Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip

    S. Parvathi*, S. Umamaheswari

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 15-32, 2022, DOI:10.32604/iasc.2022.025290

    Abstract Network-on-chip (NoC) proves to be the best alternative to replace the traditional bus-based interconnection in Multi-Processor System on a Chip (MPSoCs). Irregular NoC topologies are highly recommended and utilised in various applications as they are application specific. Optimized mapping of the cores in a NoC plays a major role in its performance. Firefly algorithm is a bio-inspired meta-heuristic approach. Discretized firefly algorithm is used in our proposed work. In this work, two optimization algorithms are proposed: Topology Generation using Discrete Firefly Algorithm (TGDFA) and Core Mapping using Discrete Firefly Algorithm (CMDFA) for multimedia benchmark applications, Video Object Plane Decoder (VOPD),… More >

  • Open Access

    ARTICLE

    Wireless Intrusion Detection Based on Optimized LSTM with Stacked Auto Encoder Network

    S. Karthic1,*, S. Manoj Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 439-453, 2022, DOI:10.32604/iasc.2022.025153

    Abstract In recent years, due to the rapid progress of various technologies, wireless computer networks have developed. However, the activities of the security threats and attackers affect the data communication of these technologies. So, to protect the network against these security threats, an efficient IDS (Intrusion Detection System) is presented in this paper. Namely, optimized long short-term memory (OLSTM) network with a stacked auto-encoder (SAE) network is proposed as an IDS system. Using SAE, significant features are extracted from the databases such as input NSL-KDD database and the UNSW-NB15 database. Then extracted features are given as input to the optimized LSTM… More >

  • Open Access

    ARTICLE

    A Secure E-commerce Environment Using Multi-agent System

    Farah Tawfiq Abdul Hussien*, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 499-514, 2022, DOI:10.32604/iasc.2022.025091

    Abstract Providing security for the customers in the e-commerce system is an essential issue. Providing security for each single online customer at the same time is considered a time consuming process. For a huge websites such task may cause several problems including response delay, losing the customer orders and system deadlock or crash, in which reduce system performance. This paper aims to provide a new prototype structure of multi agent system that solve the problem of providing security and avoid the problems that may reduce system performance. This is done by creating a software agent which is settled into the customer… More >

  • Open Access

    ARTICLE

    A Stacked Ensemble-Based Classifier for Breast Invasive Ductal Carcinoma Detection on Histopathology Images

    Ali G. Alkhathami*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 235-247, 2022, DOI:10.32604/iasc.2022.024952

    Abstract Breast cancer is one of the main causes of death in women. When body tissues start behaves abnormally and the ratio of tissues growth becomes asymmetrical then this stage is called cancer. Invasive ductal carcinoma (IDC) is the early stage of breast cancer. The early detection and diagnosis of invasive ductal carcinoma is a significant step for the cure of IDC breast cancer. This paper presents a convolutional neural network (CNN) approach to detect and visualize the IDC tissues in breast on histological images dataset. The dataset consists of 90 thousand histopathological images containing two categories: Invasive Ductal Carcinoma positive… More >

  • Open Access

    ARTICLE

    Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction

    Hyun Yoo1, Kyungyong Chung2,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 1-13, 2022, DOI:10.32604/iasc.2022.024890

    Abstract Human pose estimation has been a major concern in the field of computer vision. The existing method for recognizing human motion based on two-dimensional (2D) images showed a low recognition rate owing to motion depth, interference between objects, and overlapping problems. A convolutional neural network (CNN) based algorithm recently showed improved results in the field of human skeleton detection. In this study, we have combined human skeleton detection and deep neural network (DNN) to classify the motion of the human body. We used the visual geometry group network (VGGNet) CNN for human skeleton detection, and the generated skeleton coordinates were… More >

  • Open Access

    ARTICLE

    Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks

    V. P. Ajay1,*, M. Nesasudha2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 193-204, 2022, DOI:10.32604/iasc.2022.024839

    Abstract Cognitive radio network (CRN) is a growing technology targeting more resourcefully exploiting the available spectrum for opportunistic network usage. By the concept of cognitive radio, the wastage of available spectrum reduced about 30% worldwide. The key operation of CRN is spectrum sensing. The sensing results about the spectrum are directly proportional to the performance of the network. In CRN, the final result about the available spectrum is decided by combing the local sensing results. The presence or participation of attackers in the network leads to false decisions and the performance of the network will be degraded. In this work, an… More >

  • Open Access

    ARTICLE

    Deep Neural Network Based Vehicle Detection and Classification of Aerial Images

    Sandeep Kumar1, Arpit Jain2,*, Shilpa Rani3, Hammam Alshazly4, Sahar Ahmed Idris5, Sami Bourouis6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 119-131, 2022, DOI:10.32604/iasc.2022.024812

    Abstract The detection of the objects in the ariel image has a significant impact on the field of parking space management, traffic management activities and surveillance systems. Traditional vehicle detection algorithms have some limitations as these algorithms are not working with the complex background and with the small size of object in bigger scenes. It is observed that researchers are facing numerous problems in vehicle detection and classification, i.e., complicated background, the vehicle’s modest size, other objects with similar visual appearances are not correctly addressed. A robust algorithm for vehicle detection and classification has been proposed to overcome the limitation of… More >

  • Open Access

    ARTICLE

    Smart Grid Security by Embedding S-Box Advanced Encryption Standard

    Niraj Kumar1,*, Vishnu Mohan Mishra2, Adesh Kumar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 623-638, 2022, DOI:10.32604/iasc.2022.024804

    Abstract Supervisory control and data acquisition (SCADA) systems continuously monitor the real-time processes in the smart grid. The system software, which is based on a human-machine interface (HMI), makes intelligent decisions to assist the system operator and perform normal grid management activities. The management of SCADA networks and monitoring without proper security is a major concern, as many grids and plant networks still lack necessary monitoring and detection systems, making them vulnerable to attack. SCADA networks exploit physical weaknesses as well as cyber-attacks. Researchers have developed a monitoring system based on a field-programmable gate array (FPGA) and a microcontroller that allows… More >

  • Open Access

    ARTICLE

    AI Powered Asthma Prediction Towards Treatment Formulation: An Android App Approach

    Saydul Akbar Murad1, Apurba Adhikary2, Abu Jafar Md Muzahid1, Md. Murad Hossain Sarker3, Md. Ashikur Rahman Khan2, Md. Bipul Hossain2, Anupam Kumar Bairagi4,*, Mehedi Masud5, Md. Kowsher6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 87-103, 2022, DOI:10.32604/iasc.2022.024777

    Abstract Asthma is a disease which attacks the lungs and that affects people of all ages. Asthma prediction is crucial since many individuals already have asthma and increasing asthma patients is continuous. Machine learning (ML) has been demonstrated to help individuals make judgments and predictions based on vast amounts of data. Because Android applications are widely available, it will be highly beneficial to individuals if they can receive therapy through a simple app. In this study, the machine learning approach is utilized to determine whether or not a person is affected by asthma. Besides, an android application is being created to… More >

  • Open Access

    ARTICLE

    Modeling of Chaotic Political Optimizer for Crop Yield Prediction

    Gurram Sunitha1,*, M. N. Pushpalatha2, A. Parkavi3, Prasanthi Boyapati4, Ranjan Walia5, Rachna Kohar6, Kashif Qureshi7

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 423-437, 2022, DOI:10.32604/iasc.2022.024757

    Abstract Crop yield is an extremely difficult trait identified using many factors like genotype, environment and their interaction. Accurate Crop Yield Prediction (CYP) necessitates the basic understanding of the functional relativity among yields and the collaborative factor. Disclosing such connection requires both wide-ranging datasets and an efficient model. The CYP is important to accomplish irrigation scheduling and assessing labor necessities for reaping and storing. Predicting yield using various kinds of irrigation is effective for optimizing resources, but CYP is a difficult process owing to the existence of distinct factors. Recently, Deep Learning (DL) approaches offer solutions to complicated data like weather… More >

Displaying 8371-8380 on page 838 of 22098. Per Page