Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    Sustainable Energy Management with Traffic Prediction Strategy for Autonomous Vehicle Systems

    Manar Ahmed Hamza1,*, Masoud Alajmi2, Jaber S. Alzahrani3, Siwar Ben Haj Hassine4, Abdelwahed Motwakel1, Ishfaq Yaseen1

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3465-3479, 2022, DOI:10.32604/cmc.2022.026066

    Abstract Recent advancements of the intelligent transportation system (ITS) provide an effective way of improving the overall efficiency of the energy management strategy (EMSs) for autonomous vehicles (AVs). The use of AVs possesses many advantages such as congestion control, accident prevention, and etc. However, energy management and traffic flow prediction (TFP) still remains a challenging problem in AVs. The complexity and uncertainties of driving situations adequately affect the outcome of the designed EMSs. In this view, this paper presents novel sustainable energy management with traffic flow prediction strategy (SEM-TPS) for AVs. The SEM-TPS technique applies type II fuzzy logic system (T2FLS)… More >

  • Open Access

    ARTICLE

    A Novel Convolutional Neural Networks-Fused Shallow Classifier for Breast Cancer Detection

    Sharifa Khalid Alduraibi*

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1321-1334, 2022, DOI:10.32604/iasc.2022.025021

    Abstract This paper proposes a fused methodology based upon convolutional neural networks and a shallow classifier to diagnose and differentiate breast cancer between malignant lesions and benign lesions. First, various pre-trained convolutional neural networks are used to calculate the features of breast ultrasonography (BU) images. Then, the computed features are used to train the different shallow classifiers like the tree, naïve Bayes, support vector machine (SVM), k-nearest neighbors, ensemble, and neural network. After extensive training and testing, the DenseNet-201, MobileNet-v2, and ResNet-101 trained SVM show high accuracy. Furthermore, the best BU features are merged to increase the classification accuracy at the… More >

  • Open Access

    ARTICLE

    Soft Computing Based Discriminator Model for Glaucoma Diagnosis

    Anisha Rebinth1,*, S. Mohan Kumar2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 867-880, 2022, DOI:10.32604/csse.2022.022955

    Abstract In this study, a Discriminator Model for Glaucoma Diagnosis (DMGD) using soft computing techniques is presented. As the biomedical images such as fundus images are often acquired in high resolution, the Region of Interest (ROI) for glaucoma diagnosis must be selected at first to reduce the complexity of any system. The DMGD system uses a series of pre-processing; initial cropping by the green channel’s intensity, Spatially Weighted Fuzzy C Means (SWFCM), blood vessel detection and removal by Gaussian Derivative Filters (GDF) and inpainting algorithms. Once the ROI has been selected, the numerical features such as colour, spatial domain features from… More >

  • Open Access

    ARTICLE

    Adaptive Fuzzy Logic Controller for Harmonics Mitigation Using Particle Swarm Optimization

    Waleed Rafique1, Ayesha Khan2, Ahmad Almogren3, Jehangir Arshad1, Adnan Yousaf4, Mujtaba Hussain Jaffery1, Ateeq Ur Rehman5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4275-4293, 2022, DOI:10.32604/cmc.2022.023588

    Abstract An excessive use of non-linear devices in industry results in current harmonics that degrades the power quality with an unfavorable effect on power system performance. In this research, a novel control technique-based Hybrid-Active Power-Filter (HAPF) is implemented for reactive power compensation and harmonic current component for balanced load by improving the Power-Factor (PF) and Total–Hormonic Distortion (THD) and the performance of a system. This work proposed a soft-computing technique based on Particle Swarm-Optimization (PSO) and Adaptive Fuzzy technique to avoid the phase delays caused by conventional control methods. Moreover, the control algorithms are implemented for an instantaneous reactive and active… More >

  • Open Access

    ARTICLE

    Achieving State Space Reduction in Generated Ajax Web Application State Machine

    Nadeem Fakhar Malik1,*, Aamer Nadeem1, Muddassar Azam Sindhu2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 429-455, 2022, DOI:10.32604/iasc.2022.023423

    Abstract The testing of Ajax (Asynchronous JavaScript and XML) web applications poses novel challenges for testers because Ajax constructs dynamic web applications by using Asynchronous communication and run time Document Object Model (DOM) manipulation. Ajax involves extreme dynamism, which induces novel kind of issues like state explosion, triggering state changes and unreachable states etc. that require more demanding web-testing methods. Model based testing is amongst the effective approaches to detect faults in web applications. However, the state model generated for an Ajax application can be enormous and may be hit by state explosion problem for large number of user action based… More >

  • Open Access

    ARTICLE

    Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text

    Mohammad Alamgeer1, Fahd N. Al-Wesabi2,3,*, Huda G. Iskandar3,4, Imran Khan5, Nadhem Nemri6, Mohammad Medani6, Mohammed Abdullah Al-Hagery7, Ali Mohammed Al-Sharafi3,8

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2497-2513, 2022, DOI:10.32604/cmc.2022.018591

    Abstract Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology. In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is proposed for content authentication and tampering detection of English text. A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach. The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique… More >

  • Open Access

    ARTICLE

    A Novel Hybrid MPPT Control Strategy for Isolated Solar PV Power System

    D. Sabaripandiyan1,*, H. Habeebullah Sait2, G. Aarthi3

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1055-1070, 2022, DOI:10.32604/iasc.2022.021950

    Abstract The main aspiration of this paper is to improve the efficiency of Solar Photovoltaic (SPV) power system with a new Hybrid controller for standalone/isolated Solar PV applications is proposed. This controller uses the merits of both Adapted Neuro-Fuzzy Inference System (ANFIS) and Perturbation & Observation (P&O) control techniques to concede rapid recovery at dynamic change of environment conditions such as solar irradiation and temperature. The ANFIS strategy itself has the merits over Fuzzy Logic and ANN methods. Conversely, P&O has its simplicity in implementation. Hence a case study for rapid recovery with the proposed controller and conventional P&O control strategy… More >

  • Open Access

    ARTICLE

    Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks

    Mesfer Al Duhayyim1, Manal Abdullah Alohali2, Fahd N. Al-Wesabi3,4, Anwer Mustafa Hilal5,*, Mohammad Medani3, Manar Ahmed Hamza5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2879-2894, 2022, DOI:10.32604/cmc.2022.019594

    Abstract The most common digital media exchanged via the Internet is in text form. The Arabic language is considered one of the most sensitive languages of content modification due to the presence of diacritics that can cause a change in the meaning. In this paper, an intelligent scheme is proposed for improving the reliability and security of the text exchanged via the Internet. The core mechanism of the proposed scheme depends on integrating the hidden Markov model and zero text watermarking techniques. The watermark key will be generated by utilizing the extracted features of the text analysis process using the third… More >

  • Open Access

    ARTICLE

    H-infinity Controller Based Disturbance Rejection in Continuous Stirred-Tank Reactor

    Sikander Hans1, Smarajit Ghosh2,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 29-41, 2022, DOI:10.32604/iasc.2022.019525

    Abstract This paper offers an H-infinity (H∞) controller-based disturbance rejection along with the utilization of the water wave optimization (WWO) algorithm. H∞ controller is used to synthesize the guaranteed performance of certain applications as well as it provides maximum gain at any situation. The proposed work focuses on the conflicts of continuous stirred-tank reactor (CSTR) such as variation in temperature and product concentration. The elimination of these issues is performed with the help of the WWO algorithm along with the controller operation. In general, the algorithmic framework of WWO algorithm is simple, and easy to implement with a small-size population and… More >

  • Open Access

    ARTICLE

    Arabic Feature-Based Text Watermarking Technique for Sensitive Detecting Tampering Attack

    Fahd N. Al-Wesabi1,2,*, Huda G. Iskandar2,3, Saleh Alzahrani4, Abdelzahir Abdelmaboud4, Mohammed Abdul4, Nadhem Nemri4, Mohammad Medani4, Mohammed Y. Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3789-3806, 2021, DOI:10.32604/cmc.2021.017674

    Abstract In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated, null-watermarking approach to enhance the proposed approach’s efficiency, accuracy, and intensity. The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of… More >

Displaying 11-20 on page 2 of 29. Per Page