Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Fully Authentication Services Scheme for NFC Mobile Payment Systems

    Munefah Alshammari*, Shadi Nashwan

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 401-428, 2022, DOI:10.32604/iasc.2022.022065

    Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent… More >

  • Open Access

    ARTICLE

    A Morphological Image Segmentation Algorithm for Circular Overlapping Cells

    Fuchu Zhang1, Yanpeng Wu2,*, Miaoqing Xu2, Sanjun Liu3, Changling Peng2, Zhichen Gao4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 301-321, 2022, DOI:10.32604/iasc.2022.021929

    Abstract Cell segmentation is an important topic in medicine. A cell image segmentation algorithm based on morphology is proposed. First, some morphological operations, including top-hat transformation, bot-hat transformation, erosion operation, dilation operation, opening operation, closing operation, majority operation, skeleton operation, etc., are applied to remove noise or enhance cell images. Then the small blocks in the cell image are deleted as noise, the medium blocks are removed and saved as normal cells, and the large blocks are segmented as overlapping cells. Each point on the edge of the overlapping cell area to be divided is careful checked. If the shape of… More >

  • Open Access

    ARTICLE

    Analysis of Inventory Model for Quadratic Demand with Three Levels of Production

    Dharamender Singh1, Majed G. Alharbi2, Anurag Jayswal1, Ali Akbar Shaikh3,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 167-182, 2022, DOI:10.32604/iasc.2022.021815

    Abstract The inventory framework is one of the standards of activity research fundamentals in ventures and business endeavors. Production planning includes all building production plans, including organizing and appointing exercises to every individual, gathering individuals or machines, and mastering work orders in every work environment. Production booking should take care of all issues, for example, limiting client standby time and production time; and viably utilizing the undertaking’s HR. This paper considered three degrees of a production inventory model for a consistent deterioration rate. This model assumes a significant part in the production of the board and assembling units. Request rate is… More >

  • Open Access

    ARTICLE

    A Multi-Simplex Imperialist Competitive Paradigm for Solving Nonlinear Physical Systems

    Javaid Ali1, Shaukat Iqbal2, Salem Alkhalaf3,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 149-166, 2022, DOI:10.32604/iasc.2022.021788

    Abstract This paper proposes a novel gradient free multi-simplex topology fabric aided imperialist competitive algorithm (ICA) for solving nonlinear systems of algebraic equations by transforming them to equivalent global optimization problems. The high dependence of traditional gradient based solvers of such systems on initial guesses and the Jacobeans resulting in false convergence is the main motivation behind the present work. The present work provides a mechanism for enhancing exploitation powers of imperialist search phase of the algorithm and hence improves the convergence speed. The variants emerging from the proposed approach are applied to diverse nonlinear systems arising in different scientific areas… More >

  • Open Access

    ARTICLE

    Massive MIMO Codebook Design Using Gaussian Mixture Model Based Clustering

    S. Markkandan1,*, S. Sivasubramanian2, Jaison Mulerikkal3, Nazeer Shaik4, Beulah Jackson5, Lakshmi Naryanan6

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 361-375, 2022, DOI:10.32604/iasc.2022.021779

    Abstract The codebook design is the most essential core technique in constrained feedback massive multi-input multi-output (MIMO) system communications. MIMO vectors have been generally isotropic or evenly distributed in traditional codebook designs. In this paper, Gaussian mixture model (GMM) based clustering codebook design is proposed, which is inspired by the strong classification and analytical abilities of clustering techniques. Huge quantities of channel state information (CSI) are initially saved as entry data of the clustering process. Further, split into N number of clusters based on the shortest distance. The centroids part of clustering has been utilized for constructing a codebook with statistic… More >

  • Open Access

    ARTICLE

    Scrambling Based Riffle Shift on Stego-Image to Channelize the Ensured Data

    R. Bala Krishnan1, M. M. Anishin Raj2, N. Rajesh Kumar1, B. Karthikeyan3, G. Manikandan3,*, N. R. Raajan4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 221-235, 2022, DOI:10.32604/iasc.2022.021775

    Abstract In recent years information hiding has got much attention as it acts as an alternate option for secured communication. The Secret content would get imbedded with the image using various possible image embodiment techniques, in which the Least Significant Bit (LSB) substitution is one of the preferred content embodiment strategy; however, asserting the quality and the originality of the content embedded image (stego) is yet a grievous concern in the field of Information Security. In this article, a proficient Scrambling Based Haar Wavelet Transform (SBHWT) approach has been sought to ensure the novelty of the stego-image that supports the safe… More >

  • Open Access

    ARTICLE

    Strengthening Software Make vs. Buy Decision: A Mixed-Method Approach

    Farooq Javeed1, Basit Shahzad2, Asadullah Shaikh3, Mana Saleh Al Reshan3,*, Saba Ahmad1, Hani Alshahrani3, Khairan Rajab3

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 193-205, 2022, DOI:10.32604/iasc.2022.021769

    Abstract Over the past few decades, multiple software development process models, tools, and techniques have been used by practitioners. Despite using these techniques, most software development organizations still fail to meet customer’s needs within time and budget. Time overrun is one of the major reasons for project failure. There is a need to come up with a comprehensive solution that would increase the chances of project success. However, the “make vs. buy” decision can be helpful for “in time” software development. Social media have become a popular platform for discussion of all sorts of topics, so software development is no exception.… More >

  • Open Access

    ARTICLE

    Optimization of Heat Treatment Scheduling for Hot Press Forging Using Data-Driven Models

    Seyoung Kim1, Jeonghoon Choi1, Kwang Ryel Ryu2,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 207-220, 2022, DOI:10.32604/iasc.2022.021752

    Abstract Scheduling heat treatment jobs in a hot press forging factory involves forming batches of multiple workpieces for the given furnaces, determining the start time of heating each batch, and sorting out the order of cooling the heated workpieces. Among these, forming batches is particularly difficult because of the various constraints that must be satisfied. This paper proposes an optimization method based on an evolutionary algorithm to search for a heat treatment schedule of maximum productivity with minimum energy cost, satisfying various constraints imposed on the batches. Our method encodes a candidate solution as a permutation of heat treatment jobs and… More >

  • Open Access

    ARTICLE

    Machine Learning for Modeling and Control of Industrial Clarifier Process

    M. Rajalakshmi1, V. Saravanan2, V. Arunprasad3, C. A. T. Romero4, O. I. Khalaf5, C. Karthik1,*

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 339-359, 2022, DOI:10.32604/iasc.2022.021696

    Abstract In sugar production, model parameter estimation and controller tuning of the nonlinear clarification process are major concerns. Because the sugar industry’s clarification process is difficult and nonlinear, obtaining the exact model using identification methods is critical. For regulating the clarification process and identifying the model parameters, this work presents a state transition algorithm (STA). First, the model parameters for the clarifier are estimated using the normal system identification process. The STA is then utilized to improve the accuracy of the system parameters that have been identified. Metaheuristic algorithms such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), and State Transition… More >

  • Open Access

    ARTICLE

    Target Classification of Marine Debris Using Deep Learning

    Anum Aleem1, Samabia Tehsin1,*, Sumaira Kausar1, Amina Jameel2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 73-85, 2022, DOI:10.32604/iasc.2022.021583

    Abstract Marine Debris is human-created waste dumped into the sea or ocean. It pollutes the aquatic environment and hence very dangerous for ocean species. Removal of marine debris from ocean is necessary to eliminate pollution and to secure aquatic life. A robust and automatic system is essential that detects unnecessary litter of plastic and other garbage at real-time. In this study, we have proposed deep learning based architecture for the detection and classification of marine debris. Histogram Equalization technique combined with Median Filter is used to enhance the contrast of images and to remove noise. Experiments are performed on challenging Forward… More >

Displaying 10241-10250 on page 1025 of 22212. Per Page