Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,827)
  • Open Access

    ARTICLE

    Internet of Things Software Engineering Model Validation Using Knowledge-Based Semantic Learning

    Mahmood Alsaadi, Mohammed E. Seno*, Mohammed I. Khalaf

    Intelligent Automation & Soft Computing, Vol.40, pp. 29-52, 2025, DOI:10.32604/iasc.2024.060390 - 10 January 2025

    Abstract The agility of Internet of Things (IoT) software engineering is benchmarked based on its systematic insights for wide application support infrastructure developments. Such developments are focused on reducing the interfacing complexity with heterogeneous devices through applications. To handle the interfacing complexity problem, this article introduces a Semantic Interfacing Obscuration Model (SIOM) for IoT software-engineered platforms. The interfacing obscuration between heterogeneous devices and application interfaces from the testing to real-time validations is accounted for in this model. Based on the level of obscuration between the infrastructure hardware to the end-user software, the modifications through device replacement, More >

  • Open Access

    ARTICLE

    Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission

    Haider H. Al-Mahmood1,*, Saad N. Alsaad2

    Intelligent Automation & Soft Computing, Vol.40, pp. 53-74, 2025, DOI:10.32604/iasc.2024.059691 - 10 January 2025

    Abstract In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism… More >

  • Open Access

    ARTICLE

    Enhancing Network Security: Leveraging Machine Learning for Integrated Protection and Intrusion Detection

    Nada Mohammed Murad1, Adnan Yousif Dawod2, Saadaldeen Rashid Ahmed3,4,*, Ravi Sekhar5, Pritesh Shah5

    Intelligent Automation & Soft Computing, Vol.40, pp. 1-27, 2025, DOI:10.32604/iasc.2024.058624 - 10 January 2025

    Abstract This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity, focusing on network intrusion detection systems (NIDS). The main goal is to overcome the shortcomings of conventional intrusion detection techniques by developing a more flexible and robust security architecture. We use seven unique machine learning models to improve detection skills, emphasizing data quality, traceability, and transparency, facilitated by a blockchain layer that safeguards against data modification and ensures auditability. Our technique employs the Synthetic Minority Oversampling Technique (SMOTE) to equilibrate the dataset, therefore mitigating prevalent class imbalance difficulties… More >

  • Open Access

    ARTICLE

    Overfitting in Machine Learning: A Comparative Analysis of Decision Trees and Random Forests

    Erblin Halabaku, Eliot Bytyçi*

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 987-1006, 2024, DOI:10.32604/iasc.2024.059429 - 30 December 2024

    Abstract Machine learning has emerged as a pivotal tool in deciphering and managing this excess of information in an era of abundant data. This paper presents a comprehensive analysis of machine learning algorithms, focusing on the structure and efficacy of random forests in mitigating overfitting—a prevalent issue in decision tree models. It also introduces a novel approach to enhancing decision tree performance through an optimized pruning method called Adaptive Cross-Validated Alpha CCP (ACV-CCP). This method refines traditional cost complexity pruning by streamlining the selection of the alpha parameter, leveraging cross-validation within the pruning process to achieve More >

  • Open Access

    ARTICLE

    Evaluating the Effectiveness of Graph Convolutional Network for Detection of Healthcare Polypharmacy Side Effects

    Omer Nabeel Dara1,*, Tareq Abed Mohammed2, Abdullahi Abdu Ibrahim1

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 1007-1033, 2024, DOI:10.32604/iasc.2024.058736 - 30 December 2024

    Abstract Healthcare polypharmacy is routinely used to treat numerous conditions; however, it often leads to unanticipated bad consequences owing to complicated medication interactions. This paper provides a graph convolutional network (GCN)-based model for identifying adverse effects in polypharmacy by integrating pharmaceutical data from electronic health records (EHR). The GCN framework analyzes the complicated links between drugs to forecast the possibility of harmful drug interactions. Experimental assessments reveal that the proposed GCN model surpasses existing machine learning approaches, reaching an accuracy (ACC) of 91%, an area under the receiver operating characteristic curve (AUC) of 0.88, and an More >

  • Open Access

    ARTICLE

    Enhanced Diagnostic Precision: Deep Learning for Tumors Lesion Classification in Dermatology

    Rafid Sagban1,2,*, Haydar Abdulameer Marhoon3,4, Saadaldeen Rashid Ahmed5,6,*

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 1035-1051, 2024, DOI:10.32604/iasc.2024.058416 - 30 December 2024

    Abstract Skin cancer is a highly frequent kind of cancer. Early identification of a phenomenon significantly improves outcomes and mitigates the risk of fatalities. Melanoma, basal, and squamous cell carcinomas are well-recognized cutaneous malignancies. Malignant We can differentiate Melanoma from non-pigmented carcinomas like basal and squamous cell carcinoma. The research on developing automated skin cancer detection systems has primarily focused on pigmented malignant type melanoma. The limited availability of datasets with a wide range of lesion categories has hindered in-depth exploration of non-pigmented malignant skin lesions. The present study investigates the feasibility of automated methods for… More >

  • Open Access

    ARTICLE

    A Deep Learning-Based Automated Approach of Schizophrenia Detection from Facial Micro-Expressions

    Anum Saher1, Ghulam Gilanie1,*, Sana Cheema1, Akkasha Latif1, Syeda Naila Batool1, Hafeez Ullah2

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 1053-1071, 2024, DOI:10.32604/iasc.2024.057047 - 30 December 2024

    Abstract Schizophrenia is a severe mental illness responsible for many of the world’s disabilities. It significantly impacts human society; thus, rapid, and efficient identification is required. This research aims to diagnose schizophrenia directly from a high-resolution camera, which can capture the subtle micro facial expressions that are difficult to spot with the help of the naked eye. In a clinical study by a team of experts at Bahawal Victoria Hospital (BVH), Bahawalpur, Pakistan, there were 300 people with schizophrenia and 299 healthy subjects. Videos of these participants have been captured and converted into their frames using… More >

  • Open Access

    ARTICLE

    Secure Digital Image Watermarking Technique Based on ResNet-50 Architecture

    Satya Narayan Das1,2,*, Mrutyunjaya Panda2,*

    Intelligent Automation & Soft Computing, Vol.39, No.6, pp. 1073-1100, 2024, DOI:10.32604/iasc.2024.057013 - 30 December 2024

    Abstract In today’s world of massive data and interconnected networks, it’s crucial to burgeon a secure and efficient digital watermarking method to protect the copyrights of digital content. Existing research primarily focuses on deep learning-based approaches to improve the quality of watermarked images, but they have some flaws. To overcome this, the deep learning digital image watermarking model with highly secure algorithms is proposed to secure the digital image. Recently, quantum logistic maps, which combine the concept of quantum computing with traditional techniques, have been considered a niche and promising area of research that has attracted… More >

  • Open Access

    CORRECTION

    Correction: Noise-Filtering Enhanced Deep Cognitive Diagnosis Model for Latent Skill Discovering

    Jing Geng1,*, Huali Yang2, Shengze Hu3

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 985-986, 2024, DOI:10.32604/iasc.2024.059591 - 31 October 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Distributed Federated Split Learning Based Intrusion Detection System

    Rasha Almarshdi1,2,*, Etimad Fadel1, Nahed Alowidi1, Laila Nassef1

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 949-983, 2024, DOI:10.32604/iasc.2024.056792 - 31 October 2024

    Abstract The Internet of Medical Things (IoMT) is one of the critical emerging applications of the Internet of Things (IoT). The huge increases in data generation and transmission across distributed networks make security one of the most important challenges facing IoMT networks. Distributed Denial of Service (DDoS) attacks impact the availability of services of legitimate users. Intrusion Detection Systems (IDSs) that are based on Centralized Learning (CL) suffer from high training time and communication overhead. IDS that are based on distributed learning, such as Federated Learning (FL) or Split Learning (SL), are recently used for intrusion… More >

Displaying 11-20 on page 2 of 1827. Per Page