Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (132)
  • Open Access

    ARTICLE

    An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

    A. Chinnappa*, C. Vijayakumaran

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4017-4031, 2022, DOI:10.32604/cmc.2022.027858

    Abstract Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKH-SDT technique aims to effectively encrypts… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Microarray Gene Expression Classification for Data Science Applications

    Areej A. Malibari1, Reem M. Alshehri2, Fahd N. Al-Wesabi3, Noha Negm3, Mesfer Al Duhayyim4, Anwer Mustafa Hilal5,*, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4277-4290, 2022, DOI:10.32604/cmc.2022.027030

    Abstract In bioinformatics applications, examination of microarray data has received significant interest to diagnose diseases. Microarray gene expression data can be defined by a massive searching space that poses a primary challenge in the appropriate selection of genes. Microarray data classification incorporates multiple disciplines such as bioinformatics, machine learning (ML), data science, and pattern classification. This paper designs an optimal deep neural network based microarray gene expression classification (ODNN-MGEC) model for bioinformatics applications. The proposed ODNN-MGEC technique performs data normalization process to normalize the data into a uniform scale. Besides, improved fruit fly optimization (IFFO) based feature selection technique is used… More >

  • Open Access

    ARTICLE

    Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks

    R.M. Bhavadharini1,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1233-1250, 2023, DOI:10.32604/csse.2023.025461

    Abstract With recent advancements made in wireless communication techniques, wireless sensors have become an essential component in both data collection as well as tracking applications. Wireless Sensor Network (WSN) is an integral part of Internet of Things (IoT) and it encounters different kinds of security issues. Blockchain is designed as a game changer for highly secure and effective digital society. So, the current research paper focuses on the design of Metaheuristic-based Clustering with Routing Protocol for Blockchain-enabled WSN abbreviated as MCRP-BWSN. The proposed MCRP-BWSN technique aims at deriving a shared memory scheme using blockchain technology and determine the optimal paths to… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Enabled Wild Forest Fire Detection System

    Ahmed S. Almasoud*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1485-1498, 2023, DOI:10.32604/csse.2023.025190

    Abstract The latest advancements in computer vision and deep learning (DL) techniques pave the way to design novel tools for the detection and monitoring of forest fires. In this view, this paper presents an intelligent wild forest fire detection and alarming system using deep learning (IWFFDA-DL) model. The proposed IWFFDA-DL technique aims to identify forest fires at earlier stages through integrated sensors. The proposed IWFFDA-DL system includes an Integrated sensor system (ISS) combining an array of sensors that acts as the major input source that helps to forecast the fire. Then, the attention based convolution neural network with bidirectional long short… More >

  • Open Access

    ARTICLE

    Brain Tumor Diagnosis Using Sparrow Search Algorithm Based Deep Learning Model

    G. Ignisha Rajathi1, R. Ramesh Kumar2, D. Ravikumar3, T. Joel4, Seifedine Kadry4,5, Chang-Won Jeong6, Yunyoung Nam7,*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1793-1806, 2023, DOI:10.32604/csse.2023.024674

    Abstract Recently, Internet of Medical Things (IoMT) has gained considerable attention to provide improved healthcare services to patients. Since earlier diagnosis of brain tumor (BT) using medical imaging becomes an essential task, automated IoMT and cloud enabled BT diagnosis model can be devised using recent deep learning models. With this motivation, this paper introduces a novel IoMT and cloud enabled BT diagnosis model, named IoMTC-HDBT. The IoMTC-HDBT model comprises the data acquisition process by the use of IoMT devices which captures the magnetic resonance imaging (MRI) brain images and transmit them to the cloud server. Besides, adaptive window filtering (AWF) based… More >

  • Open Access

    ARTICLE

    Fuzzy with Metaheuristics Based Routing for Clustered Wireless Sensor Networks

    Ashit Kumar Dutta1,*, Yasser Albagory2, Majed Alsanea3, Abdul Rahaman Wahab Sait4, Hazim Saleh AlRawashdeh5

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 367-380, 2023, DOI:10.32604/iasc.2023.027076

    Abstract Wireless sensor network (WSN) plays a vital part in real time tracking and data collection applications. WSN incorporates a set of numerous sensor nodes (SNs) commonly utilized to observe the target region. The SNs operate using an inbuilt battery and it is not easier to replace or charge it. Therefore, proper utilization of available energy in the SNs is essential to prolong the lifetime of the WSN. In this study, an effective Type-II Fuzzy Logic with Butterfly Optimization Based Route Selection (TFL-BOARS) has been developed for clustered WSN. The TFL-BOARS technique intends to optimally select the cluster heads (CHs) and… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Financial Crisis Prediction Model for Small-Medium Sized Industries

    Kavitha Muthukumaran*, K. Hariharanath

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 521-536, 2023, DOI:10.32604/iasc.2023.025968

    Abstract Recently, data science techniques utilize artificial intelligence (AI) techniques who start and run small and medium-sized enterprises (SMEs) to take an influence and grow their businesses. For SMEs, owing to the inexistence of consistent data and other features, evaluating credit risks is difficult and costly. On the other hand, it becomes necessary to design efficient models for predicting business failures or financial crises of SMEs. Various data classification approaches for financial crisis prediction (FCP) have been presented for predicting the financial status of the organization by the use of past data. A major process involved in the design of FCP… More >

  • Open Access

    ARTICLE

    Metaheuristics with Optimal Deep Transfer Learning Based Copy-Move Forgery Detection Technique

    C. D. Prem Kumar1,*, S. Saravana Sundaram2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 881-899, 2023, DOI:10.32604/iasc.2023.025766

    Abstract The extensive availability of advanced digital image technologies and image editing tools has simplified the way of manipulating the image content. An effective technique for tampering the identification is the copy-move forgery. Conventional image processing techniques generally search for the patterns linked to the fake content and restrict the usage in massive data classification. Contrastingly, deep learning (DL) models have demonstrated significant performance over the other statistical techniques. With this motivation, this paper presents an Optimal Deep Transfer Learning based Copy Move Forgery Detection (ODTL-CMFD) technique. The presented ODTL-CMFD technique aims to derive a DL model for the classification of… More >

  • Open Access

    ARTICLE

    Hybridization of Metaheuristics Based Energy Efficient Scheduling Algorithm for Multi-Core Systems

    J. Jean Justus1, U. Sakthi2, K. Priyadarshini3, B. Thiyaneswaran4, Masoud Alajmi5, Marwa Obayya6, Manar Ahmed Hamza7,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 205-219, 2023, DOI:10.32604/csse.2023.025256

    Abstract The developments of multi-core systems (MCS) have considerably improved the existing technologies in the field of computer architecture. The MCS comprises several processors that are heterogeneous for resource capacities, working environments, topologies, and so on. The existing multi-core technology unlocks additional research opportunities for energy minimization by the use of effective task scheduling. At the same time, the task scheduling process is yet to be explored in the multi-core systems. This paper presents a new hybrid genetic algorithm (GA) with a krill herd (KH) based energy-efficient scheduling technique for multi-core systems (GAKH-SMCS). The goal of the GAKH-SMCS technique is to… More >

  • Open Access

    ARTICLE

    Metaheuristics Based Node Localization Approach for Real-Time Clustered Wireless Networks

    R. Bhaskaran1, P. S. Sujith Kumar2, G. Shanthi3, L. Raja4, Gyanendra Prasad Joshi5, Woong Cho6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 1-17, 2023, DOI:10.32604/csse.2023.024973

    Abstract In recent times, real time wireless networks have found their applicability in several practical applications such as smart city, healthcare, surveillance, environmental monitoring, etc. At the same time, proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks. This study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization (IM-EECNL) approach for real-time wireless networks. The proposed IM-EECNL technique involves two major processes namely node localization and clustering. Firstly, Chaotic Water Strider Algorithm based Node Localization (CWSANL) technique to determine the unknown position of the nodes. Secondly, an Oppositional Archimedes Optimization… More >

Displaying 61-70 on page 7 of 132. Per Page