Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    SNCDM: Spinal Tumor Detection from MRI Images Using Optimized Super-Pixel Segmentation

    T. Merlin Inbamalar1,*, Dhandapani Samiappan2, R. Ramesh3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1899-1913, 2023, DOI:10.32604/iasc.2023.031202

    Abstract Conferring to the American Association of Neurological Surgeons (AANS) survey, 85% to 99% of people are affected by spinal cord tumors. The symptoms are varied depending on the tumor’s location and size. Up-to-the-minute, back pain is one of the essential symptoms, but it does not have a specific symptom to recognize at the earlier stage. Numerous significant research studies have been conducted to improve spine tumor recognition accuracy. Nevertheless, the traditional systems are consuming high time to extract the specific region and features. Improper identification of the tumor region affects the predictive tumor rate and causes the maximum error-classification problem.… More >

  • Open Access

    ARTICLE

    Energy-Efficient Routing Protocol with Multi-Hop Fuzzy Logic for Wireless Networks

    J. Gobinath1,*, S. Hemajothi2, J. S. Leena Jasmine3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2457-2471, 2023, DOI:10.32604/iasc.2023.031171

    Abstract A Wireless Sensor Network (WSN) becomes a newer type of real-time embedded device that can be utilized for a wide range of applications that make regular networking which appears impracticable. Concerning the energy production of the nodes, WSN has major issues that may influence the stability of the system. As a result, constructing WSN requires devising protocols and standards that make the most use of constrained capacity, especially the energy resources. WSN faces some issues with increased power utilization and an on going development due to the uneven energy usage between the nodes. Clustering has proven to be a more… More >

  • Open Access

    ARTICLE

    Leaching Fraction (LF) of Irrigation Water for Saline Soils Using Machine Learning

    Rab Nawaz Bashir1, Imran Sarwar Bajwa2, Muhammad Waseem Iqbal3,*, Muhammad Usman Ashraf4, Ahmed Mohammed Alghamdi5, Adel A. Bahaddad6, Khalid Ali Almarhabi7

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1915-1930, 2023, DOI:10.32604/iasc.2023.030844

    Abstract Soil salinity is a serious land degradation issue in agriculture. It is a major threat to agriculture productivity. Extra irrigation water is applied to leach down the salts from the root zone of the plants in the form of a Leaching fraction (LF) of irrigation water. For the leaching process to be effective, the LF of irrigation water needs to be adjusted according to the environmental conditions and soil salinity level in the form of Evapotranspiration (ET) rate. The relationship between environmental conditions and ET rate is hard to be defined by a linear relationship and data-driven Machine learning (ML)… More >

  • Open Access

    ARTICLE

    Selective Mapping Scheme for Universal Filtered Multicarrier

    Akku Madhusudhan*, Sudhir Kumar Sharma

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1273-1282, 2023, DOI:10.32604/iasc.2023.030765

    Abstract The next step in mobile communication technology, known as 5G, is set to go live in a number of countries in the near future. New wireless applications have high data rates and mobility requirements, which have posed a challenge to mobile communication technology researchers and designers. 5G systems could benefit from the Universal Filtered Multicarrier (UFMC). UFMC is an alternate waveform to orthogonal frequency-division multiplexing (OFDM), in filtering process is performed for a sub-band of subcarriers rather than the entire band of subcarriers Inter Carrier Interference (ICI) between neighbouring users is reduced via the sub-band filtering process, which reduces out-of-band… More >

  • Open Access

    ARTICLE

    Clustered Wireless Sensor Network in Precision Agriculture via Graph Theory

    L. R. Bindu1,*, P. Titus2, D. Dhanya3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1435-1449, 2023, DOI:10.32604/iasc.2023.030591

    Abstract Food security and sustainable development is making a mandatory move in the entire human race. The attainment of this goal requires man to strive for a highly advanced state in the field of agriculture so that he can produce crops with a minimum amount of water and fertilizer. Even though our agricultural methodologies have undergone a series of metamorphoses in the process of a present smart-agricultural system, a long way is ahead to attain a system that is precise and accurate for the optimum yield and profitability. Towards such a futuristic method of cultivation, this paper proposes a novel method… More >

  • Open Access

    ARTICLE

    Cooperative Channel and Optimized Route Selection in Adhoc Network

    D. Manohari1,*, M. S. Kavitha2, K. Periyakaruppan3, B. Chellapraba4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1547-1560, 2023, DOI:10.32604/iasc.2023.030540

    Abstract Over the last decade, mobile Adhoc networks have expanded dramatically in popularity, and their impact on the communication sector on a variety of levels is enormous. Its uses have expanded in lockstep with its growth. Due to its instability in usage and the fact that numerous nodes communicate data concurrently, adequate channel and forwarder selection is essential. In this proposed design for a Cognitive Radio Cognitive Network (CRCN), we gain the confidence of each forwarding node by contacting one-hop and second level nodes, obtaining reports from them, and selecting the forwarder appropriately with the use of an optimization technique. At… More >

  • Open Access

    ARTICLE

    Spectrum Sensing Using Optimized Deep Learning Techniques in Reconfigurable Embedded Systems

    Priyesh Kumar*, Ponniyin Selvan

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2041-2054, 2023, DOI:10.32604/iasc.2023.030291

    Abstract The exponential growth of Internet of Things (IoT) and 5G networks has resulted in maximum users, and the role of cognitive radio has become pivotal in handling the crowded users. In this scenario, cognitive radio techniques such as spectrum sensing, spectrum sharing and dynamic spectrum access will become essential components in Wireless IoT communication. IoT devices must learn adaptively to the environment and extract the spectrum knowledge and inferred spectrum knowledge by appropriately changing communication parameters such as modulation index, frequency bands, coding rate etc., to accommodate the above characteristics. Implementing the above learning methods on the embedded chip leads… More >

  • Open Access

    ARTICLE

    Smart Grid Communication Under Elliptic Curve Cryptography

    B. Prabakaran1,*, T. R. Sumithira2, V. Nagaraj3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2333-2347, 2023, DOI:10.32604/iasc.2023.029725

    Abstract Smart Grids (SGs) are introduced as a solution for standard power distribution. The significant capabilities of smart grids help to monitor consumer behaviors and power systems. However, the delay-sensitive network faces numerous challenges in which security and privacy gain more attention. Threats to transmitted messages, control over smart grid information and user privacy are the major concerns in smart grid security. Providing secure communication between the service provider and the user is the only possible solution for these security issues. So, this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve… More >

  • Open Access

    ARTICLE

    Moth Flame Optimization Based FCNN for Prediction of Bugs in Software

    C. Anjali*, Julia Punitha Malar Dhas, J. Amar Pratap Singh

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1241-1256, 2023, DOI:10.32604/iasc.2023.029678

    Abstract The software engineering technique makes it possible to create high-quality software. One of the most significant qualities of good software is that it is devoid of bugs. One of the most time-consuming and costly software procedures is finding and fixing bugs. Although it is impossible to eradicate all bugs, it is feasible to reduce the number of bugs and their negative effects. To broaden the scope of bug prediction techniques and increase software quality, numerous causes of software problems must be identified, and successful bug prediction models must be implemented. This study employs a hybrid of Faster Convolution Neural Network… More >

  • Open Access

    ARTICLE

    Cryptographic Algorithm for Enhancing Data Security in Wireless IoT Sensor Networks

    A. Bhavani, V. Nithya*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1381-1393, 2023, DOI:10.32604/iasc.2023.029397

    Abstract Wireless IoT Sensor Network can handle audio, video, text, etc., through the interconnection of ubiquitous devices. The entertainment and application-centric network relies on its autonomous nodes for handling large streams of multimedia data. Security breaches and threats due to insider attacks reduce the data handling and distribution capacity of the nodes. For addressing the insider attacks problem, Session-Critical Distributed Authentication Method (SCDAM) is proposed. The proposed method relies on short-lived concealed authentication based on an improved elliptic curve cryptography (ECC) algorithm. In this authentication, the session time and the interrupts are accounted for, providing end-to-end authentication. The session keys are… More >

Displaying 361-370 on page 37 of 1781. Per Page