Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Hybrid Online Model for Predicting Diabetes Mellitus

    C. Mallika1,*, S. Selvamuthukumaran2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1873-1885, 2022, DOI:10.32604/iasc.2022.020543

    Abstract Modern healthcare systems have become smart by synergizing the potentials of wireless sensors, the medical Internet of things, and big data science to provide better patient care while decreasing medical expenses. Large healthcare organizations generate and accumulate an incredible volume of data continuously. The already daunting volume of medical information has a massive amount of diagnostic features and logged details of patients for certain diseases such as diabetes. Diabetes mellitus has emerged as along-haul fatal disease across the globe and particularly in developing countries. Exact and early diagnosis of diabetes from big medical data is vital for the deterrence of… More >

  • Open Access

    ARTICLE

    Prediction of Transformer Oil Breakdown Voltage with Barriers Using Optimization Techniques

    Sherif S. M. Ghoneim1,*, Mosleh M. Alharthi1, Ragab A. El-Sehiemy2, Abdullah M. Shaheen3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1593-1610, 2022, DOI:10.32604/iasc.2022.020464

    Abstract A new procedure to optimally identifying the prediction equation of oil breakdown voltage with the barrier parameters’ effect is presented. The specified equation is built based on the results of experimental works to link the response with the barrier parameters as the inputs for hemisphere-hemisphere electrode gap configuration under AC voltage. The AC HV is applied using HV Transformer Type (PGK HB-100 kV AC) to the high voltage electrode in the presence of a barrier immersed in Diala B insulating oil. The problem is formulated as a nonlinear optimization problem to minimize the error between experimental and estimated breakdown voltages… More >

  • Open Access

    ARTICLE

    A Grey Wolf Optimized 15-Level Inverter Design with Confined Switching Components

    S. Caroline1,*, M. Marsaline Beno2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1753-1769, 2022, DOI:10.32604/iasc.2022.020440

    Abstract Multilevel inverters are a new class of dc-ac converters designed for high-power medium voltage and power applications as they work at high switching frequencies and in renewable applications by avoiding stresses like dv/dt and has low harmonic distortion in their output voltage. In variable speed drives and power generation systems, the use of multilevel inverters is obligatory. To estimate the switching positions in inverter configuration with low harmonic distortion value, a fast sequential optimization algorithm has been established. For harmonic reduction in multilevel inverter design, a hybrid optimization technique combining Firefly and the Genetic algorithm was used. In several real-time… More >

  • Open Access

    ARTICLE

    Efficient Key Management System Based Lightweight Devices in IoT

    T. Chindrella Priyadharshini1,*, D. Mohana Geetha2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1793-1808, 2022, DOI:10.32604/iasc.2022.020422

    Abstract The Internet of Things (IoT) has changed our lives significantly. Although IoT provides new opportunities, security remains a key concern while providing various services. Existing research methodologies try to solve the security and time-consuming problem also exists. To solve those problems, this paper proposed a Hashed Advanced Encryption Standard (HAES) algorithm based efficient key management system for internet-based lightweight devices in IoT networks. The proposed method is mainly divided into two phases namely Data Owner (DO) and Data User (DU) phase. The DO phase consists of two processes namely authentication and secure data uploading. In authentication, the registration process consists… More >

  • Open Access

    ARTICLE

    Classification Framework for COVID-19 Diagnosis Based on Deep CNN Models

    Walid El-Shafai1, Abeer D. Algarni2,*, Ghada M. El Banby3, Fathi E. Abd El-Samie1,2, Naglaa F. Soliman2,4

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1561-1575, 2022, DOI:10.32604/iasc.2022.020386

    Abstract Automated diagnosis based on medical images is a very promising trend in modern healthcare services. For the task of automated diagnosis, there should be flexibility to deal with an enormous amount of data represented in the form of medical images. In addition, efficient algorithms that could be adapted according to the nature of images should be used. The importance of automated medical diagnosis has been maximized with the evolution of COVID-19 pandemic. COVID-19 first appeared in China, Wuhan, and then it has exploded in the whole world with a very bad impact on our daily life. The third wave of… More >

  • Open Access

    ARTICLE

    Application of XR-Based Virtuality-Reality Coexisting Course

    Chun Xu1,*, Linyue Zhang2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1843-1855, 2022, DOI:10.32604/iasc.2022.020365

    Abstract Significant advances in new emerging technologies such as the 5th generation mobile networks (5G), Expand the reality (XR), and Artificial Intelligence (AI) enable extensive three-dimensional (3D) experience and interaction. The vivid 3D virtual dynamic displays and immersive experiences will become new normal in near future. The XR-based virtuality-reality co-existing classroom goes beyond the limitations of Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR). Such technology also enables integration of the digital and physical worlds and further creates a smart classroom featuring co-existed virtuality and reality. In this paper, we show an application of the XR enabling human-environment interaction.… More >

  • Open Access

    ARTICLE

    Utilization of Deep Learning-Based Crowd Analysis for Safety Surveillance and Spread Control of COVID-19 Pandemic

    Osama S. Faragallah1,*, Sultan S. Alshamrani1, Heba M. El-Hoseny2, Mohammed A. AlZain1, Emad Sami Jaha3, Hala S. El-Sayed4

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1483-1497, 2022, DOI:10.32604/iasc.2022.020330

    Abstract Crowd monitoring analysis has become an important challenge in academic researches ranging from surveillance equipment to people behavior using different algorithms. The crowd counting schemes can be typically processed in two steps, the images ground truth density maps which are obtained from ground truth density map creation and the deep learning to estimate density map from density map estimation. The pandemic of COVID-19 has changed our world in few months and has put the normal human life to a halt due to its rapid spread and high danger. Therefore, several precautions are taken into account during COVID-19 to slowdown the… More >

  • Open Access

    ARTICLE

    A Modelling and Scheduling Tool for Crowd Movement in Complex Network

    Emad Felemban1, Faizan Ur Rehman2,*, Akhlaq Ahmad2, Muhamad Felemban3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1361-1375, 2022, DOI:10.32604/iasc.2022.020235

    Abstract Managing events pose a unique challenge to the stakeholders and authorities to control the crowd in all three phases of the event (pre, during and post), ensuring crowd safety. One of the fundamental keys to provide crowd safety is to consider the mobility infrastructure hosting the crowd, i.e., routes, areas, entrances and exits. During Hajj, where millions of pilgrims worldwide fulfil the annual event’s rites, mina encampment incorporates pilgrims performing recurring stoning ritual conducted over multi-level Jamarat bridge. Pilgrims mobility through the available complex road network, to and back from the Jamarat bridge, forces upon authorities in charge to set… More >

  • Open Access

    ARTICLE

    Enhancing Detection of Malicious URLs Using Boosting and Lexical Features

    Mohammad Atrees*, Ashraf Ahmad, Firas Alghanim

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1405-1422, 2022, DOI:10.32604/iasc.2022.020229

    Abstract A malicious URL is a link that is created to spread spams, phishing, malware, ransomware, spyware, etc. A user may download malware that can adversely affect the computer by clicking on an infected URL, or might be convinced to provide confidential information to a fraudulent website causing serious losses. These threats must be identified and handled in a decent time and in an effective way. Detection is traditionally done through the blacklist usage method, which relies on keyword matching with previously known malicious domain names stored in a repository. This method is fast and easy to implement, with the advantage… More >

  • Open Access

    ARTICLE

    Developing Secure Healthcare Video Consultations for Corona Virus (COVID-19) Pandemic

    Mohammed A. AlZain1,*, Jehad F. Al-Amri1, Ahmed I. Sallam2, Emad Sami Jaha3, Sultan S. Alshamrani1, Hala S. El-Sayed4, Osama S. Faragallah1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1627-1640, 2022, DOI:10.32604/iasc.2022.020137

    Abstract Many health networks became increasingly interactive in implementing a consulting approach to telemedicine before the COVID-19 pandemic. To mitigate patient trafficking and reduce the virus exposure in health centers, several GPs, physicians and people in the video were consulted during the pandemic at the start. Video and smartphone consultations will allow well-insulated and high-risk medical practitioners to maintain their patient care security. Video appointments include diabetes, obesity, hypertension, stroke, mental health, chemotherapy and chronic pain. Many urgent diseases, including an emergency triage for the eye, may also be used for online consultations and triages. The COVID-19 pandemic shows that healthcare… More >

Displaying 10511-10520 on page 1052 of 22233. Per Page