


default search action
Intelligent Automation & Soft Computing, Volume 29
Volume 29, Number 1, 2021
- Mehedi Masud, Mohammad Dahman Alshehri, Roobaea Alroobaea
, Mohammad Shorfuzzaman:
Leveraging Convolutional Neural Network for COVID-19 Disease Detection Using CT Scan Images. 1-13 - Osama S. Faragallah, Ghada Abdel-Aziz, Walid El-Shafai, Hala S. El-sayed
, S. F. El-Zoghdy, Gamal G. N. Geweid:
Performance Evaluation of Medical Segmentation Techniques for Cardiac MRI. 15-29 - Pengfei Gong, Qun Wang, Junjun Zhu:
Spatiotemporal Characteristics of Traffic Accidents in China, 2016-2019. 31-42 - Sadman Ahmed, Mohammad Monirujjaman Khan, Roobaea Alroobaea
, Mehedi Masud:
Development of a Multi-feature Web-based Physiotherapy Service System. 43-54 - Pu Han, Mingtao Zhang, Jin Shi, Jinming Yang, Xiaoyan Li:
Chinese Q&A Community Medical Entity Recognition with Character-Level Features and Self-Attention Mechanism. 55-72 - Ahmad Almufarreh, Muhammad Arshad, Sameer Hassan Mohammed:
An Efficient Utilization of Blackboard Ally in Higher Education Institution. 73-87 - Abeer A. Alfutamani, Heyam H. Al-Baity:
Emotional Analysis of Arabic Saudi Dialect Tweets Using a Supervised Learning Approach. 89-109 - Abdullah Ali H. Ahmadini, Amal S. Hassan
, Rokaya E. Mohamed, Shokrya Saleh Alshqaq
, Heba F. Nagy
:
A New Four-Parameter Moment Exponential Model with Applications to Lifetime Data. 131-146 - Ahmed S. Ghiduk, Moheb R. Girgis, Eman Hassan, Sultan H. Aljahdali:
Automatic PSO Based Path Generation Technique for Data Flow Coverage. 147-164 - Memoona Malik, Iftikhar Azim, Amir Hanif Dar, Sohail Asghar:
An Adaptive SAR Despeckling Method Using Cuckoo Search Algorithm. 165-182 - Shahid Ali Mahar, Mumtaz Hussain Mahar, Javed Ahmed Mahar, Mehedi Masud, Muneer Ahmad
, N. Z. Jhanjhi
, Mirza Abdur Razzaq
:
Superposition of Functional Contours Based Prosodic Feature Extraction for Speech Processing. 183-197 - Abdullah Ali H. Ahmadini, Amal S. Hassan
, M. Elgarhy
, Mahmoud Elsehetry, Shokrya Saleh Alshqaq, Said G. Nassr
:
Inference of Truncated Lomax Inverse Lomax Distribution with Applications. 199-212 - Abdelaziz Alsubie, Mostafa Abdelhamid, Abdul-Hadi N. Ahmed, Mohammed Alqawba
, Ahmed Z. Afify:
Inference on Generalized Inverse-Pareto Distribution under Complete and Censored Samples. 213-232 - A. Daniel
, K. M. Balamurugan, R. Vijay, Kp Arjun:
Energy Aware Clustering with Multihop Routing Algorithm for Wireless Sensor Networks. 233-246 - Huijin Park, Soobin Ou, Jongwoo Lee:
Implementation of Multi-Object Recognition System for the Blind. 247-258 - Yunzuo Zhang, Shasha Zhang, Jiayu Zhang, Kaina Guo, Zhaoquan Cai:
Key Frame Extraction of Surveillance Video Based on Frequency Domain Analysis. 259-272 - Gang Yu, Jian Tang, Jian Zhang, Zhonghui Wang:
Adaptive Multi-Layer Selective Ensemble Least Square Support Vector Machines with Applications. 273-290 - Omer Bin Tauqeer, Sadeeq Jan, Alaa O. Khadidos
, Adil Omar Khadidos, Fazal Qudus Khan, Sana Khattak:
Analysis of Security Testing Techniques. 291-306 - Hissah A. Ben Zayed, Mashael S. Maashi
:
Optimizing the Software Testing Problem Using Search-Based Software Engineering Techniques. 307-318
Volume 29, Number 2, 2021
- Hyun Yoo, Ji-Won Baek, Kyungyong Chung:
CNN-Based Voice Emotion Classification Model for Risk Detection. 319-334 - Kentaro Mori, Kotaro Kitaya, Tomomoto Ishikawa, Yutaka Hata:
A Pregnancy Prediction System based on Uterine Peristalsis from Ultrasonic Images. 335-352 - Gamal M. Ibrahim, Amal S. Hassan
, Ehab M. Almetwally, Hisham M. Almongy:
Parameter Estimation of Alpha Power Inverted Topp-Leone Distribution with Applications. 353-371 - Hiba Jasim Hadi, Mohd. Adan Omar
, Wan Rozaini Sheik Osman:
Investigating the Role of Trust Dimension as a Mediator on CC-SaaS Adoption. 373-386 - Hongxia Deng, Chunxiang Hu, Zihao Zhou, Jinxiu Guo, Zhenxuan Zhang, Haifang Li:
RMCA-LSA: A Method of Monkey Brain Extraction. 387-402 - Faseeha Matloob, Shabib Aftab
, Munir Ahmad
, Muhammad Adnan Khan
, Areej Fatima
, Muhammad Iqbal, Wesam Mohsen Alruwaili, Nouh Sabri Elmitwally
:
Software Defect Prediction Using Supervised Machine Learning Techniques: A Systematic Literature Review. 403-421 - Rihem Farkh
, Khaled Al jaloud
, Saad Alhuwaimel, Mohammad Tabrez Quasim
, Moufida Ksouri:
A Deep Learning Approach for the Mobile-Robot Motion Control System. 423-435 - Lei Hong, Jie Yin, Ling-Ling Xia, Chao-Fan Gong, Qi Huang:
Improved Short-video User Impact Assessment Method Based on PageRank Algorithm. 437-449 - A. Manjula
, L. Kalaivani, M. Gengaraj:
PSO Based Torque Ripple Minimization Of Switched Reluctance Motor Using FPGA Controller. 451-465 - Abdelatif Oussar, Abdelmoumen Ferrag, Mohamed Guiatni, Mustapha Hamerlain:
SVSF-Based Robust UGV/UAV Control/Tracking Architecture in Disturbed Environment. 467-495 - Yu Xue, Yiling Tong, Ziming Yuan, Shoubao Su
, Adam Slowik
, Sam Toglaw
:
Handwritten Character Recognition Based on Improved Convolutional Neural Network. 497-509 - Sehrish Jamil, Salma Noor, Iftikhar Ahmed, Neelam Gohar, Fouzia:
Semantic Modeling of Events Using Linked Open Data. 511-524 - Bin Xu, Jianming Zhu, Junzhe Wen, Shanshan Lin, Yunkai Zhao, Jin Qi, Yu Xue, Sichong Qin:
Optimization for Variable Height Wind Farm Layout Model. 525-537 - Y. Sreeraman
, S. Lakshmana Pandian:
Design and Experimentation of Causal Relationship Discovery among Features of Healthcare Datasets. 539-557 - Cheng-Yan Siao, Jhe-Wei Lin, Ting-Hsuan Chien, Rong-Guey Chang:
Paralleling Collision Detection on Five-Axis Machining. 559-569 - Adnan Bin Amanat Ali, Vasaki Ponnusamy, Anbuselvan Sangodiah, Roobaea Alroobaea
, N. Z. Jhanjhi
, Uttam Ghosh, Mehedi Masud:
Smartphone Security Using Swipe Behavior-based Authentication. 571-585 - Sara Mehmood, Naeem Ahmed Mahoto, Asadullah Shaikh
, Hani Alshahrani, Mana Saleh Al Reshan
:
Impact of Skim Reading Based on Different Screen Sizes. 587-604 - Mohammed Hamdi, Fekry Olayah, Amin A. Al-Awady, Ahlam F. Shamsan, Mokhtar M. Ghilan:
Attitude Towards Adopting Cloud Computing in the Saudi Banking Sector. 605-617 - A. M. Abdullah, Hegazy Rezk, A. Hadad, Mohamed K. Hassan
, A. F. Mohamed:
Optimal Parameter Estimation of Proton Exchange Membrane Fuel Cells. 619-631 - Muhammad Irshad Nazeer, Ghulam Ali Mallah, Raheel Ahmed Memon
:
A Hybrid Scheme for Secure Wireless Communications in IoT. 633-648
Volume 29, Number 3, 2021
- Jaber Almutairi, Mohammad Aldossary
:
Resource Management and Task Offloading Issues in the Edge-Cloud Environment. 129-145 - Qura-Tul-Ain Khan, Taher M. Ghazal
, Sagheer Abbas
, Wasim Ahmad Khan
, Muhammad Adnan Khan
, Raed A. Said
, Munir Ahmad, Muhammad Asif:
Modeling Habit Patterns Using Conditional Reflexes in Agency. 539-552 - Wei Lu, Guanghui Yuan, Hao Yang, Hongrun Yang, Xin Zhao, Qian Zhang:
Visualization of Reactor Core Based on Triangular Mesh Method. 689-699 - Nadia Tabassum, Tahir Alyas
, Muhammad Hamid
, Muhammad Saleem, Saadia Malik, Zain Ali, Umer Farooq
:
Semantic Analysis of Urdu English Tweets Empowered by Machine Learning. 175-186 - Adil Hussain Seh, Jehad F. Al-Amri, Ahmad F. Subahi, Alka Agrawal, Rajeev Kumar
, Raees Ahmad Khan:
Machine Learning Based Framework for Maintaining Privacy of Healthcare Data. 697-712 - D. Saber, Ibrahim B. M. Taha
, Kh. Abd El-Aziz:
Prediction of the Corrosion Rate of Al-Si Alloys Using Optimal Regression Methods. 757-769 - Hanan A. Hosni Mahmoud, Amal H. Alharbi, Doaa S. Khafga
:
Breast Cancer Classification Using Deep Convolution Neural Network with Transfer Learning. 803-814 - Ramesh Krishnamoorthy, Kalimuthu Krishnan:
Security Empowered System-on-Chip Selection for Internet of Things. 403-418 - Tooba Batool, Sagheer Abbas
, Yousef Alhwaiti
, Muhammad Saleem
, Munir Ahmad, Muhammad Asif
, Nouh Sabri Elmitwally
:
Intelligent Model Of Ecosystem For Smart Cities Using Artificial Neural Networks. 513-525 - Mohammad Monirujjaman Khan, Shamsun Nahar Safa, Minhazul Hoque Ashik, Mehedi Masud, Mohammed A. Alzain:
Research and Development of a Brain-Controlled Wheelchair for Paralyzed Patients. 49-64 - Yabin Xu, Peiyuan Gu, Xiaowei Xu:
Research on Detection Method of Interest Flooding Attack in Named Data Networking. 113-127 - Wei Fang
, Lin Pang, Weinan Yi, Victor S. Sheng:
AttEF: Convolutional LSTM Encoder-Forecaster with Attention Module for Precipitation Nowcasting. 453-466 - Azeem Shera, Muhammad Waseem Iqbal, Syed Khuram Shahzad, Madeeha Gul, Natash Ali Mian, Muhammad Raza Naqvi
, Babar Ayub Khan:
Blind and Visually Impaired User Interface to Solve Accessibility Problems. 285-301 - Naeem Ali
, Alia Ahmed, Leena Anum
, Taher M. Ghazal
, Sagheer Abbas
, Muhammad Adnan Khan
, Haitham M. Alzoubi, Munir Ahmad:
Modelling Supply Chain Information Collaboration Empowered with Machine Learning Technique. 243-257 - Jianping Yu, Zhuqing Qiao, Wensheng Tang, Danni Wang, Xiaojun Cao
:
Blockchain-Based Decision Tree Classification in Distributed Networks. 713-728 - Osama S. Faragallah, Ghada Abdel-Aziz, Hala S. El-sayed
, Gamal G. N. Geweid:
Segmentation of the Left Ventricle in Cardiac MRI Using Random Walk Techniques. 575-588 - Naeem Ahmed Mahoto, Rabia Iftikhar
, Asadullah Shaikh
, Yousef Asiri, Abdullah Alghamdi
, Khairan Rajab:
An Intelligent Business Model for Product Price Prediction Using Machine Learning Approach. 147-159 - Sobia Wassan, Chen Xi, N. Z. Jhanjhi
, Hassan Raza:
A Smart Comparative Analysis for Secure Electronic Websites. 187-199 - Qin Zhang, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qiang Liu, Neal N. Xiong:
Short Text Entity Disambiguation Algorithm Based on Multi-Word Vector Ensemble. 227-241 - Yong Li, Xipeng Wang:
Person Re-Identification Based on Joint Loss and Multiple Attention Mechanism. 563-573 - Gaigai Jin, Junsheng Zhou, Weiguang Qu, Yunfei Long, Yanhui Gu:
Exploiting Rich Event Representation to Improve Event Causality Recognition. 161-173 - Desheng Zheng
, Xiaolan Tang, Xinlong Wu, Kexin Zhang, Chao Lu, Lulu Tian:
Surge Fault Detection of Aeroengines Based on Fusion Neural Network. 815-826 - Yujie Zhou, Jin Liu
, Yurong Xie, Y. Ken Wang:
Morphological Feature Aware Multi-CNN Model for Multilingual Text Recognition. 715-733 - Hao Wu
, B. Nagaraj:
Research on College English Teaching Model Based on Decision Trees. 81-95 - Mamoona Majid, Muhammad Faisal Hayat, Farrukh Zeeshan Khan, Muneer Ahmad
, N. Z. Jhanjhi
, Mohammad Arif Sobhan Bhuiyan, Mehedi Masud, Mohammed A. Alzain:
Ontology-Based System for Educational Program Counseling. 373-386 - Sherif S. M. Ghoneim, Amr E. Rashed
, Nagy I. Elkalashy:
Fault Detection Algorithms for Achieving Service Continuity in Photovoltaic Farms. 467-479 - Jiahui Pan
, Liangxin Liu, Mianfen Lin, Shengzhou Luo, Chengju Zhou, Huijian Liao, Fei Wang:
An Improved Two-stream Inflated 3D ConvNet for Abnormal Behavior Detection. 673-688 - Toqir A. Rana
, Bahrooz Bakht, Mehtab Afzal
, Natash Ali Mian, Muhammad Waseem Iqbal, Abbas Khalid, Muhammad Raza Naqvi
:
Extraction of Opinion Target Using Syntactic Rules in Urdu Text. 839-853 - A. M. Abdullah, Hegazy Rezk, Abdelrahman Elbloye, Mohamed K. Hassan
, A. F. Mohamed:
Grey Wolf Optimizer-Based Fractional MPPT for Thermoelectric Generator. 729-740 - Sangeetha Ganesan
, Sumathi Ganesan:
A Multi-Objective Secure Optimal VM Placement in Energy-Efficient Server of Cloud Computing. 387-401 - Zhe Wang, Yingying Zhao, Hai Dong
, Yulong Xu, Yali Lv:
Improved Algorithm Based on Decision Tree for Semantic Information Retrieval. 419-429 - Xiaoyan Zhao, Lin Zhou, Ying Tong, Yuxiao Qi, Jingang Shi:
Robust Sound Source Localization Using Convolutional Neural Network Based on Microphone Array. 361-371 - Mohammed Faisal, Fahad R. Albogamy, Hebah ElGibreen, Mohammed Algabri, Syed Ahad M. Alvi
, Mansour Alsulaiman:
COVID-19 Diagnosis Using Transfer-Learning Techniques. 649-667 - Emad H. El-Zohri, Hegazy Rezk, Basem Alamri
, Hamdy A. Ziedan
:
Improving the Power Quality of Smart Microgrid Based Solar Photovoltaic Systems. 201-213 - Munif Alotaibi, Bandar Alotaibi:
Detection of COVID-19 Using Deep Learning on X-Ray Images. 885-898 - Tian Liwei, Feng Li, Sun Yu, Yuankai Guo:
Forecast of LSTM-XGBoost in Stock Price Based on Bayesian Optimization. 855-868 - Lina Wang, Jie Wang, Yongjun Ren, Zimeng Xing, Tao Li, Jinyue Xia:
A Shadowed Rough-fuzzy Clustering Algorithm Based on Mahalanobis Distance for Intrusion Detection. 31-47 - Ye Yang, Xiaofang Li, Dongjie Zhu, Hao Hu, Haiwen Du, Yundong Sun, Weiguo Tian, Yansong Wang
, Ning Cao, Gregory M. P. O'Hare:
A Resource-constrained Edge IoT Device Data-deduplication Method with Dynamic Asymmetric Maximum. 481-494 - Mohammed Baz, Hatem Zaini, Hala S. El-sayed
, Matokah M. Abualnaja, Heba M. Elhoseny
, Osama S. Faragallah:
Utilization of Artificial Intelligence in Medical Image Analysis for COVID-19 Patients Detection. 97-111 - Guiying Wang, Xigui Wang, Hong Zhao, Yinggang Huang, Jinyong Ju, E. E. Erdun:
A Low-Cost 3-Axis Computer Controlled Filament-Winding Pattern Design Method for Composite Elbows. 651-662 - Jing Peng, Chaoyang Xia, Yuanwei Xu, Xiaojie Li, Xi Wu, Xiao Han, Xinlai Chen, Yucheng Chen, Zhe Cui:
A Multi-Task Network for Cardiac Magnetic Resonance Image Segmentation and Classification. 259-272 - Bushra Mumtaz
, Summrina Kanwal
, Sultan Alamri, Faiza Khan:
Feature Selection Using Artificial Immune Network: An Approach for Software Defect Prediction. 669-684 - Maryam Munawar
, Iram Noreen:
Duplicate Frame Video Forgery Detection Using Siamese-based RNN. 927-937 - Juan Huang, Bifang Zhou, Huajun Huang, Dingwen Qing, Neal N. Xiong:
Main Factor Selection Algorithm and Stability Analysis of Regional FDI Statistics. 303-318 - Jianming Zhao, Peng Zeng
, Chunyu Chen, Zhiwei Dong, Jongho Han:
Deep Learning Anomaly Detection Based on Hierarchical Status-Connection Features in Networked Control Systems. 337-350 - Kathiravan Srinivasan, Lalit Garg, Bor-Yann Chen, Abdulellah A. Alaboudi
, N. Z. Jhanjhi
, Chang-Tang Chang, B. Prabadevi
, N. Deepa:
Expert System for Stable Power Generation Prediction in Microbial Fuel Cell. 17-30 - Osama S. Faragallah, Abdullah N. Muhammed, Taha S. Taha, Gamal G. N. Geweid:
Liver Lesions and Acute Intracerebral Hemorrhage Detection Using Multimodal Fusion. 215-225 - Yiming Liu, Ke Chen, Lanzhen Bian, Lei Ren, Jing Hu, Jinyue Xia:
Game-Theory Based Graded Diagnosis Strategies of Craniocerebral Injury. 553-561 - Aihong Yu, Zhe Liu, Victor S. Sheng, Yuqing Song, Xuesheng Liu, Chongya Ma, Wenqiang Wang, Cong Ma:
CT Segmentation of Liver and Tumors Fused Multi-Scale Features. 589-599 - Bin Lin, Jixin Chen
, Zhihong Zhang, Yanlin Lai, Xinlong Wu, Lulu Tian, Wangchi Cheng:
An Adversarial Network-based Multi-model Black-box Attack. 641-649 - Xinyue Zhang
, Ting Jin, Mingjie Han, Jingsheng Lei, Zhichao Cao:
Visual Saliency Prediction Using Attention-based Cross-modal Integration Network in RGB-D Images. 439-452 - Nadia Tabassum, Abdul Rehman, Muhammad Hamid
, Muhammad Saleem, Saadia Malik, Tahir Alyas
:
Intelligent Nutrition Diet Recommender System for Diabetic's Patients. 319-335 - Xiaoliang Lin, Junxiao Shi, Yanbo Wang, Chenyang Liu, Bin Lu, Siwen Xu:
Container Application Migration Algorithm in Internet of Vehicles. 915-926 - Jhe-Wei Lin, Cheng-Yan Siao, Ting-Hsuan Chien, Rong-Guey Chang:
A Novel Automatic Meal Delivery System. 685-695 - Ghassan Ahmed Ali
:
Strategies for Reducing the Spread of COVID-19 Based on an Ant-Inspired Framework. 351-360 - Taher M. Ghazal
, Muhammad Zahid Hussain, Raed A. Said
, Afrozah Nadeem, Mohammad Kamrul Hasan, Munir Ahmad, Muhammad Adnan Khan
, Muhammad Tahir Naseem:
Performances of K-Means Clustering Algorithm with Different Distance Metrics. 735-742 - Lin Zhou, Kun Feng, Tianyi Wang, Yue Xu, Jingang Shi:
Binaural Speech Separation Algorithm Based on Deep Clustering. 527-537 - Lin Xiang, Jiaohua Qin, Xuyu Xiang, Yun Tan, Neal N. Xiong:
A Robust Text Coverless Information Hiding Based on Multi-Index Method. 899-914 - Muhammad Usman Ashraf
, Fathy Alburaei Eassa, Leon J. Osterweil, Aiiad Ahmad Albeshri, Abdullah M. Algarni
, Iqra Ilyas:
AAP4All: An Adaptive Auto Parallelization of Serial Code for HPC Systems. 615-639 - Ting-Hsuan Chien, Cheng-Yan Siao, Rong-Guey Chang:
A General Technique for Real-Time Robotic Simulation in Manufacturing System. 827-838 - V. Nivedita, N. Nandhagopal
:
Trust Management-Based Service Recovery and Attack Prevention in MANET. 771-786 - Muhammad Shujaat
, Numan Aslam, Iram Noreen, Muhammad Khurram Ehsan, Muhammad Aasim Qureshi
, Aasim Ali, Neelma Naz, Imtisal Qadeer:
Intelligent and Integrated Framework for Exudate Detection in Retinal Fundus Images. 663-672 - Si-Yi Chen, Gang Xu, Xiu-Bo Chen, Haseeb Ahmad, Yu-Ling Chen:
Measurement-based Quantum Repeater Network Coding. 273-284 - Xiaoli Hao, Xiaojuan Meng, Yueqin Zhang, Jindong Xue, Jinyue Xia:
Conveyor Belt Detection Based on Deep Convolution GANs. 601-613 - Yabin Xu, Shujuan Chen, Xiaowei Xu:
Research on Viewpoint Extraction in Microblog. 495-511 - K. Kalaivani, M. Chinnadurai:
A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment. 1-15 - Shuo Liang, Dingcheng Wang, Jingrong Wu, Rui Wang, Ruiqi Wang:
Method of Bidirectional LSTM Modelling for the Atmospheric Temperature. 701-714 - Adel Hamdan Mohammad:
Intrusion Detection Using a New Hybrid Feature Selection Model. 65-80 - Mengyuan Liao, Jing Duan, Rong Zhang, Xu Zhou, Xi Wu, Xin Wang, Jinrong Hu:
A Hypergraph-Embedded Convolutional Neural Network for Ice Crystal Particle Habit Classification. 787-801 - Tao Li, Ning Peng Li, Qi Qian, Wenduo Xu, Yongjun Ren, Jinyue Xia:
Inversion of Temperature and Humidity Profile of Microwave Radiometer Based on BP Network. 741-755 - Nadzirah Nahrawi, Wan Azani Mustafa
, Siti Nurul Aqmariah Mohd Kanafiah
, Mohd Yusoff Mashor:
Color Contrast Enhancement on Pap Smear Images Using Statistical Analysis. 431-438 - Majid Hussain:
Stator Winding Fault Detection and Classification in Three-Phase Induction Motor. 869-883

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.