Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    Deep Learning for Depression Detection Using Twitter Data

    Doaa Sami Khafaga1, Maheshwari Auvdaiappan2, K. Deepa3, Mohamed Abouhawwash4,5, Faten Khalid Karim1,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1301-1313, 2023, DOI:10.32604/iasc.2023.033360

    Abstract Today social media became a communication line among people to share their happiness, sadness, and anger with their end-users. It is necessary to know people’s emotions are very important to identify depressed people from their messages. Early depression detection helps to save people’s lives and other dangerous mental diseases. There are many intelligent algorithms for predicting depression with high accuracy, but they lack the definition of such cases. Several machine learning methods help to identify depressed people. But the accuracy of existing methods was not satisfactory. To overcome this issue, the deep learning method is used in the proposed method… More >

  • Open Access

    ARTICLE

    Early Detection Glaucoma and Stargardt’s Disease Using Deep Learning Techniques

    Somasundaram Devaraj*, Senthil Kumar Arunachalam

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1283-1299, 2023, DOI:10.32604/iasc.2023.033200

    Abstract Retinal fundus images are used to discover many diseases. Several Machine learning algorithms are designed to identify the Glaucoma disease. But the accuracy and time consumption performance were not improved. To address this problem Max Pool Convolution Neural Kuan Filtered Tobit Regressive Segmentation based Radial Basis Image Classifier (MPCNKFTRS-RBIC) Model is used for detecting the Glaucoma and Stargardt’s disease by early period using higher accuracy and minimal time. In MPCNKFTRS-RBIC Model, the retinal fundus image is considered as an input which is preprocessed in hidden layer 1 using weighted adaptive Kuan filter. Then, preprocessed retinal fundus is given for hidden… More >

  • Open Access

    ARTICLE

    Numerical Analysis for the Effect of Irresponsible Immigrants on HIV/AIDS Dynamics

    Muhammad Tariq Ali1, Dumitru Baleanu2,3,4, Muhammad Rafiq5, Jan Awrejcewicz6, Nauman Ahmed7, Ali Raza8,*, Muhammad Sajid Iqbal9, Muhammad Ozair Ahmad7

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1479-1496, 2023, DOI:10.32604/iasc.2023.033157

    Abstract The human immunodeficiency viruses are two species of Lentivirus that infect humans. Over time, they cause acquired immunodeficiency syndrome, a condition in which progressive immune system failure allows life-threatening opportunistic infections and cancers to thrive. Human immunodeficiency virus infection came from a type of chimpanzee in Central Africa. Studies show that immunodeficiency viruses may have jumped from chimpanzees to humans as far back as the late 1800s. Over decades, human immunodeficiency viruses slowly spread across Africa and later into other parts of the world. The Susceptible-Infected-Recovered (SIR) models are significant in studying disease dynamics. In this paper, we have studied… More >

  • Open Access

    ARTICLE

    Parallel Iterative FEM Solver with Initial Guess for Frequency Domain Electromagnetic Analysis

    Woochan Lee1, Woobin Park1, Jaeyoung Park2, Young-Joon Kim3, Moonseong Kim4,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1585-1602, 2023, DOI:10.32604/iasc.2023.033112

    Abstract The finite element method is a key player in computational electromagnetics for designing RF (Radio Frequency) components such as waveguides. The frequency-domain analysis is fundamental to identify the characteristics of the components. For the conventional frequency-domain electromagnetic analysis using FEM (Finite Element Method), the system matrix is complex-numbered as well as indefinite. The iterative solvers can be faster than the direct solver when the solver convergence is guaranteed and done in a few steps. However, such complex-numbered and indefinite systems are hard to exploit the merit of the iterative solver. It is also hard to benefit from matrix factorization techniques… More >

  • Open Access

    ARTICLE

    Hopping-Aware Cluster Header Capability for Sensor Relocation in Mobile IoT Networks

    Moonseong Kim1, Jaeyoung Park2, Young-Joon Kim3, Woochan Lee4,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1613-1625, 2023, DOI:10.32604/iasc.2023.033081

    Abstract Mobile sensor nodes such as hopping sensors are of critical importance in data collection. However, the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes. Thus, it is evident that the relocation of mobile sensors is the most desirable method to recover the sensing holes. The previous research conducted by the authors so far demonstrated the most realistic hopping sensor relocation scheme, which is suitable for the distributed environment. In previous studies, the cluster header plays an essential role in detecting the sensing hole and requesting the neighboring cluster to recover the sensing hole that… More >

  • Open Access

    ARTICLE

    Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

    A. Ramachandran1,*, P. Ramadevi2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2055-2070, 2023, DOI:10.32604/iasc.2023.032942

    Abstract Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly convenient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentication process. Blockchain technology is utilized in this study to enable… More >

  • Open Access

    ARTICLE

    Computing Connected Resolvability of Graphs Using Binary Enhanced Harris Hawks Optimization

    Basma Mohamed1,*, Linda Mohaisen2, Mohamed Amin1

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2349-2361, 2023, DOI:10.32604/iasc.2023.032930

    Abstract In this paper, we consider the NP-hard problem of finding the minimum connected resolving set of graphs. A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the vertices in B. A resolving set B of G is connected if the subgraph induced by B is a nontrivial connected subgraph of G. The cardinality of the minimal resolving set is the metric dimension of G and the cardinality of minimum connected resolving set is the connected metric dimension of G. The problem is solved heuristically… More >

  • Open Access

    ARTICLE

    Prediction of Link Failure in MANET-IoT Using Fuzzy Linear Regression

    R. Mahalakshmi1,*, V. Prasanna Srinivasan2, S. Aghalya3, D. Muthukumaran4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1627-1637, 2023, DOI:10.32604/iasc.2023.032709

    Abstract A Mobile Ad-hoc NETwork (MANET) contains numerous mobile nodes, and it forms a structure-less network associated with wireless links. But, the node movement is the key feature of MANETs; hence, the quick action of the nodes guides a link failure. This link failure creates more data packet drops that can cause a long time delay. As a result, measuring accurate link failure time is the key factor in the MANET. This paper presents a Fuzzy Linear Regression Method to measure Link Failure (FLRLF) and provide an optimal route in the MANET-Internet of Things (IoT). This work aims to predict link… More >

  • Open Access

    ARTICLE

    Novel Multimodal Biometric Feature Extraction for Precise Human Identification

    J. Vasavi1, M. S. Abirami2,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1349-1363, 2023, DOI:10.32604/iasc.2023.032604

    Abstract In recent years, biometric sensors are applicable for identifying important individual information and accessing the control using various identifiers by including the characteristics like a fingerprint, palm print, iris recognition, and so on. However, the precise identification of human features is still physically challenging in humans during their lifetime resulting in a variance in their appearance or features. In response to these challenges, a novel Multimodal Biometric Feature Extraction (MBFE) model is proposed to extract the features from the noisy sensor data using a modified Ranking-based Deep Convolution Neural Network (RDCNN). The proposed MBFE model enables the feature extraction from… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Enabled Decision Support System on E-Healthcare Environment

    B. Karthikeyan1,*, K. Nithya2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2299-2313, 2023, DOI:10.32604/iasc.2023.032585

    Abstract In today’s digital era, e-healthcare systems exploit digital technologies and telecommunication devices such as mobile devices, computers and the internet to provide high-quality healthcare services. E-healthcare decision support systems have been developed to optimize the healthcare services and enhance a patient’s health. These systems enable rapid access to the specialized healthcare services via reliable information, retrieved from the cases or the patient histories. This phenomenon reduces the time taken by the patients to physically visit the healthcare institutions. In the current research work, a new Shuffled Frog Leap Optimizer with Deep Learning-based Decision Support System (SFLODL-DSS) is designed for the… More >

Displaying 331-340 on page 34 of 1781. Per Page