Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Gender-specific Facial Age Group Classification Using Deep Learning

    Valliappan Raman1, Khaled ELKarazle2,*, Patrick Then2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 105-118, 2022, DOI:10.32604/iasc.2022.025608

    Abstract Facial age is one of the prominent features needed to make decisions, such as accessing certain areas or resources, targeted advertising, or more straightforward decisions such as addressing one another. In machine learning, facial age estimation is a typical facial analysis subtask in which a model learns the different facial ageing features from several facial images. Despite several studies confirming a relationship between age and gender, very few studies explored the idea of introducing a gender-based system that consists of two separate models, each trained on a specific gender group. This study attempts to bridge this gap by introducing an… More >

  • Open Access

    ARTICLE

    Motor Torque Measurement Using Dual-Function Radar Polarized Signals of Flux

    B. Chinthamani1,*, N. S. Bhuvaneswari2, R. Senthil Kumar3, N. R. Shanker4

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 515-530, 2022, DOI:10.32604/iasc.2022.025410

    Abstract Motor Torque (MT) measurement plays a vital role for evaluating the performance of squirrel cage induction motor during operating conditions. Accurate and continuous measurements of MT provide information regarding driving load capacity, performance degradation of motor, reduces downtime and increases the efficiency. Traditional inline torque sensors-based measurement becomes inaccurate during abrupt change in load during starting condition of motor due to torque spikes. Mounting of torque sensor on motor is a major problem during torque measurement. Improper mounting of sensor acquires signals from other inefficient driveline components such as gearbox, couplings, and bearing. In this paper, we propose a non-contact… More >

  • Open Access

    ARTICLE

    Background Subtraction in Surveillance Systems Using Local Spectral Histograms and Linear Regression

    S. Hariharan1,*, R. Venkatesan2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 407-422, 2022, DOI:10.32604/iasc.2022.025309

    Abstract Background subtraction is a fundamental and crucial task for computer vision-based automatic video analysis due to various challenging situations that occur in real-world scenarios. This paper presents a novel background subtraction method by estimating the background model using linear regression and local spectral histogram which captures combined spectral and texture features. Different linear filters are applied on the image window centered at each pixel location and the features are captured via these filter responses. Each feature has been approximated by a linear combination of two representative features, each of which corresponds to either a background or a foreground pixel. These… More >

  • Open Access

    ARTICLE

    Multi-Agent with Multi Objective-Based Optimized Resource Allocation on Inter-Cloud

    J. Arravinth*, D. Manjula

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 133-147, 2022, DOI:10.32604/iasc.2022.025292

    Abstract Cloud computing is the ability to provide new technologies and standard cloud services. One of the essential features of cloud computing is the provision of “unlimited” computer resources to users on demand. However, single cloud resources are generally limited and may not be able to cope with the sudden rise in user needs. Therefore, the inter-cloud concept is introduced to support resource sharing between clouds. In this system, each cloud can tap the resources of other clouds when there are not enough resources to meet the demands of the consumer. In cloud computing, allocating the available resources of service nodes… More >

  • Open Access

    ARTICLE

    Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip

    S. Parvathi*, S. Umamaheswari

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 15-32, 2022, DOI:10.32604/iasc.2022.025290

    Abstract Network-on-chip (NoC) proves to be the best alternative to replace the traditional bus-based interconnection in Multi-Processor System on a Chip (MPSoCs). Irregular NoC topologies are highly recommended and utilised in various applications as they are application specific. Optimized mapping of the cores in a NoC plays a major role in its performance. Firefly algorithm is a bio-inspired meta-heuristic approach. Discretized firefly algorithm is used in our proposed work. In this work, two optimization algorithms are proposed: Topology Generation using Discrete Firefly Algorithm (TGDFA) and Core Mapping using Discrete Firefly Algorithm (CMDFA) for multimedia benchmark applications, Video Object Plane Decoder (VOPD),… More >

  • Open Access

    ARTICLE

    Wireless Intrusion Detection Based on Optimized LSTM with Stacked Auto Encoder Network

    S. Karthic1,*, S. Manoj Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 439-453, 2022, DOI:10.32604/iasc.2022.025153

    Abstract In recent years, due to the rapid progress of various technologies, wireless computer networks have developed. However, the activities of the security threats and attackers affect the data communication of these technologies. So, to protect the network against these security threats, an efficient IDS (Intrusion Detection System) is presented in this paper. Namely, optimized long short-term memory (OLSTM) network with a stacked auto-encoder (SAE) network is proposed as an IDS system. Using SAE, significant features are extracted from the databases such as input NSL-KDD database and the UNSW-NB15 database. Then extracted features are given as input to the optimized LSTM… More >

  • Open Access

    ARTICLE

    A Secure E-commerce Environment Using Multi-agent System

    Farah Tawfiq Abdul Hussien*, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 499-514, 2022, DOI:10.32604/iasc.2022.025091

    Abstract Providing security for the customers in the e-commerce system is an essential issue. Providing security for each single online customer at the same time is considered a time consuming process. For a huge websites such task may cause several problems including response delay, losing the customer orders and system deadlock or crash, in which reduce system performance. This paper aims to provide a new prototype structure of multi agent system that solve the problem of providing security and avoid the problems that may reduce system performance. This is done by creating a software agent which is settled into the customer… More >

  • Open Access

    ARTICLE

    A Stacked Ensemble-Based Classifier for Breast Invasive Ductal Carcinoma Detection on Histopathology Images

    Ali G. Alkhathami*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 235-247, 2022, DOI:10.32604/iasc.2022.024952

    Abstract Breast cancer is one of the main causes of death in women. When body tissues start behaves abnormally and the ratio of tissues growth becomes asymmetrical then this stage is called cancer. Invasive ductal carcinoma (IDC) is the early stage of breast cancer. The early detection and diagnosis of invasive ductal carcinoma is a significant step for the cure of IDC breast cancer. This paper presents a convolutional neural network (CNN) approach to detect and visualize the IDC tissues in breast on histological images dataset. The dataset consists of 90 thousand histopathological images containing two categories: Invasive Ductal Carcinoma positive… More >

  • Open Access

    ARTICLE

    Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction

    Hyun Yoo1, Kyungyong Chung2,*

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 1-13, 2022, DOI:10.32604/iasc.2022.024890

    Abstract Human pose estimation has been a major concern in the field of computer vision. The existing method for recognizing human motion based on two-dimensional (2D) images showed a low recognition rate owing to motion depth, interference between objects, and overlapping problems. A convolutional neural network (CNN) based algorithm recently showed improved results in the field of human skeleton detection. In this study, we have combined human skeleton detection and deep neural network (DNN) to classify the motion of the human body. We used the visual geometry group network (VGGNet) CNN for human skeleton detection, and the generated skeleton coordinates were… More >

  • Open Access

    ARTICLE

    Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks

    V. P. Ajay1,*, M. Nesasudha2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 193-204, 2022, DOI:10.32604/iasc.2022.024839

    Abstract Cognitive radio network (CRN) is a growing technology targeting more resourcefully exploiting the available spectrum for opportunistic network usage. By the concept of cognitive radio, the wastage of available spectrum reduced about 30% worldwide. The key operation of CRN is spectrum sensing. The sensing results about the spectrum are directly proportional to the performance of the network. In CRN, the final result about the available spectrum is decided by combing the local sensing results. The presence or participation of attackers in the network leads to false decisions and the performance of the network will be degraded. In this work, an… More >

Displaying 8481-8490 on page 849 of 22212. Per Page