Special lssues
Table of Content

Emerging Trends and Real-World Applications of Intelligent Computing Techniques

Submission Deadline: 30 June 2021 (closed)

Guest Editors

Dr. Nitish Pathak, Guru Gobind Singh Indraprastha University (GGSIPU), Delhi, India.
Prof. Joel J. P. C. Rodrigues, Federal University of Piauí (UFPI), Brazil.
Dr. Kanta Prasad Sharma, Chandigarh University Mohali (Punjab) India.

Summary

Artificial Intelligence, Intelligent Computing Techniques and Deep Learning are offering practical tools for many engineering applications. Computer learning, artificial intelligence and its learning, adaptation paradigms are able to improve engineering applications. This decade is really about adding intelligence to different devices, services, etc. We have been confronted with a new IoT-The intelligence of things. It means that AI/IoT will in the near future logically and effortlessly interrelate with human experts and operators, providing them with articulate clarifications and answers, even at the edge of the network or in robotic devices and navigation. Moreover, we shall witness the exploration of IoT cooperation, navigation at highest form autonomous automation navigation, wireless sensor network and Cloud integration. In this thematic issue, we solicit the submission of high-quality original research and articles closely related to the following topics, particularly interdisciplinary submissions that bring together next generation Intelligence of Things, Artificial intelligence, Smart information processing, IoT security, AI techniques and optimization algorithms. privacy and trust researchers.


Keywords

• Intelligent Computing Systems and their Applications
• Artificial Intelligence for Engineering Applications
• Intelligent Communication Systems
• Machine Learning for Data Science
• Soft Computing for Emerging Applications
• Internet of Things
• Smart enterprise systems
• Optimization Algorithms
• Data Analytics
• Industry 4.0

Published Papers


  • Open Access

    ARTICLE

    IoT & AI Enabled Three-Phase Secure and Non-Invasive COVID 19 Diagnosis System

    Anurag Jain, Kusum Yadav, Hadeel Fahad Alharbi, Shamik Tiwari
    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 423-438, 2022, DOI:10.32604/cmc.2022.020238
    (This article belongs to this Special Issue: Emerging Trends and Real-World Applications of Intelligent Computing Techniques)
    Abstract Corona is a viral disease that has taken the form of an epidemic and is causing havoc worldwide after its first appearance in the Wuhan state of China in December 2019. Due to the similarity in initial symptoms with viral fever, it is challenging to identify this virus initially. Non-detection of this virus at the early stage results in the death of the patient. Developing and densely populated countries face a scarcity of resources like hospitals, ventilators, oxygen, and healthcare workers. Technologies like the Internet of Things (IoT) and artificial intelligence can play a vital role in diagnosing the COVID-19… More >

  • Open Access

    ARTICLE

    Analysis of Pneumonia Model via Efficient Computing Techniques

    Kamaledin Abodayeh, Ali Raza, Muhammad Rafiq, Muhammad Shoaib Arif, Muhammad Naveed, Zunir Zeb, Syed Zaheer Abbas, Kiran Shahzadi, Sana Sarwar, Qasim Naveed, Badar Ul Zaman, Muhammad Mohsin
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6073-6088, 2022, DOI:10.32604/cmc.2022.020732
    (This article belongs to this Special Issue: Emerging Trends and Real-World Applications of Intelligent Computing Techniques)
    Abstract Pneumonia is a highly transmissible disease in children. According to the World Health Organization (WHO), the most affected regions include south Asia and sub-Saharan Africa. Worldwide, 15% of pediatric deaths can be attributed to pneumonia. Computing techniques have a significant role in science, engineering, and many other fields. In this study, we focused on the efficiency of numerical techniques via computer programs. We studied the dynamics of the pneumonia-like infections of epidemic models using numerical techniques. We discuss two types of analysis: dynamical and numerical. The dynamical analysis included positivity, boundedness, local stability, reproduction number, and equilibria of the model.… More >

  • Open Access

    ARTICLE

    Error Detection and Pattern Prediction Through Phase II Process Monitoring

    Azam Zaka, Riffat Jabeen, Kanwal Iqbal Khan
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4781-4802, 2022, DOI:10.32604/cmc.2022.020316
    (This article belongs to this Special Issue: Emerging Trends and Real-World Applications of Intelligent Computing Techniques)
    Abstract The continuous monitoring of the machine is beneficial in improving its process reliability through reflected power function distribution. It is substantial for identifying and removing errors at the early stages of production that ultimately benefit the firms in cost-saving and quality improvement. The current study introduces control charts that help the manufacturing concerns to keep the production process in control. It presents an exponentially weighted moving average and extended exponentially weighted moving average and then compared their performance. The percentiles estimator and the modified maximum likelihood estimator are used to constructing the control charts. The findings suggest that an extended… More >

  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh, Abdulmohsen Almalawi, Fawaz Jaber Alsolami, Yoosef B. Abushark, Asif Irshad Khan, Adel Aboud S. Bahaddad, Alka Agrawal, Rajeev Kumar, Raees Ahmad Khan
    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146
    (This article belongs to this Special Issue: Emerging Trends and Real-World Applications of Intelligent Computing Techniques)
    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web applications, but not as the… More >

Share Link