Intelligent Automation & Soft Computing

About the Journal

Intelligent Automation & Soft Computing: An International Journal seeks to provide a common forum for the dissemination of accurate results about the world of artificial intelligence, intelligent automation, control, computer science, modeling and systems engineering. It is intended that the articles published in the journal will encompass both the short and the long term effects of soft computing and other related fields such as robotics, control, computer, cyber security, vision, speech recognition, pattern recognition, data mining, big data, data analytics, machine intelligence and deep learning. It further hopes it will address the existing and emerging relationships between automation, systems engineering, system of computer engineering and soft computing. Intelligent Automation & Soft Computing is published monthly by Tech Science Press.

Indexing and Abstracting

SCIE: 2020 Impact Factor 1.647; Scopus CiteScore (Impact per Publication 2020): 1.9; SNIP (Source Normalized Impact per Paper 2020): 0.778; Essential Science Indicators(ESI), etc.

Previously published by TSI Press (http://www.wacong.org/autosoft/auto/), Intelligent Automation & Soft Computing starts to be published by Tech Science Press from the third issue of 2020 and supports Open Access Policy.

  • Energy Aware Seagull Optimization-Based Unequal Clustering Technique in WSN Communication
  • Abstract Wireless sensor network (WSN) becomes a hot research area owing to an extensive set of applications. In order to accomplish energy efficiency in WSN, most of the earlier works have focused on the clustering process which enables to elect CHs and organize unequal clusters. However, the clustering process results in hot spot problem and can be addressed by the use of unequal clustering techniques, which enables to construct of clusters of unequal sizes to equalize the energy dissipation in the WSN. Unequal clustering can be formulated as an NP-hard issue and can be solved by metaheuristic optimization algorithms. With this… More
  •   Views:33       Downloads:15        Download PDF
  • Mobile Robots’ Collision Prediction Based on Virtual Cocoons
  • Abstract The research work presents a collision prediction method of mobile robots. The authors of the work use so-called, virtual cocoons to evaluate the collision criteria of two robots. The idea, mathematical representation of the calculations and experimental simulations are presented in the paper work. A virtual model of the industrial process with moving mobile robots was created. Obstacle avoidance was not solved here. The authors of the article were working on collision avoidance problem solving between moving robots. Theoretical approach presents mathematical calculations and dependences of path angles of mobile robots. Experimental simulations, using the software Centaurus CPN, based on… More
  •   Views:11       Downloads:1        Download PDF
  • A Cost-Efficient Radiation Monitoring System for Nuclear Sites: Designing and Implementation
  • Abstract Radiation monitoring is essential for examining and refraining the unwanted situations in the vicinity of nuclear plants as high levels of radiation are quite dangerous for human beings. Meanwhile, Wireless Sensor Networks (WSNs) are proved to be an auspicious candidate to address that issue. Actually, WSNs are pretty beneficial to monitor an area with the aim of avoiding undesirable situations. In this paper, we have designed and implemented a cost-efficient radiation and the temperature monitoring system. We have used ZigBee to develop the sensor nodes, and the sensor nodes are instilled with the radiation and the temperature sensors. In addition,… More
  •   Views:14       Downloads:6        Download PDF
  • Autonomous Exploration Based on Multi-Criteria Decision-Making and Using D* Lite Algorithm
  • Abstract An autonomous robot is often in a situation to perform tasks or missions in an initially unknown environment. A logical approach to doing this implies discovering the environment by the incremental principle defined by the applied exploration strategy. A large number of exploration strategies apply the technique of selecting the next robot position between candidate locations on the frontier between the unknown and the known parts of the environment using the function that combines different criteria. The exploration strategies based on Multi-Criteria Decision-Making (MCDM) using the standard SAW, COPRAS and TOPSIS methods are presented in the paper. Their performances are… More
  •   Views:5       Downloads:1        Download PDF
  • Smart Garbage Bin Based on AIoT
  • Abstract Waste management and monitoring is a major concern in the context of the environment, and has a significant impact on human health. The concept of the Artificial Intelligence of Things (AIoT) can help people in everyday tasks in life. This study proposes a smart trash bin to help solve the problem of waste management and monitoring. Traditional methods of garbage disposal require human labor, and pose a hazard to the worker. The proposed smart garbage bin can move itself by using ultrasonic sensors and a web camera, which serves as its “eyes.” Because the smart garbage bin is designed for… More
  •   Views:7       Downloads:3        Download PDF
  • Smart and Automated Diagnosis of COVID-19 Using Artificial Intelligence Techniques
  • Abstract Machine Learning (ML) techniques have been combined with modern technologies across medical fields to detect and diagnose many diseases. Meanwhile, given the limited and unclear statistics on the Coronavirus Disease 2019 (COVID-19), the greatest challenge for all clinicians is to find effective and accurate methods for early diagnosis of the virus at a low cost. Medical imaging has found a role in this critical task utilizing a smart technology through different image modalities for COVID-19 cases, including X-ray imaging, Computed Tomography (CT) and magnetic resonance image (MRI) that can be used for diagnosis by radiologists. This paper combines ML with… More
  •   Views:7       Downloads:4        Download PDF
  • Classification of Elephant Sounds Using Parallel Convolutional Neural Network
  • Abstract Human-elephant conflict is the most common problem across elephant habitat Zones across the world. Human elephant conflict (HEC) is due to the migration of elephants from their living habitat to the residential areas of humans in search of water and food. One of the important techniques used to track the movements of elephants is based on the detection of Elephant Voice. Our previous work [] on Elephant Voice Detection to avoid HEC was based on Feature set Extraction using Support Vector Machine (SVM). This research article is an improved continuum of the previous method using Deep learning techniques. The current… More
  •   Views:6       Downloads:4        Download PDF
  • Comparative Research Directions of Population Initialization Techniques using PSO Algorithm
  • Abstract In existing meta-heuristic algorithms, population initialization forms a huge part towards problem optimization. These calculations can impact variety and combination to locate a productive ideal arrangement. Especially, for perceiving the significance of variety and intermingling, different specialists have attempted to improve the presentation of meta-heuristic algorithms. Particle Swarm Optimization (PSO) algorithm is a populace-based, shrewd stochastic inquiry strategy that is motivated by the inherent honey bee swarm food search mechanism. Population initialization is an indispensable factor in the PSO algorithm. To improve the variety and combination factors, rather than applying the irregular circulation for the introduction of the populace, semi-arbitrary… More
  •   Views:4       Downloads:1        Download PDF
  • Energy Conservation of Adiabatic ECRL-Based Kogge-Stone Adder Circuits for FFT Applications
  • Abstract Low Power circuits play a significant role in designing large-scale devices with high energy and power consumption. Adiabatic circuits are one such energy-saving circuits that utilize reversible power. Several methodologies used previously infer the use of CMOS circuits for reducing power dissipation in logic circuits. However, CMOS devices hardly manage in maintaining their performance when it comes to fast switching networks. Adiabatic technology is employed to overcome these difficulties, which can further scale down the dissipation of power by charging and discharging. An Efficient Charge Recovery Logic (ECRL) based adiabatic technology is used here to evaluate arithmetic operations in circuits… More
  •   Views:11       Downloads:3        Download PDF
  • Virtualized Load Balancer for Hybrid Cloud Using Genetic Algorithm
  • Abstract Load Balancing is an important factor handling resource during running and execution time in real time applications. Virtual machines are used for dynamically access and share the resources. As per current scenario cloud computing is played major for storage, resource accessing, resource pooling and internet based service offering. Usage of cloud computing services is dynamically increased such as online shopping, education, ticketing, etc. Many users can use the cloud resources and load balancing is used for adjusting the virtual machine and balance the node. Our proposed virtualized genetic algorithms are to provide balanced virtual machine services in Hybrid cloud. The… More
  •   Views:34       Downloads:10        Download PDF
  • Greedy-Genetic Algorithm Based Video Data Scheduling Over 5G Networks
  • Abstract Essential components in wireless systems are schedulin and resource allocation. The problems in scheduling refers to inactive users in a given time slot and in terms of resource allocation it refers to the issues in the allocation of physical layer resources such as power and bandwidth among the active users. In the Long Time Evolution (LTE) downlink scheduling the optimized problem refers to the flow deadlines that incorporate the formulation in the surveyed scheduling algorithm for achieving enhanced performance levels. The major challenges appear in the areas of quality and bandwidth constrains in the video processing sectors in 5G. The… More
  •   Views:4       Downloads:2        Download PDF
  • Optimized Fuzzy Enabled Semi-Supervised Intrusion Detection System for Attack Prediction
  • Abstract Detection of intrusion plays an important part in data protection. Intruders will carry out attacks from a compromised user account without being identified. The key technology is the effective detection of sundry threats inside the network. However, process automation is experiencing expanded use of information communication systems, due to high versatility of interoperability and ease off 34 administration. Traditional knowledge technology intrusion detection systems are not completely tailored to process automation. The combined use of fuzziness-based and RNN-IDS is therefore highly suited to high-precision classification, and its efficiency is better compared to that of conventional machine learning approaches. This model… More
  •   Views:4       Downloads:1        Download PDF
  • IoT-EMS: An Internet of Things Based Environment Monitoring System in Volunteer Computing Environment
  • Abstract Environment monitoring is an important area apart from environmental safety and pollution control. Such monitoring performed by the physical models of the atmosphere is unstable and inaccurate. Machine Learning (ML) techniques on the other hand are more robust in capturing the dynamics in the environment. In this paper, a novel approach is proposed to build a cost-effective standardized environment monitoring system (IoT-EMS) in volunteer computing environment. In volunteer computing, the volunteers (people) share their resources for distributed computing to perform a task (environment monitoring). The system is based on the Internet of Things and is controlled and accessed remotely through… More
  •   Views:6       Downloads:3        Download PDF
  • Construction of Key-dependent S-box for Secure Cloud Storage
  • Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation function. Two stages are… More
  •   Views:6       Downloads:3        Download PDF
  • Spectrum Prediction in Cognitive Radio Network Using Machine Learning Techniques
  • Abstract Cognitive Radio (CR) aims to achieve efficient utilization of scarcely available radio spectrum. Spectrum sensing in CR is a basic process for identifying the existence or absence of primary users. In spectrum sensing, CR users suffer from deep fading effects and it requires additional sensing time to identify the primary user. To overcome these challenges, we frame Spectrum Prediction-Channel Allocation (SP-CA) algorithm which consists of three phases. First, clustering mechanisms to select the spectrum coordinator. Second, Eigenvalue based detection method to expand the sensing accuracy of the secondary user. Third, Bayesian inference approach to reduce the performance degradation of the… More
  •   Views:4       Downloads:1        Download PDF
  • Volumetric Object Modeling Using Internal Shape Preserving Constraint in Unity 3D
  • Abstract In real-time contents, such as games and interactive simulators, it is very important to reduce the amount of simulation computation of 3D deformable objects. Although position-based dynamics has been proposed to reduce the amount of computation, the number of nodes for the tetrahedral model to represent a volumetric deformable object has to be increased, which makes the real-time simulation difficult. Therefore, this paper proposes an Internal shape preserving constraint(ISPC) generation algorithm integrated into the position-based dynamics to represent the physical properties of the 3D volumetric deformable object, while reducing the number of nodes filling the interior of the object. The… More
  •   Views:4       Downloads:0        Download PDF
  • Integration of Renewable Energy Sources into the Smart Grid Using Enhanced SCA
  • Abstract The usage of energy in everyday life is growing day by day as a result of the rapid growth in the human population. One solution is to increase electricity generation to the same extent as the human population, but this is usually practically impossible. As the population is increasing, the need for electrical usage is also increasing. Therefore, smart grids play an important role in making efficient use of existing energy sources like solar, wind and battery storage systems. By managing demand, the minimization of power consumption and its consequent costs. On the load side, residential and commercial types use… More
  •   Views:15       Downloads:4        Download PDF
  • Improved U-Net-Based Novel Segmentation Algorithm for Underwater Mineral Image
  • Abstract Autonomous underwater vehicle (AUV) has many intelligent optical system, which can collect underwater signal information to make the system decision. One of them is the intelligent vision system, and it can capture the images to analyze. The performance of the particle image segmentation plays an important role in the monitoring of underwater mineral resources. In order to improve the underwater mineral image segmentation performance, some novel segmentation algorithm architectures are proposed. In this paper, an improved mineral image segmentation is proposed based on the modified U-Net. The pyramid upsampling module and residual module are bring into the U-Net model, which… More
  •   Views:22       Downloads:30        Download PDF
  • A Dominating Set Routing Scheme for Adaptive Caching in Ad Hoc Network
  • Abstract Current efforts for providing an efficient dynamic source routing protocol (DSR) for use in multi-hop ad-hoc wireless are promising. This is since DSR has a unique characteristic in that it uses source routing, instead of relying on the routing table at each intermediate device. This study addresses the current challenges facing DSR protocol in terms of the dynamic changes of the route and how to update such changes into the route cache of the DSR. The challenges typically persist when a sudden route break occurs resulting in a delay in updating the new node location into the cache of the… More
  •   Views:1       Downloads:1        Download PDF
  • An Innovative Approach for Water Distribution Systems
  • Abstract Water Distribution System (WDS) is one of the important phases of the Water Treatment Plant (WTP) and plays a crucial role in plant, animal, and human life. The WDS aims not only to supply a continuous, stable water amount but also to reduce energy consumption as little as possible during operation. To keep the continuous, stable water amount, the water pressure in the pipe network of the WDS must be maintained at desired set points under the effecting of uncertainties, disturbances, and noises. For saving the energy requirement, a Variable Frequency Driver (VFD) was utilized to control the speed of… More
  •   Views:3       Downloads:1        Download PDF
  • An Automated Word Embedding with Parameter Tuned Model for Web Crawling
  • Abstract In recent years, web crawling has gained a significant attention due to the drastic advancements in the World Wide Web. Web Search Engines have the issue of retrieving massive quantity of web documents. One among the web crawlers is the focused crawler, that intends to selectively gather web pages from the Internet. But the efficiency of the focused crawling can easily be affected by the environment of web pages. In this view, this paper presents an Automated Word Embedding with Parameter Tuned Deep Learning (AWE-PTDL) model for focused web crawling. The proposed model involves different processes namely pre-processing, Incremental Skip-gram… More
  •   Views:31       Downloads:8        Download PDF
  • Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security
  • Abstract This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentication discipline, and most of them proposed the best possible approaches, but there are very limited studies in the area that… More
  •   Views:4       Downloads:1        Download PDF
  • Aquarium Monitoring System Based on Internet of Things
  • Abstract With the ever-increasing richness of social resources, the number of devices using the Internet of Things is also increasing. Currently, many people keep pets such as fish in their homes, and they need to be carefully taken care of. In particular, it is necessary to create a safe and comfortable environment for them and to maintain this environment continuously. An adverse environment can affect the growth of fish and may even result in their death. This study used the LinkIt 7697 module and the BlocklyDuino editor to produce a control system for a smart aquarium. The purpose of this system… More
  •   Views:6       Downloads:3        Download PDF
  • Fuzzy Based MPPT and Solar Power Forecasting Using Artificial Intelligence
  • Abstract Solar energy is the radiant heat and light energy harvested by ultra violet rays to convert into electrical Direct Current (DC). The solar energy stood ahead of other renewable energy as it can produce a constant level of alternating current over the year with minimal harmonic distortions. The renewable energy attracts the energy harvesters as there is rise of deficiency of carbon and reduction of efficiency in thermal energy generation. The concerns associated with the solar power generation are the fluctuation in the generated direct current due to the displacement of sun and deviation in the quantity of solar rays… More
  •   Views:7       Downloads:4        Download PDF
  • Improved Radio Resource Allocation in 5G Network Using Fuzzy Logic Systems
  • Abstract With recent advancements in machine-to-machine (M2M), the demand for fastest communication is an utmost concern of the M2M technology. The advent of 5G telecommunication networks enables to bridge the demand on satisfying the Quality-of-Service (QoS) concerns in M2M communication. The massive number of devices in M2M communication is henceforth do not lie under limited resource allocation by embedding the 5G telecommunication network. In this paper, we address the above limitation of allocation the resource to prominent M2M devices using Adaptive Neuro Fuzzy Inference System (ANFIS). In ANFIS, the adoption of rules will imply the resource allocation with the devices of… More
  •   Views:9       Downloads:5        Download PDF
  • Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model
  • Abstract A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the healthcare industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to determine the impact of mental health in D2 patients. This study will examine the impact assessment in D2 patients. This paper used the integrated methodology of Fuzzy Analytic Hierarchy (FAHP) and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (FTOPSIS).… More
  •   Views:7       Downloads:3        Download PDF
  • Ontology-Based Semantic Search Framework for Disparate Datasets
  • Abstract The public sector provides open data to create new opportunities, stimulate innovation, and implement new solutions that benefit academia and society. However, open data is usually available in large quantities and often lacks quality, accuracy, and completeness. It may be difficult to find the right data to analyze a target. There are many rich open data repositories, but they are difficult to understand and use because these data can only be used with a complex set of keyword search options, and even then, irrelevant or insufficient data may eventually be retrieved. To alleviate this situation, ontology-based semantic search has been… More
  •   Views:7       Downloads:4        Download PDF
  • Handling High Dimensionality in Ensemble Learning for Arrhythmia Prediction
  • Abstract Computer-aided arrhythmia prediction from ECG (electrocardiograms) is essential in clinical practices, which promises to reduce the mortality caused by inexperienced clinical practitioners. Moreover, computer-aided methods often succeed in the early detection of arrhythmia scope from electrocardiogram reports. Machine learning is the buzz of computer-aided clinical practices. Particularly, computer-aided arrhythmia prediction methods highly adopted machine learning methods. However, the high dimensionality in feature values considered for the machine learning models’ training phase often causes false alarming. This manuscript addressed the high dimensionality in the learning phase and proposed an (Ensemble Learning method for Arrhythmia Prediction) ELAP (ensemble learning-based arrhythmia prediction). The… More
  •   Views:4       Downloads:2        Download PDF
  • Fault Tolerance Techniques for Multi-Hop Clustering in Wireless Sensor Networks
  • Abstract Wireless sensor networks (WSN) deploy many nodes over an extended area for traffic surveillance, environmental monitoring, healthcare, tracking wildlife, and military sensing. Nodes of the WSN have a limited amount of energy. Each sensor node collects information from the surrounding area and forwards it onto the cluster head, which then sends it on to the base station (BS). WSNs extend the lifetime of the network through clustering techniques. Choosing nodes with the greatest residual energy as cluster heads is based on the idea that energy consumption is periodically distributed between nodes. The sink node gathers information from its environment that… More
  •   Views:6       Downloads:0        Download PDF
  • Analyzing the Implications of Healthcare Data Breaches through Computational Technique
  • Abstract The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that… More
  •   Views:16       Downloads:20        Download PDF
  • Fast Access and Retrieval of Big Data Based on Unique Identification
  • Abstract In big data applications, the data are usually stored in data files, whose data file structures, field structures, data types and lengths are not uniform. Therefore, if these data are stored in the traditional relational database, it is difficult to meet the requirements of fast storage and access. To solve this problem, we propose the mapping model between the source data file and the target HBase file. Our method solves the heterogeneity of the file object and the universality of the storage conversion. Firstly, based on the mapping model, we design “RowKey”, generation rules and algorithm. Then according to the… More
  •   Views:6       Downloads:3        Download PDF
  • Bacterial Foraging Based Algorithm Front-end to Solve Global Optimization Problems
  • Abstract The Bacterial Foraging Algorithm (BFOA) is a well-known swarm collective intelligence algorithm used to solve a variety of constraint optimization problems with wide success. Despite its universality, implementing the BFOA may be complex due to the calibration of multiple parameters. Moreover, the Two-Swim Modified Bacterial Foraging Optimization Algorithm (TS-MBFOA) is a state-of-the-art modification of the BFOA which may lead to solutions close to the optimal but with more parameters than the original BFOA. That is why in this paper we present the design using the Unified Modeling Language (UML) and the implementation in the MATLAB platform of a front-end for… More
  •   Views:19       Downloads:32        Download PDF
  • Blockchain for Securing Healthcare Data Using Squirrel Search Optimization Algorithm
  • Abstract The Healthcare system is an organization that consists of important requirements corresponding to security and privacy, for example, protecting patients’ medical information from unauthorized access, communication with transport like ambulance and smart e-health monitoring. Due to lack of expert design of security protocols, the healthcare system is facing many security threats such as authenticity, data sharing, the conveying of medical data. In such situation, block chain protocol is used. In this manuscript, Efficient Block chain Network for securing Healthcare data using Multi-Objective Squirrel Search Optimization Algorithm (MOSSA) is proposed to generate smart and secure Healthcare system. In this the block… More
  •   Views:25       Downloads:6        Download PDF
  • Fair and Stable Matching Virtual Machine Resource Allocation Method
  • Abstract In order to unify the management and scheduling of cloud resources, cloud platforms use virtualization technology to re-integrate multiple computing resources in the cloud and build virtual units on physical machines to achieve dynamic provisioning of resources by configuring virtual units of various sizes. Therefore, how to reasonably determine the mapping relationship between virtual units and physical machines is an important research topic for cloud resource scheduling. In this paper, we propose a fair cloud virtual machine resource allocation method of using the stable matching theory. Our allocation method considers the allocation of resources from both user’s demand and cloud… More
  •   Views:4       Downloads:1        Download PDF
  • Fuzzy Logic for Underground Mining Method Selection
  • Abstract The Selection of the mining method for underground minerals extraction is the crucial task for the mining engineers. Underground minerals extraction is a multi-criteria decision making problem due to many criteria to be considered in the selection process. There are many studies on selection of underground mining method using Multi Criteria Decision Making (MCDM) techniques or approaches. Extracting minerals from the underground involves many geological characteristics also called as input parameters. The geological characteristics of any mineral deposit vary from one location to another location. Thus only one mineral extraction method is not suitable for different deposit characteristics. There are… More
  •   Views:21       Downloads:28        Download PDF
  • Actuator Fluid Control Using Fuzzy Feedback for Soft Robotics Activities
  • Abstract Soft robotics is a new field that uses actuators that are non-standard and compatible materials. Industrial robotics is high-throughput manufacturing devices that are quick and accurate. They are built on rigid-body mechanisms. The advancement of robotic production now depends on the inclusion of staff in manufacturing processes, allowing for the completion of activities that need cognitive abilities that are now beyond the scope of artificial networks. Hydrostatic pressure is used to achieve high deflections of structures that are based on the elastomeric in Fluid Actuators (FAs). Soft actuators based on the fluid are a popular choice safe for humans and… More
  •   Views:28       Downloads:18        Download PDF
  • Soil Urea Analysis Using Mid-Infrared Spectroscopy and Machine Learning
  • Abstract Urea is the most common fertilizer used by the farmers. In this study, the variation of mid-infrared transmittance spectra with addition of urea in soil was studied for five different concentrations of urea. 150 gm of soil is taken and dried in a hot air oven for 5 h at 80°C and then samples are prepared by adding urea and water to it. The spectral signature of soil with urea is obtained by using an Infrared Spectrometer that reads the spectra in the mid infra-red region. The analysis is done using Partial Least Square Regression and Support Vector Machine algorithms… More
  •   Views:8       Downloads:4        Download PDF
  • Hybrid Approach for Taxonomic Classification Based on Deep Learning
  • Abstract Recently, deep learning has opened a remarkable research direction in the track of bioinformatics, especially for the applications that need classification and regression. With deep learning techniques, DNA sequences can be classified with high accuracy. Firstly, a DNA sequence should be represented, numerically. After that, DNA features are extracted from the numerical representations based on deep learning techniques to improve the classification process. Recently, several architectures have been developed based on deep learning for DNA sequence classification. Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) are the default deep learning architectures used for this task. This paper presents a… More
  •   Views:6       Downloads:4        Download PDF
  • On NSGA-II and NSGA-III in Portfolio Management
  • Abstract To solve single and multi-objective optimization problems, evolutionary algorithms have been created. We use the non-dominated sorting genetic algorithm (NSGA-II) to find the Pareto front in a two-objective portfolio query, and its extended variant NSGA-III to find the Pareto front in a three-objective portfolio problem, in this article. Furthermore, in both portfolio problems, we quantify the Karush-Kuhn-Tucker Proximity Measure (KKTPM) for each generation to determine how far we are from the effective front and to provide knowledge about the Pareto optimal solution. In the portfolio problem, looking for the optimal set of stock or assets that maximizes the mean return… More
  •   Views:17       Downloads:18        Download PDF
  • Hybrid Deep Learning Framework for Privacy Preservation in Geo-Distributed Data Centre
  • Abstract In recent times, a huge amount of data is being created from different sources and the size of the data generated on the Internet has already surpassed two Exabytes. Big Data processing and analysis can be employed in many disciplines which can aid the decision-making process with privacy preservation of users’ private data. To store large quantity of data, Geo-Distributed Data Centres (GDDC) are developed. In recent times, several applications comprising data analytics and machine learning have been designed for GDDC. In this view, this paper presents a hybrid deep learning framework for privacy preservation in distributed DCs. The proposed… More
  •   Views:9       Downloads:1        Download PDF
  • Covid-19 Symptoms Periods Detection Using Transfer-Learning Techniques
  • Abstract The inflationary illness caused by extreme acute respiratory syndrome coronavirus in 2019 (COVID-19) is an infectious and deadly disease. COVID-19 was first found in Wuhan, China, in December 2019, and has since spread worldwide. Globally, there have been more than 198 M cases and over 4.22 M deaths, as of the first of Augest, 2021. Therefore, an automated and fast diagnosis system needs to be introduced as a simple, alternative diagnosis choice to avoid the spread of COVID-19. The main contributions of this research are 1) the COVID-19 Period Detection System (CPDS), that used to detect the symptoms periods or… More
  •   Views:7       Downloads:4        Download PDF
  • CVAE-GAN Emotional AI Music System for Car Driving Safety
  • Abstract Musical emotion is important for the listener’s cognition. A smooth emotional expression generated through listening to music makes driving a car safer. Music has become more diverse and prolific with rapid technological developments. However, the cost of music production remains very high. At present, because the cost of music creation and the playing copyright are still very expensive, the music that needs to be listened to while driving can be executed by the way of automated composition of AI to achieve the purpose of driving safety and convenience. To address this problem, automated AI music composition has gradually gained attention… More
  •   Views:6       Downloads:3        Download PDF