Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    A Stacked Ensemble-Based Classifier for Breast Invasive Ductal Carcinoma Detection on Histopathology Images

    Ali G. Alkhathami*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 235-247, 2022, DOI:10.32604/iasc.2022.024952

    Abstract Breast cancer is one of the main causes of death in women. When body tissues start behaves abnormally and the ratio of tissues growth becomes asymmetrical then this stage is called cancer. Invasive ductal carcinoma (IDC) is the early stage of breast cancer. The early detection and diagnosis of invasive ductal carcinoma is a significant step for the cure of IDC breast cancer. This paper presents a convolutional neural network (CNN) approach to detect and visualize the IDC tissues in breast on histological images dataset. The dataset consists of 90 thousand histopathological images containing two categories: Invasive Ductal Carcinoma positive… More >

  • Open Access

    ARTICLE

    Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction

    Hyun Yoo1, Kyungyong Chung2,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 1-13, 2022, DOI:10.32604/iasc.2022.024890

    Abstract Human pose estimation has been a major concern in the field of computer vision. The existing method for recognizing human motion based on two-dimensional (2D) images showed a low recognition rate owing to motion depth, interference between objects, and overlapping problems. A convolutional neural network (CNN) based algorithm recently showed improved results in the field of human skeleton detection. In this study, we have combined human skeleton detection and deep neural network (DNN) to classify the motion of the human body. We used the visual geometry group network (VGGNet) CNN for human skeleton detection, and the generated skeleton coordinates were… More >

  • Open Access

    ARTICLE

    Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks

    V. P. Ajay1,*, M. Nesasudha2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 193-204, 2022, DOI:10.32604/iasc.2022.024839

    Abstract Cognitive radio network (CRN) is a growing technology targeting more resourcefully exploiting the available spectrum for opportunistic network usage. By the concept of cognitive radio, the wastage of available spectrum reduced about 30% worldwide. The key operation of CRN is spectrum sensing. The sensing results about the spectrum are directly proportional to the performance of the network. In CRN, the final result about the available spectrum is decided by combing the local sensing results. The presence or participation of attackers in the network leads to false decisions and the performance of the network will be degraded. In this work, an… More >

  • Open Access

    ARTICLE

    Deep Neural Network Based Vehicle Detection and Classification of Aerial Images

    Sandeep Kumar1, Arpit Jain2,*, Shilpa Rani3, Hammam Alshazly4, Sahar Ahmed Idris5, Sami Bourouis6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 119-131, 2022, DOI:10.32604/iasc.2022.024812

    Abstract The detection of the objects in the ariel image has a significant impact on the field of parking space management, traffic management activities and surveillance systems. Traditional vehicle detection algorithms have some limitations as these algorithms are not working with the complex background and with the small size of object in bigger scenes. It is observed that researchers are facing numerous problems in vehicle detection and classification, i.e., complicated background, the vehicle’s modest size, other objects with similar visual appearances are not correctly addressed. A robust algorithm for vehicle detection and classification has been proposed to overcome the limitation of… More >

  • Open Access

    ARTICLE

    Smart Grid Security by Embedding S-Box Advanced Encryption Standard

    Niraj Kumar1,*, Vishnu Mohan Mishra2, Adesh Kumar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 623-638, 2022, DOI:10.32604/iasc.2022.024804

    Abstract Supervisory control and data acquisition (SCADA) systems continuously monitor the real-time processes in the smart grid. The system software, which is based on a human-machine interface (HMI), makes intelligent decisions to assist the system operator and perform normal grid management activities. The management of SCADA networks and monitoring without proper security is a major concern, as many grids and plant networks still lack necessary monitoring and detection systems, making them vulnerable to attack. SCADA networks exploit physical weaknesses as well as cyber-attacks. Researchers have developed a monitoring system based on a field-programmable gate array (FPGA) and a microcontroller that allows… More >

  • Open Access

    ARTICLE

    AI Powered Asthma Prediction Towards Treatment Formulation: An Android App Approach

    Saydul Akbar Murad1, Apurba Adhikary2, Abu Jafar Md Muzahid1, Md. Murad Hossain Sarker3, Md. Ashikur Rahman Khan2, Md. Bipul Hossain2, Anupam Kumar Bairagi4,*, Mehedi Masud5, Md. Kowsher6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 87-103, 2022, DOI:10.32604/iasc.2022.024777

    Abstract Asthma is a disease which attacks the lungs and that affects people of all ages. Asthma prediction is crucial since many individuals already have asthma and increasing asthma patients is continuous. Machine learning (ML) has been demonstrated to help individuals make judgments and predictions based on vast amounts of data. Because Android applications are widely available, it will be highly beneficial to individuals if they can receive therapy through a simple app. In this study, the machine learning approach is utilized to determine whether or not a person is affected by asthma. Besides, an android application is being created to… More >

  • Open Access

    ARTICLE

    Modeling of Chaotic Political Optimizer for Crop Yield Prediction

    Gurram Sunitha1,*, M. N. Pushpalatha2, A. Parkavi3, Prasanthi Boyapati4, Ranjan Walia5, Rachna Kohar6, Kashif Qureshi7

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 423-437, 2022, DOI:10.32604/iasc.2022.024757

    Abstract Crop yield is an extremely difficult trait identified using many factors like genotype, environment and their interaction. Accurate Crop Yield Prediction (CYP) necessitates the basic understanding of the functional relativity among yields and the collaborative factor. Disclosing such connection requires both wide-ranging datasets and an efficient model. The CYP is important to accomplish irrigation scheduling and assessing labor necessities for reaping and storing. Predicting yield using various kinds of irrigation is effective for optimizing resources, but CYP is a difficult process owing to the existence of distinct factors. Recently, Deep Learning (DL) approaches offer solutions to complicated data like weather… More >

  • Open Access

    ARTICLE

    Crypto Hash Based Malware Detection in IoMT Framework

    R Punithavathi1, K Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 559-574, 2022, DOI:10.32604/iasc.2022.024715

    Abstract The challenges in providing e-health services with the help of Internet of Medical Things (IoMT) is done by connecting to the smart medical devices. Through IoMT sensor devices/smart devices, physicians share the sensitive information of the patient. However, protecting the patient health care details from malware attack is necessary in this advanced digital scenario. Therefore, it is needed to implement cryptographic algorithm to enhance security, safety, reliability, preventing details from malware attacks and privacy of medical data. Nowadays blockchain has become a prominent technology for storing medical data securely and transmit through IoMT concept. The issues in the existing research… More >

  • Open Access

    ARTICLE

    Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos

    M. Murugesan*, S. Thilagamani

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 389-405, 2022, DOI:10.32604/iasc.2022.024641

    Abstract Automatic anomaly activity detection is difficult in video surveillance applications due to variations in size, type, shape, and objects’ location. The traditional anomaly detection and classification methods may affect the overall segmentation accuracy. It requires the working groups to judge their constant attention if the captured activities are anomalous or suspicious. Therefore, this defect creates the need to automate this process with high accuracy. In addition to being extraordinary or questionable, the display does not contain the necessary recording frame and activity standard to help the quick judgment of the parts’ specialized action. Therefore, to reduce the wastage of time… More >

  • Open Access

    ARTICLE

    Steering Behavior-based Multiple RUAV Obstacle Avoidance Control

    Vishnu Kumar Kaliappan1, Tuan Anh Nguyen1, Dugki Min2,*, Jae-Woo Lee1, U. Sakthi3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 575-591, 2022, DOI:10.32604/iasc.2022.024577

    Abstract In recent years, the applications of rotorcraft-based unmanned aerial vehicles (RUAV) have increased rapidly. In particular, the integration of bio-inspired techniques to enhance intelligence in coordinating multiple Rotorcraft-based Unmanned Aerial Vehicles (RUAVs) has been a focus of recent research and development. Due to the limitation in intelligence, these RUAVs are restricted in flying low altitude with high maneuverability. To make it possible, the RUAVs must have the ability to avoid both static and dynamic obstacles while operating at low altitudes. Therefore, developing a state-of-the-art intelligent control algorithm is necessary to avoid low altitude obstacles and coordinate without collision while executing… More >

Displaying 8501-8510 on page 851 of 22225. Per Page