


default search action
Intelligent Automation & Soft Computing, Volume 35
Volume 35, Number 1, 2023
- Prasanalakshmi Balaji

:
Generative Deep Belief Model for Improved Medical Image Segmentation. 1-14 - M. Ramya Devi, I Jasmine Selvakumari Jeya

:
Intelligent Vehicular Communication Using Vulnerability Scoring Based Routing Protocol. 31-45 - Nik Muhammad Farhan Hakim Nik Badrul Alam, Ku Muhammad Naim Ku Khalif, Nor Izzati Jaini:

Application of Intuitionistic Z-Numbers in Supplier Selection. 47-61 - Venkata Sunil Srikanth, S. Krithiga:

Pre-Trained Deep Neural Network-Based Computer-Aided Breast Tumor Diagnosis Using ROI Structures. 63-78 - R. S. Aashmi, T. Jaya

:
Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm. 79-95 - Mahmood Al-Bahri

, Abdelhamied A. Ateya
, Ammar Muthanna, Abeer D. Algarni, Naglaa F. Soliman
:
Digital Object Architecture for IoT Networks. 97-110 - K. Meenakshi

, K. Sashi Rekha:
An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship. 111-128 - S. Sathishkumar, R. Devi Priya:

A Novel Radial Basis Function Neural Network Approach for ECG Signal Classification. 129-148 - Tamara Al Shloul, Madiha Javeed

, Munkhjargal Gochoo, Suliman A. Alsuhibany, Yazeed Yasin Ghadi
, Ahmad Jalal, Jeongmin Park:
Student's Health Exercise Recognition Tool for E-Learning Education. 149-161 - Yassir Edrees Almalki, Maryam Zaffar, Muhammad Irfan, Mohammad Ali Abbas, Maida Khalid, K. S. Quraishi

, Tariq Ali, Fahad Alshehri, Sharifa Khalid Alduraibi, Abdullah A. Asiri, Mohammad Abd Alkhalik Basha, Alaa Alduraibi, M. K. Saeed
, Saifur Rahman
:
A Novel-based Swin Transfer Based Diagnosis of COVID-19 Patients. 163-180 - Smarajit Ghosh:

Effective Energy Management Scheme by IMPC. 181-197 - Prathibha Soma

, Deepak Dahiya
, Chinnanadar Ramachandran Rene Robin
, Cherukuru Venkata Nishkala, S. Swedha:
A Novel Technique for Detecting Various Thyroid Diseases Using Deep Learning. 199-214 - S. Muthukumaran

, P. Geetha, E. Ramaraj:
Multi-Objective Optimization with Artificial Neural Network Based Robust Paddy Yield Prediction Model. 215-230 - V. Kavitha, K. Subramanian:

Design and Analysis of Novel Three-Phase PFC for IM Drives. 231-241 - J. Priya

, C. Palanisamy:
Novel Block Chain Technique for Data Privacy and Access Anonymity in Smart Healthcare. 243-259 - R. Priyadharsini, A. Kunthavai:

Intelligent MRI Room Design Using Visible Light Communication with Range Augmentation. 261-279 - Gurwinder Kaur, Ashwani Kumar:

No-Reference Blur Assessment Based on Re-Blurring Using Markov Basis. 281-296 - Rasha Almarshdi, Laila Nassef

, Etimad A. Fadel, Nahed Alowidi
:
Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification. 297-320 - Hanan A. Hosni Mahmoud, Alaaeldin M. Hafez, Eatedal Alabdulkreem:

Language-Independent Text Tokenization Using Unsupervised Deep Learning. 321-334 - Rachid Karra

, Abdelali Lasfar:
Impact of Data Quality on Question Answering System Performances. 335-349 - Anitha Govindhan

, Karnam Anantha Sunitha, Sivanathan Kandhasamy
:
A Custom Manipulator for Dental Implantation Through Model-Based Design. 351-365 - Ashit Kumar Dutta, Yasser Albagory

, Majed Alsanea
, Abdul Rahaman Wahab Sait
, Hazim Saleh Al-Rawashdeh:
Fuzzy with Metaheuristics Based Routing for Clustered Wireless Sensor Networks. 367-380 - P. Srinivasan, P. Jagatheeswari:

Machine Learning Controller for DFIG Based Wind Conversion System. 381-397 - Ulagammai Meyyappan

, S. Joyal Isac
:
Economic Analysis of Demand Response Incorporated Optimal Power Flow. 399-413 - Wen-Tsai Sung

, Sung-Jung Hsiao:
Creating Smart House via IoT and Intelligent Computation. 415-430 - T. R. Manikandan, Venkatesan Thangavelu:

Combined Economic and Emission Power Dispatch Control Using Substantial Augmented Transformative Algorithm. 431-447 - T. Jagadesh, B. Sheela Rani:

Modeling Target Detection and Performance Analysis of Electronic Countermeasures for Phased Radar. 449-463 - S. Leo Pauline, T. R. Ganeshbabu:

A Substrate Integrated Waveguide Based Filtenna for X and Ku Band Application. 465-473 - G. Nagalalli, G. Ravi

:
A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks. 475-490 - S. Padmapriya, R. Shankar, R. Thiagarajan, N. Partheeban

, Daniel Arockiam
, S. Arun:
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET. 491-505 - Riya Kumarasamy Santhanaraj, Surendran Rajendran

, Carlos Andrés Tavera Romero, Sadish Sendil Murugaraj
:
Encryption with User Authentication Model for Internet of Medical Things Environment. 507-520 - Kavitha Muthukumaran, K. Hariharanath:

Deep Learning Enabled Financial Crisis Prediction Model for Small-Medium Sized Industries. 521-536 - Amishi Mahesh Kapadia, P. Nithyanandam:

A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform. 537-552 - Ayman Altameem, Ramesh Chandra Poonia, Ankit Kumar, Linesh Raja, Abdul Khader Jilani Saudagar

:
P-ROCK: A Sustainable Clustering Algorithm for Large Categorical Datasets. 553-566 - M. P. Karthikeyan

, E. A. Mary Anita:
IM-EDRD from Retinal Fundus Images Using Multi-Level Classification Techniques. 567-580 - Sagar Mekala, K. Shahu Chatrapati:

A Hybrid Approach to Neighbour Discovery in Wireless Sensor Networks. 581-593 - S. P. Abirami, G. Kousalya

, R. Karthick:
Emotion Exploration in Autistic Children as an Early Biomarker through R-CNN. 595-607 - G. Girishkumar, S. Ganesan, Jayakumar N, S. Subramanian:

Black Widow Optimization for Multi Area Economic Emission Dispatch. 609-625 - K. Meenakshi

, G. Maragatham
:
An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform. 627-643 - D. Karthikeyan

, V. Mohanraj, J. Senthilkumar, Y. Suresh
:
Intrusion Detection Using Ensemble Wrapper Filter Based Feature Selection with Stacking Model. 645-659 - Chih-Fang Huang, Ai-Hsien Fan, Jin-Huang Huang, Hsing-Cheng Huang:

Main Melody Configuration and Chord Algorithm for Relaxing Music Generation. 661-673 - A. Soujanya, N. Nandhagopal

:
Automated Skin Lesion Diagnosis and Classification Using Learning Algorithms. 675-687 - M. N. Kavitha

, A. Rajivkannan:
Hybrid Convolutional Neural Network and Long Short-Term Memory Approach for Facial Expression Recognition. 689-704 - M. Suresh Kumar, G. A. Sathish Kumar:

Efficient Hybrid Energy Optimization Method in Location Aware Unmanned WSN. 705-725 - Dae-Young Kim

, Seokhoon Kim:
Data Aggregation-based Transmission Method in Ultra-Dense Wireless Networks. 727-737 - K. Subramanian, S. Shanmugavel:

Intelligent Deployment Model for Target Coverage in Wireless Sensor Network. 739-754 - Ziad M. Ali, Ahmed M. Galal, Salem Alkhalaf, Imran Khan:

An Optimized Algorithm for Renewable Energy Forecasting Based on Machine Learning. 755-767 - Mahmoud Helal, Elsayed Fathallah, Abdulaziz H. Alghtani, Hussein Shawki Osman, Jong Wan Hu, Hasan Eleashy:

Minimizing Buoyancy Factor of Metallic Pressure-Hull Subjected to Hydrostatic Pressure. 769-793 - Kiran Jot Singh

, Divneet Singh Kapoor, Mohamed Abouhawwash
, Jehad F. Al-Amri, Shubham Mahajan, Amit Kant Pandit:
Behavior of Delivery Robot in Human-Robot Collaborative Spaces During Navigation. 795-810 - J. Premalatha, A. Sahayaanselin Nisha:

Base Station Energy Management in 5G Networks Using Wide Range Control Optimization. 811-826 - C. Ambhika, C. Murukesh

:
Optimized ANFIS Model for Stable Clustering in Cognitive Radio Network. 827-838 - B. Murugeshwari, D. Selvaraj

, K. Sudharson
, S. Radhika
:
Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography. 839-851 - S. Sakthivel

, Vijayarangan Vivekanandhan
, Muthaiyan Manikandan
:
Automated Irrigation System Using Improved Fuzzy Neural Network in Wireless Sensor Networks. 853-866 - G. Logeswari, S. Bose

, T. Anitha:
An Intrusion Detection System for SDN Using Machine Learning. 867-880 - C. D. Prem Kumar, S. Saravana Sundaram:

Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique. 881-899 - Rihem Farkh

, Khaled A. Aljaloud
:
Vision Navigation Based PID Control for Line Tracking Robot. 901-911 - Chang-Yi Kao, Hao-En Chueh:

Voice Response Questionnaire System for Speaker Recognition Using Biometric Authentication Interface. 913-924 - Adela Pop Puscasiu, Alexandra Fanca

, Dan-Ioan Gota, Honoriu Valean:
Monitoring and Prediction of Indoor Air Quality for Enhanced Occupational Health. 925-940 - Tao Li, Zhiwei Jiang, Rui Han, Jinyue Xia, Yongjun Ren:

Using GAN Neural Networks for Super-Resolution Reconstruction of Temperature Fields. 941-956 - T. Shanthi, M. Ramprasath, A. Kavitha, T. Muruganantham:

Deep Learning Based Autonomous Transport System for Secure Vehicle and Cargo Matching. 957-969 - K. Sukanya, P. Vijayakumar:

Frequency Control Approach and Load Forecasting Assessment for Wind Systems. 971-982 - Ravi Samikannu, Vinoth Krishnamoorthy, Narasimha Rao Dasari, Senthil Kumar Subburaj

:
Gaussian PI Controller Network Classifier for Grid-Connected Renewable Energy System. 983-995 - R. S. Preethishri, Anitha Roseline Johnson, K. Murugesan, M. Senthil Kumaran:

Optimized Power Factor Correction for High Speed Switched Reluctance Motor. 997-1014 - Ayman Mohamed Mostafa

:
Enhanced Sentiment Analysis Algorithms for Multi-Weight Polarity Selection on Twitter Dataset. 1015-1034 - Sumit Kumar

, S. Indu, Gurjit Singh Walia:
Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis. 1035-1051 - Praveen Talari

, A. Suresh, M. G. Kavitha:
An Intelligent Medical Expert System Using Temporal Fuzzy Rules and Neural Classifier. 1053-1067 - G. Arutperumjothi, K. Suganya Devi, C. Rani, P. Srinivasan:

Qualitative Abnormalities of Peripheral Blood Smear Images Using Deep Learning Techniques. 1069-1086 - Sonia, Kapil Sharma, Monika Bajaj:

DeepWalk Based Influence Maximization (DWIM): Influence Maximization Using Deep Learning. 1087-1101 - Thangavel Saravanakumar

, R. Saravana kumar:
Fuzzy Based Interleaved Step-up Converter for Electric Vehicle. 1103-1118 - Mohamed Ali Rakrouki

, Abeer Aljohani, Nawaf Alharbe
, Abdelaziz Berrais, Talel Ladhari:
Minimizing Total Tardiness in a Two-Machine Flowshop Scheduling Problem with Availability Constraints. 1119-1134 - A. Sivaranjani, B. Vinod:

Artificial Potential Field Incorporated Deep-Q-Network Algorithm for Mobile Robot Path Prediction. 1135-1150 - M. Mohan

, P. C. Kishore Raja, P. Velmurugan, A. Kulothungan:
Holt-Winters Algorithm to Predict the Stock Value Using Recurrent Neural Network. 1151-1163 - Tahir Alyas

, Nadia Tabassum, Muhammad Waseem Iqbal
, Abdullah S. Alshahrani, Ahmed Alghamdi
, Syed Khuram Shahzad:
Resource Based Automatic Calibration System (RBACS) Using Kubernetes Framework. 1165-1179 - K. Dharani Sree

, P. Karpagavalli:
Modified Satin Bowerbird for Distributed Generation in Remotely Controlled Voltage Bus. 1181-1195 - R. Gowrishankar

, N. Sathish Kumar:
Analysis of Efficient 32 Bit Adder Using Tree Grafting Technique. 1197-1209 - M. Rekha

, M. Bhuvaneswari:
Cross-Tier Interference Mitigation in 3D HetNets for LTE and Wi-Fi Access. 1211-1227 - A. Arunkumar

, S. Ramabalan, D. Elayaraja:
Optimum Design of Stair-Climbing Robots Using Taguchi Method. 1229-1244 - Narit Hnoohom, Sakorn Mekruksavanich

, Anuchit Jitpattanakul:
An Efficient ResNetSE Architecture for Smoking Activity Recognition from Smartwatch. 1245-1259 - Santhana Krishnan Jayapal, Sivakumar Poruran

:
Enhanced Disease Identification Model for Tea Plant Using Deep Learning. 1261-1275
Volume 35, Number 2, 2023
- M. Vinoth Kumar

, M. Prakash, M. Naresh Kumar
, H. Abdul Shabeer:
Enhanced Long Short Term Memory for Early Alzheimer's Disease Prediction. 1277-1293 - Mubashir Javaid, Muazzam Maqsood, Farhan Aadil, Jibran Safdar, Yongsung Kim:

An Efficient Method for Underwater Video Summarization and Object Detection Using YoLoV3. 1295-1310 - N. Rajeswari, S. Venkatanarayanan:

An Efficient Honey Badger Optimization Based Solar MPPT Under Partial Shading Conditions. 1311-1322 - S. Senthilmurugan, K. Gunaseelan:

Fin Field Effect Transistor with Active 4-Bit Arithmetic Operations in 22 nm Technology. 1323-1336 - W. Gracy Theresa, A. Gayathri, P. Rama:

A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network. 1337-1351 - S. Raghavendra, Vasudev Parvati, R. Manjula

, Ashok Kumar Nanda, Ruby Singh, D. Lakshmi, S. Velmurugan
:
DLMNN Based Heart Disease Prediction with PD-SS Optimization Algorithm. 1353-1368 - Farzana Kausar Gondal, Syed Khuram Shahzad, Muhammad Arfan Jaffar, Muhammad Waseem Iqbal

:
A Process Oriented Integration Model for Smart Health Services. 1369-1386 - P. Rajeswari, V. Manikandan:

Buck Converter Current Measurement Using Differential Amplifier. 1387-1402 - Ishu Tomar, Indu Sreedevi, Neeta Pandey:

Real Time Control System for Metro Railways Using PLC & SCADA. 1403-1421 - Abeer Abdulaziz AlArfaj, Nada Ali Hakami, Hanan A. Hosni Mahmoud:

Predicting Violence-Induced Stress in an Arabic Social Media Forum. 1423-1439 - J. Leon Bosco Raj, M. Marsaline Beno:

Modeling and Control of Parallel Hybrid Electric Vehicle Using Sea-Lion Optimization. 1441-1454 - G. Indra, N. Duraipandian

:
Modeling of Optimal Deep Learning Based Flood Forecasting Model Using Twitter Data. 1455-1470 - E. Jessy Mol, M. Mary Linda:

Integration of Wind and PV Systems Using Genetic-Assisted Artificial Neural Network. 1471-1489 - Yogeshwaran A

, K. Umadevi:
Optimized Neural Network-Based Micro Strip Patch Antenna Design for Radar Application. 1491-1503 - R. Hemalatha, M. Ramasamy:

Harmonics Extraction Scheme for Power Quality Improvement Using Chbmli-Dstatcom Module. 1505-1525 - P. Vigneshwaran, N. Prasath, M. Islabudeen

, A. Arun, A. K. Sampath
:
Identification and Acknowledgment of Programmed Traffic Sign Utilizing Profound Convolutional Neural Organization. 1527-1543 - Vivekraj Mannayee, Thirumalai Ramanathan:

An Efficient SDFRM Security System for Blockchain Based Internet of Things. 1545-1563 - R. Mangalagowri, Revathi Venkataraman:

Randomized MILP framework for Securing Virtual Machines from Malware Attacks. 1565-1580 - J. Shanmugapriya

, K. Baskaran
:
Rapid Fault Analysis by Deep Learning-Based PMU for Smart Grid System. 1581-1594 - P. Rahul, B. Kaarthick:

An Optimal Cluster Head and Gateway Node Selection with Fault Tolerance. 1595-1609 - Saranya Rajeshwaran, C. Agees Kumar, Kanthaswamy Ganapathy:

Hybrid Optimization Based PID Controller Design for Unstable System. 1611-1625 - Madiraju Sirisha, P. Abdul Khayum:

Using a Software-Defined Air Interface Algorithm to Improve Service Quality. 1627-1641 - Ashit Kumar Dutta, Yasser Albagory

, Majed Alsanea, Hamdan I. Almohammed, Abdul Rahaman Wahab Sait
:
Ensemble Deep Learning with Chimp Optimization Based Medical Data Classification. 1643-1655 - M. Indirani, S. Shankar:

Ensemble Based Learning with Accurate Motion Contrast Detection. 1657-1674 - Kavipriya Gananathan, D. Manjula:

Drug-Target Interaction Prediction Model Using Optimal Recurrent Neural Network. 1675-1689 - Tingting Yang, Shuwen Jia, Ying Yu, Zhiyong Sui:

Monocular Visual SLAM for Markerless Tracking Algorithm to Augmented Reality. 1691-1704 - Ganesh Jayaraman, V. R. Sarma Dhulipala:

AEECA for Reliable Communication to Enhance the Network Life Time for WSN. 1705-1719 - Ali Alqahtani, Shumaila Akram, Muhammad Ramzan, Fouzia Nawaz, Hikmat Ullah Khan

, Essa Alhashlan, Samar M. Alqhtani, Areeba Waris, Zain Ali:
A Transfer Learning Based Approach for COVID-19 Detection Using Inception-v4 Model. 1721-1736 - C. Edwin Singh

, S. Maria Celestin Vigila:
WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services. 1737-1751 - G. Karthiha, S. Allwin:

Speckle Noise Suppression in Ultrasound Images Using Modular Neural Networks. 1753-1765 - C. Arun Prasath, C. Gowri Shankar:

Adaptive Sub-Threshold Voltage Level Control for Voltage Deviate-Domino Circuits. 1767-1781 - Thamatapu Eswara Rao

, S. Elango:
Implementation of FPGA Based MPPT Techniques for Grid-Connected PV System. 1783-1798 - R. Sarasu, K. K. Thyagharajan

, N. R. Shanker:
SF-CNN: Deep Text Classification and Retrieval for Text Documents. 1799-1813 - Saud S. Alotaibi

:
Germination Quality Prognosis: Classifying Spectroscopic Images of the Seed Samples. 1815-1829 - M. Mohamed Iqbal

, K. Latha:
A Parallel Approach for Sentiment Analysis on Social Networks Using Spark. 1831-1842 - Walid El-Shafai, Randa Ali, Ahmed Sedik

, Taha El-Sayed Taha, Mohammed Abd-Elnaby, Fathi E. Abd El-Samie:
Analysis of Brain MRI: AI-Assisted Healthcare Framework for the Smart Cities. 1843-1856 - A. Prabha, G. Themozhi, Rama Reddy Sathi

:
SMO Algorithm to Unravel CEED Problem using Wind and Solar. 1857-1872 - S. Siamala Devi, Chandrakala Kuruba

, Yunyoung Nam, Mohamed Abouhawwash
:
Hybrid Optimisation with Black Hole Algorithm for Improving Network Lifespan. 1873-1887 - D. Doreen Hephzibah Miriam, Deepak Dahiya

, Nitin, Chinnanadar Ramachandran Rene Robin
:
Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology. 1889-1906 - Kanupriya Mittal, V. Mary Anita Rajam:

Game Theory-Based Dynamic Weighted Ensemble for Retinal Disease Classification. 1907-1921 - R. Rengaraj alias Muralidharan

, K. Latha:
Gorilla Troops Optimizer Based Fault Tolerant Aware Scheduling Scheme for Cloud Environment. 1923-1937 - I. Adumbabu, K. Selvakumar:

An Improved Lifetime and Energy Consumption with Enhanced Clustering in WSNs. 1939-1956 - D. Maincer, Y. Benmahamed, Moufid Mansour

, Mosleh Alharthi, Sherif S. M. Ghonein:
Fault Diagnosis in Robot Manipulators Using SVM and KNN. 1957-1969 - Lina M. K. Al-Ebbini

:
An Efficient Allocation for Lung Transplantation Using Ant Colony Optimization. 1971-1985 - S. Girirajan

, A. Pandian
:
Real-Time Speech Enhancement Based on Convolutional Recurrent Neural Network. 1987-2001 - T. S. Kanchana, B. Smitha Evelin Zoraida:

Assessing Conscientiousness and Identify Leadership Quality Using Temporal Sequence Images. 2003-2013 - V. Balaji, P. Selvaraj

:
Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing. 2015-2027 - K. Saranya

, K. Premalatha:
Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography. 2029-2042 - Neetika Bhandari, Payal Pahwa:

Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF). 2043-2055 - Abdul Rahaman Wahab Sait

, Mohamad Khairi Ishak
:
A Novel Handcrafted with Deep Features Based Brain Tumor Diagnosis Model. 2057-2070 - S. Prabu, K. Joseph Abraham Sundar

:
Enhanced Attention-Based Encoder-Decoder Framework for Text Recognition. 2071-2086 - Yu Shih, Chien-Chih Kuo, Ching-Hung Lee:

Low-Cost Real-Time Automated Optical Inspection Using Deep Learning and Attention Map. 2087-2099 - R. Rajakumar

, S. Sathiya Devi
:
A Novel Outlier Detection with Feature Selection Enabled Streaming Data Classification. 2101-2116 - Anas Quteishat

, M. A. A. Younis:
Strategic Renewable Energy Resource Selection Using a Fuzzy Decision-Making Method. 2117-2134 - Reem Alkanhel

, Mohamed Abouhawwash
, S. N. Sangeethaa, K. Venkatachalam, Doaa Sami Khafaga
:
Wireless Network Security Using Load Balanced Mobile Sink Technique. 2135-2149 - Wahidul Hasan Abir, Faria Rahman Khanam, Kazi Nabiul Alam

, Myriam Hadjouni
, Hela Elmannai
, Sami Bourouis
, Rajesh Dey
, Mohammad Monirujjaman Khan:
Detecting Deepfake Images Using Deep Learning Techniques and Explainable AI Methods. 2151-2169 - S. Raguvaran

, S. Anandamurugan, A. M. J. Md. Zubair Rahman:
Harnessing LSTM Classifier to Suggest Nutrition Diet for Cancer Patients. 2171-2187 - T. S. Balaji

, S. Srinivasan:
Networking Controller Based Real Time Traffic Prediction in Clustered Vehicular Adhoc Networks. 2189-2203 - Saleem Mustafa, Arfan Jaffar, Muhammad Waseem Iqbal

, Asma Abubakar, Abdullah S. Alshahrani, Ahmed Alghamdi
:
Hybrid Color Texture Features Classification Through ANN for Melanoma. 2205-2218 - Dalel Ben Ismail, Hela Elmannai

, Souham Meshoul, Mohamed Saber Naceur:
Robust ACO-Based Landmark Matching and Maxillofacial Anomalies Classification. 2219-2236 - Kazim Ali, Adnan N. Qureshi, Muhammad Shahid Bhatti

, Abid Sohail, Muhammad Hijji:
Defending Adversarial Examples by a Clipped Residual U-Net Model. 2237-2256 - S. Prabu

, J. M. Gnanasekar:
Realtime Object Detection Through M-ResNet in Video Surveillance System. 2257-2271 - A. Deepak Kumar

, T. Sasipraba:
Multilevel Augmentation for Identifying Thin Vessels in Diabetic Retinopathy Using UNET Model. 2273-2288 - Jazem Mutared Alanazi, Ahmad Ali AlZubi

:
An Optimized Method for Information System Transactions Based on Blockchain. 2289-2308 - Srilekha Muthukaruppankaruppiah, Shanker Nagalingam Rajendiran, Priya Murugasen, Rajesh Nandaamarnath:

Human Fatty Liver Monitoring Using Nano Sensor and IoMT. 2309-2323 - R. Senthil Rama, C. R. Edwin Selva Rex

, N. Herald Anantha Rufus, J. Annrose
:
THD Reduction for Permanent Magnet Synchronous Motor Using Simulated Annealing. 2325-2336 - S. M. Udhaya Sankar

, Mary Subaja Christo, P. S. Uma Priyadarsini:
Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks. 2337-2351 - B. Chellapraba, D. Manohari, K. Periyakaruppan, M. S. Kavitha:

Automated Red Deer Algorithm with Deep Learning Enabled Hyperspectral Image Classification. 2353-2366 - S. Sathish Kumar, G. Ravi

:
Opportunistic Routing with Multi-Channel Cooperative Neighbour Discovery. 2367-2382 - Nithya Rekha Sivakumar

:
Ensemble Deep Learning for IoT Based COVID 19 Health Care Pollution Monitor. 2383-2398 - G. Rajasekaran, J. Raja Sekar:

Abnormal Crowd Behavior Detection Using Optimized Pyramidal Lucas-Kanade Technique. 2399-2412 - V. Joseph Raymond, R. Jeberson Retna Raj:

Investigation of Android Malware Using Deep Learning Approach. 2413-2429 - Shyla, Vishal Bhatnagar:

Perspicacious Apprehension of HDTbNB Algorithm Opposed to Security Contravention. 2431-2447 - R. Saravana Ram

, M. Vinoth Kumar, Tareq M. Al-shami
, Mehedi Masud, Hanan Aljuaid, Mohamed Abouhawwash
:
Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning. 2449-2462 - D. Anitha, R. A. Karthika

:
Hybrid Deep Learning-Based Adaptive Multiple Access Schemes Underwater Wireless Networks. 2463-2477 - Thien Khai Tran

, Kha Tu Huynh, Dac-Nhuong Le
, Muhammad Arif, Hoa Minh Dinh
:
A Deep Trash Classification Model on Raspberry Pi 4. 2479-2491 - V. Jesus Bobin

, M. Marsalinebeno:
Performance Analysis of Optimization Based FOC and DTC Methods for Three Phase Induction Motor. 2493-2511 - M. Prabhu

, B. Muthu Kumar:
OFDM-CFO and Resource Scheduling Algorithm Using Fuzzy Linear-CFO. 2513-2525 - Abeer Abdulaziz AlArfaj, Hanan A. Hosni Mahmoud:

Deep Learning Prediction Model for Heart Disease for Elderly Patients. 2527-2540 - S. Neelavathy Pari, K. Sudharson

:
An Enhanced Trust-Based Secure Route Protocol for Malicious Node Detection. 2541-2554
Volume 35, Number 3, 2023
- Inayet Hakki Cizmeci

, Adem Alpaslan Altun:
Improved Electro Search Algorithm with Intelligent Controller Control System: ESPID Algorithm. 2555-2572 - Shin Jin Kang, Soo Kyun Kim

:
User Interface-Based Repeated Sequence Detection Method for Authentication. 2573-2588 - Tariq T. Alshammari, Muhammad Tahir, Nawaf N. Hamadneh

, S. Al Wadi, Jamil J. Jaber
, Nawa Alshammari, Mohammad Saleh:
Forecasting Stock Volatility Using Wavelet-based Exponential Generalized Autoregressive Conditional Heteroscedasticity Methods. 2589-2601 - Yining Qi, Yubo Luo, Yongfeng Huang, Xing Li:

Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data. 2603-2618 - A. Naresh Kumar, G. Geetha:

Recognizing Ancient South Indian Language Using Opposition Based Grey Wolf Optimization. 2619-2637 - R. Subha, Anandakumar Haldorai

, Arulmurugan Ramu
:
Artificial Intelligence Model for Software Reusability Prediction System. 2639-2654 - Mohammed Alarfaj, Mahwish Pervaiz, Yazeed Yasin Ghadi

, Tamara Al Shloul, Suliman A. Alsuhibany, Ahmad Jalal, Jeongmin Park:
Automatic Anomaly Monitoring in Public Surveillance Areas. 2655-2671 - S. Priya, N. K. Karthikeyan, D. Palanikkumar:

Pre Screening of Cervical Cancer Through Gradient Boosting Ensemble Learning Method. 2673-2685 - Tolga Memika, Tulay Korkusuz Polat

:
Internet of Things Supported Airport Boarding System and Evaluation with Fuzzy. 2687-2702 - P. Jenitha Deepa, H. Habeebullah Sait:

A Novel Approach for Improving the PQ in SPIM. 2703-2715 - P. Samuel Pakianathan

, R. V. Maheswari
:
Breakdown Voltage Prediction by Utilizing the Behavior of Natural Ester for Transformer Applications. 2717-2736 - Qing Miao, Lan Guo, Yang Lu, Zhongqi Wang:

Efficient Expressive Attribute-Based Encryption with Keyword Search over Prime-Order Groups. 2737-2754 - T. Manikandan, S. Karthikeyan, J. Jai Jaganath Babu

, G. Babu:
Adaptive Fuzzy Logic Despeckling in Non-Subsampled Contourlet Transformed Ultrasound Pictures. 2755-2771 - Amal H. Alharbi, S. Karthick, K. Venkatachalam, Mohamed Abouhawwash

, Doaa Sami Khafaga
:
Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security. 2773-2787 - Mini Prince, P. M. Joe Prathap

:
A Novel Approach to Design Distribution Preserving Framework for Big Data. 2789-2803 - R. Nandakumar

, Vijayakumar Ponnusamy
, Aman Kumar Mishra:
LSTM Based Spectrum Prediction for Real-Time Spectrum Access for IoT Applications. 2805-2819 - Riaz Muhammad

, Ahmed Ali
, M. Abid Anwar, Toufique Ahmed Soomro
, Omar AlShorman, Adel Alshahrani
, Mahmoud Masadeh
, Ghulam Md Ashraf
, Naif H. Ali
, Muhammad Irfan, Athanasios Alexiou
:
Design and Development of Low-cost Wearable Electroencephalograms (EEG) Headset. 2821-2835 - P. P. Fathimathul Rajeena

, R. Sivakumar
:
Brain Tumor Classification Using Image Fusion and EFPA-SVM Classifier. 2837-2855 - R. Raja

, N. Satheesh, J. Britto Dennis, C. Raghavendra:
Routing with Cooperative Nodes Using Improved Learning Approaches. 2857-2874 - C. K. Morarji

, N. Sathish Kumar:
Smart-Grid Monitoring using IoT with Modified Lagranges Key Based Data Transmission. 2875-2892 - C. Santhosh Kumar

, K. Vishnu Kumar:
Integrated Privacy Preserving Healthcare System Using Posture-Based Classifier in Cloud. 2893-2907 - S. J. K. Jagadeesh Kumar, P. Parthasarathi, Mehedi Masud, Jehad F. Al-Amri, Mohamed Abouhawwash

:
Butterfly Optimized Feature Selection with Fuzzy C-Means Classifier for Thyroid Prediction. 2909-2924 - H. Manikandan, D. Narasimhan

:
Improved Rat Swarm Based Multihop Routing Protocol for Wireless Sensor Networks. 2925-2939 - Raqinah Alrabiah

, Muhammad Hussain
, Hatim A. Aboalsamh:
Unconstrained Gender Recognition from Periocular Region Using Multiscale Deep Features. 2941-2962 - Anwar R. Shaheen, Sundar Santhosh Kumar:

Tasks Scheduling in Cloud Environment Using PSO-BATS with MLRHE. 2963-2978 - P. Ganesan, S. Arockia Edwin Xavier:

An Intelligent Intrusion Detection System in Smart Grid Using PRNN Classifier. 2979-2996 - Nabanita Dutta, Palanisamy Kaliannan, Paramasivam Shanmugam:

SVM Algorithm for Vibration Fault Diagnosis in Centrifugal Pump. 2997-3020 - Nitish Pathak, Shams Tabrez Siddiqui

, Anjani Kumar Singh, Heba G. Mohamed, Shabana Urooj, Abhinandan R. Patil:
Smart Quarantine Environment Privacy through IoT Gadgets Using Blockchain. 3021-3036 - G. Rajamanickam, G. Ravi

:
Evaluation of Codebook Design Using SCMA Scheme Based on An and Dn Lattices. 3037-3048 - G. Anurekha, P. Geetha:

An Intelligent Hybrid Ensemble Gene Selection Model for Autism Using DNN. 3049-3064 - P. Anantha Prabha

, G. Suchitra, R. Saravanan:
Cephalopods Classification Using Fine Tuned Lightweight Transfer Learning Models. 3065-3079 - T. Anand Kumar, M. Kaliamoorthy, I. Gerald Christopher Raj

:
Genetic Algorithm Based 7-Level Step-Up Inverter with Reduced Harmonics and Switching Devices. 3081-3097 - Junhua Xi, Kouquan Zheng, Yifan Zhong, Longjiang Li, Zhiping Cai, Jinjing Chen:

Robust Symmetry Prediction with Multi-Modal Feature Fusion for Partial Shapes. 3099-3111 - R. Radha

, R. Gopalakrishnan:
Enhanced Feature Fusion Segmentation for Tumor Detection Using Intelligent Techniques. 3113-3127 - Hanan Abdullah Mengash, Alaaeldin M. Hafez, Hanan A. Hosni Mahmoud:

Encephalitis Detection from EEG Fuzzy Density-Based Clustering Model with Multiple Centroid. 3129-3140 - Xia Zhang, Wei Lu, Youwei Ding, Yihua Song, Jinyue Xia:

A Mixed Method for Feature Extraction Based on Resonance Filtering. 3141-3154 - M. Sundar Prakash Balaji, V. R. Vijaykumar, Kamalraj Subramaniam, M. Kannan, V. Ayyem Pillai:

VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption. 3155-3168 - Muthaiyan Manikandan

, Sakthivel Subramaniam
, Vijayarangan Vivekanandhan
:
Efficient Clustering Using Memetic Adaptive Hill Climbing Algorithm in WSN. 3169-3185 - Suma Sekhar, Sakuntala S. Pillai, S. Santhosh Kumar:

New Preamble Sequence for WiMAX System with Improved Synchronization Accuracy. 3187-3197 - K. Arutchelvan, R. Sathiya Priya, C. Bhuvaneswari:

Honey Badger Algorithm Based Clustering with Routing Protocol for Wireless Sensor Networks. 3199-3212 - N. Kanagaraj:

An Adaptive Neuro-Fuzzy Inference System to Improve Fractional Order Controller Performance. 3213-3226 - Hemant Kumar Vijayvergia, Uma Shankar Modani:

Energy Efficient Load Balancing and Routing Using Multi-Objective Based Algorithm in WSN. 3227-3239 - S. Sridhar, D. Dhanasekaran, G. Charlyn Pushpa Latha:

Content-Based Movie Recommendation System Using MBO with DBN. 3241-3257 - A. K. Z. Rasel Rahman, S. M. Nabil Sakif, Niloy Sikder

, Mehedi Masud, Hanan Aljuaid, Anupam Kumar Bairagi:
Unmanned Aerial Vehicle Assisted Forest Fire Detection Using Deep Convolutional Neural Network. 3259-3277 - N. Venkata Subramanian

, V. S. Shankar Sriram:
Load-Aware VM Migration Using Hypergraph Based CDB-LSTM. 3279-3294 - Soha A. Shaban

, Hosnia M. M. Ahmed, Dalia L. Elsheweikh:
A Novel Fusion System Based on Iris and Ear Biometrics for E-exams. 3295-3315 - Waheed Ahmad Khan, Khurram Faiz, Abdelghani Taouti:

Cayley Picture Fuzzy Graphs and Interconnected Networks. 3317-3330 - R. T. Pavendan, K. Sankar, K. A. Varun Kumar

:
A Graph Theory Based Self-Learning Honeypot to Detect Persistent Threats. 3331-3348 - P. Pandi Chandran, N. Hema Rajini, M. Jeyakarthic:

Optimal Deep Belief Network Enabled Malware Detection and Classification Model. 3349-3364 - S. Sadesh, Osamah Ibrahim Khalaf, Mohammad Shorfuzzaman, Abdulmajeed Alsufyani, K. Sangeetha, Mueen Uddin

:
Automatic Clustering of User Behaviour Profiles for Web Recommendation System. 3365-3384 - Fadl Dahan, Abdulelah Alwabel

:
Artificial Bee Colony with Cuckoo Search for Solving Service Composition. 3385-3402 - S. Ayshwarya Lakshmi

, K. Anandavelu
:
Enhanced Cuckoo Search Optimization Technique for Skin Cancer Diagnosis Application. 3403-3413 - E. Gokulakannan:

DeepQ Based Automated Irrigation Systems Using Deep Belief WSN. 3415-3427 - C. Gnana Thilaka, M. Mary Linda:

Harmonics Mitigation Using MMC Based UPFC and Particle Swarm Optimization. 3429-3445 - U. Muthaiah, S. Chitra:

Mango Pest Detection Using Entropy-ELM with Whale Optimization Algorithm. 3447-3458 - Thomas Thangam

, K. Muthuvel:
Improved Interleaved Single-Ended Primary Inductor-Converter for Single-Phase Grid-Connected System. 3459-3478 - M. Vargheese, S. Vanithamani, D. Stalin David, Ganga Rama Koteswara Rao:

Design of Fuzzy Logic Control Framework for QoS Routing in MANET. 3479-3499 - M. Daniel Nareshkumar

, B. Jaison:
A Light-Weight Deep Learning-Based Architecture for Sign Language Classification. 3501-3515 - Le Quang Thao

, Duong Duc Cuong
, Vu Manh Hung, Le Thanh Vinh, Doan Trong Nghia, Dinh Ha Hai, Nguyen Nhan Nhi:
Eye Strain Detection During Online Learning. 3517-3530 - Vani Haridasan, Kavitha Muthukumaran, K. Hariharanath:

Arithmetic Optimization with Deep Learning Enabled Churn Prediction Model for Telecommunication Industries. 3531-3544 - C. P. Thamil Selvi, P. Muneeshwari, K. Selvasheela

, D. Prasanna:
Twitter Media Sentiment Analysis to Convert Non-Informative to Informative Using QER. 3545-3555 - Harish Gunigari, S. Chitra:

Energy Efficient Networks Using Ant Colony Optimization with Game Theory Clustering. 3557-3571 - Fei Wang, Yinxing Wan, Man Li, Haiyun Huang, Li Li, Xueying Hou, Jiahui Pan, Zhenfu Wen

, Jingcong Li:
Recent Advances in Fatigue Detection Algorithm Based on EEG. 3573-3586 - Monika Khandelwal, Ranjeet Kumar Rout, Saiyed Umer

, Kshira Sagar Sahoo, N. Z. Jhanjhi
, Mohammad Shorfuzzaman, Mehedi Masud:
A Pattern Classification Model for Vowel Data Using Fuzzy Nearest Neighbor. 3587-3598 - Ahmad Ali AlZubi

, Jazem Mutared Alanazi:
An Optimized Technique for RNA Prediction Based on Neural Network. 3599-3611 - C. Narmadha, T. Kavitha

, R. Poonguzhali, V. Hamsadhwani, Ranjan Walia, Monia
, B. Jegajothi:
Robust Deep Transfer Learning Based Object Detection and Tracking Approach. 3613-3626 - Wenjia Xiang, Xiaoyu Li

, Zirui He, Chenjing Su, Wangchi Cheng, Chao Lu, Shan Yang:
Intention Estimation of Adversarial Spatial Target Based on Fuzzy Inference. 3627-3639 - Meherab Mamun Ratul, Kazi Ayesha Rahman, Javeria Fazal, Naimur Rahman Abanto, Riasat Khan:

Face Mask and Social Distance Monitoring via Computer Vision and Deployable System Architecture. 3641-3658 - Mohamed Ezz

, Ayman Mohamed Mostafa
, Ayman Elshenawy
:
Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning. 3659-3675 - S. Maheswari, R. Vijayabhasker:

Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET. 3677-3692 - Jazem Mutared Alanazi, Ahmad Ali AlZubi

:
An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain. 3693-3712 - G. Pandiaraj, S. Muralidharan:

Novel ARC-Fuzzy Coordinated Automatic Tracking Control of Four-Wheeled Mobile Robot. 3713-3726 - Hanan A. Hosni Mahmoud, Alaaeldin M. Hafez, Fahd Althukair:

Data Mining Approach Based on Hierarchical Gaussian Mixture Representation Model. 3727-3741 - P. Nithya, A. M. Kalpana:

Prediction of Suitable Crops Using Stacked Scaling Conjugant Neural Classifier. 3743-3755 - Ellaiyan Jayabalan, R. Pugazendi:

Generative Adversarial Networks for Secure Data Transmission in Wireless Network. 3757-3784 - Talal H. Noor, El-Sayed Atlam

, Abdulqader M. Almars
, Ayman Noor
, Amer Malki
:
An IoT-Based Energy Conservation Smart Classroom System. 3785-3799 - P. Prathap Nayudu

, Krovi Raja Sekhar:
Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization. 3801-3813 - Gowdham Chinnaraju

, S. Nithyanandam:
A Rule-Based Approach for Grey Hole Attack Prediction in Wireless Sensor Networks. 3815-3827 - Subbiah Siva Sankari, Senthil Kumar Paramasivan

, Karmel Arockiasamy, Saminathan Senthivel
, Muthamilselvan Thangavel:
Deep Learning for Wind Speed Forecasting Using Bi-LSTM with Selected Features. 3829-3844 - P. N. Ramesh, S. Kannimuthu

:
Context-Aware Practice Problem Recommendation Using Learners' Skill Level Navigation Patterns. 3845-3860

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














