Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Identification and Acknowledgment of Programmed Traffic Sign Utilizing Profound Convolutional Neural Organization

    P. Vigneshwaran1,*, N. Prasath1, M. Islabudeen2, A. Arun1, A. K. Sampath2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1527-1543, 2023, DOI:10.32604/iasc.2023.028444

    Abstract Traffic signs are basic security workplaces making the rounds, which expects a huge part in coordinating busy time gridlock direct, ensuring the prosperity of the road and dealing with the smooth segment of vehicles and individuals by walking, etc. As a segment of the clever transportation structure, the acknowledgment of traffic signs is basic for the driving assistance system, traffic sign upkeep, self-administering driving, and various spaces. There are different assessments turns out achieved for traffic sign acknowledgment in the world. However, most of the works are only for explicit arrangements of traffic signs, for example, beyond what many would… More >

  • Open Access

    ARTICLE

    A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

    W. Gracy Theresa1,*, A. Gayathri2, P. Rama3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1337-1351, 2023, DOI:10.32604/iasc.2023.028425

    Abstract Mobile computing is the most powerful application for network communication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a framework must ensure that the retrieved data reflects the transmitted data. Before driving to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame and enable the high-layer protocols… More >

  • Open Access

    ARTICLE

    A Process Oriented Integration Model for Smart Health Services

    Farzana Kausar Gondal1,*, Syed Khuram Shahzad2, Muhammad Arfan Jaffar3, Muhammad Waseem Iqbal4

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1369-1386, 2023, DOI:10.32604/iasc.2023.028407

    Abstract Cities are facing challenges of high rise in population number and consequently need to be equipped with latest smart services to provide luxuries of life to its residents. Smart integrated solutions are also a need to deal with the social and environmental challenges, caused by increasing urbanization. Currently, the development of smart services’ integrated network, within a city, is facing the barriers including; less efficient collection and sharing of data, along with inadequate collaboration of software and hardware. Aiming to resolve these issues, this paper recommended a solution for a synchronous functionality in the smart services’ integration process through modeling… More >

  • Open Access

    ARTICLE

    Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)

    Neetika Bhandari1,*, Payal Pahwa2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2043-2055, 2023, DOI:10.32604/iasc.2023.028368

    Abstract Data is humongous today because of the extensive use of World Wide Web, Social Media and Intelligent Systems. This data can be very important and useful if it is harnessed carefully and correctly. Useful information can be extracted from this massive data using the Data Mining process. The information extracted can be used to make vital decisions in various industries. Clustering is a very popular Data Mining method which divides the data points into different groups such that all similar data points form a part of the same group. Clustering methods are of various types. Many parameters and indexes exist… More >

  • Open Access

    ARTICLE

    An Efficient Method for Underwater Video Summarization and Object Detection Using YoLoV3

    Mubashir Javaid1, Muazzam Maqsood2, Farhan Aadil2, Jibran Safdar1, Yongsung Kim3,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1295-1310, 2023, DOI:10.32604/iasc.2023.028262

    Abstract Currently, worldwide industries and communities are concerned with building, expanding, and exploring the assets and resources found in the oceans and seas. More precisely, to analyze a stock, archaeology, and surveillance, several cameras are installed underseas to collect videos. However, on the other hand, these large size videos require a lot of time and memory for their processing to extract relevant information. Hence, to automate this manual procedure of video assessment, an accurate and efficient automated system is a greater necessity. From this perspective, we intend to present a complete framework solution for the task of video summarization and object… More >

  • Open Access

    ARTICLE

    Real Time Control System for Metro Railways Using PLC & SCADA

    Ishu Tomar*, Indu Sreedevi, Neeta Pandey

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1403-1421, 2023, DOI:10.32604/iasc.2023.028163

    Abstract This paper proposes to adopt SCADA and PLC technology for the improvement of the performance of real time signaling & train control systems in metro railways. The main concern of this paper is to minimize the failure in automated metro railways system operator and integrate the information coming from Operational Control Centre (OCC), traction SCADA system, traction power control, and power supply system. This work presents a simulated prototype of an automated metro train system operator that uses PLC and SCADA for the real time monitoring and control of the metro railway systems. Here, SCADA is used for the visualization… More >

  • Open Access

    ARTICLE

    Real-Time Speech Enhancement Based on Convolutional Recurrent Neural Network

    S. Girirajan, A. Pandian*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1987-2001, 2023, DOI:10.32604/iasc.2023.028090

    Abstract Speech enhancement is the task of taking a noisy speech input and producing an enhanced speech output. In recent years, the need for speech enhancement has been increased due to challenges that occurred in various applications such as hearing aids, Automatic Speech Recognition (ASR), and mobile speech communication systems. Most of the Speech Enhancement research work has been carried out for English, Chinese, and other European languages. Only a few research works involve speech enhancement in Indian regional Languages. In this paper, we propose a two-fold architecture to perform speech enhancement for Tamil speech signal based on convolutional recurrent neural… More >

  • Open Access

    ARTICLE

    Predicting Violence-Induced Stress in an Arabic Social Media Forum

    Abeer Abdulaziz AlArfaj1, Nada Ali Hakami2,*, Hanan Ahmed Hosni Mahmoud1

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1423-1439, 2023, DOI:10.32604/iasc.2023.028067

    Abstract Social Media such as Facebook plays a substantial role in virtual communities by sharing ideas and ideologies among different populations over time. Social interaction analysis aids in defining people’s emotions and aids in assessing public attitudes, towards different issues such as violence against women and children. In this paper, we proposed an Arabic language prediction model to identify the issue of Violence-Induced Stress in social media. We searched for Arabic posts of many countries through Facebook application programming interface (API). We discovered that the stress state of a battered woman is usually related to her friend’s stress states on Facebook.… More >

  • Open Access

    ARTICLE

    WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

    C. Edwin Singh1,*, S. Maria Celestin Vigila2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1737-1751, 2023, DOI:10.32604/iasc.2023.028022

    Abstract Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified issues, academics have begun to concentrate on building IDS-based machine learning algorithms. Deep learning is a type of machine learning that can produce exceptional outcomes. This study proposes… More >

  • Open Access

    ARTICLE

    DLMNN Based Heart Disease Prediction with PD-SS Optimization Algorithm

    S. Raghavendra1, Vasudev Parvati2, R. Manjula3, Ashok Kumar Nanda4, Ruby Singh5, D. Lakshmi6, S. Velmurugan7,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1353-1368, 2023, DOI:10.32604/iasc.2023.027977

    Abstract In contemporary medicine, cardiovascular disease is a major public health concern. Cardiovascular diseases are one of the leading causes of death worldwide. They are classified as vascular, ischemic, or hypertensive. Clinical information contained in patients’ Electronic Health Records (EHR) enables clinicians to identify and monitor heart illness. Heart failure rates have risen dramatically in recent years as a result of changes in modern lifestyles. Heart diseases are becoming more prevalent in today’s medical setting. Each year, a substantial number of people die as a result of cardiac pain. The primary cause of these deaths is the improper use of pharmaceuticals… More >

Displaying 571-580 on page 58 of 1767. Per Page