Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,249)
  • Open Access

    ARTICLE

    Modeling of Chaotic Political Optimizer for Crop Yield Prediction

    Gurram Sunitha1,*, M. N. Pushpalatha2, A. Parkavi3, Prasanthi Boyapati4, Ranjan Walia5, Rachna Kohar6, Kashif Qureshi7

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 423-437, 2022, DOI:10.32604/iasc.2022.024757

    Abstract Crop yield is an extremely difficult trait identified using many factors like genotype, environment and their interaction. Accurate Crop Yield Prediction (CYP) necessitates the basic understanding of the functional relativity among yields and the collaborative factor. Disclosing such connection requires both wide-ranging datasets and an efficient model. The CYP is important to accomplish irrigation scheduling and assessing labor necessities for reaping and storing. Predicting yield using various kinds of irrigation is effective for optimizing resources, but CYP is a difficult process owing to the existence of distinct factors. Recently, Deep Learning (DL) approaches offer solutions to complicated data like weather… More >

  • Open Access

    ARTICLE

    Crypto Hash Based Malware Detection in IoMT Framework

    R Punithavathi1, K Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 559-574, 2022, DOI:10.32604/iasc.2022.024715

    Abstract The challenges in providing e-health services with the help of Internet of Medical Things (IoMT) is done by connecting to the smart medical devices. Through IoMT sensor devices/smart devices, physicians share the sensitive information of the patient. However, protecting the patient health care details from malware attack is necessary in this advanced digital scenario. Therefore, it is needed to implement cryptographic algorithm to enhance security, safety, reliability, preventing details from malware attacks and privacy of medical data. Nowadays blockchain has become a prominent technology for storing medical data securely and transmit through IoMT concept. The issues in the existing research… More >

  • Open Access

    ARTICLE

    Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos

    M. Murugesan*, S. Thilagamani

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 389-405, 2022, DOI:10.32604/iasc.2022.024641

    Abstract Automatic anomaly activity detection is difficult in video surveillance applications due to variations in size, type, shape, and objects’ location. The traditional anomaly detection and classification methods may affect the overall segmentation accuracy. It requires the working groups to judge their constant attention if the captured activities are anomalous or suspicious. Therefore, this defect creates the need to automate this process with high accuracy. In addition to being extraordinary or questionable, the display does not contain the necessary recording frame and activity standard to help the quick judgment of the parts’ specialized action. Therefore, to reduce the wastage of time… More >

  • Open Access

    ARTICLE

    Steering Behavior-based Multiple RUAV Obstacle Avoidance Control

    Vishnu Kumar Kaliappan1, Tuan Anh Nguyen1, Dugki Min2,*, Jae-Woo Lee1, U. Sakthi3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 575-591, 2022, DOI:10.32604/iasc.2022.024577

    Abstract In recent years, the applications of rotorcraft-based unmanned aerial vehicles (RUAV) have increased rapidly. In particular, the integration of bio-inspired techniques to enhance intelligence in coordinating multiple Rotorcraft-based Unmanned Aerial Vehicles (RUAVs) has been a focus of recent research and development. Due to the limitation in intelligence, these RUAVs are restricted in flying low altitude with high maneuverability. To make it possible, the RUAVs must have the ability to avoid both static and dynamic obstacles while operating at low altitudes. Therefore, developing a state-of-the-art intelligent control algorithm is necessary to avoid low altitude obstacles and coordinate without collision while executing… More >

  • Open Access

    ARTICLE

    Core-based Approach to Measure Pairwise Layer Similarity in Multiplex Network

    Debasis Mohapatra1, Sourav Kumar Bhoi1, Kalyan Kumar Jena1, Chittaranjan Mallick2, Kshira Sagar Sahoo3, N. Z. Jhanjhi4,*, Mehedi Masud5

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 51-64, 2022, DOI:10.32604/iasc.2022.024561

    Abstract Most of the recent works on network science are focused on investigating various interactions among a set of entities present in a system that can be represented by multiplex network. Each type of relationship is treated as a layer of multiplex network. Some of the recent works on multiplex networks are focused on deriving layer similarity from node similarity where node similarity is evaluated using neighborhood similarity measures like cosine similarity and Jaccard similarity. But this type of analysis lacks in finding the set of nodes having the same influence in both the network. The discovery of influence similarity between… More >

  • Open Access

    ARTICLE

    Extreme Learning Bat Algorithm in Brain Tumor Classification

    G. R. Sreekanth1, Adel Fahad Alrasheedi2, K. Venkatachalam3, Mohamed Abouhawwash4,5,*, S. S. Askar2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 249-265, 2022, DOI:10.32604/iasc.2022.024538

    Abstract Brain tumor is considered as an unusual cell that presents and grows in the brain. Similarly, it may lead to cancerous or non-cancerous. So, to improve the survival rate of the patient and to give the best treatment at the earliest, it’s very necessary for early prediction of tumor. Accurate classification of tumor in the brain is important for improving the diagnosis. In accordance with that, various research programs are invited for the better treatment of the patients. Machine Learning (ML) algorithms are applied to help the health associates for the classification of brain tumor and present their diagnosis. This… More >

  • Open Access

    ARTICLE

    Automated Crack Detection via Semantic Segmentation Approaches Using Advanced U-Net Architecture

    Honggeun Ji1,2, Jina Kim3, Syjung Hwang4, Eunil Park1,4,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 593-607, 2022, DOI:10.32604/iasc.2022.024405

    Abstract Cracks affect the robustness and adaptability of various infrastructures, including buildings, bridge piers, pavement, and pipelines. Therefore, the robustness and the reliability of automated crack detection are essential. In this study, we conducted image segmentation using various crack datasets by applying the advanced architecture of U-Net. First, we collected and integrated crack datasets from prior studies, including the cracks in buildings and pavements. For effective localization and detection of cracks, we used U-Net-based neural networks, ResU-Net, VGGU-Net, and EfficientU-Net. The models were evaluated by the five-fold cross-validation using several evaluation metrics including mean pixel accuracy (MPA), mean intersection over union… More >

  • Open Access

    ARTICLE

    An Intelligent Classification System for Trophozoite Stages in Malaria Species

    Siti Nurul Aqmariah Mohd Kanafiah1,*, Mohd Yusoff Mashor1, Zeehaida Mohamed2, Yap Chun Way1, Shazmin Aniza Abdul Shukor1, Yessi Jusman3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 687-697, 2022, DOI:10.32604/iasc.2022.024361

    Abstract Malaria is categorised as a dangerous disease that can cause fatal in many countries. Therefore, early detection of malaria is essential to get rapid treatment. The malaria detection process is usually carried out with a 100x magnification of thin blood smear using microscope observation. However, the microbiologist required a long time to identify malaria types before applying any proper treatment to the patient. It also has difficulty to differentiate the species in trophozoite stages because of similar characteristics between species. To overcome these problems, a computer-aided diagnosis system is proposed to classify trophozoite stages of Plasmodium Knowlesi (PK), Plasmodium Falciparum… More >

  • Open Access

    ARTICLE

    Ant Colony Optimization-based Light Weight Container (ACO-LWC) Algorithm for Efficient Load Balancing

    K. Aruna1,*, G. Pradeep2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 205-219, 2022, DOI:10.32604/iasc.2022.024317

    Abstract Container technology is the latest lightweight virtualization technology which is an alternate solution for virtual machines. Docker is the most popular container technology for creating and managing Linux containers. Containers appear to be the most suitable medium for use in dynamic development, packaging, shipping and many other information technology environments. The portability of the software through the movement of containers is appreciated by businesses and IT professionals. In the docker container, one or more processes may run simultaneously. The main objective of this work is to propose a new algorithm called Ant Colony Optimization-based Light Weight Container (ACO-LWC) load balancing… More >

  • Open Access

    ARTICLE

    Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things

    D. Kothandaraman1,*, M. Manickam2, A. Balasundaram3, D. Pradeep4, A. Arulmurugan5, Arun Kumar Sivaraman6, Sita Rani7, Barnali Dey8, R. Balakrishna9

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 655-666, 2022, DOI:10.32604/iasc.2022.024134

    Abstract This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote enhanced and efficient Internet of Things (IoT). The work increases the mobility as well as an opportunity for loss of IoT node meeting links due to both mobility and blockers/interferers. The proposed algorithm overcomes loss issues as well as works in dynamically allocating alternate route from other IoT nodes available in near and selecting for efficient route in the network. When the link fails, bandwidth is reduced and coverage area problems for packets sending from source to destination is managed. The proposed algorithm works with light-weight wireless… More >

Displaying 8531-8540 on page 854 of 22249. Per Page