Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (297)
  • Open Access

    ARTICLE

    The Influence of Digital Multimedia Communication Forms on Graphic Design

    Shenghong Huang

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 215-222, 2020, DOI:10.32604/csse.2020.35.215

    Abstract Today, highly sophisticated technology has changed the lives of most individuals worldwide. In the field of graphic design, the emergence and development of digital multimedia communication forms have had a crucial impact on the creative process of graphic design and even the process of communication, offering more opportunities and more exciting challenges to this domain. And with the continuous improvement of people’s material culture and spiritual culture, the digital age has enriched people’s production and life. Especially in the application of digital multimedia in graphic design, the changes caused by the emergence of digital multimedia focus mainly on the visual… More >

  • Open Access

    ARTICLE

    The Optimization Analysis of the Communication Model of Negative Influence of the Entrepreneur's Social Relationship Change

    Linlin Zhang*

    Intelligent Automation & Soft Computing, Vol.26, No.3, pp. 577-583, 2020, DOI:10.32604/iasc.2020.013936

    Abstract The change of entrepreneurial social relations will have a negative impact on the enterprise performance. There is a significant positive correlation between the change of entrepreneurs' social relations and the negative impact of corporate performance. In order to reduce the negative impact of the social relationship of entrepreneurs and improve the profitability of the enterprises, a communication model of the entrepreneur social relationship change and the negative influence of the enterprise performance is proposed based on the closeness decision. The communication model of the negative impact of the enterprise performance and the enterprise performance are analyzed. In the perspective of… More >

  • Open Access

    ARTICLE

    Reliable Differentiated Services Optimization for Network Coding Cooperative Communication System

    Anfeng Liu1, Jie Min1, Kaoru Ota2, Ming Zhao3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 235-250, 2018, DOI:10.32604/csse.2018.33.235

    Abstract Software-Defined Networking (SDN) is a new network architecture with flexibility and scalability, researchers introduced the core idea of SDN into wireless network, and a cooperative communication system based on network coding is proposed. In this paper, we carry on an investigation in differentiated service strategy of network coding cooperative communication system. The meaning of differentiated services is for the different applications take different power for data transmission and the transmission power is associated with their reliability needs. In other words, transmission power control is performed in the presence of known reliability, we named the scheme Reliability-Bounded Transmission Power Control (RTPC)… More >

  • Open Access

    ARTICLE

    Intelligent Speech Communication Using Double Humanoid Robots

    Li-Hong Juang1,*, Yi-Hua Zhao2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 291-301, 2020, DOI:10.31209/2020.100000164

    Abstract Speech recognition is one of the most convenient forms of human beings engaging in the exchanging of information. In this research, we want to make robots understand human language and communicate with each other through the human language, and to realize man–machine interactive and humanoid– robot interactive. Therefore, this research mainly studies NAO robots’ speech recognition and humanoid communication between double -humanoid robots. This paper introduces the future direction and application prospect of speech recognition as well as its basic method and knowledge of speech recognition fields. This research also proposes the application of the most advanced method—establishment of the… More >

  • Open Access

    ARTICLE

    Research on Data Extraction and Analysis of Software Defect in IoT Communication Software

    Wenbin Bi1, Fang Yu2, Ning Cao3, Wei Huo3, Guangsheng Cao4, *, Xiuli Han5, Lili Sun6, Russell Higgs7

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1837-1854, 2020, DOI:10.32604/cmc.2020.010420

    Abstract Software defect feature selection has problems of feature space dimensionality reduction and large search space. This research proposes a defect prediction feature selection framework based on improved shuffled frog leaping algorithm (ISFLA).Using the two-level structure of the framework and the improved hybrid leapfrog algorithm's own advantages, the feature values are sorted, and some features with high correlation are selected to avoid other heuristic algorithms in the defect prediction that are easy to produce local The case where the convergence rate of the optimal or parameter optimization process is relatively slow. The framework improves generalization of predictions of unknown data samples… More >

  • Open Access

    ARTICLE

    A Robust Resource Allocation Scheme for Device-to-Device Communications Based on Q-Learning

    Azka Amin1, Xihua Liu2, Imran Khan3, Peerapong Uthansakul4, *, Masoud Forsat5, Seyed Sajad Mirjavadi5

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1487-1505, 2020, DOI:10.32604/cmc.2020.011749

    Abstract One of the most effective technology for the 5G mobile communications is Device-to-device (D2D) communication which is also called terminal pass-through technology. It can directly communicate between devices under the control of a base station and does not require a base station to forward it. The advantages of applying D2D communication technology to cellular networks are: It can increase the communication system capacity, improve the system spectrum efficiency, increase the data transmission rate, and reduce the base station load. Aiming at the problem of co-channel interference between the D2D and cellular users, this paper proposes an efficient algorithm for resource… More >

  • Open Access

    ARTICLE

    Secret Image Communication Scheme Based on Visual Cryptography and Tetrolet Tiling Patterns

    N. RajeshKumar1, D. Yuvaraj2, G. Manikandan3, *, R. BalaKrishnan1, B. Karthikeyan3, D. Narasimhan1, N. R. Raajan4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1283-1301, 2020, DOI:10.32604/cmc.2020.011226

    Abstract Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images. The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image. In this paper, a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed. The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns. The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret… More >

  • Open Access

    ARTICLE

    System Integration for Cognitive Model of a Robot Partner

    Jinseok Woo, János Botzheim, Naoyuki Kubota

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 829-841, 2018, DOI:10.1080/10798587.2017.1364919

    Abstract This paper introduces the integrated system of a smart-device-based cognitive robot partner called iPhonoid-C. Interaction with a robot partner requires many elements, including verbal communication, nonverbal communication, and embodiment as well. A robot partner should be able to understand human sentences, as well as nonverbal information such as human gestures. In the proposed system, the robot has an emotional model connecting the input information from the human with the robot’s behavior. Since emotions are involved in human natural communication, and emotion has a significant impact on humans’ actions, it is important to develop an emotional model for the robot partner… More >

  • Open Access

    ARTICLE

    Realization of Internet of Things Smart Appliances

    Jia‐Shing Sheua, I‐Chen Chenb, Yi‐Syong Liaoa

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 395-404, 2019, DOI:10.31209/2019.100000101

    Abstract This study proposed a household energy state monitoring system (HESMS) and a household energy load monitoring system (HELMS) for monitoring smart appliances. The HESMS applies reinforcement learning to receive changes in the external environment and the state of an electrical appliance, determines if the electrical appliance should be turned on, and controls the signals sent to the HELMS according to these decisions. The HELMS implements an ON/OFF control mechanism for household appliances according to the control signals and the power consumption state. The proposed systems are based on the wireless communication network and can monitor household appliances’ energy usage, control… More >

  • Open Access

    ARTICLE

    Cyber-security Risk Assessment Framework for Critical Infrastructures

    Zubair Baig1, Sherali Zeadally2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 121-129, 2019, DOI:10.31209/2018.100000049

    Abstract A critical infrastructure provides essential services to a nation’s population. Interruptions in its smooth operations are highly undesirable because they will cause significant and devastating consequences on all stakeholders in the society. In order to provide sustained protection to a nation’s critical infrastructure, we must continually assess and evaluate the risks thereof. We propose a risk assessment framework that can evaluate the risks posed to the security of a critical infrastructure from threat agents, with a special emphasis on the smart grid communications infrastructure. The framework defines finegrained risk identification to help quantify and assess exploitable vulnerabilities within a critical… More >

Displaying 251-260 on page 26 of 297. Per Page