


default search action
Intelligent Automation & Soft Computing, Volume 29
Volume 29, Number 1, 2021
- Mehedi Masud, Mohammad Dahman Alshehri, Roobaea Alroobaea

, Mohammad Shorfuzzaman:
Leveraging Convolutional Neural Network for COVID-19 Disease Detection Using CT Scan Images. 1-13 - Osama S. Faragallah, Ghada Abdel-Aziz, Walid El-Shafai, Hala S. El-sayed

, S. F. El-Zoghdy, Gamal G. N. Geweid:
Performance Evaluation of Medical Segmentation Techniques for Cardiac MRI. 15-29 - Pengfei Gong, Qun Wang, Junjun Zhu:

Spatiotemporal Characteristics of Traffic Accidents in China, 2016-2019. 31-42 - Sadman Ahmed, Mohammad Monirujjaman Khan, Roobaea Alroobaea

, Mehedi Masud:
Development of a Multi-feature Web-based Physiotherapy Service System. 43-54 - Pu Han, Mingtao Zhang, Jin Shi, Jinming Yang, Xiaoyan Li:

Chinese Q&A Community Medical Entity Recognition with Character-Level Features and Self-Attention Mechanism. 55-72 - Ahmad Almufarreh, Muhammad Arshad, Sameer Hassan Mohammed:

An Efficient Utilization of Blackboard Ally in Higher Education Institution. 73-87 - Abeer A. Alfutamani, Heyam H. Al-Baity:

Emotional Analysis of Arabic Saudi Dialect Tweets Using a Supervised Learning Approach. 89-109 - Abdullah Ali H. Ahmadini, Amal S. Hassan

, Rokaya E. Mohamed, Shokrya Saleh Alshqaq
, Heba F. Nagy
:
A New Four-Parameter Moment Exponential Model with Applications to Lifetime Data. 131-146 - Ahmed S. Ghiduk, Moheb R. Girgis, Eman Hassan, Sultan H. Aljahdali:

Automatic PSO Based Path Generation Technique for Data Flow Coverage. 147-164 - Memoona Malik, Iftikhar Azim, Amir Hanif Dar, Sohail Asghar:

An Adaptive SAR Despeckling Method Using Cuckoo Search Algorithm. 165-182 - Shahid Ali Mahar, Mumtaz Hussain Mahar, Javed Ahmed Mahar, Mehedi Masud, Muneer Ahmad

, N. Z. Jhanjhi
, Mirza Abdur Razzaq
:
Superposition of Functional Contours Based Prosodic Feature Extraction for Speech Processing. 183-197 - Abdullah Ali H. Ahmadini, Amal S. Hassan

, M. Elgarhy
, Mahmoud Elsehetry, Shokrya Saleh Alshqaq, Said G. Nassr
:
Inference of Truncated Lomax Inverse Lomax Distribution with Applications. 199-212 - Abdelaziz Alsubie, Mostafa Abdelhamid, Abdul-Hadi N. Ahmed, Mohammed Alqawba

, Ahmed Z. Afify:
Inference on Generalized Inverse-Pareto Distribution under Complete and Censored Samples. 213-232 - Daniel Arockiam

, K. M. Balamurugan, R. Vijay, Kp Arjun:
Energy Aware Clustering with Multihop Routing Algorithm for Wireless Sensor Networks. 233-246 - Huijin Park, Soobin Ou, Jongwoo Lee:

Implementation of Multi-Object Recognition System for the Blind. 247-258 - Yunzuo Zhang, Shasha Zhang, Jiayu Zhang, Kaina Guo, Zhaoquan Cai:

Key Frame Extraction of Surveillance Video Based on Frequency Domain Analysis. 259-272 - Gang Yu, Jian Tang, Jian Zhang, Zhonghui Wang:

Adaptive Multi-Layer Selective Ensemble Least Square Support Vector Machines with Applications. 273-290 - Omer Bin Tauqeer, Sadeeq Jan, Alaa O. Khadidos

, Adil Omar Khadidos, Fazal Qudus Khan, Sana Khattak:
Analysis of Security Testing Techniques. 291-306 - Hissah A. Ben Zayed, Mashael S. Maashi

:
Optimizing the Software Testing Problem Using Search-Based Software Engineering Techniques. 307-318
Volume 29, Number 2, 2021
- Hyun Yoo, Ji-Won Baek, Kyungyong Chung:

CNN-Based Voice Emotion Classification Model for Risk Detection. 319-334 - Kentaro Mori, Kotaro Kitaya, Tomomoto Ishikawa, Yutaka Hata:

A Pregnancy Prediction System based on Uterine Peristalsis from Ultrasonic Images. 335-352 - Gamal M. Ibrahim, Amal S. Hassan

, Ehab M. Almetwally, Hisham M. Almongy:
Parameter Estimation of Alpha Power Inverted Topp-Leone Distribution with Applications. 353-371 - Hiba Jasim Hadi, Mohd. Adan Omar

, Wan Rozaini Sheik Osman:
Investigating the Role of Trust Dimension as a Mediator on CC-SaaS Adoption. 373-386 - Hongxia Deng, Chunxiang Hu, Zihao Zhou, Jinxiu Guo, Zhenxuan Zhang, Haifang Li:

RMCA-LSA: A Method of Monkey Brain Extraction. 387-402 - Faseeha Matloob, Shabib Aftab

, Munir Ahmad
, Muhammad Adnan Khan
, Areej Fatima
, Muhammad Iqbal, Wesam Mohsen Alruwaili, Nouh Sabri Elmitwally
:
Software Defect Prediction Using Supervised Machine Learning Techniques: A Systematic Literature Review. 403-421 - Rihem Farkh

, Khaled Al jaloud
, Saad Alhuwaimel, Mohammad Tabrez Quasim
, Moufida Ksouri:
A Deep Learning Approach for the Mobile-Robot Motion Control System. 423-435 - Lei Hong, Jie Yin, Ling-Ling Xia, Chao-Fan Gong, Qi Huang:

Improved Short-video User Impact Assessment Method Based on PageRank Algorithm. 437-449 - A. Manjula

, L. Kalaivani, M. Gengaraj:
PSO Based Torque Ripple Minimization Of Switched Reluctance Motor Using FPGA Controller. 451-465 - Abdelatif Oussar, Abdelmoumen Ferrag, Mohamed Guiatni, Mustapha Hamerlain:

SVSF-Based Robust UGV/UAV Control/Tracking Architecture in Disturbed Environment. 467-495 - Yu Xue, Yiling Tong, Ziming Yuan, Shoubao Su

, Adam Slowik
, Sam Toglaw
:
Handwritten Character Recognition Based on Improved Convolutional Neural Network. 497-509 - Sehrish Jamil, Salma Noor, Iftikhar Ahmed, Neelam Gohar, Fouzia:

Semantic Modeling of Events Using Linked Open Data. 511-524 - Bin Xu, Jianming Zhu, Junzhe Wen, Shanshan Lin, Yunkai Zhao, Jin Qi, Yu Xue, Sichong Qin:

Optimization for Variable Height Wind Farm Layout Model. 525-537 - Y. Sreeraman

, S. Lakshmana Pandian:
Design and Experimentation of Causal Relationship Discovery among Features of Healthcare Datasets. 539-557 - Cheng-Yan Siao, Jhe-Wei Lin, Ting-Hsuan Chien, Rong-Guey Chang:

Paralleling Collision Detection on Five-Axis Machining. 559-569 - Adnan Bin Amanat Ali, Vasaki Ponnusamy, Anbuselvan Sangodiah, Roobaea Alroobaea

, N. Z. Jhanjhi
, Uttam Ghosh, Mehedi Masud:
Smartphone Security Using Swipe Behavior-based Authentication. 571-585 - Sara Mehmood, Naeem Ahmed Mahoto, Asadullah Shaikh

, Hani Alshahrani, Mana Saleh Al Reshan
:
Impact of Skim Reading Based on Different Screen Sizes. 587-604 - Mohammed Hamdi, Fekry Olayah, Amin A. Al-Awady

, Ahlam F. Shamsan, Mokhtar M. Ghilan:
Attitude Towards Adopting Cloud Computing in the Saudi Banking Sector. 605-617 - A. M. Abdullah, Hegazy Rezk, A. Hadad, Mohamed K. Hassan

, A. F. Mohamed:
Optimal Parameter Estimation of Proton Exchange Membrane Fuel Cells. 619-631 - Muhammad Irshad Nazeer, Ghulam Ali Mallah, Raheel Ahmed Memon

:
A Hybrid Scheme for Secure Wireless Communications in IoT. 633-648
Volume 29, Number 3, 2021
- Jaber Almutairi, Mohammad Aldossary

:
Resource Management and Task Offloading Issues in the Edge-Cloud Environment. 129-145 - Qura-Tul-Ain Khan, Taher M. Ghazal

, Sagheer Abbas
, Wasim Ahmad Khan
, Muhammad Adnan Khan
, Raed A. Said
, Munir Ahmad, Muhammad Asif:
Modeling Habit Patterns Using Conditional Reflexes in Agency. 539-552 - Wei Lu, Guanghui Yuan, Hao Yang, Hongrun Yang, Xin Zhao, Qian Zhang:

Visualization of Reactor Core Based on Triangular Mesh Method. 689-699 - Nadia Tabassum, Tahir Alyas

, Muhammad Hamid
, Muhammad Saleem, Saadia Malik, Zain Ali, Umer Farooq
:
Semantic Analysis of Urdu English Tweets Empowered by Machine Learning. 175-186 - Adil Hussain Seh, Jehad F. Al-Amri, Ahmad F. Subahi, Alka Agrawal, Rajeev Kumar

, Raees Ahmad Khan:
Machine Learning Based Framework for Maintaining Privacy of Healthcare Data. 697-712 - D. Saber, Ibrahim B. M. Taha

, Kh. Abd El-Aziz:
Prediction of the Corrosion Rate of Al-Si Alloys Using Optimal Regression Methods. 757-769 - Hanan A. Hosni Mahmoud, Amal H. Alharbi, Doaa S. Khafga

:
Breast Cancer Classification Using Deep Convolution Neural Network with Transfer Learning. 803-814 - Ramesh Krishnamoorthy, Kalimuthu Krishnan:

Security Empowered System-on-Chip Selection for Internet of Things. 403-418 - Tooba Batool, Sagheer Abbas

, Yousef Alhwaiti
, Muhammad Saleem
, Munir Ahmad, Muhammad Asif
, Nouh Sabri Elmitwally
:
Intelligent Model Of Ecosystem For Smart Cities Using Artificial Neural Networks. 513-525 - Mohammad Monirujjaman Khan, Shamsun Nahar Safa, Minhazul Hoque Ashik, Mehedi Masud, Mohammed A. Alzain:

Research and Development of a Brain-Controlled Wheelchair for Paralyzed Patients. 49-64 - Yabin Xu, Peiyuan Gu, Xiaowei Xu:

Research on Detection Method of Interest Flooding Attack in Named Data Networking. 113-127 - Wei Fang

, Lin Pang, Weinan Yi, Victor S. Sheng:
AttEF: Convolutional LSTM Encoder-Forecaster with Attention Module for Precipitation Nowcasting. 453-466 - Azeem Shera, Muhammad Waseem Iqbal, Syed Khuram Shahzad, Madeeha Gul, Natash Ali Mian, Muhammad Raza Naqvi

, Babar Ayub Khan:
Blind and Visually Impaired User Interface to Solve Accessibility Problems. 285-301 - Naeem Ali

, Alia Ahmed, Leena Anum
, Taher M. Ghazal
, Sagheer Abbas
, Muhammad Adnan Khan
, Haitham M. Alzoubi, Munir Ahmad:
Modelling Supply Chain Information Collaboration Empowered with Machine Learning Technique. 243-257 - Jianping Yu, Zhuqing Qiao, Wensheng Tang, Danni Wang, Xiaojun Cao

:
Blockchain-Based Decision Tree Classification in Distributed Networks. 713-728 - Osama S. Faragallah, Ghada Abdel-Aziz, Hala S. El-sayed

, Gamal G. N. Geweid:
Segmentation of the Left Ventricle in Cardiac MRI Using Random Walk Techniques. 575-588 - Naeem Ahmed Mahoto, Rabia Iftikhar

, Asadullah Shaikh
, Yousef Asiri, Abdullah Alghamdi
, Khairan Rajab:
An Intelligent Business Model for Product Price Prediction Using Machine Learning Approach. 147-159 - Sobia Wassan, Chen Xi, N. Z. Jhanjhi

, Hassan Raza:
A Smart Comparative Analysis for Secure Electronic Websites. 187-199 - Qin Zhang, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qiang Liu, Neal N. Xiong:

Short Text Entity Disambiguation Algorithm Based on Multi-Word Vector Ensemble. 227-241 - Yong Li, Xipeng Wang:

Person Re-Identification Based on Joint Loss and Multiple Attention Mechanism. 563-573 - Gaigai Jin, Junsheng Zhou, Weiguang Qu, Yunfei Long, Yanhui Gu:

Exploiting Rich Event Representation to Improve Event Causality Recognition. 161-173 - Desheng Zheng

, Xiaolan Tang, Xinlong Wu, Kexin Zhang, Chao Lu, Lulu Tian:
Surge Fault Detection of Aeroengines Based on Fusion Neural Network. 815-826 - Yujie Zhou, Jin Liu

, Yurong Xie, Y. Ken Wang:
Morphological Feature Aware Multi-CNN Model for Multilingual Text Recognition. 715-733 - Hao Wu

, B. Nagaraj:
Research on College English Teaching Model Based on Decision Trees. 81-95 - Mamoona Majid, Muhammad Faisal Hayat, Farrukh Zeeshan Khan, Muneer Ahmad

, N. Z. Jhanjhi
, Mohammad Arif Sobhan Bhuiyan, Mehedi Masud, Mohammed A. Alzain:
Ontology-Based System for Educational Program Counseling. 373-386 - Sherif S. M. Ghoneim, Amr E. Rashed

, Nagy I. Elkalashy:
Fault Detection Algorithms for Achieving Service Continuity in Photovoltaic Farms. 467-479 - Jiahui Pan

, Liangxin Liu, Mianfen Lin, Shengzhou Luo, Chengju Zhou, Huijian Liao, Fei Wang:
An Improved Two-stream Inflated 3D ConvNet for Abnormal Behavior Detection. 673-688 - Toqir A. Rana

, Bahrooz Bakht, Mehtab Afzal
, Natash Ali Mian, Muhammad Waseem Iqbal, Abbas Khalid, Muhammad Raza Naqvi
:
Extraction of Opinion Target Using Syntactic Rules in Urdu Text. 839-853 - A. M. Abdullah, Hegazy Rezk, Abdelrahman Elbloye, Mohamed K. Hassan

, A. F. Mohamed:
Grey Wolf Optimizer-Based Fractional MPPT for Thermoelectric Generator. 729-740 - Sangeetha Ganesan

, Sumathi Ganesan:
A Multi-Objective Secure Optimal VM Placement in Energy-Efficient Server of Cloud Computing. 387-401 - Zhe Wang, Yingying Zhao, Hai Dong

, Yulong Xu, Yali Lv:
Improved Algorithm Based on Decision Tree for Semantic Information Retrieval. 419-429 - Xiaoyan Zhao, Lin Zhou, Ying Tong, Yuxiao Qi, Jingang Shi:

Robust Sound Source Localization Using Convolutional Neural Network Based on Microphone Array. 361-371 - Mohammed Faisal, Fahad R. Albogamy, Hebah ElGibreen, Mohammed Algabri, Syed Ahad M. Alvi

, Mansour Alsulaiman:
COVID-19 Diagnosis Using Transfer-Learning Techniques. 649-667 - Emad H. El-Zohri, Hegazy Rezk, Basem Alamri

, Hamdy A. Ziedan
:
Improving the Power Quality of Smart Microgrid Based Solar Photovoltaic Systems. 201-213 - Munif Alotaibi, Bandar Alotaibi:

Detection of COVID-19 Using Deep Learning on X-Ray Images. 885-898 - Tian Liwei, Feng Li, Sun Yu, Yuankai Guo:

Forecast of LSTM-XGBoost in Stock Price Based on Bayesian Optimization. 855-868 - Lina Wang, Jie Wang, Yongjun Ren, Zimeng Xing, Tao Li, Jinyue Xia:

A Shadowed Rough-fuzzy Clustering Algorithm Based on Mahalanobis Distance for Intrusion Detection. 31-47 - Ye Yang, Xiaofang Li, Dongjie Zhu, Hao Hu, Haiwen Du, Yundong Sun, Weiguo Tian, Yansong Wang

, Ning Cao, Gregory M. P. O'Hare:
A Resource-constrained Edge IoT Device Data-deduplication Method with Dynamic Asymmetric Maximum. 481-494 - Mohammed Baz, Hatem Zaini, Hala S. El-sayed

, Matokah M. Abualnaja
, Heba M. Elhoseny
, Osama S. Faragallah:
Utilization of Artificial Intelligence in Medical Image Analysis for COVID-19 Patients Detection. 97-111 - Guiying Wang, Xigui Wang, Hong Zhao, Yinggang Huang, Jinyong Ju, E. E. Erdun:

A Low-Cost 3-Axis Computer Controlled Filament-Winding Pattern Design Method for Composite Elbows. 651-662 - Jing Peng, Chaoyang Xia, Yuanwei Xu, Xiaojie Li, Xi Wu, Xiao Han, Xinlai Chen, Yucheng Chen, Zhe Cui:

A Multi-Task Network for Cardiac Magnetic Resonance Image Segmentation and Classification. 259-272 - Bushra Mumtaz

, Summrina Kanwal
, Sultan Alamri, Faiza Khan:
Feature Selection Using Artificial Immune Network: An Approach for Software Defect Prediction. 669-684 - Maryam Munawar

, Iram Noreen:
Duplicate Frame Video Forgery Detection Using Siamese-based RNN. 927-937 - Juan Huang, Bifang Zhou, Huajun Huang, Dingwen Qing, Neal N. Xiong:

Main Factor Selection Algorithm and Stability Analysis of Regional FDI Statistics. 303-318 - Jianming Zhao, Peng Zeng

, Chunyu Chen, Zhiwei Dong, Jongho Han:
Deep Learning Anomaly Detection Based on Hierarchical Status-Connection Features in Networked Control Systems. 337-350 - Kathiravan Srinivasan, Lalit Garg, Bor-Yann Chen, Abdulellah A. Alaboudi

, N. Z. Jhanjhi
, Chang-Tang Chang, B. Prabadevi
, N. Deepa:
Expert System for Stable Power Generation Prediction in Microbial Fuel Cell. 17-30 - Osama S. Faragallah, Abdullah N. Muhammed, Taha S. Taha, Gamal G. N. Geweid:

Liver Lesions and Acute Intracerebral Hemorrhage Detection Using Multimodal Fusion. 215-225 - Yiming Liu, Ke Chen, Lanzhen Bian, Lei Ren, Jing Hu, Jinyue Xia:

Game-Theory Based Graded Diagnosis Strategies of Craniocerebral Injury. 553-561 - Aihong Yu, Zhe Liu, Victor S. Sheng, Yuqing Song, Xuesheng Liu, Chongya Ma, Wenqiang Wang, Cong Ma:

CT Segmentation of Liver and Tumors Fused Multi-Scale Features. 589-599 - Bin Lin, Jixin Chen

, Zhihong Zhang, Yanlin Lai, Xinlong Wu, Lulu Tian, Wangchi Cheng:
An Adversarial Network-based Multi-model Black-box Attack. 641-649 - Xinyue Zhang

, Ting Jin, Mingjie Han, Jingsheng Lei, Zhichao Cao:
Visual Saliency Prediction Using Attention-based Cross-modal Integration Network in RGB-D Images. 439-452 - Nadia Tabassum, Abdul Rehman, Muhammad Hamid

, Muhammad Saleem, Saadia Malik, Tahir Alyas
:
Intelligent Nutrition Diet Recommender System for Diabetic's Patients. 319-335 - Xiaoliang Lin, Junxiao Shi, Yanbo Wang, Chenyang Liu, Bin Lu, Siwen Xu:

Container Application Migration Algorithm in Internet of Vehicles. 915-926 - Jhe-Wei Lin, Cheng-Yan Siao, Ting-Hsuan Chien, Rong-Guey Chang:

A Novel Automatic Meal Delivery System. 685-695 - Ghassan Ahmed Ali

:
Strategies for Reducing the Spread of COVID-19 Based on an Ant-Inspired Framework. 351-360 - Taher M. Ghazal

, Muhammad Zahid Hussain, Raed A. Said
, Afrozah Nadeem, Mohammad Kamrul Hasan, Munir Ahmad, Muhammad Adnan Khan
, Muhammad Tahir Naseem:
Performances of K-Means Clustering Algorithm with Different Distance Metrics. 735-742 - Lin Zhou, Kun Feng, Tianyi Wang, Yue Xu, Jingang Shi:

Binaural Speech Separation Algorithm Based on Deep Clustering. 527-537 - Lin Xiang, Jiaohua Qin, Xuyu Xiang, Yun Tan, Neal N. Xiong:

A Robust Text Coverless Information Hiding Based on Multi-Index Method. 899-914 - Muhammad Usman Ashraf

, Fathy Alburaei Eassa, Leon J. Osterweil, Aiiad Ahmad Albeshri, Abdullah M. Algarni
, Iqra Ilyas:
AAP4All: An Adaptive Auto Parallelization of Serial Code for HPC Systems. 615-639 - Ting-Hsuan Chien, Cheng-Yan Siao, Rong-Guey Chang:

A General Technique for Real-Time Robotic Simulation in Manufacturing System. 827-838 - V. Nivedita, N. Nandhagopal

:
Trust Management-Based Service Recovery and Attack Prevention in MANET. 771-786 - Muhammad Shujaat

, Numan Aslam, Iram Noreen, Muhammad Khurram Ehsan, Muhammad Aasim Qureshi
, Aasim Ali, Neelma Naz, Imtisal Qadeer:
Intelligent and Integrated Framework for Exudate Detection in Retinal Fundus Images. 663-672 - Si-Yi Chen, Gang Xu, Xiu-Bo Chen, Haseeb Ahmad

, Yu-Ling Chen:
Measurement-based Quantum Repeater Network Coding. 273-284 - Xiaoli Hao, Xiaojuan Meng, Yueqin Zhang, Jindong Xue, Jinyue Xia:

Conveyor Belt Detection Based on Deep Convolution GANs. 601-613 - Yabin Xu, Shujuan Chen, Xiaowei Xu:

Research on Viewpoint Extraction in Microblog. 495-511 - K. Kalaivani, M. Chinnadurai:

A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment. 1-15 - Shuo Liang, Dingcheng Wang, Jingrong Wu, Rui Wang, Ruiqi Wang:

Method of Bidirectional LSTM Modelling for the Atmospheric Temperature. 701-714 - Adel Hamdan Mohammad:

Intrusion Detection Using a New Hybrid Feature Selection Model. 65-80 - Mengyuan Liao, Jing Duan, Rong Zhang, Xu Zhou, Xi Wu, Xin Wang, Jinrong Hu:

A Hypergraph-Embedded Convolutional Neural Network for Ice Crystal Particle Habit Classification. 787-801 - Tao Li, Ning Peng Li, Qi Qian, Wenduo Xu, Yongjun Ren, Jinyue Xia:

Inversion of Temperature and Humidity Profile of Microwave Radiometer Based on BP Network. 741-755 - Nadzirah Nahrawi, Wan Azani Mustafa

, Siti Nurul Aqmariah Mohd Kanafiah
, Mohd Yusoff Mashor:
Color Contrast Enhancement on Pap Smear Images Using Statistical Analysis. 431-438 - Majid Hussain:

Stator Winding Fault Detection and Classification in Three-Phase Induction Motor. 869-883

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














