Intelligent Automation & Soft Computing

About the Journal

Intelligent Automation & Soft Computing: An International Journal seeks to provide a common forum for the dissemination of accurate results about the world of artificial intelligence, intelligent automation, control, computer science, modeling and systems engineering. It is intended that the articles published in the journal will encompass both the short and the long term effects of soft computing and other related fields such as robotics, control, computer, cyber security, vision, speech recognition, pattern recognition, data mining, big data, data analytics, machine intelligence and deep learning. It further hopes it will address the existing and emerging relationships between automation, systems engineering, system of computer engineering and soft computing. Intelligent Automation & Soft Computing is published monthly by Tech Science Press.

Indexing and Abstracting

SCIE: 2020 Impact Factor 1.647; Scopus CiteScore (Impact per Publication 2020): 1.9; SNIP (Source Normalized Impact per Paper 2020): 0.778; Essential Science Indicators(ESI), etc.

Previously published by TSI Press (http://www.wacong.org/autosoft/auto/), Intelligent Automation & Soft Computing starts to be published by Tech Science Press from the third issue of 2020 and supports Open Access Policy.

  • COVID-19 Diagnosis Using Transfer-Learning Techniques
  • Abstract COVID-19 was first discovered in Wuhan, China, in December 2019 and has since spread worldwide. An automated and fast diagnosis system needs to be developed for early and effective COVID-19 diagnosis. Hence, we propose two- and three-classifier diagnosis systems for classifying COVID-19 cases using transfer-learning techniques. These systems can classify X-ray images into three categories: healthy, COVID-19, and pneumonia cases. We used two X-ray image datasets (DATASET-1 and DATASET-2) collected from state-of-the-art studies and train the systems using deep learning architectures, such as VGG-19, NASNet, and MobileNet2, on these datasets. According to the validation and testing results, our proposed diagnosis… More
  •   Views:233       Downloads:153        Download PDF
  • Feature Selection Using Artificial Immune Network: An Approach for Software Defect Prediction
  • Abstract Software Defect Prediction (SDP) is a dynamic research field in the software industry. A quality software product results in customer satisfaction. However, the higher the number of user requirements, the more complex will be the software, with a correspondingly higher probability of failure. SDP is a challenging task requiring smart algorithms that can estimate the quality of a software component before it is handed over to the end-user. In this paper, we propose a hybrid approach to address this particular issue. Our approach combines the feature selection capability of the Optimized Artificial Immune Networks (Opt-aiNet) algorithm with benchmark machine-learning classifiers… More
  •   Views:156       Downloads:120        Download PDF
  • A Novel Automatic Meal Delivery System
  • Abstract Since the rapid growth of the Fourth Industrial Revolution (or Industry 4.0), robots have been widely used in many applications. In the catering industry, robots are used to replace people to do routine jobs. Because meal is an important part of the catering industry, we aim to design and develop a robot to deliver meals for saving cost and improving a restaurant’s performance in this paper. However, for the existing meal delivery system, the guests must make their meals by themselves. To let the food delivery system become more user-friendly, we integrate an automatic guided vehicle (AGV) and a robotic… More
  •   Views:120       Downloads:95        Download PDF
  • Machine Learning Based Framework for Maintaining Privacy of Healthcare Data
  • Abstract The Adoption of Artificial Intelligence (AI), Machine Learning (ML), Internet of Things (IoT), cloud services, web-based software systems, and other wireless sensor devices in the healthcare infrastructure have led to phenomenal improvements and benefits in the healthcare sector. Digital healthcare has ensured early diagnosis of the diseases, greater accessibility, and mass outreach in terms of treatment. Despite this unprecedented success, the privacy and confidentiality of the healthcare data have become a major concern for all the stakeholders. Data breach reports reveal that the healthcare data industry is one of the key targets of cyber invaders. In fact the last few… More
  •   Views:130       Downloads:86        Download PDF
  • Blockchain-Based Decision Tree Classification in Distributed Networks
  • Abstract In a distributed system such as Internet of things, the data volume from each node may be limited. Such limited data volume may constrain the performance of the machine learning classification model. How to effectively improve the performance of the classification in a distributed system has been a challenging problem in the field of data mining. Sharing data in the distributed network can enlarge the training data volume and improve the machine learning classification model’s accuracy. In this work, we take data sharing and the quality of shared data into consideration and propose an efficient Blockchain-based ID3 Decision Tree Classification… More
  •   Views:109       Downloads:73        Download PDF
  • Grey Wolf Optimizer-Based Fractional MPPT for Thermoelectric Generator
  • Abstract The energy harvested from a thermoelectric generator (TEG) relies mostly on the difference in temperature between the hot side and cold side of the TEG along with the connected load. Hence, a reliable maximum power point tracker is needed to force the TEG to operate close to the maximum power point (MPP) with any variation during the operation. In the current work, an optimized fractional maximum power point tracker (OFMPPT) is proposed to improve the performance of the TEG. The proposed tracker is based on fractional control. The optimal parameters of the OFMPPT have been determined using the grey wolf… More
  •   Views:151       Downloads:215        Download PDF
  • Inversion of Temperature and Humidity Profile of Microwave Radiometer Based on BP Network
  • Abstract In this paper, the inversion method of atmospheric temperature and humidity profiles via ground-based microwave radiometer is studied. Using the three-layer BP neural network inversion algorithm, four BP neural network models (temperature and humidity models with and without cloud information) are established using L-band radiosonde data obtained from the Atmospheric Exploration base of the China Meteorological Administration from July 2018 to June 2019. Microwave radiometer level 1 data and cloud radar data from July to September 2019 are used to evaluate the model. The four models are compared with the measured sounding data, and the inversion accuracy and the influence… More
  •   Views:102       Downloads:62        Download PDF
  • Prediction of the Corrosion Rate of Al–Si Alloys Using Optimal Regression Methods
  • Abstract In this study, optimal regression learner methods were used to predict the corrosion behavior of aluminum–silicon alloys (Al–Si) with various Si ratios in different media. Al–Si alloys with 0, 1%, 8%, 11.2%, and 15% Si were tested in different media with different pH values at different stirring speeds (0, 300, 600, 750, 900, 1050, and 1200 rpm). Corrosion behavior was evaluated via electrochemical potentiodynamic test. The corrosion rates (CRs) obtained from the corrosion tests were utilized in the formation of datasets of various machine regression learner optimization (MRLO) methods, namely, decision tree, support vector machine, Gaussian process regression, and ensemble… More
  •   Views:137       Downloads:176        Download PDF
  • Trust Management-Based Service Recovery and Attack Prevention in MANET
  • Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the master recovery timer (MRT) for… More
  •   Views:107       Downloads:87        Download PDF
  • A Hypergraph-Embedded Convolutional Neural Network for Ice Crystal Particle Habit Classification
  • Abstract In the field of weather modification, it is important to accurately identify the ice crystal particles in ice clouds. When ice crystal habits are correctly identified, cloud structure can be further understood and cloud seeding and other methods of weather modification can be used to change the microstructure of the cloud. Consequently, weather phenomena can be changed at an appropriate time to support human production and quality of life. However, ice crystal morphology is varied. Traditional ice crystal particle classification methods are based on expert experience, which is subjective and unreliable for the identification of the categories by threshold setting.… More
  •   Views:105       Downloads:81        Download PDF
  • Breast Cancer Classification Using Deep Convolution Neural Network with Transfer Learning
  • Abstract In this paper, we aim to apply deep learning convolution neural network (Deep-CNN) technology to classify breast masses in mammograms. We develop a Deep-CNN combined with multi-feature extraction and transfer learning to detect breast cancer. The Deep-CNN is utilized to extract features from mammograms. A support vector machine (SVM) is then trained on the Deep-CNN features to classify normal, benign, and cancer cases. The scoring features from the Deep-CNN are coupled with texture features and used as inputs to the final classifier. Two texture features are included: texture features of spatial dependency and gradient-based histograms. Both are employed to locate… More
  •   Views:144       Downloads:203        Download PDF
  • Surge Fault Detection of Aeroengines Based on Fusion Neural Network
  • Abstract Aeroengine surge fault is one of the main causes of flight accidents. When a surge occurs, it is hard to detect it in time and take anti-surge measures correctly. Recently, people have been applying detection methods based on mathematical models and expert knowledge. Due to difficult modeling and limited failure-mode coverage of these methods, early surge detection cannot be achieved. To address these problems, firstly, this paper introduced the data of six main sensors related to the aeroengine surge fault, such as, total pressure at compressor (high pressure rotor) outlet (Pt3), high pressure compressor rotor speed (N2), power level angle… More
  •   Views:118       Downloads:141        Download PDF
  • A General Technique for Real-Time Robotic Simulation in Manufacturing System
  • Abstract This paper describes a real-time simulator that allows the user in the factories to simulate arbitrary interaction between machinery and equipment. We discussed in details not only the general technique for developing such a real-time simulator but also the implementation of the simulator in its actual use. As such, people on the production line could benefit from observing and controlling robots in factories for preventing or reducing the severity of a collision, using the proposed simulator and its related technique. For that purpose, we divided the simulator into two main models: the real-time communication model and the simulation model. For… More
  •   Views:108       Downloads:82        Download PDF
  • Extraction of Opinion Target Using Syntactic Rules in Urdu Text
  • Abstract Opinion target or aspect extraction is the key task of aspect-based sentiment analysis. This task focuses on the extraction of targeted words or phrases against which a user has expressed his/her opinion. Although, opinion target extraction has been studied extensively in the English language domain, with notable work in other languages such as Chinese, Arabic etc., other regional languages have been neglected. One of the reasons is the lack of resources and available texts for these languages. Urdu is one, with millions of native and non-native speakers across the globe. In this paper, the Urdu language domain is focused on… More
  •   Views:159       Downloads:185        Download PDF
  • Forecast of LSTM-XGBoost in Stock Price Based on Bayesian Optimization
  • Abstract The prediction of the “ups and downs” of stock market prices is one of the important undertakings of the financial market. Since accurate prediction helps foster considerable economic benefits, stock market prediction has attracted significant interest by both investors and researchers. Efforts into building an accurate, stable and effective model to predict stock prices’ movements have been proliferating at a fast pace, to meet such a challenge. Firstly, this paper uses a correlation analysis to analyze the attributes of a stock dataset, processing missing values, determining the data attributes to be retained data, then divide it in a training set… More
  •   Views:92       Downloads:61        Download PDF
  • Stator Winding Fault Detection and Classification in Three-Phase Induction Motor
  • Abstract Induction motors (IMs) are the workhorse of the industry and are subjected to a harsh environment. Due to their operating conditions, they are exposed to different kinds of unavoidable faults that lead to unscheduled downtimes and losses. These faults may be detected early through predictive maintenance (i.e., deployment of condition monitoring systems). Motor current signature analysis (MCSA) is the most widely used technique to detect various faults in industrial motors. The stator winding faults (SWF) are one of the major faults. In this paper, we present an induction motor fault detection and identification system using signal processing techniques such as… More
  •   Views:159       Downloads:81        Download PDF
  • Detection of COVID-19 Using Deep Learning on X-Ray Images
  • Abstract The novel coronavirus 2019 (COVID-19) is one of a large family of viruses that cause illness, the symptoms of which range from a common cold, fever, coughing, and shortness of breath to more severe symptoms. The virus rapidly and easily spreads from infected people to others through close contact in the absence of protection. Early detection of COVID-19 assists governmental authorities and healthcare specialists in reducing the chain of transmission and flattening the curve of the pandemic. The widespread form of the COVID-19 diagnostic test lacks a high true positive rate and a low false negative rate and needs a… More
  •   Views:110       Downloads:78        Download PDF
  • A Robust Text Coverless Information Hiding Based on Multi-Index Method
  • Abstract Recently, researchers have shown that coverless information hiding technology can effectively resist the existing steganalysis tools. However, the robustness of existing coverless text information hiding methods is generally poor. To solve this problem, we propose a robust text coverless information hiding method based on multi-index. Firstly, the sender segment the secret information into several keywords. Secondly, we transform keywords into keyword IDs by the word index table and introduce a random increment factor to control. Then, search all texts containing the keyword ID in the big data text, and use the robust text search algorithm to find multiple texts. Finally,… More
  •   Views:100       Downloads:75        Download PDF
  • Container Application Migration Algorithm in Internet of Vehicles
  • Abstract Internet of Vehicles (IoV) is a popular application scenario that combines edge computing and the Internet of Things. Among them, service migration caused by IoV application mobility is a research hotspot in this field. This paper studies the migration strategy of container applications based on edge computing in the IoV business scenario. In order to solve the difficulty in selecting the target server of the application to be migrated in the crossroads scenario, this paper converts the migration decision to the shortest path problem based on dynamic programming, and obtains the best migration choice at the current time by finding… More
  •   Views:168       Downloads:175        Download PDF
  • Duplicate Frame Video Forgery Detection Using Siamese-based RNN
  • Abstract Video and image data is the most important and widely used format of communication today. It is used as evidence and authenticated proof in different domains such as law enforcement, forensic studies, journalism, and others. With the increase of video applications and data, the problem of forgery in video and images has also originated. Although a lot of work has been done on image forgery, video forensic is still a challenging area. Videos are manipulated in many ways. Frame insertion, deletion, and frame duplication are a few of the major challenges. Moreover, in the perspective of duplicated frames, frame rate… More
  •   Views:218       Downloads:205        Download PDF