Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    To Control Diabetes Using Machine Learning Algorithm and Calorie Measurement Technique

    T. Viveka1,*, C. Christopher Columbus2, N. Senthil Velmurugan3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 535-547, 2022, DOI:10.32604/iasc.2022.022976

    Abstract Because of the increasing workload, people are having several clinical examinations to determine their health status, resulting in limited time. Here, we present a healthful consuming device based on rule mining that can modify your parameter dependency and recommend the varieties of meals that will boost your fitness and assist you to avoid the types of meals that increase your risk for sicknesses. Using the meals database, the data mining technique is useful for gathering meal energy from breakfast, after breakfast, lunch, after lunch, dinner, after dinner, and bedtime for ninety days. The purpose of this study is to determine… More >

  • Open Access

    ARTICLE

    An Advanced Integrated Approach in Mobile Forensic Investigation

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 87-102, 2022, DOI:10.32604/iasc.2022.022972

    Abstract Rapid advancement of digital technology has encouraged its use in all aspects of life, including the workplace, education, and leisure. As technology advances, so does the number of users, which leads to an increase in criminal activity and demand for a cyber-crime investigation. Mobile phones have been the epicenter of illegal activity in recent years. Sensitive information is transferred due to numerous technical applications available at one’s fingertips, which play an essential part in cyber-crime attacks in the mobile environment. Mobile forensic is a technique of recovering or retrieving digital evidence from mobile devices so that it may be submitted… More >

  • Open Access

    ARTICLE

    Optimized Compressive Sensing Based ECG Signal Compression and Reconstruction

    Ishani Mishra1,*, Sanjay Jain2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 415-428, 2022, DOI:10.32604/iasc.2022.022860

    Abstract In wireless body sensor network (WBSN), the set of electrocardiograms (ECG) data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient. However, due to the size of the ECG data, the performance of the signal compression and reconstruction is degraded. For efficient wireless transmission of ECG data, compressive sensing (CS) frame work plays significant role recently in WBSN. So, this work focuses to present CS for ECG signal compression and reconstruction. Although CS minimizes mean square error (MSE), compression rate and reconstruction probability of the CS is… More >

  • Open Access

    ARTICLE

    Multi-Domain Deep Convolutional Neural Network for Ancient Urdu Text Recognition System

    K. O. Mohammed Aarif1,*, P. Sivakumar2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 275-289, 2022, DOI:10.32604/iasc.2022.022805

    Abstract Deep learning has achieved magnificent success in the field of pattern recognition. In recent years Urdu character recognition system has significantly benefited from the effectiveness of the deep convolutional neural network. Majority of the research on Urdu text recognition are concentrated on formal handwritten and printed Urdu text document. In this paper, we experimented the Challenging issue of text recognition in Urdu ancient literature documents. Due to its cursiveness, complex word formation (ligatures), and context-sensitivity, and inadequate benchmark dataset, recognition of Urdu text from the literature document is very difficult to process compared to the formal Urdu text document. In… More >

  • Open Access

    ARTICLE

    Social Networks Fake Account and Fake News Identification with Reliable Deep Learning

    N. Kanagavalli1,*, S. Baghavathi Priya2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 191-205, 2022, DOI:10.32604/iasc.2022.022720

    Abstract Recent developments of the World Wide Web (WWW) and social networking (Twitter, Instagram, etc.) paves way for data sharing which has never been observed in the human history before. A major security issue in this network is the creation of fake accounts. In addition, the automatic classification of the text article as true or fake is also a crucial process. The ineffectiveness of humans in distinguishing the true and false information exposes the fake news as a risk to credibility, democracy, logical truth, and journalism in government sectors. Besides, the automatic fake news or rumors from the social networking sites… More >

  • Open Access

    ARTICLE

    Multi-Model CNN-RNN-LSTM Based Fruit Recognition and Classification

    Harmandeep Singh Gill1,*, Osamah Ibrahim Khalaf2, Youseef Alotaibi3, Saleh Alghamdi4, Fawaz Alassery5

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 637-650, 2022, DOI:10.32604/iasc.2022.022589

    Abstract Contemporary vision and pattern recognition issues such as image, face, fingerprint identification, and recognition, DNA sequencing, often have a large number of properties and classes. To handle such types of complex problems, one type of feature descriptor is not enough. To overcome these issues, this paper proposed a multi-model recognition and classification strategy using multi-feature fusion approaches. One of the growing topics in computer and machine vision is fruit and vegetable identification and categorization. A fruit identification system may be employed to assist customers and purchasers in identifying the species and quality of fruit. Using Convolution Neural Network (CNN), Recurrent… More >

  • Open Access

    ARTICLE

    Error Rate Analysis of Intelligent Reflecting Surfaces Aided Non-Orthogonal Multiple Access System

    A. Vasuki1, Vijayakumar Ponnusamy2,*

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 71-86, 2022, DOI:10.32604/iasc.2022.022586

    Abstract A good wireless device in a system needs high spectral efficiency. Non-Orthogonal Multiple Access (NOMA) is a technique used to enhance spectral efficiency, thereby allowing users to share information at the same time and same frequency. The information of the user is super-positioned either in the power or code domain. However, interference cancellation in NOMA aided system is challenging as it determines the reliability of the system in terms of Bit Error Rate (BER). BER is an essential performance parameter for any wireless network. Intelligent Reflecting Surfaces (IRS) enhances the BER of the users by controlling the electromagnetic wave propagation… More >

  • Open Access

    ARTICLE

    Deep Reinforcement Learning-Based Long Short-Term Memory for Satellite IoT Channel Allocation

    S. Lakshmi Durga1, Ch. Rajeshwari1, Khalid Hamed Allehaibi2, Nishu Gupta3,*, Nasser Nammas Albaqami4, Isha Bharti5, Ahmad Hoirul Basori6

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 1-19, 2022, DOI:10.32604/iasc.2022.022536

    Abstract In recent years, the demand for smart wireless communication technology has increased tremendously, and it urges to extend internet services globally with high reliability, less cost and minimal delay. In this connection, low earth orbit (LEO) satellites have played prominent role by reducing the terrestrial infrastructure facilities and providing global coverage all over the earth with the help of satellite internet of things (SIoT). LEO satellites provide wide coverage area to dynamically accessing network with limited resources. Presently, most resource allocation schemes are designed only for geostationary earth orbit (GEO) satellites. For LEO satellites, resource allocation is challenging due to… More >

  • Open Access

    ARTICLE

    A Novel Method of User Identity Recognition Based on Finger Trajectory

    Xia Zhou1, Zijian Wang2, Tianyu Wang2, Jin Han2,*, Zhiling Wang2, Yannan Qian3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 473-481, 2022, DOI:10.32604/iasc.2022.022493

    Abstract User identity recognition is the key shield to protect users’ privacy data from disclosure and embezzlement. The user identity of mobile devices such as mobile phones mainly includes fingerprint recognition, nine-grid password, face recognition, digital password, etc. Due to the requirements of computing resources and convenience of mobile devices, these verification methods have their own shortcomings. In this paper, a user identity recognition technology based on finger trajectory is proposed. Based on the analysis of the users’ finger trajectory data, the feature of the user's finger movement trajectory is extracted to realize the identification of the user. Also, in this… More >

  • Open Access

    ARTICLE

    Adaptive XGBOOST Hyper Tuned Meta Classifier for Prediction of Churn Customers

    B. Srikanth1,*, Swarajya Lakshmi V. Papineni2, Gutta Sridevi3, D. N. V. S. L. S. Indira4, K. S. R. Radhika5, Khasim Syed6

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 21-34, 2022, DOI:10.32604/iasc.2022.022423

    Abstract In India, the banks have a formidable edge in maintaining their customer retention ratio for past few decades. Downfall makes the private banks to reduce their operations and the nationalised banks merge with other banks. The researchers have used the traditional and ensemble algorithms with relevant feature engineering techniques to better classify the customers. The proposed algorithm uses a Meta classifier instead of an ensemble algorithm with an adaptive genetic algorithm for feature selection. Churn prediction is the number of customers who wants to terminate their services in the banking sector. The model considers twelve attributes like credit score, geography,… More >

Displaying 9471-9480 on page 948 of 22233. Per Page