Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    A New Modified EWMA Control Chart for Monitoring Processes Involving Autocorrelated Data

    Korakoch Silpakob1, Yupaporn Areepong1,*, Saowanit Sukparungsee1, Rapin Sunthornwat2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 281-298, 2023, DOI:10.32604/iasc.2023.032487

    Abstract Control charts are one of the tools in statistical process control widely used for monitoring, measuring, controlling, improving the quality, and detecting problems in processes in various fields. The average run length (ARL) can be used to determine the efficacy of a control chart. In this study, we develop a new modified exponentially weighted moving average (EWMA) control chart and derive explicit formulas for both one and the two-sided ARLs for a p-order autoregressive (AR(p)) process with exponential white noise on the new modified EWMA control chart. The accuracy of the explicit formulas was compared to that of the well-known… More >

  • Open Access

    ARTICLE

    Millimeter Wave Massive MIMO Heterogeneous Networks Using Fuzzy-Based Deep Convolutional Neural Network (FDCNN)

    Hussain Alaaedi*, Masoud Sabaei

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 633-646, 2023, DOI:10.32604/iasc.2023.032462

    Abstract Enabling high mobility applications in millimeter wave (mmWave) based systems opens up a slew of new possibilities, including vehicle communications in addition to wireless virtual/augmented reality. The narrow beam usage in addition to the millimeter waves sensitivity might block the coverage along with the reliability of the mobile links. In this research work, the improvement in the quality of experience faced by the user for multimedia-related applications over the millimeter-wave band is investigated. The high attenuation loss in high frequencies is compensated with a massive array structure named Multiple Input and Multiple Output (MIMO) which is utilized in a hyperdense… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Models for Magnetic Resonance Imaging (MRI)-Based Brain Tumor Classification

    Abdullah A. Asiri1, Bilal Khan2, Fazal Muhammad3,*, Shams ur Rahman4, Hassan A. Alshamrani1, Khalaf A. Alshamrani1, Muhammad Irfan5, Fawaz F. Alqhtani1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 299-312, 2023, DOI:10.32604/iasc.2023.032426

    Abstract In the medical profession, recent technological advancements play an essential role in the early detection and categorization of many diseases that cause mortality. The technique rising on daily basis for detecting illness in magnetic resonance through pictures is the inspection of humans. Automatic (computerized) illness detection in medical imaging has found you the emergent region in several medical diagnostic applications. Various diseases that cause death need to be identified through such techniques and technologies to overcome the mortality ratio. The brain tumor is one of the most common causes of death. Researchers have already proposed various models for the classification… More >

  • Open Access

    ARTICLE

    Multi-Level Deep Generative Adversarial Networks for Brain Tumor Classification on Magnetic Resonance Images

    Abdullah A. Asiri1, Ahmad Shaf2,*, Tariq Ali2, Muhammad Aamir2, Ali Usman2, Muhammad Irfan3, Hassan A. Alshamrani1, Khlood M. Mehdar4, Osama M. Alshehri5, Samar M. Alqhtani6

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 127-143, 2023, DOI:10.32604/iasc.2023.032391

    Abstract The brain tumor is an abnormal and hysterical growth of brain tissues, and the leading cause of death affected patients worldwide. Even in this technology-based arena, brain tumor images with proper labeling and acquisition still have a problem with the accurate and reliable generation of realistic images of brain tumors that are completely different from the original ones. The artificially created medical image data would help improve the learning ability of physicians and other computer-aided systems for the generation of augmented data. To overcome the highlighted issue, a Generative Adversarial Network (GAN) deep learning technique in which two neural networks… More >

  • Open Access

    ARTICLE

    Night Vision Object Tracking System Using Correlation Aware LSTM-Based Modified Yolo Algorithm

    R. Anandha Murugan1,*, B. Sathyabama2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 353-368, 2023, DOI:10.32604/iasc.2023.032355

    Abstract Improved picture quality is critical to the effectiveness of object recognition and tracking. The consistency of those photos is impacted by night-video systems because the contrast between high-profile items and different atmospheric conditions, such as mist, fog, dust etc. The pictures then shift in intensity, colour, polarity and consistency. A general challenge for computer vision analyses lies in the horrid appearance of night images in arbitrary illumination and ambient environments. In recent years, target recognition techniques focused on deep learning and machine learning have become standard algorithms for object detection with the exponential growth of computer performance capabilities. However, the… More >

  • Open Access

    ARTICLE

    Neuro-Based Higher Order Sliding Mode Control for Perturbed Nonlinear Systems

    Ahmed M. Elmogy1,2,*, Wael M. Elawady2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 385-400, 2023, DOI:10.32604/iasc.2023.032349

    Abstract One of the great concerns when tackling nonlinear systems is how to design a robust controller that is able to deal with uncertainty. Many researchers have been working on developing such type of controllers. One of the most efficient techniques employed to develop such controllers is sliding mode control (SMC). However, the low order SMC suffers from chattering problem which harm the actuators of the control system and thus unsuitable to be used in many practical applications. In this paper, the drawbacks of low order traditional sliding mode control (FOTSMC) are resolved by presenting a novel adaptive radial basis function… More >

  • Open Access

    ARTICLE

    Automatic Detection of Outliers in Multi-Channel EMG Signals Using MFCC and SVM

    Muhammad Irfan1, Khalil Ullah2, Fazal Muhammad3,*, Salman Khan3, Faisal Althobiani4, Muhammad Usman5, Mohammed Alshareef4, Shadi Alghaffari4, Saifur Rahman1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 169-181, 2023, DOI:10.32604/iasc.2023.032337

    Abstract The automatic detection of noisy channels in surface Electromyogram (sEMG) signals, at the time of recording, is very critical in making a noise-free EMG dataset. If an EMG signal contaminated by high-level noise is recorded, then it will be useless and can’t be used for any healthcare application. In this research work, a new machine learning-based paradigm is proposed to automate the detection of low-level and high-level noises occurring in different channels of high density and multi-channel sEMG signals. A modified version of mel frequency cepstral coefficients (mMFCC) is proposed for the extraction of features from sEMG channels along with… More >

  • Open Access

    ARTICLE

    Improved Ant Colony Optimization and Machine Learning Based Ensemble Intrusion Detection Model

    S. Vanitha1,*, P. Balasubramanie2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 849-864, 2023, DOI:10.32604/iasc.2023.032324

    Abstract Internet of things (IOT) possess cultural, commercial and social effect in life in the future. The nodes which are participating in IOT network are basically attracted by the cyber-attack targets. Attack and identification of anomalies in IoT infrastructure is a growing problem in the IoT domain. Machine Learning Based Ensemble Intrusion Detection (MLEID) method is applied in order to resolve the drawback by minimizing malicious actions in related botnet attacks on Message Queue Telemetry Transport (MQTT) and Hyper-Text Transfer Protocol (HTTP) protocols. The proposed work has two significant contributions which are a selection of features and detection of attacks. New… More >

  • Open Access

    ARTICLE

    Explainable Heart Disease Prediction Using Ensemble-Quantum Machine Learning Approach

    Ghada Abdulsalam1, Souham Meshoul2,*, Hadil Shaiba3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 761-779, 2023, DOI:10.32604/iasc.2023.032262

    Abstract Nowadays, quantum machine learning is attracting great interest in a wide range of fields due to its potential superior performance and capabilities. The massive increase in computational capacity and speed of quantum computers can lead to a quantum leap in the healthcare field. Heart disease seriously threatens human health since it is the leading cause of death worldwide. Quantum machine learning methods can propose effective solutions to predict heart disease and aid in early diagnosis. In this study, an ensemble machine learning model based on quantum machine learning classifiers is proposed to predict the risk of heart disease. The proposed… More >

  • Open Access

    ARTICLE

    Region Centric GL Feature Approximation Based Secure Routing for Improved QoS in MANET

    S. Soundararajan1, R. Prabha2, M. Baskar3,*, T. J. Nagalakshmi4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 267-280, 2023, DOI:10.32604/iasc.2023.032239

    Abstract Secure routing in Mobile Adhoc Network (Manet) is the key issue now a day in providing secure access to different network services. As mobile devices are used in accessing different services, performing secure routing becomes a challenging task. Towards this, different approaches exist which find the trusted route based on their previous transmission details and behavior of different nodes. Also, the methods focused on trust measurement based on tiny information obtained from local nodes or with global information which are incomplete. However, the adversary nodes are more capable and participate in each transmission not just to steal the data also… More >

Displaying 381-390 on page 39 of 1767. Per Page