Home / Journals / IASC / Vol.34, No.3, 2022
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction

    Huiyu Sun*, Ralph Grishman
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1415-1423, 2022, DOI:10.32604/iasc.2022.030794 - 25 May 2022
    Abstract Active learning methods which present selected examples from the corpus for annotation provide more efficient learning of supervised relation extraction models, but they leave the developer in the unenviable role of a passive informant. To restore the developer’s proper role as a partner with the system, we must give the developer an ability to inspect the extraction model during development. We propose to make this possible through a representation based on lexicalized dependency paths (LDPs) coupled with an active learner for LDPs. We apply LDPs to both simulated and real active learning with ACE as evaluation More >

  • Open AccessOpen Access

    ARTICLE

    Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM

    S. Hariprasad1,*, T. Deepa1, N. Bharathiraja2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1425-1440, 2022, DOI:10.32604/iasc.2022.022856 - 25 May 2022
    Abstract The Internet of Things (IoT) is a global information and communication technology which aims to connect any type of device to the internet at any time and in any location. Nowadays billions of IoT devices are connected to the world, this leads to easily cause vulnerability to IoT devices. The increasing of users in different IoT-related applications leads to more data attacks is happening in the IoT networks after the fog layer. To detect and reduce the attacks the deep learning model is used. In this article, a hybrid sample selected recurrent neural network-extreme learning… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Based Power Transformer Monitoring Using Partial Discharge Patterns

    D. Karthik Prabhu1,*, R. V. Maheswari2, B. Vigneshwaran2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1441-1454, 2022, DOI:10.32604/iasc.2022.024128 - 25 May 2022
    Abstract Measurement and recognition of Partial Discharge (PD) in power apparatus is considered a protuberant tool for condition monitoring and assessing the state of a dielectric system. During operating conditions, PD may occur either in the form of single and multiple patterns in nature. Currently, for PD pattern recognition, deep learning approaches are used. To evaluate spatial order less features from the large-scale patterns, a pre-trained network is used. The major drawback of traditional approaches is that they generate high dimensional data or requires additional steps like dictionary learning and dimensionality reduction. However, in real-time applications,… More >

  • Open AccessOpen Access

    ARTICLE

    Multiple Events Detection Using Context-Intelligence Features

    Yazeed Yasin Ghadi1, Israr Akhter2, Suliman A. Alsuhibany3, Tamara al Shloul4, Ahmad Jalal2, Kibum Kim5,*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1455-1471, 2022, DOI:10.32604/iasc.2022.025013 - 25 May 2022
    Abstract Event detection systems are mainly used to observe and monitor human behavior via red green blue (RGB) images and videos. Event detection using RGB images is one of the challenging tasks of the current era. Human detection, position and orientation of human body parts in RGB images is a critical phase for numerous systems models. In this research article, the detection of human body parts by extracting context-aware energy features for event recognition is described. For this, silhouette extraction, estimation of human body parts, and context-aware features are extracted. To optimize the context-intelligence vector, we… More >

  • Open AccessOpen Access

    ARTICLE

    Consensus Mechanism of Blockchain Based on PoR with Data Deduplication

    Wei Zhou1, Hao Wang2, Ghulam Mohiuddin3, Dan Chen4,*, Yongjun Ren1
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1473-1488, 2022, DOI:10.32604/iasc.2022.029657 - 25 May 2022
    Abstract As the basis of cloud computing, distributed storage technology mainly studies how data centers store, organize and manage data. Blockchain has become the most secure solution for cloud storage due to its decentralization and immutability. Consensus mechanism is one of the core technologies of blockchain, which affects the transaction processing capability, security and scalability of blockchain. The current mainstream consensus algorithms such as Proof of Work, Proof of Stake, and Delegated Proof of Stake all have the problem of wasting resources. And with the explosive growth of data, cloud storage nodes store a large amount… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Localization and Segmentation of Vertebrae for Cobb Estimation and Curvature Deformity

    Joddat Fatima1,*, Amina Jameel2, Muhammad Usman Akram3, Adeel Muzaffar Syed1, Malaika Mushtaq3
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1489-1504, 2022, DOI:10.32604/iasc.2022.025935 - 25 May 2022
    Abstract The long twisted fragile tube, termed as spinal cord, can be named as the second vital organ of Central Nervous System (CNS), after brain. In human anatomy, all crucial life activities are controlled by CNS. The spinal cord does not only control the flow of information from the brain to rest of the body, but also takes charge of our reflexes control and the mobility of body. It keeps the body upright and acts as the main support for the flesh and bones. Spine deformity can occur by birth, due to aging, injury or spine… More >

  • Open AccessOpen Access

    ARTICLE

    Novel DoS Attack Detection Based on Trust Mode Authentication for IoT

    D. Yuvaraj1, S. Shanmuga Priya2,*, M. Braveen3, S. Navaneetha Krishnan4, S. Nachiyappan5, Abolfazl Mehbodniya6, A. Mohamed Uvaze Ahamed7, M. Sivaram8
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1505-1522, 2022, DOI:10.32604/iasc.2022.022151 - 25 May 2022
    Abstract Wireless sensor networks are extensively utilized as a communication mechanism in the field of the Internet of Things (IoT). Along with these services, numerous IoT based applications need stabilized transmission or delivery over unbalanced wireless connections. To ensure the stability of data packets delivery, prevailing works exploit diverse geographical routing with multi-hop forwarders in WSNs. Furthermore, critical Denial of Service (DoS) attacks frequently has an impact on these techniques, where an enormous amount of invalid data starts replicating and transmitted to receivers to prevent Wireless Sensor Networks (WSN) communication. In this investigation, a novel adaptive… More >

  • Open AccessOpen Access

    ARTICLE

    Efficient Medical Image Encryption Framework against Occlusion Attack

    May A. Al-Otaibi1,*, Hesham Alhumyani1, Saleh Ibrahim2, Alaa M. Abbas2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1523-1536, 2022, DOI:10.32604/iasc.2022.026161 - 25 May 2022
    Abstract Image encryption has attracted a lot of interest as an important security application for protecting confidential image data against unauthorized access. An adversary with the power to manipulate cipher image data can crop part of the image out to prevent decryption or render the decrypted image useless. This is known as the occlusion attack. In this paper, we address a vulnerability to the occlusion attack identified in the medical image encryption framework recently proposed in []. We propose adding a pixel scrambling phase to the framework and show through simulation that the extended framework effectively More >

  • Open AccessOpen Access

    ARTICLE

    Latent Semantic Based Fuzzy Kernel Support Vector Machine for Automatic Content Summarization

    T. Vetriselvi1,*, J. Albert Mayan2, K. V. Priyadharshini3, K. Sathyamoorthy4, S. Venkata Lakshmi5, P. Vishnu Raja6
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1537-1551, 2022, DOI:10.32604/iasc.2022.025235 - 25 May 2022
    Abstract Recently, the bounteous amount of data/information has been available on the Internet which makes it very complicated to the customers to calculate the preferred data. Because the huge amount of data in a system is mandated to discover the most proper data from the corpus. Content summarization selects and extracts the related sentence depends upon the calculation of the score and rank of the corpus. Automatic content summarization technique translates from the higher corpus into smaller concise description. This chooses the very important level of the texts and implements the complete statistics summary. This paper… More >

  • Open AccessOpen Access

    ARTICLE

    A New Route Optimization Approach of Fresh Agricultural Logistics Distribution

    Daqing Wu1,2, Jiye Cui1,*, Dan Li3, Romany Fouad Mansour4
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1553-1569, 2022, DOI:10.32604/iasc.2022.028780 - 25 May 2022
    Abstract Under the fierce market competition and the demand of low-carbon economy, the freshness of fresh products directly determines the degree of customer satisfaction. Cold chain logistics companies must pay attention to the freshness and carbon emissions of fresh products to obtain better service development. In the cold chain logistics path optimization problem, considering the cost, product freshness and carbon emission environmental factors at the same time, based on the cost-benefit idea, a comprehensive cold chain vehicle routing problem optimization model is proposed to minimize the unit cost of product freshness and the carbon trading mechanism… More >

  • Open AccessOpen Access

    ARTICLE

    Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins

    M. Kavitha1, B. Sankara Babu2, B. Sumathy3, T. Jackulin4, N. Ramkumar5, A. Manimaran6, Ranjan Walia7, S. Neelakandan8,*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1571-1586, 2022, DOI:10.32604/iasc.2022.026385 - 25 May 2022
    Abstract With the advancement of communication and computing technologies, multimedia technologies involving video and image applications have become an important part of the information society and have become inextricably linked to people's daily productivity and lives. Simultaneously, there is a growing interest in super-resolution (SR) video reconstruction techniques. At the moment, the design of digital twins in video computing and video reconstruction is based on a number of difficult issues. Although there are several SR reconstruction techniques available in the literature, most of the works have not considered the spatio-temporal relationship between the video frames. With… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling Metaheuristic Optimization with Deep Learning Software Bug Prediction Model

    M. Sangeetha1,*, S. Malathi2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1587-1601, 2022, DOI:10.32604/iasc.2022.025192 - 25 May 2022
    Abstract Software testing is an effective means of verifying software stability and trustworthiness. It is essential in the software development process and needs a huge quantity of resources such as labor, money, and time. Automated software testing can be used to save manual work, shorten testing times, and improve testing performance. Recently, Software Bug Prediction (SBP) models have been developed to improve the software quality assurance (SQA) process through the prediction of bug parts. Advanced deep learning (DL) models can be used to classify faults in software parts. Because hyperparameters have a significant impact on the… More >

  • Open AccessOpen Access

    ARTICLE

    Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage

    B. Venkatesan1,*, S. Chitra2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1603-1615, 2022, DOI:10.32604/iasc.2022.026049 - 25 May 2022
    Abstract The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in… More >

  • Open AccessOpen Access

    ARTICLE

    Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network

    M. Vanitha1,*, C. T. Kalaivani1, J. Kirubakaran2, R. Praveena2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1617-1627, 2022, DOI:10.32604/iasc.2022.026154 - 25 May 2022
    Abstract Hybrid networks are a rising innovation for maximizing wireless network coverage without any extra need for resources. This research paper focuses on effective channel allocation for Wireless Fidelity (Wi-Fi) and cellular networks. As a novel work in this area, the Beyond Access Point Coverage (BAPC) has been presented for adequately installing cellular networks on the unlicensed Wi-Fi spectrum. Networks can straightforwardly exploit Wi-Fi distributed coordination. Our BAPC commits and permits a combat-free period to cellular network subscribers and customary Wi-Fi subscribers to encourage concurrence. This research focuses on the maximization of combined subscriber affiliation and More >

  • Open AccessOpen Access

    ARTICLE

    Criss-Cross Attention Based Auto Encoder for Video Anomaly Event Detection

    Jiaqi Wang1, Jie Zhang2, Genlin Ji2,*, Bo Sheng3
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1629-1642, 2022, DOI:10.32604/iasc.2022.029535 - 25 May 2022
    Abstract The surveillance applications generate enormous video data and present challenges to video analysis for huge human labor cost. Reconstruction-based convolutional autoencoders have achieved great success in video anomaly detection for their ability of automatically detecting abnormal event. The approaches learn normal patterns only with the normal data in an unsupervised way due to the difficulty of collecting anomaly samples and obtaining anomaly annotations. But convolutional autoencoders have limitations in global feature extraction for the local receptive field of convolutional kernels. What is more, 2-dimensional convolution lacks the capability of capturing temporal information while videos change… More >

  • Open AccessOpen Access

    ARTICLE

    Depression Detection on COVID 19 Tweets Using Chimp Optimization Algorithm

    R. Meena1,*, V. Thulasi Bai2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1643-1658, 2022, DOI:10.32604/iasc.2022.025305 - 25 May 2022
    Abstract The Covid-19 outbreak has an unprecedented effects on people's daily lives throughout the world, causing immense stress amongst individuals owing to enhanced psychological disorders like depression, stress, and anxiety. Researchers have used social media data to detect behaviour changes in individuals with depression, postpartum changes and stress detection since it reveals critical aspects of mental and emotional diseases. Considerable efforts have been made to examine the psychological health of people which have limited performance in accuracy and demand increased training time. To conquer such issues, this paper proposes an efficient depression detection framework named Improved… More >

  • Open AccessOpen Access

    ARTICLE

    Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks

    Ashit Kumar Dutta1,*, Yasser Albagory2, Farhan M. Obesat3, Anas Waleed Abulfaraj4
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1659-1674, 2022, DOI:10.32604/iasc.2022.026263 - 25 May 2022
    Abstract Energy is considered a valuable source in wireless sensor networks (WSN) for effectively improving the survivability of the network. The non-uniform dispersion of load in the network causes unbalanced energy dissipation which can result in network interruption. The route selection process can be considered as an optimization problem and is solved by utilize of artificial intelligence (AI) techniques. This study introduces an energy efficient chaotic krill herd algorithm with adaptive neuro fuzzy inference system based routing (EECKHA-ANFIS) protocol for WSN. The goal of the EECKHA-ANFIS method is for deriving a better set of routes to… More >

  • Open AccessOpen Access

    ARTICLE

    Medical Image Demosaicing Based Design of Newton Gregory Interpolation Algorithm

    E. P. Kannan1,*, S. S. Vinsley2, T. V. Chithra3
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1675-1691, 2022, DOI:10.32604/iasc.2022.022707 - 25 May 2022
    Abstract In this paper, Field-Programmable Gate Array (FPGA) implementation-based image demosaicing is carried out. The Newton Gregory interpolation algorithm is designed based on FPGA frame work. Interpolation is the method of assessing the value of a function for any in-between value of self-regulating variable, whereas the method of computing the value of the function outside the specified range is named extrapolation. The natural images are collected from Kodak image database and medical images are collected from UPOL (University of Phoenix Online) database. The proposed algorithm is executed on using Xilinx ISE (Integrated Synthesis Environment) Design Suite… More >

  • Open AccessOpen Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714 - 25 May 2022
    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based… More >

  • Open AccessOpen Access

    ARTICLE

    Attention Weight is Indispensable in Joint Entity and Relation Extraction

    Jianquan Ouyang1,*, Jing Zhang1, Tianming Liu2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1707-1723, 2022, DOI:10.32604/iasc.2022.028352 - 25 May 2022
    Abstract Joint entity and relation extraction (JERE) is an important foundation for unstructured knowledge extraction in natural language processing (NLP). Thus, designing efficient algorithms for it has become a vital task. Although existing methods can efficiently extract entities and relations, their performance should be improved. In this paper, we propose a novel model called Attention and Span-based Entity and Relation Transformer (ASpERT) for JERE. First, differing from the traditional approach that only considers the last hidden layer as the feature embedding, ASpERT concatenates the attention head information of each layer with the information of the last… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Based Residual Network Features for Telugu Printed Character Recognition

    Vijaya Krishna Sonthi1,*, S. Nagarajan1, N. Krishnaraj2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1725-1736, 2022, DOI:10.32604/iasc.2022.026940 - 25 May 2022
    Abstract In India, Telugu is one of the official languages and it is a native language in the Andhra Pradesh and Telangana states. Although research on Telugu optical character recognition (OCR) began in the early 1970s, it is still necessary to develop effective printed character recognition for the Telugu language. OCR is a technique that aids machines in identifying text. The main intention in the classifier design of the OCR systems is supervised learning where the training process takes place on the labeled dataset with numerous characters. The existing OCR makes use of patterns and correlations… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Measurement and Monitoring by Integrating Fieldbus and Robotic Arm

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1737-1753, 2022, DOI:10.32604/iasc.2022.026055 - 25 May 2022
    Abstract In response to the rapid global development of industrial technologies and the resulting rapid growth in the production lines of industry and manufacturing, traditional manufacturing must become intelligent and automated, and undergo the process of informatization. Machines can reduce human errors, replace manpower, and even work better than manpower in certain aspects. Over recent years, the Internet of Things (IoT) has been applied in a wide range of fields. IoT helps control all the production information of factories in real time, and accordingly, reduces labor cost, improves quality, efficiently handles exceptions, and swiftly meets market… More >

  • Open AccessOpen Access

    ARTICLE

    Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks

    Maganti Srinivas*, M. Ramesh Patnaik
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1755-1767, 2022, DOI:10.32604/iasc.2022.026355 - 25 May 2022
    Abstract In recent times, Mobile Ad Hoc Network (MANET) becomes a familiar research field owing to its applicability in distinct scenarios. MANET comprises a set of autonomous mobile nodes which independently move and send data through wireless channels. Energy efficiency is considered a critical design issue in MANET and can be addressed by the use of the clustering process. Clustering is treated as a proficient approach, which partitions the mobile nodes into groups called clusters and elects a node as cluster head (CH). On the other hand, the nature of wireless links poses security as a… More >

  • Open AccessOpen Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483 - 25 May 2022
    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights

    Liutao Zhao1,2, Jiawan Zhang1,3,*, Hairong Jing4
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1785-1801, 2022, DOI:10.32604/iasc.2022.029693 - 25 May 2022
    Abstract With the rapid development of digitization technology, digital copyright of museum has become more and more valuable. Its collections can be opened to and shared with the people through the Internet. However, centralized authorization, untransparent transaction information and risk of tampering data in traditional digital rights management have a strong impact on system normal operation. In this paper, we proposed a blockchain-based digital rights management scheme (BMDRM) that realizes a distributed digital rights management and authorization system by introducing non-fungible tokens (NFTs) and smart contracts. To ensure the security and efficiency of transactions and authorization, More >

  • Open AccessOpen Access

    ARTICLE

    Shrinkage Linear with Quadratic Gaussian Discriminant Analysis for Big Data Classification

    R. S. Latha1, K. Venkatachalam2, Jehad F. Al-Amri3, Mohamed Abouhawwash4,5,*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1803-1818, 2022, DOI:10.32604/iasc.2022.024539 - 25 May 2022
    Abstract Generation of massive data is increasing in big data industries due to the evolution of modern technologies. The big data industries include data source from sensors, Internet of Things, digital and social media. In particular, these big data systems consist of data extraction, preprocessing, integration, analysis, and visualization mechanism. The data encountered from the sources are redundant, incomplete and conflict. Moreover, in real time applications, it is a tedious process for the interpretation of all the data from different sources. In this paper, the gathered data are preprocessed to handle the issues such as redundant,… More >

  • Open AccessOpen Access

    ARTICLE

    4D Facial Expression Recognition Using Geometric Landmark-based Axes-angle Feature Extraction

    Henry Ugochukwu Ukwu*, Kamil Yurtkan
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1819-1838, 2022, DOI:10.32604/iasc.2022.025695 - 25 May 2022
    Abstract The primary goal of this paper is to describe a proposed framework for identifying human face expressions. A methodology has been proposed and developed to identify facial emotions using an axes-angular feature extracted from facial landmarks for 4D dynamic facial expression video data. The 4D facial expression recognition (FER) problem is modeled as an unbalanced problem using the full video sequence. The proposed dataset includes landmarks that are positioned to be fiducial features: around the brows, eyes, nose, cheeks, and lips. Following the initial facial landmark preprocessing, feature extraction is carried out. Input feature vectors… More >

  • Open AccessOpen Access

    ARTICLE

    Resource Allocation Using Phase Change Hyper Switching Algorithm in the Cloud Environment

    J. Praveenchandar1,*, A. Tamilarasi2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1839-1850, 2022, DOI:10.32604/iasc.2022.026354 - 25 May 2022
    Abstract Cloud computing is one of the emerging technology; it provides various services like Software as a Service, Platform as a Service, and Infrastructure as a Service on demand. It reduces the cost of traditional computing by renting the resources instead of buying them for a huge cost. The usage of cloud resources is increasing day by day. Due to the heavy workload, all users cannot get uninterrupted service at some time. And the response time of some users also gets increased. Resource allocation is one of the primary issues of a cloud environment, one of… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Objective Immune Algorithm for Internet of Vehicles for Data Offloading

    B. Gomathi1, S. T. Suganthi2,*, T. N. Prabhu3, Andriy Kovalenko4
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1851-1860, 2022, DOI:10.32604/iasc.2022.026779 - 25 May 2022
    Abstract On the Internet of Vehicle (IoV) devices, offloading data is the major problem because massive amounts of data generate energy consumption, and the execution cost is high. At present, accidents traffic management is highly prominent due to increased vehicles among the population. IoV is the only technology to help the transport system effectively. This data outreach the memory also has high energy consumption, and the storage cost is high. To overcome these issues, a Mobility aware Offloading scheme with Multi-Objective Immune Optimization algorithm (MOS-MOIO) is used in the cloud storage. The data is generated from More >

  • Open AccessOpen Access

    ARTICLE

    Selfish Mining and Defending Strategies in the Bitcoin

    Weijian Zhang1,*, Hao Wang2, Hao Hua3, Qirun Wang4
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1861-1875, 2022, DOI:10.32604/iasc.2022.030274 - 25 May 2022
    Abstract As a kind of distributed, decentralized and peer-to-peer transmitted technology, blockchain technology has gradually changed people’s lifestyle. However, blockchain technology also faces many problems including selfish mining attack, which causes serious effects to the development of blockchain technology. Selfish mining is a kind of mining strategy where selfish miners increase their profit by selectively publishing hidden blocks. This paper builds the selfish mining model from the perspective of node state conversion and utilize the function extremum method to figure out the optimal profit of this model. Meanwhile, based on the experimental data of honest mining, More >

  • Open AccessOpen Access

    ARTICLE

    Image Steganography Using Deep Neural Networks

    Kavitha Chinniyan*, Thamil Vani Samiyappan, Aishvarya Gopu, Narmatha Ramasamy
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1877-1891, 2022, DOI:10.32604/iasc.2022.027274 - 25 May 2022
    Abstract Steganography is the technique of hiding secret data within ordinary data by modifying pixel values which appear normal to a casual observer. Steganography which is similar to cryptography helps in secret communication. The cryptography method focuses on the authenticity and integrity of the messages by hiding the contents of the messages. Sometimes, it is not only just enough to encrypt the message but also essential to hide the existence of the message itself. As this avoids misuse of data, this kind of encryption is less suspicious and does not catch attention. To achieve this, Stacked… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm

    N. Sureka*, K. Gunaseelan
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1893-1906, 2022, DOI:10.32604/iasc.2022.026098 - 25 May 2022
    Abstract Cognitive Radio (CR) is a competent technique devised to smart sense its surroundings and address the spectrum scarcity issues in wireless communication networks. The Primary User Emulation Attack (PUEA) is one of the most serious security threats affecting the performance of CR networks. In this paper, machine learning (ML) principles have been applied to detect PUEA with superior decision-making ability. To distinguish the attacking nodes, Reinforced Learning (RL) and Extreme Machine Learning (EML-RL) algorithms are proposed to be based on Reinforced Learning (EML). Various dynamic parameters like estimation error, attack detection efficiency, attack estimation rate, More >

  • Open AccessOpen Access

    ARTICLE

    Sport-Related Activity Recognition from Wearable Sensors Using Bidirectional GRU Network

    Sakorn Mekruksavanich1, Anuchit Jitpattanakul2,*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1907-1925, 2022, DOI:10.32604/iasc.2022.027233 - 25 May 2022
    Abstract Numerous learning-based techniques for effective human activity recognition (HAR) have recently been developed. Wearable inertial sensors are critical for HAR studies to characterize sport-related activities. Smart wearables are now ubiquitous and can benefit people of all ages. HAR investigations typically involve sensor-based evaluation. Sport-related activities are unpredictable and have historically been classified as complex, with conventional machine learning (ML) algorithms applied to resolve HAR issues. The efficiency of machine learning techniques in categorizing data is limited by the human-crafted feature extraction procedure. A deep learning model named MBiGRU (multimodal bidirectional gated recurrent unit) neural network More >

  • Open AccessOpen Access

    ARTICLE

    Anatomical Region Detection Scheme Using Deep Learning Model in Video Capsule Endoscope

    S. Rajagopal1,*, T. Ramakrishnan2, S. Vairaprakash3
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1927-1941, 2022, DOI:10.32604/iasc.2022.024998 - 25 May 2022
    Abstract Video capsule endoscope (VCE) is a developing methodology, which permits analysis of the full gastrointestinal (GI) tract with minimum intrusion. Although VCE permits for profound analysis, evaluating and analyzing for long hours of images is tiresome and cost-inefficient. To achieve automatic VCE-dependent GI disease detection, identifying the anatomical region shall permit for a more concentrated examination and abnormality identification in each area of the GI tract. Hence we proposed a hybrid (Long-short term memory-Visual Geometry Group network) LSTM-VGGNET based classification for the identification of the anatomical area inside the gastrointestinal tract caught by VCE images.… More >

  • Open AccessOpen Access

    ARTICLE

    Application of CNN and Long Short-Term Memory Network in Water Quality Predicting

    Wenwu Tan1, Jianjun Zhang1,*, Jiang Wu1, Hao Lan1, Xing Liu1, Ke Xiao2, Li Wang2, Haijun Lin1, Guang Sun3, Peng Guo4
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1943-1958, 2022, DOI:10.32604/iasc.2022.029660 - 25 May 2022
    Abstract Water resources are an indispensable precious resource for human survival and development. Water quality prediction plays a vital role in protecting and enhancing water resources. Changes in water quality are influenced by many factors, both long-term and short-term. Therefore, according to water quality changes’ periodic and nonlinear characteristics, this paper considered dissolved oxygen as the research object and constructed a neural network model combining convolutional neural network (CNN) and long short-term memory network (LSTM) to predict dissolved oxygen index in water quality. Firstly, we preprocessed the water quality data set obtained from the water quality… More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Reinforcement Learning Based Multipath Transfer Protocol in Wireless Mesh Network

    S. Rajeswari1,*, S. A. Arunmozhi1, Y. Venkataramani2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1959-1970, 2022, DOI:10.32604/iasc.2022.025957 - 25 May 2022
    Abstract Multiple radios working on different channels are used in Wireless Mesh Networks (WMNs) to improve network performance and reduce Energy Consumption (EC). Effective routing in Backbone WMNs is where each cross-section switch is well-organized with multiple Radio Interfaces (RI), and a subset of hubs is occupied as a gateway to the Internet. Most routing methods decrease the forward overheads by evolving one dimension, e.g., hop count and traffic proportion. With that idea, while considering these dimensions together, the complexity of the routing issue increases drastically. Consequently, an effective EC routing method considers a few performances simultaneously, More >

  • Open AccessOpen Access

    ARTICLE

    Smart Greenhouse Control via NB-IoT

    Wen-Tsai Sung1, Ching-Hao Weng1, Sung-Jung Hsiao2,*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1971-1988, 2022, DOI:10.32604/iasc.2022.026927 - 25 May 2022
    Abstract The Internet of Things (IoT) has flourished in recent years, which brings convenience to people’s lives, improves the quality of life, allows more effectively managing and maximizing benefits in industry, and improves weather predictions as the impact of global warming has complicated traditional methods to infer the weather. To this end, agriculture has also given more attention to greenhouse cultivation. In the early days of industrial research, Wi-Fi and ZigBee were used as short-or medium-distance communication technologies for transmissions in the network layer of the IoT architecture. Instead of long-distance communication technologies, such as LoRa More >

  • Open AccessOpen Access

    ARTICLE

    Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval

    Anil Sharma1,*, Suresh Kumar2
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1989-2005, 2022, DOI:10.32604/iasc.2022.026095 - 25 May 2022
    Abstract Information Retrieval (IR) systems are developed to fetch the most relevant content matching the user’s information needs from a pool of information. A user expects to get IR results based on the conceptual contents of the query rather than keywords. But traditional IR approaches index documents based on the terms that they contain and ignore semantic descriptions of document contents. This results in a vocabulary gap when queries and documents use different terms to describe the same concept. As a solution to this problem and to improve the performance of IR systems, we have designed… More >

  • Open AccessOpen Access

    ARTICLE

    Smart Communication Using 2D and 3D Mesh Network-on-Chip

    Arpit Jain1,*, Adesh Kumar2, Anand Prakash Shukla3, Hammam Alshazly4, Hela Elmannai5, Abeer D. Algarni5, Roushan Kumar6, Jitendra Yadav6
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2007-2021, 2022, DOI:10.32604/iasc.2022.024770 - 25 May 2022
    Abstract Network on chip (NoC) is an integrated communication system on chip (SoC), efficiently connecting various intellectual property (IP) modules on a single die. NoC has been suggested as an enormously scalable solution to overcome the communication problems in SoC. The performance of NoC depends on several aspects in terms of area, latency, throughput, and power. In this paper, the 2D and 3D mesh NoC performance on Virtex-5 field-programmable gate array (FPGA) is studied. The design is carried in Xilinx ISE 14.7 and the behavior model is followed based on XY and XYZ routing for 2D More >

  • Open AccessOpen Access

    ARTICLE

    SSAG-Net: Syntactic and Semantic Attention-Guided Machine Reading Comprehension

    Chenxi Yu, Xin Li*
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2023-2034, 2022, DOI:10.32604/iasc.2022.029447 - 25 May 2022
    Abstract Machine reading comprehension (MRC) is a task in natural language comprehension. It assesses machine reading comprehension based on text reading and answering questions. Traditional attention methods typically focus on one of syntax or semantics, or integrate syntax and semantics through a manual method, leaving the model unable to fully utilize syntax and semantics for MRC tasks. In order to better understand syntactic and semantic information and improve machine reading comprehension, our study uses syntactic and semantic attention to conduct text modeling for tasks. Based on the BERT model of Transformer encoder, we separate a text… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Multicale Transformation Run-Length Code-Based Test Data Compression in Benchmark Circuits

    P. Thilagavathi*, S. Karthikeyan
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2035-2050, 2022, DOI:10.32604/iasc.2022.026651 - 25 May 2022
    Abstract Test data volume reduction and power consumption during testing time outlines are two main problems for Very Large Scale Integration (VLSI) gadgets. Most the code-based arrangements have been utilized to diminish test data volume, although the most notable way that test data volume is high. The switching action that happens between the test carriers leads would expand power consumption. This work presents a compression/decompression methodology for limiting the amount of test data that should be kept on a tester and conveyed to each center in a System on a Chip (SOC) during a test utilizing… More >

  • Open AccessOpen Access

    ARTICLE

    Energy Management of an Isolated Wind/Photovoltaic Microgrid Using Cuckoo Search Algorithm

    Hani Albalawi1,3, Ahmed M. Kassem2, Sherif A. Zaid1,3,4,*, Abderrahim Lakhouit5, Muhammed A. Arshad6
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2051-2066, 2022, DOI:10.32604/iasc.2022.026032 - 25 May 2022
    Abstract This paper introduces a renewable-energy-based microgrid that includes Photovoltaic (PV) energy and wind energy generation units. Also, an energy storage system is present. The proposed microgrid is loaded with a constant load impedance. To improve the performance of the proposed microgrid, an optimal control algorithm utilizing Cuckoo Search Algorithm (CSA) is adapted. It has many merits such as fast convergence, simple tunning, and high efficiency. Commonly, the PV and wind energies are suitable for supplying loads under normal conditions. However, the energy storage system recovers the excess load demand. The load frequency and voltage are… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems

    P. Ramadevi1,*, K. N. Baluprithviraj2, V. Ayyem Pillai3, Kamalraj Subramaniam4
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2067-2081, 2022, DOI:10.32604/iasc.2022.026377 - 25 May 2022
    Abstract Cyber Physical Systems (CPSs) are network systems containing cyber (computation, communication) and physical (sensors, actuators) components that interact with each other through feedback loop with the help of human intervention. The dynamic and disseminated characteristics of CPS environment makes it vulnerable to threats that exist in virtualization process. Due to this, several security issues are presented in CPS. In order to address the challenges, there is a need exists to extend the conventional security solutions such as Intrusion Detection Systems (IDS) to handle high speed network data traffic and adaptive network pattern in cloud. Additionally,… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628 - 25 May 2022
    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short… More >

  • Open AccessOpen Access

    ARTICLE

    Glowworm Optimization with Deep Learning Enabled Cybersecurity in Social Networks

    Ashit Kumar Dutta1,*, Basit Qureshi2, Yasser Albagory3, Majed Alsanea4, Anas Waleed AbulFaraj5, Abdul Rahaman Wahab Sait6
    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2097-2110, 2022, DOI:10.32604/iasc.2022.027500 - 25 May 2022
    Abstract Recently, the exponential utilization of Internet has posed several cybersecurity issues in social networks. Particularly, cyberbulling becomes a common threat to users in real time environment. Automated detection and classification of cyberbullying in social networks become an essential task, which can be derived by the use of machine learning (ML) and deep learning (DL) approaches. Since the hyperparameters of the DL model are important for optimal outcomes, appropriate tuning strategy becomes important by the use of metaheuristic optimization algorithms. In this study, an effective glowworm swarm optimization (GSO) with deep neural network (DNN) model named… More >

Per Page:

Share Link