Home / Journals / IASC / Vol.39, No.5, 2024
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Privacy-Preserving and Lightweight V2I and V2V Authentication Protocol Using Blockchain Technology

    Muhammad Imran Ghafoor1, Awad Bin Naeem2,*, Biswaranjan Senapati3, Md. Sakiul Islam Sudman4, Satyabrata Pradhan5, Debabrata Das6, Friban Almeida6, Hesham A. Sakr7
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 783-803, 2024, DOI:10.32604/iasc.2024.050819 - 31 October 2024
    Abstract The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles. The Internet of Vehicles has meaningful applications, enabling connected and autonomous vehicles to interact with infrastructure, sensors, computing nodes, humans, and fellow vehicles. Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards. This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication, utilizing encryption and the Moore curve. The proposed approach enables a vehicle to deduce the planned itinerary of Roadside More >

  • Open AccessOpen Access

    ARTICLE

    Fusion of Type-2 Neutrosophic Similarity Measure in Signatures Verification Systems: A New Forensic Document Analysis Paradigm

    Shahlaa Mashhadani1,*, Wisal Hashim Abdulsalam1, Oday Ali Hassen2, Saad M. Darwish3
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 805-828, 2024, DOI:10.32604/iasc.2024.054611 - 31 October 2024
    (This article belongs to the Special Issue: Combining Soft Computing with Machine Learning for Real-World Applications)
    Abstract Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also… More >

  • Open AccessOpen Access

    ARTICLE

    A New Framework for Scholarship Predictor Using a Machine Learning Approach

    Bushra Kanwal1, Rana Saud Shoukat2, Saif Ur Rehman2,*, Mahwish Kundi3, Tahani AlSaedi4, Abdulrahman Alahmadi4
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 829-854, 2024, DOI:10.32604/iasc.2024.054645 - 31 October 2024
    Abstract Education is the base of the survival and growth of any state, but due to resource scarcity, students, particularly at the university level, are forced into a difficult situation. Scholarships are the most significant financial aid mechanisms developed to overcome such obstacles and assist the students in continuing with their higher studies. In this study, the convoluted situation of scholarship eligibility criteria, including parental income, responsibilities, and academic achievements, is addressed. In an attempt to maximize the scholarship selection process, numerous machine learning algorithms, including Support Vector Machines, Neural Networks, K-Nearest Neighbors, and the C4.5… More >

  • Open AccessOpen Access

    ARTICLE

    Robot Vision over CosGANs to Enhance Performance with Source-Free Domain Adaptation Using Advanced Loss Function

    Laviza Falak Naz1, Rohail Qamar2,*, Raheela Asif1, Muhammad Imran2, Saad Ahmed3
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 855-887, 2024, DOI:10.32604/iasc.2024.055074 - 31 October 2024
    Abstract Domain shift is when the data used in training does not match the ones it will be applied to later on under similar conditions. Domain shift will reduce accuracy in results. To prevent this, domain adaptation is done, which adapts the pre-trained model to the target domain. In real scenarios, the availability of labels for target data is rare thus resulting in unsupervised domain adaptation. Herein, we propose an innovative approach where source-free domain adaptation models and Generative Adversarial Networks (GANs) are integrated to improve the performance of computer vision or robotic vision-based systems in… More >

  • Open AccessOpen Access

    ARTICLE

    Recognition of Bird Species of Yunnan Based on Improved ResNet18

    Wei Yang1,2,*, Ivy Kim D. Machica1
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 889-905, 2024, DOI:10.32604/iasc.2024.055133 - 31 October 2024
    Abstract Birds play a crucial role in maintaining ecological balance, making bird recognition technology a hot research topic. Traditional recognition methods have not achieved high accuracy in bird identification. This paper proposes an improved ResNet18 model to enhance the recognition rate of local bird species in Yunnan. First, a dataset containing five species of local birds in Yunnan was established: C. amherstiae, T. caboti, Syrmaticus humiae, Polyplectron bicalcaratum, and Pucrasia macrolopha. The improved ResNet18 model was then used to identify these species. This method replaces traditional convolution with depth wise separable convolution and introduces an SE (Squeeze and Excitation) module to More >

  • Open AccessOpen Access

    ARTICLE

    Arabic Dialect Identification in Social Media: A Comparative Study of Deep Learning and Transformer Approaches

    Enas Yahya Alqulaity1, Wael M.S. Yafooz1,*, Abdullah Alourani2, Ayman Jaradat3
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 907-928, 2024, DOI:10.32604/iasc.2024.055470 - 31 October 2024
    Abstract Arabic dialect identification is essential in Natural Language Processing (NLP) and forms a critical component of applications such as machine translation, sentiment analysis, and cross-language text generation. The difficulties in differentiating between Arabic dialects have garnered more attention in the last 10 years, particularly in social media. These difficulties result from the overlapping vocabulary of the dialects, the fluidity of online language use, and the difficulties in telling apart dialects that are closely related. Managing dialects with limited resources and adjusting to the ever-changing linguistic trends on social media platforms present additional challenges. A strong… More >

  • Open AccessOpen Access

    ARTICLE

    Predicting Grain Orientations of 316 Stainless Steel Using Convolutional Neural Networks

    Dhia K. Suker, Ahmed R. Abdo*, Khalid Abdulkhaliq M. Alharbi
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 929-947, 2024, DOI:10.32604/iasc.2024.056341 - 31 October 2024
    Abstract This paper presents a deep learning Convolutional Neural Network (CNN) for predicting grain orientations from electron backscatter diffraction (EBSD) patterns. The proposed model consists of multiple neural network layers and has been trained on a dataset of EBSD patterns obtained from stainless steel 316 (SS316). Grain orientation changes when considering the effects of temperature and strain rate on material deformation. The deep learning CNN predicts material orientation using the EBSD method to address this challenge. The accuracy of this approach is evaluated by comparing the predicted crystal orientation with the actual orientation under different conditions, More >

  • Open AccessOpen Access

    ARTICLE

    Distributed Federated Split Learning Based Intrusion Detection System

    Rasha Almarshdi1,2,*, Etimad Fadel1, Nahed Alowidi1, Laila Nassef1
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 949-983, 2024, DOI:10.32604/iasc.2024.056792 - 31 October 2024
    Abstract The Internet of Medical Things (IoMT) is one of the critical emerging applications of the Internet of Things (IoT). The huge increases in data generation and transmission across distributed networks make security one of the most important challenges facing IoMT networks. Distributed Denial of Service (DDoS) attacks impact the availability of services of legitimate users. Intrusion Detection Systems (IDSs) that are based on Centralized Learning (CL) suffer from high training time and communication overhead. IDS that are based on distributed learning, such as Federated Learning (FL) or Split Learning (SL), are recently used for intrusion… More >

  • Open AccessOpen Access

    CORRECTION

    Correction: Noise-Filtering Enhanced Deep Cognitive Diagnosis Model for Latent Skill Discovering

    Jing Geng1,*, Huali Yang2, Shengze Hu3
    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 985-986, 2024, DOI:10.32604/iasc.2024.059591 - 31 October 2024
    Abstract This article has no abstract. More >

Per Page:

Share Link