    Abstract This article has no abstract. More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Empowered Diagnosis of Diabetic Retinopathy

    Mustafa Youldash1, Atta Rahman2,*, Manar Alsayed1, Abrar Sebiany1, Joury Alzayat1, Noor Aljishi1, Ghaida Alshammari1, Mona Alqahtani1
    Intelligent Automation & Soft Computing, Vol.40, pp. 125-143, 2025, DOI:10.32604/iasc.2025.058509 - 23 January 2025
    Abstract Diabetic retinopathy (DR) is a complication of diabetes that can lead to reduced vision or even blindness if left untreated. Therefore, early and accurate detection of this disease is crucial for diabetic patients to prevent vision loss. This study aims to develop a deep-learning approach for the early and precise diagnosis of DR, as manual detection can be time-consuming, costly, and prone to human error. The classification task is divided into two groups for binary classification: patients with DR (diagnoses 1–4) and those without DR (diagnosis 0). For multi-class classification, the categories are no DR,… More >

  • Open AccessOpen Access

    REVIEW

    A Comprehensive Review of Next-Gen UAV Swarm Robotics: Optimisation Techniques and Control Strategies for Dynamic Environments

    Ghulam E Mustafa Abro1,*, Ayman M Abdallah1,2, Faizan Zahid3, Saleem Ahmed4
    Intelligent Automation & Soft Computing, Vol.40, pp. 99-123, 2025, DOI:10.32604/iasc.2025.060364 - 23 January 2025
    Abstract This review synthesises and assesses the most recent developments in Unmanned Aerial Vehicles (UAVs) and swarm robotics, with a specific emphasis on optimisation strategies, path planning, and formation control. The study identifies key methodologies that are driving progress in the field by conducting a comprehensive analysis of seven critical publications. The following are included: sensor-based platforms that facilitate effective obstacle avoidance, cluster-based hierarchical path planning for efficient navigation, and adaptive hybrid controllers for dynamic environments. The review emphasises the substantial contribution of optimisation techniques, including Max-Min Ant Colony Optimisation (MMACO), to the improvement of convergence… More >

  • Open AccessOpen Access

    ARTICLE

    A Blockchain-Based Access Management System for Enhanced Patient Privacy and Secure Telehealth and Telemedicine Data

    Ayoub Ghani1,*, Ahmed Zinedine1, Mohammed El Mohajir2
    Intelligent Automation & Soft Computing, Vol.40, pp. 75-98, 2025, DOI:10.32604/iasc.2025.060143 - 23 January 2025
    Abstract The Internet of Things (IoT) advances allow healthcare providers to distantly gather and immediately analyze patient health data for diagnostic purposes via connected health devices. In a COVID-19-like pandemic, connected devices can mitigate virus spread and make essential information, such as respiratory patterns, available to healthcare professionals. However, these devices generate vast amounts of data, rendering them susceptible to privacy breaches, and data leaks. Blockchain technology is a robust solution to address these issues in telemedicine systems. This paper proposes a blockchain-based access management solution to enhance patient privacy and secure telehealth and telemedicine data.… More >

  • Open AccessOpen Access

    ARTICLE

    Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission

    Haider H. Al-Mahmood1,*, Saad N. Alsaad2
    Intelligent Automation & Soft Computing, Vol.40, pp. 53-74, 2025, DOI:10.32604/iasc.2024.059691 - 10 January 2025
    Abstract In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism… More >

  • Open AccessOpen Access

    ARTICLE

    Internet of Things Software Engineering Model Validation Using Knowledge-Based Semantic Learning

    Mahmood Alsaadi, Mohammed E. Seno*, Mohammed I. Khalaf
    Intelligent Automation & Soft Computing, Vol.40, pp. 29-52, 2025, DOI:10.32604/iasc.2024.060390 - 10 January 2025
    (This article belongs to the Special Issue: Machine Learning for Privacy and Security in Internet of Things (IoT))
    Abstract The agility of Internet of Things (IoT) software engineering is benchmarked based on its systematic insights for wide application support infrastructure developments. Such developments are focused on reducing the interfacing complexity with heterogeneous devices through applications. To handle the interfacing complexity problem, this article introduces a Semantic Interfacing Obscuration Model (SIOM) for IoT software-engineered platforms. The interfacing obscuration between heterogeneous devices and application interfaces from the testing to real-time validations is accounted for in this model. Based on the level of obscuration between the infrastructure hardware to the end-user software, the modifications through device replacement, More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Network Security: Leveraging Machine Learning for Integrated Protection and Intrusion Detection

    Nada Mohammed Murad1, Adnan Yousif Dawod2, Saadaldeen Rashid Ahmed3,4,*, Ravi Sekhar5, Pritesh Shah5
    Intelligent Automation & Soft Computing, Vol.40, pp. 1-27, 2025, DOI:10.32604/iasc.2024.058624 - 10 January 2025
    Abstract This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity, focusing on network intrusion detection systems (NIDS). The main goal is to overcome the shortcomings of conventional intrusion detection techniques by developing a more flexible and robust security architecture. We use seven unique machine learning models to improve detection skills, emphasizing data quality, traceability, and transparency, facilitated by a blockchain layer that safeguards against data modification and ensures auditability. Our technique employs the Synthetic Minority Oversampling Technique (SMOTE) to equilibrate the dataset, therefore mitigating prevalent class imbalance difficulties… More >

Per Page:

Share Link