


default search action
Intelligent Automation & Soft Computing, Volume 33
Volume 33, Number 1, 2022
- S. Lakshmi Durga, Rajeshwari Chiluveru, Khalid Hamed Allehaibi, Nishu Gupta

, Nasser Nammas Albaqami, Isha Bharti, Ahmad Hoirul Basori:
Deep Reinforcement Learning-Based Long Short-Term Memory for Satellite IoT Channel Allocation. 1-19 - Srikanth Busa, Swarajya Lakshmi V. Papineni

, Gutta Sridevi, D. N. V. S. L. S. Indira
, K. S. R. Radhika, Syed Khasim:
Adaptive XGBOOST Hyper Tuned Meta Classifier for Prediction of Churn Customers. 21-34 - R. Bharathi

, N. Parvatham
:
Light-Weight Present Block Cipher Model for IoT Security on FPGA. 35-49 - Anas Bushnag:

A Wireless ECG Monitoring and Analysis System Using the IoT Cloud. 51-70 - Vasuki Andiappan, Vijayakumar Ponnusamy:

Error Rate Analysis of Intelligent Reflecting Surfaces Aided Non-Orthogonal Multiple Access System. 71-86 - G. Maria Jones, S. Godfrey Winster, P. Valarmathie:

An Advanced Integrated Approach in Mobile Forensic Investigation. 87-102 - Naglaa F. Soliman

, Samia M. Abd-Alhalem, Walid El-Shafai, Salah Eldin S. E. Abd Elrahman, N. Ismaiel, El-Sayed M. El-Rabaie, Abeer D. Algarni, Fatimah Algarni, Fathi E. Abd El-Samie:
Bidirectional Long Short-Term Memory Network for Taxonomic Classification. 103-116 - R. Rajasekar, P. Sivakumar:

A Cloud-Based Secure Emergency Message Dissemination Scheme in Vehicular Adhoc Networks. 117-131 - Zuwei Tian, Hengfu Yang, Zhichen Gao:

Software Information Hiding Algorithm Based on Palette Icon of PE File. 133-142 - R. Punithavathi

, R. Thanga Selvi, R. Latha
, G. Kadiravan
, V. Srikanth, Neeraj Kumar Shukla
:
Robust Node Localization with Intrusion Detection for Wireless Sensor Networks. 143-156 - Navod Neranjan Thilakarathne

, G. Muneeswari
, V. Parthasarathy, Fawaz Alassery, Habib Hamam, Rakesh Kumar Mahendran
, Muhammad Shafiq:
Federated Learning for Privacy-Preserved Medical Internet of Things. 157-172 - R. Manikandan, G. Ranganathan

, V. Bindhu:
Intelligent Computing and Control Framework for Smart Automated System. 173-189 - N. Kanagavalli

, S. Baghavathi Priya:
Social Networks Fake Account and Fake News Identification with Reliable Deep Learning. 191-205 - V. Ravikumar, S. Muralidharan, C. Vidhya:

Three to Six Phase Power Converter with Partial Resonant AC Link. 207-225 - Thirumoorthy Palanisamy, Daniyal M. Alghazzawi

, Surbhi Bhatia
, Areej A. Malibari, Pankaj Dadheech
, Sudhakar Sengan:
Improved Energy Based Multi-Sensor Object Detection in Wireless Sensor Networks. 227-244 - R. K. Rojin

, M. Mary Linda:
Hybrid Microgrid based on PID Controller with the Modified Particle Swarm Optimization. 245-258 - Hatim Elhassan, Mohammed Abaker

, Abdelzahir Abdelmaboud
, Mohammed Burhanur Rehman
:
Requirements Engineering: Conflict Detection Automation Using Machine Learning. 259-273 - K. O. Mohammed Aarif

, P. Sivakumar:
Multi-Domain Deep Convolutional Neural Network for Ancient Urdu Text Recognition System. 275-289 - Lihua Zhu, Yu Wang, Zhiqiang Wu, Cheire Cheng:

The Intelligent Trajectory Optimization of Multistage Rocket with Gauss Pseudo-Spectral Method. 291-303 - Mohammad Zubair Khan

, Muhammad Awais Javed, Hamza Ghandorh
, Omar Hussain Alhazmi, Khalid S. Aloufi:
Interference-Aware Transmission Scheduling for Internet of Vehicles. 305-315 - K. Babu, C. Kumar, C. Kannaiyaraju:

Face Recognition System Using Deep Belief Network and Particle Swarm Optimization. 317-329 - S. Beatrice

, Janaki Meena:
Overhauled Approach to Effectuate the Amelioration in EEG Analysis. 331-347 - Fuat Türk

, Murat Lüy
, Necaattin Barisçi, Fikret Yalcinkaya:
Kidney Tumor Segmentation Using Two-Stage Bottleneck Block Architecture. 349-363 - M. Maheswari, R. A. Karthika

:
A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks. 365-382 - Venkateswari Pichaimani, K. R. Manjula:

A Machine-Learning Framework to Improve Wi-Fi Based Indoorpositioning. 383-397 - K. Saranya, K. Selva Bhuvaneswari:

Semantic Annotation of Land Cover Remote Sensing Images Using Fuzzy CNN. 399-414 - Ishani Mishra

, Sanjay Jain:
Optimized Compressive Sensing Based ECG Signal Compression and Reconstruction. 415-428 - Nadeem Fakhar Malik, Aamer Nadeem

, Muddassar Azam Sindhu:
Achieving State Space Reduction in Generated Ajax Web Application State Machine. 429-455 - G. Niranjani, K. Umamaheswari:

Sustainable Waste Collection Vehicle Routing Problem for COVID-19. 457-472 - Xia Zhou, Zijian Wang, Tianyu Wang, Jin Han, Zhiling Wang, Yannan Qian:

A Novel Method of User Identity Recognition Based on Finger Trajectory. 473-481 - Khudran M. Alzhrani

:
Political Ideology Detection of News Articles Using Deep Neural Networks. 483-500 - Adel Binbusayyis

:
Deep Embedded Fuzzy Clustering Model for Collaborative Filtering Recommender System. 501-513 - G. Chamundeeswari

, S. Srinivasan, S. Prasanna Bharathi:
Efficient Urban Green Space Destruction and Crop Stress Yield Assessment Model. 515-534 - T. Viveka, C. Christopher Columbus, N. Senthil Velmurugan:

To Control Diabetes Using Machine Learning Algorithm and Calorie Measurement Technique. 535-547 - Ahmed M. Ayoup

, Ashraf A. M. Khalaf
, Fahad Alraddady, Fathi E. Abd El-Samie, Walid El-Safai, Salwa M. Serag Eldin
:
Selective Cancellable Multi-Biometric Template Generation Scheme Based on Multi-Exposure Feature Fusion. 549-565 - Inamul Hasan

, R. Mukesh, P. Radha Krishnan, R. Srinath, R. B. Dhanya Prakash:
Forward Flight Performance Analysis of Supercritical Airfoil in Helicopter Main Rotor. 567-584 - Huizhong Sun, Guosheng Xu, Zhimin Wu, Ruijie Quan:

Android Malware Detection Based on Feature Selection and Weight Measurement. 585-600 - S. Aravindkumar, P. Varalakshmi:

VANET: Optimal Cluster Head Selection Using Opposition Based Learning. 601-617 - Mohd Anul Haq

, Mohd Abdul Rahim Khan
, Mohammed Alshehri
:
Insider Threat Detection Based on NLP Word Embedding and Machine Learning. 619-635 - Harmandeep Singh Gill

, Osamah Ibrahim Khalaf, Youseef Alotaibi, Saleh Ahmed Alghamdi, Fawaz Alassery:
Multi-Model CNN-RNN-LSTM Based Fruit Recognition and Classification. 637-650 - V. Vijayal, K. Krishnamoorthi:

Integrated Renewable Smart Grid System Using Fuzzy Based Intelligent Controller. 651-667 - D. Ahila Jeyanthi, T. M. Selvarajan:

Enhanced Mesh Network Using Novel Forgotten Polynomial Algorithm for Pharmaceutical Design. 669-680
Volume 33, Number 2, 2022
- Hadee Madadum, Yasar Becerikli

:
A Resource-Efficient Convolutional Neural Network Accelerator Using Fine-Grained Logarithmic Quantization. 681-695 - Jayavarthini Chockalingam, Chidambaranathan Malathy:

An Enhanced Re-Ranking Model for Person Re-Identification. 697-710 - D. Nageswari, R. Maheswar

, P. Jayarajan:
OA-PU Algorithm-to Enhance WSN Life Time with Cluster Head Selection. 711-727 - M. Iniyan Arasu, S. Subha Rani, G. Raswin Geoffery:

Efficient Heuristic for Optimal MILP-LoRa Adaptive Resource Allocation for Aquaculture. 729-742 - Kotchaporn Karoon, Yupaporn Areepong, Saowanit Sukparungsee:

Exact Run Length Evaluation on Extended EWMA Control Chart for Autoregressive Process. 743-759 - S. Manikandan, B. Nagaraj:

Hyperparameter Tuned Bidirectional Gated Recurrent Neural Network for Weather Forecasting. 761-775 - S. Arun Kumar

, S. Padma, S. Madhubalan
:
Distribution Network Reconfiguration Using Hybrid Optimization Technique. 777-789 - Yousef Jaradat

, Mohammad Z. Masoud, Ismael Jannoud, Dema Zeidan:
Genetic Algorithm Energy Optimization in 3D WSNs with Different Node Distributions. 791-808 - Tauqeer Safdar Malik

, Kaleem Razzaq Malik, Muhammad Sanaullah, Mohd Hilmi Hasan, Norshakirah Aziz:
Non-Cooperative Learning Based Routing for 6G-IoT Cognitive Radio Network. 809-824 - M. P. Haripriya

, P. Venkadesh:
Feature Selection Based on IoT Aware QDA Node Authentication in 5G Networks. 825-836 - Saleh Albahli, Ghulam Nabi Ahmad Hassan Yar

:
Detection of Diabetic Retinopathy Using Custom CNN to Segment the Lesions. 837-853 - Pengyu Liu, Wenjing Zhang, Tao Wang, Xiaowei Jia, Ying Ma, Kebin Jia, Yanming Wang:

Error Calibration Model of Air Pressure Sensor Based on DF-RBF. 855-864 - G. Ravikumar, K. Venkatachalam, Mehedi Masud, Mohamed Abouhawwash

:
Cost Efficient Scheduling Using Smart Contract Cognizant Ethereum for IoMT. 865-877 - Reena Thomas

, M. Sucharitha:
Contourlet and Gould Transforms for Hybrid Image Watermarking in RGB Color Images. 879-889 - R. Muthaiyan

, M. Malleswaran
:
Bendlets and Ensemble Learning Based MRI Brain Classification System. 891-907 - Y. Alexander Jeevanantham

, S. Srinath:
ANN Based Reduced Switch Multilevel Inverter in UPQC for Power Quality Improvement. 909-921 - Fatmah Alanazi, Kamal Mansur Jambi, Fathy Elbouraey Eassa, Maher Khemakhem

, Abdullah Basuhail, Khalid Alsubhi:
Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network. 923-938 - K. Poongodi, A. Sabari:

Identification of Bio-Markers for Cancer Classification Using Ensemble Approach and Genetic Algorithm. 939-953 - L. Vasanth, N. J. R. Muniraj:

Incredible VLSI Design for MIMO System Using SEC-QPSK Detection. 955-966 - Wen-Tsai Sung

, Ihzany Vilia Devi, Sung-Jung Hsiao:
Smart Lamp Using Google Firebase as Realtime Database. 967-982 - Duraimurugan Nagendiran

, S. P. Chokkalingam:
Real Time Brain Tumor Prediction Using Adaptive Neuro Fuzzy Technique. 983-996 - Xingyu Zeng, Hua Zhang, Chaosong Yan, Liu Zhao, Qiaoyan Wen:

ISmart: Protecting Smart Contract Against Integer Bugs. 997-1008 - Meenu Chaudhary

, Loveleen Gaur
, N. Z. Jhanjhi
, Mehedi Masud, Sultan Aljahdali:
Envisaging Employee Churn Using MCDM and Machine Learning. 1009-1024 - P. Karuppanan, K. Dhanalakshmi:

Criminal Persons Recognition Using Improved Feature Extraction Based Local Phase Quantization. 1025-1043 - Amit Ramesh Khaparde, Fawaz Alassery, Arvind Kumar, Youseef Alotaibi, Osamah Ibrahim Khalaf, Sofia Pillai

, Saleh Alghamdi:
Differential Evolution Algorithm with Hierarchical Fair Competition Model. 1045-1062 - Kawther Benharrath, Amine Ben Slama, Balkine Khaddoumi, Mounir Sayadi, Hervé Rix, Olivier Meste

, Sophie Guetat, Jérôme Lebrun
, Marie-Noële Magnie-Mauro:
Interactive Human Interface for ERP Component Extraction from Gifted Children. 1063-1080 - K. Sundara Krishnan, S. Syed Suhaila, S. P. Raja

:
A Novel Medical Image Encryption Using R鰏sler System. 1081-1101 - S. Baskaran

, Raghuraman Sivalingam
:
Optimized Control of Single Phase Reboost Luo Converter Fed Grid-Connected PV System. 1103-1119 - Chandla Ellis

, C. Chellamuthu, J. Jayaseelan:
Transformer Less Grid Integrated Single Phase PV Inverter Using Prognosticative Control. 1121-1138 - S. Jacophine Susmi:

Optimized LSTM with Dimensionality Reduction Based Gene Expression Data Classification. 1139-1152 - Xiaopeng Li, Ziyuan Xu, Jin Han, Xingming Sun, Yi Cao:

Research on Thunderstorm Identification Based on Discrete Wavelet Transform. 1153-1166 - A. Saranya, R. Anandan

:
Facial Action Coding and Hybrid Deep Learning Architectures for Autism Detection. 1167-1182 - Aitizaz Ali, Mehedi Masud, Ateeq ur Rehman, Can Chen, Mehmood, Mohammed Abdullatif Alzain, Jehad Ali:

An Effective Blockchain Based Secure Searchable Encryption System. 1183-1195 - Zi Ye

, Yogan Jaya Kumar, Goh Ong Sing, Fengyan Song, Xianda Ni:
Classification of Echocardiographic Standard Views Using a Hybrid Attention-based Approach. 1197-1215 - Kranthi Kumar Singamaneni

, Alhassan Alolo Abdul-Rasheed Akeji, Tiruvedula Mithun, M. Ambika, L. Jabasheela
, Ranjan Walia
, U. Sakthi
:
Stock Price Prediction Using Optimal Network Based Twitter Sentiment Analysis. 1217-1227 - Ihsan Uluocak

, Hakan Yavuz
:
Artificial Intelligence Based PID Controller for an Eddy Current Dynamometer. 1229-1243 - Chia-Nan Wang

, Thi-Ly Nguyen, Thanh-Tuan Dang
:
Two-Stage Fuzzy MCDM for Green Supplier Selection in Steel Industry. 1245-1260 - Surbhi Bhatia

, Mohammed Alojail
:
A Novel Approach for Deciphering Big Data Value Using Dark Data. 1261-1271 - G. Tamilarasi

, K. Rajiv Gandhi
, V. Palanisamy:
Improved Homomorphic Encryption with Optimal Key Generation Technique for VANETs. 1273-1288 - Ahmed M. Ayoup

, Ashraf A. M. Khalaf
, Fahad Alraddady, Fathi E. Abd El-Samie, Walid El-Shafai, Salwa M. Serag Eldin
:
Cancelable Multi-biometric Template Generation Based on Dual-Tree Complex Wavelet Transform. 1289-1304 - R. Kavitha, N. Viswanathan:

Cat-Inspired Deep Convolutional Neural Network for Bone Marrow Cancer Cells Detection. 1305-1320 - Sharifa Khalid Alduraibi:

A Novel Convolutional Neural Networks-Fused Shallow Classifier for Breast Cancer Detection. 1321-1334
Volume 33, Number 3, 2022
- V. Rajalakshmi

, S. Ganesh Vaidyanathan:
MLP-PSO Framework with Dynamic Network Tuning for Traffic Flow Forecasting. 1335-1348 - Ajina Mohamed Ameer

, M. Victor Jose:
Arrhythmia Detection and Classification by Using Modified Recurrent Neural Network. 1349-1361 - S. Benisha, J. Anitha Roseline:

Interleaved Boost Integrated Flyback Converter for Power Factor Correction in Brushless DC Motor Drive. 1363-1378 - Ye Yang, Dongjie Zhu, Xiaofang Li, Haiwen Du, Yundong Sun, Zhixin Huo, Mingrui Wu, Ning Cao, Russell Higgs

:
Research on Cross-domain Representation Learning Based on Multi-network Space Fusion. 1379-1391 - J. Faritha Banu

, S. B. Rajeshwari, Jagadish S. Kallimani, S. Vasanthi
, Ahmed Mateen Buttar
, Sangeetha Meckanizi, Sanjay Bhargava:
Modeling of Hyperparameter Tuned Hybrid CNN and LSTM for Prediction Model. 1393-1405 - Iqra Abid, Sultan Almakdi, Hameedur Rahman

, Ahmed Almulihi, Ali Alqahtani, Khairan Rajab, Abdulmajeed Alqhatani, Asadullah Shaikh
:
A Convolutional Neural Network for Skin Lesion Segmentation Using Double U-Net Architecture. 1407-1421 - P. E. Irin Dorathy, M. Chandrasekaran:

Ant-based Energy Efficient Routing Algorithm for Mobile Ad hoc Networks. 1423-1438 - Yu Ren, Jiaohua Qin, Yun Tan, Neal N. Xiong:

Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction-error Label Map. 1439-1453 - A. George Ansfer

, M. Marsaline Beno:
Improving the Efficiency of HEV Electronic Applications Using CAN-BUS Communication. 1455-1472 - Worakamol Wisetsri, Shamimul Qamar, Gaurav Verma, Deval Verma

, Varun Kumar Kakar, Thanyanant Chansongpol, Chanyanan Somtawinpongsai, Chai Ching Tan
:
Electricity Theft Detection and Localization in Smart Grids for Industry 4.0. 1473-1483 - M. Gomathy Nayagam

, K. Ramar
, K. Venkatesh, S. P. Raja
:
Moving Object Detection and Tracking Algorithm Using Hybrid Decomposition Parallel Processing. 1485-1499 - Yuhao Chen, Jiajun Liu, Yaxi Peng, Ziyi Liu, Zhipeng Yang:

Multilayer Functional Connectome Fingerprints: Individual Identification via Multimodal Convolutional Neural Network. 1501-1516 - S. Priyadarsini

, Carlos Andrés Tavera Romero
, M. Mrunalini, Ganga Rama Koteswara Rao
, Sudhakar Sengan:
Classification of Liver Tumors from Computed Tomography Using NRSVM. 1517-1530 - P. Rajesh

, K. S. Saji
:
Total Cross Tied-Inverted Triangle View Configuration for PV System Power Enhancement. 1531-1545 - M. Vinoth Kumar

, K. Venkatachalam, Mehedi Masud, Mohamed Abouhawwash
:
Novel Dynamic Scaling Algorithm for Energy Efficient Cloud Computing. 1547-1559 - Huading Ling, Aiping Zhang, Changchun Yin

, Dafang Li, Mengyu Chang:
Improve Representation for Cross-Language Clone Detection by Pretrain Using Tree Autoencoder. 1561-1577 - P. R. Sheebha Rani, R. Jemila Rose

:
Segmentation of Cervical Cancer by OLHT Based DT-CWT Techniques. 1579-1592 - R. Bhaskaran

, R. Karuppathal, M. Karthick
, J. Vijayalakshmi, Seifedine Nimer Kadry, Yunyoung Nam:
Blockchain Enabled Optimal Lightweight Cryptography Based Image Encryption Technique for IIoT. 1593-1606 - Amal Ben Hamida

, Chokri Ben Amar, Yasser Albagory
:
A New Color Model for Fire Pixels Detection in PJF Color Space. 1607-1621 - Ruhao Ma, Fansheng Meng, Haiwen Du:

CI-Block: A Blockchain System for Information Management of Collaborative Innovation. 1623-1637 - R. Saravana Ram, K. Venkatachalam, Mehedi Masud, Mohammed Abdullatif Alzain:

Air Pollution Prediction Using Dual Graph Convolution LSTM Technique. 1639-1652 - Yang Liu

, Xiaoyu Liu, Xiu Dai, Guanglian Xun, Ni Ren, Rui Kang, Xiaojuan Mao:
Sensor Location Optimisation Design Based on IoT and Geostatistics in Greenhouse. 1653-1663 - M. Usharani, B. Sakthivel, K. Jayaram, R. Renugadevi:

Design of Logically Obfuscated Memory and Arithmetic Logic Unit for Improved Hardware Security. 1665-1675 - Tao Zhang, Yi Cao:

Indoor Scene Splicing Based on Genetic Algorithm and ORB. 1677-1685 - Marwah Mohammad Almasri, Abrar Mohammed Alajlan

:
Modified Optimization for Efficient Cluster-based Routing Protocol in Wireless Sensor Network. 1687-1710 - S. Marisargunam

, L. Kalaivani, R. V. Maheswari:
Energy Enhancement of Permanent Magnet Synchronous Generators Using Particle Swarm Optimization. 1711-1727 - Vineetha Mathai, P. Indumathi:

Spectral Vacancy Prediction Using Time Series Forecasting for Cognitive Radio Applications. 1729-1746 - Jun Zhu, Chaosong Yan, Yinglong Ouyang, Yao Chen, Xiaowan Wang:

Security Data Sharing of Shipbuilding Information Based on Blockchain. 1747-1756 - S. S. Selva Pradeep, M. Marsaline Beno:

Hybrid Sensorless Speed Control Technique for BLDC Motor Using ANFIS Automation. 1757-1770 - B. Gomathi, Saravana Balaji B.

, V. Krishna Kumar
, Mohamed Abouhawwash
, Sultan Aljahdali, Mehedi Masud, Nina Kuchuk:
Multi-Objective Optimization of Energy Aware Virtual Machine Placement in Cloud Data Center. 1771-1785 - P. R. Varshini, S. Baskar, M. Varatharajan, S. Sadhana:

Tuning Rules for Fractional Order PID Controller Using Data Analytics. 1787-1799 - Xiaona Hu, Baiqing Zhou, Jinyue Xia, Yao Chen, Gang Hu:

Energy-saving-oriented Berth Scheduling Model at Bulk Terminal. 1801-1813 - Khaled Suwais

:
Stream Cipher Based on Game Theory and DNA Coding. 1815-1834 - P. Saravanakumar

, T. V. P. Sundararajan, Rajesh Kumar Dhanaraj
, Kashif Nisar, Fida Hussain Memon, Ag Asri Ag Ibrahim:
Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN. 1835-1847 - D. Devina Merin, P. A. Jagatheeswari:

Detection of Microbial Activity in Silver Nanoparticles Using Modified Convolution Network. 1849-1860 - Xiaosha Qi, Genlin Ji, Jie Zhang, Bo Sheng

:
Multi Chunk Learning Based Auto Encoder for Video Anomaly Detection. 1861-1875 - D. Dhinakaran

, P. M. Joe Prathap
:
Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm. 1877-1892 - Wei Gao, Haixu Xi, Gyun Yeol Park:

Context-Aware Service Model of a Mobile Library Based on Internet of Things. 1893-1906 - S. Vimal, S. Nalini, K. Anguraj, T. Chelladurai:

Design of Clustering Enabled Intrusion Detection with Blockchain Technology. 1907-1921 - Shami A. M. Alsallami

, Ali Raza
, Mona Elmahi, Muhammad Rafiq
, Shamas Bilal, Nauman Ahmed, Emad E. Mahmoud:
Computational Approximations for Real-World Application of Epidemic Model. 1923-1939 - Joe Louis Paul Ignatius, Sasirekha Selvakumar:

Enhanced Distributed Storage System Using Lower Triangular Matrix-Luby Transform Codes. 1941-1959 - Fikret Yalcinkaya, Ali Erbas:

Image Masking and Enhancement System for Melanoma Early Stage Detection. 1961-1977

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














