Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,827)
  • Open Access

    ARTICLE

    Classification Framework for COVID-19 Diagnosis Based on Deep CNN Models

    Walid El-Shafai1, Abeer D. Algarni2,*, Ghada M. El Banby3, Fathi E. Abd El-Samie1,2, Naglaa F. Soliman2,4

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1561-1575, 2022, DOI:10.32604/iasc.2022.020386 - 09 October 2021

    Abstract Automated diagnosis based on medical images is a very promising trend in modern healthcare services. For the task of automated diagnosis, there should be flexibility to deal with an enormous amount of data represented in the form of medical images. In addition, efficient algorithms that could be adapted according to the nature of images should be used. The importance of automated medical diagnosis has been maximized with the evolution of COVID-19 pandemic. COVID-19 first appeared in China, Wuhan, and then it has exploded in the whole world with a very bad impact on our daily… More >

  • Open Access

    ARTICLE

    Application of XR-Based Virtuality-Reality Coexisting Course

    Chun Xu1,*, Linyue Zhang2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1843-1855, 2022, DOI:10.32604/iasc.2022.020365 - 09 October 2021

    Abstract Significant advances in new emerging technologies such as the 5th generation mobile networks (5G), Expand the reality (XR), and Artificial Intelligence (AI) enable extensive three-dimensional (3D) experience and interaction. The vivid 3D virtual dynamic displays and immersive experiences will become new normal in near future. The XR-based virtuality-reality co-existing classroom goes beyond the limitations of Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR). Such technology also enables integration of the digital and physical worlds and further creates a smart classroom featuring co-existed virtuality and reality. In this paper, we show an application of… More >

  • Open Access

    ARTICLE

    Utilization of Deep Learning-Based Crowd Analysis for Safety Surveillance and Spread Control of COVID-19 Pandemic

    Osama S. Faragallah1,*, Sultan S. Alshamrani1, Heba M. El-Hoseny2, Mohammed A. AlZain1, Emad Sami Jaha3, Hala S. El-Sayed4

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1483-1497, 2022, DOI:10.32604/iasc.2022.020330 - 09 October 2021

    Abstract Crowd monitoring analysis has become an important challenge in academic researches ranging from surveillance equipment to people behavior using different algorithms. The crowd counting schemes can be typically processed in two steps, the images ground truth density maps which are obtained from ground truth density map creation and the deep learning to estimate density map from density map estimation. The pandemic of COVID-19 has changed our world in few months and has put the normal human life to a halt due to its rapid spread and high danger. Therefore, several precautions are taken into account… More >

  • Open Access

    ARTICLE

    A Modelling and Scheduling Tool for Crowd Movement in Complex Network

    Emad Felemban1, Faizan Ur Rehman2,*, Akhlaq Ahmad2, Muhamad Felemban3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1361-1375, 2022, DOI:10.32604/iasc.2022.020235 - 09 October 2021

    Abstract Managing events pose a unique challenge to the stakeholders and authorities to control the crowd in all three phases of the event (pre, during and post), ensuring crowd safety. One of the fundamental keys to provide crowd safety is to consider the mobility infrastructure hosting the crowd, i.e., routes, areas, entrances and exits. During Hajj, where millions of pilgrims worldwide fulfil the annual event’s rites, mina encampment incorporates pilgrims performing recurring stoning ritual conducted over multi-level Jamarat bridge. Pilgrims mobility through the available complex road network, to and back from the Jamarat bridge, forces upon More >

  • Open Access

    ARTICLE

    Enhancing Detection of Malicious URLs Using Boosting and Lexical Features

    Mohammad Atrees*, Ashraf Ahmad, Firas Alghanim

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1405-1422, 2022, DOI:10.32604/iasc.2022.020229 - 09 October 2021

    Abstract A malicious URL is a link that is created to spread spams, phishing, malware, ransomware, spyware, etc. A user may download malware that can adversely affect the computer by clicking on an infected URL, or might be convinced to provide confidential information to a fraudulent website causing serious losses. These threats must be identified and handled in a decent time and in an effective way. Detection is traditionally done through the blacklist usage method, which relies on keyword matching with previously known malicious domain names stored in a repository. This method is fast and easy… More >

  • Open Access

    ARTICLE

    Developing Secure Healthcare Video Consultations for Corona Virus (COVID-19) Pandemic

    Mohammed A. AlZain1,*, Jehad F. Al-Amri1, Ahmed I. Sallam2, Emad Sami Jaha3, Sultan S. Alshamrani1, Hala S. El-Sayed4, Osama S. Faragallah1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1627-1640, 2022, DOI:10.32604/iasc.2022.020137 - 09 October 2021

    Abstract Many health networks became increasingly interactive in implementing a consulting approach to telemedicine before the COVID-19 pandemic. To mitigate patient trafficking and reduce the virus exposure in health centers, several GPs, physicians and people in the video were consulted during the pandemic at the start. Video and smartphone consultations will allow well-insulated and high-risk medical practitioners to maintain their patient care security. Video appointments include diabetes, obesity, hypertension, stroke, mental health, chemotherapy and chronic pain. Many urgent diseases, including an emergency triage for the eye, may also be used for online consultations and triages. The… More >

  • Open Access

    ARTICLE

    Lyapunov-Redesign and Sliding Mode Controller for Microprocessor Based Transfemoral Prosthesis

    Ali Murtaza1, Muhammad Usman Qadir1, Muhammad Awais Khan1, Izhar ul Haq1,*, Kamran Shah1, Nizar Akhtar2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1887-1899, 2022, DOI:10.32604/iasc.2022.020006 - 09 October 2021

    Abstract Transfemoral prostheses have evolved from mechanical devices to microprocessor-based, electronically controlled knee joints, allowing amputees to regain control of their limbs. For improved amputee experience at varying ambulation rates, these devices provide controlled damping throughout the swing and stance phases of the gait cycle. Commercially available microprocessor-based prosthetic knee (MPK) joints use linear controllers, heuristic-based methods, and finite state machine based algorithms to track the refence gait cycle. However, since the amputee experiences a variety of non-linearities during ambulation, such as uneven terrains, walking backwards and climbing stairs, therefore, traditional controllers produces error, abnormal movements,… More >

  • Open Access

    ARTICLE

    Fusion-Based Supply Chain Collaboration Using Machine Learning Techniques

    Naeem Ali1, Taher M. Ghazal2,3, Alia Ahmed1, Sagheer Abbas4, M. A. Khan5, Haitham M. Alzoubi6, Umar Farooq7, Munir Ahmad4, Muhammad Adnan Khan8,*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1671-1687, 2022, DOI:10.32604/iasc.2022.019892 - 09 October 2021

    Abstract Supply Chain Collaboration is the network of various entities that work cohesively to make up the entire process. The supply chain organizations’ success is dependent on integration, teamwork, and the communication of information. Every day, supply chain and business players work in a dynamic setting. They must balance competing goals such as process robustness, risk reduction, vulnerability reduction, real financial risks, and resilience against just-in-time and cost-efficiency. Decision-making based on shared information in Supply Chain Collaboration constitutes the recital and competitiveness of the collective process. Supply Chain Collaboration has prompted companies to implement the perfect… More >

  • Open Access

    ARTICLE

    MRI Image Segmentation of Nasopharyngeal Carcinoma Using Multi-Scale Cascaded Fully Convolutional Network

    Yanfen Guo1,2, Zhe Cui1, Xiaojie Li2,*, Jing Peng1,2, Jinrong Hu2, Zhipeng Yang3, Tao Wu2, Imran Mumtaz4

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1771-1782, 2022, DOI:10.32604/iasc.2022.019785 - 09 October 2021

    Abstract Nasopharyngeal carcinoma (NPC) is one of the most common malignant tumors of the head and neck, and its incidence is the highest all around the world. Intensive radiotherapy using computer-aided diagnosis is the best technique for the treatment of NPC. The key step of radiotherapy is the delineation of the target areas and organs at risk, that is, tumor images segmentation. We proposed the segmentation method of NPC image based on multi-scale cascaded fully convolutional network. It used cascaded network and multi-scale feature for a coarse-to-fine segmentation to improve the segmentation effect. In coarse segmentation,… More >

  • Open Access

    ARTICLE

    Periodic Solutions for Two Dimensional Quartic Non-Autonomous Differential Equation

    Saima Akram1,*, Allah Nawaz1, Muhammad Bilal Riaz2, Mariam Rehman3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1467-1482, 2022, DOI:10.32604/iasc.2022.019767 - 09 October 2021

    Abstract In this article, the maximum possible numbers of periodic solutions for the quartic differential equation are calculated. In this regard, for the first time in the literature, we developed new formulae to determine the maximum number of periodic solutions greater than eight for the quartic equation. To obtain the maximum number of periodic solutions, we used a systematic procedure of bifurcation analysis. We used computer algebra Maple 18 to solve lengthy calculations that appeared in the formulae of focal values as integrations. The newly developed formulae were applied to a variety of polynomials with algebraic More >

Displaying 1161-1170 on page 117 of 1827. Per Page