Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    Content-Based Movie Recommendation System Using MBO with DBN

    S. Sridhar1,*, D. Dhanasekaran2, G. Charlyn Pushpa Latha3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3241-3257, 2023, DOI:10.32604/iasc.2023.030361

    Abstract The content-based filtering technique has been used effectively in a variety of Recommender Systems (RS). The user explicitly or implicitly provides data in the Content-Based Recommender System. The system collects this data and creates a profile for all the users, and the recommendation is generated by the user profile. The recommendation generated via content-based filtering is provided by observing just a single user’s profile. The primary objective of this RS is to recommend a list of movies based on the user’s preferences. A content-based movie recommendation model is proposed in this research, which recommends movies based on the user’s profile… More >

  • Open Access

    ARTICLE

    Butterfly Optimized Feature Selection with Fuzzy C-Means Classifier for Thyroid Prediction

    S. J. K. Jagadeesh Kumar1, P. Parthasarathi2, Mehedi Masud3, Jehad F. Al-Amri4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2909-2924, 2023, DOI:10.32604/iasc.2023.030335

    Abstract The main task of thyroid hormones is controlling the metabolism rate of humans, the development of neurons, and the significant growth of reproductive activities. In medical science, thyroid disorder will lead to creating thyroiditis and thyroid cancer. The two main thyroid disorders are hyperthyroidism and hypothyroidism. Many research works focus on the prediction of thyroid disorder. To improve the accuracy in the classification of thyroid disorder this paper proposes optimization-based feature selection by using differential evolution with the Butterfly optimization algorithm (DE-BOA). For the classifier fuzzy C-means algorithm (FCM) is used. The proposed DEBOA-FCM is evaluated with parametric metric measures… More >

  • Open Access

    ARTICLE

    Robust Symmetry Prediction with Multi-Modal Feature Fusion for Partial Shapes

    Junhua Xi1, Kouquan Zheng1, Yifan Zhong2, Longjiang Li3, Zhiping Cai1,*, Jinjing Chen4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3099-3111, 2023, DOI:10.32604/iasc.2023.030298

    Abstract In geometry processing, symmetry research benefits from global geometric features of complete shapes, but the shape of an object captured in real-world applications is often incomplete due to the limited sensor resolution, single viewpoint, and occlusion. Different from the existing works predicting symmetry from the complete shape, we propose a learning approach for symmetry prediction based on a single RGB-D image. Instead of directly predicting the symmetry from incomplete shapes, our method consists of two modules, i.e., the multi-modal feature fusion module and the detection-by-reconstruction module. Firstly, we build a channel-transformer network (CTN) to extract cross-fusion features from the RGB-D… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3693-3712, 2023, DOI:10.32604/iasc.2023.030287

    Abstract Technological advancement has made a significant contribution to the change of the economy and the advancement of humanity. Because it is changing how economic transactions are carried out, the blockchain is one of the technical developments that has a lot of promise for this progress. The public record of the Bitcoin blockchain provides dispersed users with evidence of transaction ownership by publishing all transaction data from block reward transactions to unspent transaction outputs. Attacks on the public ledger, on the other hand, are a result of the fact that all transaction information are exposed. De-anonymization attacks allow users to link… More >

  • Open Access

    ARTICLE

    A Novel Fusion System Based on Iris and Ear Biometrics for E-exams

    S. A. Shaban*, Hosnia M. M. Ahmed, D. L. Elsheweikh

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3295-3315, 2023, DOI:10.32604/iasc.2023.030237

    Abstract With the rapid spread of the coronavirus epidemic all over the world, educational and other institutions are heading towards digitization. In the era of digitization, identifying educational e-platform users using ear and iris based multimodal biometric systems constitutes an urgent and interesting research topic to preserve enterprise security, particularly with wearing a face mask as a precaution against the new coronavirus epidemic. This study proposes a multimodal system based on ear and iris biometrics at the feature fusion level to identify students in electronic examinations (E-exams) during the COVID-19 pandemic. The proposed system comprises four steps. The first step is… More >

  • Open Access

    ARTICLE

    Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data

    Yining Qi1,2,*, Yubo Luo3, Yongfeng Huang1,2, Xing Li1,2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2603-2618, 2023, DOI:10.32604/iasc.2023.030191

    Abstract Cloud storage has been widely used to team work or cooperation development. Data owners set up groups, generating and uploading their data to cloud storage, while other users in the groups download and make use of it, which is called group data sharing. As all kinds of cloud service, data group sharing also suffers from hardware/software failures and human errors. Provable Data Possession (PDP) schemes are proposed to check the integrity of data stored in cloud without downloading. However, there are still some unmet needs lying in auditing group shared data. Researchers propose four issues necessary for a secure group… More >

  • Open Access

    ARTICLE

    Brain Tumor Classification Using Image Fusion and EFPA-SVM Classifier

    P. P. Fathimathul Rajeena1,*, R. Sivakumar2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2837-2855, 2023, DOI:10.32604/iasc.2023.030144

    Abstract An accurate and early diagnosis of brain tumors based on medical imaging modalities is of great interest because brain tumors are a harmful threat to a person’s health worldwide. Several medical imaging techniques have been used to analyze brain tumors, including computed tomography (CT) and magnetic resonance imaging (MRI). CT provides information about dense tissues, whereas MRI gives information about soft tissues. However, the fusion of CT and MRI images has little effect on enhancing the accuracy of the diagnosis of brain tumors. Therefore, machine learning methods have been adopted to diagnose brain tumors in recent years. This paper intends… More >

  • Open Access

    ARTICLE

    Unmanned Aerial Vehicle Assisted Forest Fire Detection Using Deep Convolutional Neural Network

    A. K. Z Rasel Rahman1, S. M. Nabil Sakif1, Niloy Sikder1, Mehedi Masud2, Hanan Aljuaid3, Anupam Kumar Bairagi1,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3259-3277, 2023, DOI:10.32604/iasc.2023.030142

    Abstract Disasters may occur at any time and place without little to no presage in advance. With the development of surveillance and forecasting systems, it is now possible to forebode the most life-threatening and formidable disasters. However, forest fires are among the ones that are still hard to anticipate beforehand, and the technologies to detect and plot their possible courses are still in development. Unmanned Aerial Vehicle (UAV) image-based fire detection systems can be a viable solution to this problem. However, these automatic systems use advanced deep learning and image processing algorithms at their core and can be tuned to provide… More >

  • Open Access

    ARTICLE

    Unconstrained Gender Recognition from Periocular Region Using Multiscale Deep Features

    Raqinah Alrabiah, Muhammad Hussain*, Hatim A. AboAlSamh

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2941-2962, 2023, DOI:10.32604/iasc.2023.030036

    Abstract The gender recognition problem has attracted the attention of the computer vision community due to its importance in many applications (e.g., surveillance and human–computer interaction [HCI]). Images of varying levels of illumination, occlusion, and other factors are captured in uncontrolled environments. Iris and facial recognition technology cannot be used on these images because iris texture is unclear in these instances, and faces may be covered by a scarf, hijab, or mask due to the COVID-19 pandemic. The periocular region is a reliable source of information because it features rich discriminative biometric features. However, most existing gender classification approaches have been… More >

  • Open Access

    ARTICLE

    Cephalopods Classification Using Fine Tuned Lightweight Transfer Learning Models

    P. Anantha Prabha1,*, G. Suchitra2, R. Saravanan3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3065-3079, 2023, DOI:10.32604/iasc.2023.030017

    Abstract Cephalopods identification is a formidable task that involves hand inspection and close observation by a malacologist. Manual observation and identification take time and are always contingent on the involvement of experts. A system is proposed to alleviate this challenge that uses transfer learning techniques to classify the cephalopods automatically. In the proposed method, only the Lightweight pre-trained networks are chosen to enable IoT in the task of cephalopod recognition. First, the efficiency of the chosen models is determined by evaluating their performance and comparing the findings. Second, the models are fine-tuned by adding dense layers and tweaking hyperparameters to improve… More >

Displaying 491-500 on page 50 of 1781. Per Page