Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    A Novel Deep Learning Framework for Pulmonary Embolism Detection for Covid-19 Management

    S. Jeevitha1,*, K. Valarmathi2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1123-1139, 2022, DOI:10.32604/iasc.2022.024746

    Abstract Pulmonary Embolism is a blood clot in the lung which restricts the blood flow and reduces blood oxygen level resulting in mortality if it is untreated. Further, pulmonary embolism is evidenced prominently in the segmental and sub-segmental regions of the computed tomography angiography images in COVID-19 patients. Pulmonary embolism detection from these images is a significant research problem in the challenging COVID-19 pandemic in the venture of early disease detection, treatment, and prognosis. Inspired by several investigations based on deep learning in this context, a two-stage framework has been proposed for pulmonary embolism detection which is realized as a segmentation… More >

  • Open Access

    ARTICLE

    Another View of Weakly Open Sets Via DNA Recombination

    Samirah Alzahrani1,*, A.I. El-Maghrabi2, M.S. Badr3

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 769-783, 2022, DOI:10.32604/iasc.2022.024682

    Abstract The generalized structure of deoxyribonucleic acid (DNA) is based on the rules of topological spaces. DNA recombination is one of the most important processes within DNA, as it is essential in the pharmaceutical industry as well as in gene therapy. In this paper, we are discussing the relationship between rough sets, nano topological spaces (N), nano Z open (N) sets, and DNA recombination. We also created a new recombination mapping using the properties of the DNA recombination process. Further, by using the process of cutting and sticking of a sequence of genes, new topological structures are constructed and some of… More >

  • Open Access

    ARTICLE

    Hybrid Renewable Energy System Using Cuckoo Firefly Optimization

    M. E. Shajini Sheeba1,*, P. Jagatheeswari2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1141-1156, 2022, DOI:10.32604/iasc.2022.024549

    Abstract With abundant and non-polluting benefits in nature, sources of renewable energy have reached vast concentrations. This paper first discusses the number of MPPT (Maximum Power Point Tracking) techniques utilized by wind and photovoltaic (PV) to create hybrid systems for generating wind-PV energy. This hybrid system complements each other day and night to enable continuous power output. Then, a new MPPT technique was proposed to extract maximum power using a newly developed hybrid optimization algorithm, namely the Cukoo Fire Fly method (CFF). The CFF algorithm is derived from the integration of the cuckoo search (CS) algorithm and the Firefly (FF) optimization… More >

  • Open Access

    ARTICLE

    Optimum Tuning of Photovoltaic System Via Hybrid Maximum Power Point Tracking Technique

    M. Nisha1,*, M. Germin Nisha2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1399-1413, 2022, DOI:10.32604/iasc.2022.024482

    Abstract A new methodology is used in this paper, for the optimal tuning of Photovoltaic (PV) by integrating the hybrid Maximum Power Point Tracking (MPPT) algorithms is proposed. The suggested hybrid MPPT algorithms can raise the performance of PV systems under partial shade conditions. It attempts to address the primary research issues in partial shading conditions in PV systems caused by clouds, trees, dirt, and dust. The proposed system computes MPPT utilizing an innovative adaptive model-based approach. In order to manage the input voltage at the Maximum PowerPoint, the MPPT algorithm changes the duty cycle of the switch in the DC-DC… More >

  • Open Access

    ARTICLE

    An Experimental Approach to Diagnose Covid-19 Using Optimized CNN

    Anjani Kumar Singha1, Nitish Pathak2,*, Neelam Sharma3, Abhishek Gandhar4, Shabana Urooj5, Swaleha Zubair6, Jabeen Sultana7, Guthikonda Nagalaxmi8

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1065-1080, 2022, DOI:10.32604/iasc.2022.024172

    Abstract The outburst of novel corona viruses aggregated worldwide and has undergone severe trials to manage medical sector all over the world. A radiologist uses x-rays and Computed Tomography (CT) scans to analyze images through which the existence of corona virus is found. Therefore, imaging and visualization systems contribute a dominant part in diagnosing process and thereby assist the medical experts to take necessary precautions and to overcome these rigorous conditions. In this research, a Multi-Objective Black Widow Optimization based Convolutional Neural Network (MBWO-CNN) method is proposed to diagnose and classify covid-19 data. The proposed method comprises of four stages, preprocess… More >

  • Open Access

    ARTICLE

    Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment

    Sriramulu Bojjagani1, D. R. Denslin Brabin2,*, K. Saravanan2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 805-819, 2022, DOI:10.32604/iasc.2022.023771

    Abstract The flow of information is a valuable asset for every company and its consumers, and Distributed Denial-of-Service (DDoS) assaults pose a substantial danger to this flow. If we do not secure security, hackers may steal information flowing across a network, posing a danger to a business and society. As a result, the most effective ways are necessary to deal with the dangers. A DDoS attack is a well-known network infrastructure assault that prevents servers from servicing genuine customers. It is necessary to identify and block a DDoS assault before it reaches the server in order to avoid being refused services.… More >

  • Open Access

    ARTICLE

    Dark and Bright Channel Priors for Haze Removal in Day and Night Images

    U. Hari, A. Ruhan Bevi*

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 957-967, 2022, DOI:10.32604/iasc.2022.023605

    Abstract Removal of noise from images is very important as a clear, denoised image is essential for any application. In this article, a modified haze removal algorithm is developed by applying combined dark channel prior and multi-scale retinex theory. The combined dark channel prior (DCP) and bright channel prior (BCP) together with the multi-scale retinex (MSR) algorithm is used to dynamically optimize the transmission map and thereby improve visibility. The proposed algorithm performs effective denoising of images considering the properties of retinex theory. The proposed method removes haze on an image scene through estimation of the atmospheric light and manipulating the… More >

  • Open Access

    ARTICLE

    Crack Detection in Composite Materials Using McrowDNN

    R. Saveeth1,*, S. Uma Maheswari2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 983-1000, 2022, DOI:10.32604/iasc.2022.023455

    Abstract In the aerospace industry, composite materials are becoming more common. The presence of a crack in an aircraft makes it weaker and more dangerous, and it can lead to complete fracture and catastrophic failure. To predict the position and depth of a crack, various methods have been developed. For aircraft repair, crack diagnosis is extremely important. Even then, due to uncertainties arising from sources such as environmental conditions, packing, and intrinsic material property changes, accurate diagnosis in real engineering applications remains a challenge. Deep learning (DL) approaches have demonstrated powerful recognition potential in a variety of fields in recent years.… More >

  • Open Access

    ARTICLE

    Person Re-Identification Using LBPH and K-Reciprocal Encoding

    V. Manimaran*, K. G. Srinivasagan

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1109-1121, 2022, DOI:10.32604/iasc.2022.023145

    Abstract Individual re-identification proof (Re-ID) targets recovering an individual of interest across different non-covering cameras. With the recent development of technological algorithm and expanding request of intelligence video observation, it has acquired fundamentally expanded interest in the computer vision. Person re-identification is characterized as the issue of perceiving an individual caught in different occasions and additionally areas more than a few nonoverlapping camera sees, thinking about a huge arrangement of up-and-comers. This issue influences essentially the administration of disseminated, multiview observation frameworks, in which subjects should be followed across better places, either deduced or on-the-fly when they travel through various areas.… More >

  • Open Access

    ARTICLE

    Deep Reinforcement Extreme Learning Machines for Secured Routing in Internet of Things (IoT) Applications

    K. Lavanya1,*, K. Vimala Devi2, B. R. Tapas Bapu3

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 837-848, 2022, DOI:10.32604/iasc.2022.023055

    Abstract Multipath TCP (SMPTCP) has gained more attention as a valuable approach for IoT systems. SMPTCP is introduced as an evolution of Transmission Control Protocol (TCP) to pass packets simultaneously across several routes to completely exploit virtual networks on multi-homed consoles and other network services. The current multipath networking algorithms and simulation software strategies are confronted with sub-flow irregularity issues due to network heterogeneity, and routing configuration issues can be fixed adequately. To overcome the issues, this paper proposes a novel deep reinforcement-based extreme learning machines (DRLELM) approach to examine the complexities between routes, pathways, sub-flows, and SMPTCP connections in different… More >

Displaying 781-790 on page 79 of 1781. Per Page