Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

    C. Edwin Singh1,*, S. Maria Celestin Vigila2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1737-1751, 2023, DOI:10.32604/iasc.2023.028022

    Abstract Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified issues, academics have begun to concentrate on building IDS-based machine learning algorithms. Deep learning is a type of machine learning that can produce exceptional outcomes. This study proposes… More >

  • Open Access

    ARTICLE

    DLMNN Based Heart Disease Prediction with PD-SS Optimization Algorithm

    S. Raghavendra1, Vasudev Parvati2, R. Manjula3, Ashok Kumar Nanda4, Ruby Singh5, D. Lakshmi6, S. Velmurugan7,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1353-1368, 2023, DOI:10.32604/iasc.2023.027977

    Abstract In contemporary medicine, cardiovascular disease is a major public health concern. Cardiovascular diseases are one of the leading causes of death worldwide. They are classified as vascular, ischemic, or hypertensive. Clinical information contained in patients’ Electronic Health Records (EHR) enables clinicians to identify and monitor heart illness. Heart failure rates have risen dramatically in recent years as a result of changes in modern lifestyles. Heart diseases are becoming more prevalent in today’s medical setting. Each year, a substantial number of people die as a result of cardiac pain. The primary cause of these deaths is the improper use of pharmaceuticals… More >

  • Open Access

    ARTICLE

    Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography

    K. Saranya*, K. Premalatha

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2029-2042, 2023, DOI:10.32604/iasc.2023.027949

    Abstract Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy. In this background, several authentication and accessibility issues emerge with an intention to protect the sensitive details of the patients over getting published in open domain. To solve this problem, Multi Attribute Case based Privacy Preservation (MACPP) technique is proposed in this study to enhance the security of privacy-preserving data. Private information can be any attribute information which is categorized as sensitive logs in a patient’s records. The semantic relation between transactional patient records and access rights… More >

  • Open Access

    ARTICLE

    Ensemble Deep Learning with Chimp Optimization Based Medical Data Classification

    Ashit Kumar Dutta1,*, Yasser Albagory2, Majed Alsanea3, Hamdan I. Almohammed4, Abdul Rahaman Wahab Sait5

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1643-1655, 2023, DOI:10.32604/iasc.2023.027865

    Abstract Eye state classification acts as a vital part of the biomedical sector, for instance, smart home device control, drowsy driving recognition, and so on. The modifications in the cognitive levels can be reflected via transforming the electroencephalogram (EEG) signals. The deep learning (DL) models automated extract the features and often showcased improved outcomes over the conventional classification model in the recognition processes. This paper presents an Ensemble Deep Learning with Chimp Optimization Algorithm for EEG Eye State Classification (EDLCOA-ESC). The proposed EDLCOA-ESC technique involves min-max normalization approach as a pre-processing step. Besides, wavelet packet decomposition (WPD) technique is employed for… More >

  • Open Access

    ARTICLE

    OFDM-CFO and Resource Scheduling Algorithm Using Fuzzy Linear-CFO

    M. Prabhu1,*, B. Muthu Kumar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2513-2525, 2023, DOI:10.32604/iasc.2023.027823

    Abstract Orthogonal Frequency-Division Multiplexing (OFDM) is the form of a digital system and a way of encoding digital data across multiple frequency components that are used in telecommunication services. Carrier Frequency Offset (CFO) inaccuracy is a major disadvantage of OFDM. This paper proposed a feasible and elegant fuzzy-based resource allocation technique, that overcomes the constraints of the CFO. The suggested Fuzzy linear CFO estimation (FL-CFO) not only estimates the CFO with increased precision but also allocates resources effectively, and achieves maximum utilization of dynamic resources. The suggested FL-CFO error estimation algorithm in OFDM systems employing 1-bit Quadrate errors ADC (1-bit QE)… More >

  • Open Access

    ARTICLE

    Modeling of Optimal Deep Learning Based Flood Forecasting Model Using Twitter Data

    G. Indra1,*, N. Duraipandian2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1455-1470, 2023, DOI:10.32604/iasc.2023.027703

    Abstract A flood is a significant damaging natural calamity that causes loss of life and property. Earlier work on the construction of flood prediction models intended to reduce risks, suggest policies, reduce mortality, and limit property damage caused by floods. The massive amount of data generated by social media platforms such as Twitter opens the door to flood analysis. Because of the real-time nature of Twitter data, some government agencies and authorities have used it to track natural catastrophe events in order to build a more rapid rescue strategy. However, due to the shorter duration of Tweets, it is difficult to… More >

  • Open Access

    ARTICLE

    An Efficient SDFRM Security System for Blockchain Based Internet of Things

    Vivekraj Mannayee1,*, Thirumalai Ramanathan2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1545-1563, 2023, DOI:10.32604/iasc.2023.027675

    Abstract Blockchain has recently sparked interest in both the technological and business firms. The Internet of Things's (IoT) core principle emerged due to the connectivity of several new technologies, including wireless technology, the Internet, embedded automation systems, and micro-electromechanical devices. Manufacturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing (CC), Cyber-Physical System (CSP), Information and Communication Technologies (ICT) and Enterprise Model, and other technological innovations into the fourth industrial revolution referred to as Industry 4.0. Data management is defined as the process of accumulation in order to make better business decisions, and process, secure… More >

  • Open Access

    ARTICLE

    Drug–Target Interaction Prediction Model Using Optimal Recurrent Neural Network

    G. Kavipriya*, D. Manjula

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1675-1689, 2023, DOI:10.32604/iasc.2023.027670

    Abstract Drug-target interactions prediction (DTIP) remains an important requirement in the field of drug discovery and human medicine. The identification of interaction among the drug compound and target protein plays an essential process in the drug discovery process. It is a lengthier and complex process for predicting the drug target interaction (DTI) utilizing experimental approaches. To resolve these issues, computational intelligence based DTIP techniques were developed to offer an efficient predictive model with low cost. The recently developed deep learning (DL) models can be employed for the design of effective predictive approaches for DTIP. With this motivation, this paper presents a… More >

  • Open Access

    ARTICLE

    Low-Cost Real-Time Automated Optical Inspection Using Deep Learning and Attention Map

    Yu Shih, Chien-Chih Kuo, Ching-Hung Lee*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2087-2099, 2023, DOI:10.32604/iasc.2023.027659

    Abstract The recent trends in Industry 4.0 and Internet of Things have encouraged many factory managers to improve inspection processes to achieve automation and high detection rates. However, the corresponding cost results of sample tests are still used for quality control. A low-cost automated optical inspection system that can be integrated with production lines to fully inspect products without adjustments is introduced herein. The corresponding mechanism design enables each product to maintain a fixed position and orientation during inspection to accelerate the inspection process. The proposed system combines image recognition and deep learning to measure the dimensions of the thread and… More >

  • Open Access

    ARTICLE

    Fin Field Effect Transistor with Active 4-Bit Arithmetic Operations in 22 nm Technology

    S. Senthilmurugan1,*, K. Gunaseelan2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1323-1336, 2023, DOI:10.32604/iasc.2023.027650

    Abstract A design of a high-speed multi-core processor with compact size is a trending approach in the Integrated Circuits (ICs) fabrication industries. Because whenever device size comes down into narrow, designers facing many power density issues should be reduced by scaling threshold voltage and supply voltage. Initially, Complementary Metal Oxide Semiconductor (CMOS) technology supports power saving up to 32 nm gate length, but further scaling causes short severe channel effects such as threshold voltage swing, mobility degradation, and more leakage power (less than 32) at gate length. Hence, it directly affects the arithmetic logic unit (ALU), which suffers a significant power… More >

Displaying 6641-6650 on page 665 of 21887. Per Page