Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique

    Liaqat Ali1, Saif E. A. Alnawayseh2, Mohammed Salahat3, Taher M. Ghazal4,5,*, Mohsen A. A. Tomh6, Beenu Mago7

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1095-1104, 2023, DOI:10.32604/iasc.2023.031335 - 29 September 2022

    Abstract The immediate international spread of severe acute respiratory syndrome revealed the potential threat of infectious diseases in a closely integrated and interdependent world. When an outbreak occurs, each country must have a well-coordinated and preventative plan to address the situation. Information and Communication Technologies have provided innovative approaches to dealing with numerous facets of daily living. Although intelligent devices and applications have become a vital part of our everyday lives, smart gadgets have also led to several physical and psychological health problems in modern society. Here, we used an artificial intelligence AI-based system for disease More >

  • Open Access

    ARTICLE

    Novel Path Counting-Based Method for Fractal Dimension Estimation of the Ultra-Dense Networks

    Farid Nahli11, Alexander Paramonov1, Naglaa F. Soliman2, Hussah Nasser AlEisa3,*, Reem Alkanhel2, Ammar Muthanna1, Abdelhamied A. Ateya4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 561-572, 2023, DOI:10.32604/iasc.2023.031299 - 29 September 2022

    Abstract Next-generation networks, including the Internet of Things (IoT), fifth-generation cellular systems (5G), and sixth-generation cellular systems (6G), suffer from the dramatic increase of the number of deployed devices. This puts high constraints and challenges on the design of such networks. Structural changing of the network is one of such challenges that affect the network performance, including the required quality of service (QoS). The fractal dimension (FD) is considered one of the main indicators used to represent the structure of the communication network. To this end, this work analyzes the FD of the network and its… More >

  • Open Access

    ARTICLE

    Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud

    G. Neelamegam*, P. Marikkannu

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1079-1093, 2023, DOI:10.32604/iasc.2023.031283 - 29 September 2022

    Abstract Due to the development of technology in medicine, millions of health-related data such as scanning the images are generated. It is a great challenge to store the data and handle a massive volume of data. Healthcare data is stored in the cloud-fog storage environments. This cloud-Fog based health model allows the users to get health-related data from different sources, and duplicated information is also available in the background. Therefore, it requires an additional storage area, increase in data acquisition time, and insecure data replication in the environment. This paper is proposed to eliminate the de-duplication… More >

  • Open Access

    ARTICLE

    Anomaly Detection in Social Media Texts Using Optimal Convolutional Neural Network

    Swarna Sudha Muppudathi1, Valarmathi Krishnasamy2,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1027-1042, 2023, DOI:10.32604/iasc.2023.031165 - 29 September 2022

    Abstract Social Networking Sites (SNSs) are nowadays utilized by the whole world to share ideas, images, and valuable contents by means of a post to reach a group of users. The use of SNS often inflicts the physical and the mental health of the people. Nowadays, researchers often focus on identifying the illegal behaviors in the SNS to reduce its negative influence. The state-of-art Natural Language processing techniques for anomaly detection have utilized a wide annotated corpus to identify the anomalies and they are often time-consuming as well as certainly do not guarantee maximum accuracy. To overcome… More >

  • Open Access

    ARTICLE

    Mobility Aware Zone-Based Routing in Vehicle Ad hoc Networks Using Hybrid Metaheuristic Algorithm

    C. Nandagopal1,*, P. Siva Kumar2, R. Rajalakshmi3, S. Anandamurugan4

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 113-126, 2023, DOI:10.32604/iasc.2023.031103 - 29 September 2022

    Abstract Vehicle Ad hoc Networks (VANETs) have high mobility and a randomized connection structure, resulting in extremely dynamic behavior. Several challenges, such as frequent connection failures, sustainability, multi-hop data transfer, and data loss, affect the effectiveness of Transmission Control Protocols (TCP) on such wireless ad hoc networks. To avoid the problem, in this paper, mobility-aware zone-based routing in VANET is proposed. To achieve this concept, in this paper hybrid optimization algorithm is presented. The hybrid algorithm is a combination of Ant colony optimization (ACO) and artificial bee colony optimization (ABC). The proposed hybrid algorithm is designed for… More >

  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079 - 29 September 2022

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts.… More >

  • Open Access

    ARTICLE

    Smart Lung Tumor Prediction Using Dual Graph Convolutional Neural Network

    Abdalla Alameen*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 369-383, 2023, DOI:10.32604/iasc.2023.031039 - 29 September 2022

    Abstract A significant advantage of medical image processing is that it allows non-invasive exploration of internal anatomy in great detail. It is possible to create and study 3D models of anatomical structures to improve treatment outcomes, develop more effective medical devices, or arrive at a more accurate diagnosis. This paper aims to present a fused evolutionary algorithm that takes advantage of both whale optimization and bacterial foraging optimization to optimize feature extraction. The classification process was conducted with the aid of a convolutional neural network (CNN) with dual graphs. Evaluation of the performance of the fused… More >

  • Open Access

    ARTICLE

    Optimization of Cognitive Femtocell Network via Oppositional Beetle Swarm Optimization Algorithm

    K. Rajesh Kumar1,*, M. Vijayakumar2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 819-832, 2023, DOI:10.32604/iasc.2023.030961 - 29 September 2022

    Abstract In past decades, cellular networks have raised the usage of spectrum resources due to the victory of mobile broadband services. Mobile devices create massive data than ever before, facing the way cellular networks are installed presently for satisfying the increased traffic requirements. The development of a new exclusive spectrum offered to meet up the traffic requirements is challenging as spectrum resources are limited, hence costly. Cognitive radio technology is presented to increase the pool of existing spectrum resources for mobile users via Femtocells, placed on the top of the available macrocell network for sharing the… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Threatened Species Translocation Under Climate Vulnerability

    Nandhi Kesavan*, Latha

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 327-337, 2023, DOI:10.32604/iasc.2023.030910 - 29 September 2022

    Abstract Climate change is the most serious causes and has a direct impact on biodiversity. According to the world’s biodiversity conservation organization, reptile species are most affected since their biological and ecological qualities are directly linked to climate. Due to a lack of time frame in existing works, conservation adoption affects the performance of existing works. The proposed research presents a knowledge-driven Decision Support System (DSS) including the assisted translocation to adapt to future climate change to conserving from its extinction. The Dynamic approach is used to develop a knowledge-driven DSS using machine learning by applying More >

  • Open Access

    ARTICLE

    An Integrated Multilayered Framework for IoT Security Intrusion Decisions

    Hassen Sallay*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 429-444, 2023, DOI:10.32604/iasc.2023.030791 - 29 September 2022

    Abstract Security breaches can seriously harm the Internet of Things (IoT) and Industrial IoT (IIoT) environments. The damage can exceed financial and material losses to threaten human lives. Overcoming these security risks is challenging given IoT ubiquity, complexity, and restricted resources. Security intrusion management is a cornerstone in fortifying the defensive security process. This paper presents an integrated multilayered framework facilitating the orchestration of the security intrusion management process and developing security decision support systems. The proposed framework incorporates four layers with four dedicated processing phases. This paper focuses mainly on the analytical layer. We present… More >

Displaying 11601-11610 on page 1161 of 31561. Per Page