Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,198)
  • Open Access

    ARTICLE

    Secure Image Authentication Using Watermarking and Blockchain

    Alsehli Abrar1, Wadood Abdul1,*, Sanaa Ghouzali2

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 577-591, 2021, DOI:10.32604/iasc.2021.016382

    Abstract Image authentication is an important field that employs many different approaches and has several significant applications. In the proposed approach, we used a combination of two techniques to achieve authentication. Image watermarking is one of the techniques that has been used in many studies but the authentication field still needs to be studied. Blockchain technology is a relatively new technology that has significant research potential related to image authentication. The watermark is embedded into the third-level discrete wavelet transform (DWT) in the middle frequency regions to achieve security and imperceptibility goals. Peak signal-to-noise ratio PSNR, structural similarity matrix (SSIM), normalized… More >

  • Open Access

    ARTICLE

    Leverage External Knowledge and Self-attention for Chinese Semantic Dependency Graph Parsing

    Dianqing Liu1,2, Lanqiu Zhang1,2, Yanqiu Shao1,2,*, Junzhao Sun3

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 447-458, 2021, DOI:10.32604/iasc.2021.016320

    Abstract Chinese semantic dependency graph (CSDG) parsing aims to analyze the semantic relationship between words in a sentence. Since it is a deep semantic analysis task, the parser needs a lot of prior knowledge about the real world to distinguish different semantic roles and determine the range of the head nodes of each word. Existing CSDG parsers usually use part-of-speech (POS) and lexical features, which can only provide linguistic knowledge, but not semantic knowledge about the word. To solve this problem, we propose an entity recognition method based on distant supervision and entity classification to recognize entities in sentences, and then… More >

  • Open Access

    ARTICLE

    Designing an Online Appointment System for Semiliterate Users

    Sarah Chaudhry1, Fakhra Batool1, Abdul Hafeez Muhammad1, Ansar Siddique2,*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 379-395, 2021, DOI:10.32604/iasc.2021.016263

    Abstract Information and Communications Technology (ICT) has revolutionized the healthcare leading to provision of eHealth facilities remotely. During the peak time of COVID-19, as the long queues at health care facilities can result in spread of the virus. ICT can play an effective role especially for reducing the extended waiting time of patients to consult a medical practitioner which is considered as a source of hazard during the pandemic. However, in developing countries where majority population is semiliterate so find difficulty when come into contact with appointment systems which are not particularly designed keeping in consideration the requirements of semiliterate users.… More >

  • Open Access

    ARTICLE

    AI/ML in Security Orchestration, Automation and Response: Future Research Directions

    Johnson Kinyua1, Lawrence Awuah2,*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 527-545, 2021, DOI:10.32604/iasc.2021.016240

    Abstract Today’s cyber defense capabilities in many organizations consist of a diversity of tools, products, and solutions, which are very challenging for Security Operations Centre (SOC) teams to manage in current advanced and dynamic cyber threat environments. Security researchers and industry practitioners have proposed security orchestration, automation, and response (SOAR) solutions designed to integrate and automate the disparate security tasks, processes, and applications in response to security incidents to empower SOC teams. The next big step for cyber threat detection, mitigation, and prevention efforts is to leverage AI/ML in SOAR solutions. AI/ML will act as a force multiplier empowering SOC analysts… More >

  • Open Access

    ARTICLE

    Exact Analysis of Second Grade Fluid with Generalized Boundary Conditions

    Syed Tauseef Saeed1, Muhammad Bilal Riaz2,3, Dumitru Baleanu4,5,7,*, Ali Akgül6, Syed Muhammad Husnine1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 547-559, 2021, DOI:10.32604/iasc.2021.015982

    Abstract Convective flow is a self-sustained flow with the effect of the temperature gradient. The density is non-uniform due to the variation of temperature. The effect of the magnetic flux plays a major role in convective flow. The process of heat transfer is accompanied by mass transfer process; for instance condensation, evaporation and chemical process. Due to the applications of the heat and mass transfer combined effects in different field, the main aim of this paper is to do comprehensive analysis of heat and mass transfer of MHD unsteady second-grade fluid in the presence of time dependent generalized boundary conditions. The… More >

  • Open Access

    ARTICLE

    Predicting COVID-19 Based on Environmental Factors With Machine Learning

    Amjed Basil Abdulkareem1, Nor Samsiah Sani1,*, Shahnorbanun Sahran1, Zaid Abdi Alkareem Alyessari1, Afzan Adam1, Abdul Hadi Abd Rahman1, Abdulkarem Basil Abdulkarem2

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 305-320, 2021, DOI:10.32604/iasc.2021.015413

    Abstract The coronavirus disease 2019 (COVID-19) has infected more than 50 million people in more than 100 countries, resulting in a major global impact. Many studies on the potential roles of environmental factors in the transmission of the novel COVID-19 have been published. However, the impact of environmental factors on COVID-19 remains controversial. Machine learning techniques have been used effectively in combating the COVID-19 epidemic. However, researches related to machine learning on weather conditions in spreading COVID-19 is generally lacking. Therefore, in this study, three machine learning models (Convolution Neural Network (CNN), ADtree Classifier and BayesNet) based on the confirmed cases… More >

  • Open Access

    ARTICLE

    ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing

    Jamal Kh-Madhloom1,2,*, Mohd Khanapi Abd Ghani1, Mohd Rizuan Baharon1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 493-512, 2021, DOI:10.32604/iasc.2021.015129

    Abstract Over the decades, protecting the privacy of a health cloud using the design of a fog computing network is a very important field and will be more important in the near future. Current Internet of Things (IoT) research includes security and privacy due to their extreme importance in any growing technology that involves the implementation of cryptographic Internet communications (ICs) for protected IC applications such as fog computing and cloud computing devices. In addition, the implementation of public-key cryptography for IoT-based DNA sequence testing devices requires considerable expertise. Any key can be broken by using a brute-force attack with ample… More >

  • Open Access

    ARTICLE

    Evolution of Influential Developer’s Communities in OSS and its Impact on Quality

    Beenish Khan1, Muhammad Rafiq Mufti2, Asad Habib3, Humaira Afzal4, Mohammad Abdul Moiz Zia5, Afshan Almas6, Shahid Hussain7,*, Bashir Ahmad1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 337-352, 2021, DOI:10.32604/iasc.2021.015034

    Abstract The high turnover of developers in the Open-Source Software (OSS) systems is due to the lack of restriction on a developer’s involvement and contributions. The primary developers start and administer an OSS project. However, they do not manage those who contribute. The literature shows that 80% of issues are resolved by 20% of developers when developing an OSS. Therefore, identifying influential developer communities is quite necessary for OSS stakeholders to reduce the efforts required to solve the issue through releases and predict quality. The purpose of this proposed empirical study is to explore influential communities by analyzing the relationship between… More >

  • Open Access

    ARTICLE

    Short-Term Stock Price Forecasting Based on an SVD-LSTM Model

    Mei Sun1, Qingtao Li2, Peiguang Lin2,*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 369-378, 2021, DOI:10.32604/iasc.2021.014962

    Abstract Stocks are the key components of most investment portfolios. The accurate forecasting of stock prices can help investors and investment brokerage firms make profits or reduce losses. However, stock forecasting is complex because of the intrinsic features of stock data, such as nonlinearity, long-term dependency, and volatility. Moreover, stock prices are affected by multiple factors. Various studies in this field have proposed ways to improve prediction accuracy. However, not all of the proposed features are valid, and there is often noise in the features—such as political, economic, and legal factors—which can lead to poor prediction results. To overcome such limitations,… More >

  • Open Access

    ARTICLE

    Optimizing Service Composition (SC) Using Smart Multistage Forward Search (SMFS)

    Issam Alhadid1, Hassan Tarawneh2, Khalid Kaabneh2, Ra’ed Masa’deh3, Nawaf N. Hamadneh4,*, Muhammad Tahir5, Sufian Khwaldeh1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 321-336, 2021, DOI:10.32604/iasc.2021.014892

    Abstract

    Service Oriented Architecture (SOA) is a style of software design where Web Services (WS) provide services to the other components through a communication protocol over a network. WS components are managed, updated, and rearranged at runtime to provide the business processes as SCs, which consist of a set of WSs that can be invoked in a specific order to fulfill the clients’ requests. According to the Service Level Agreement (SLA) requirements, WS selection and composition are significant perspectives of research to meet the clients’ expectations. This paper presents an effective technique using SMFS that attempts to improve the WS selection… More >

Displaying 12311-12320 on page 1232 of 22198. Per Page