Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,086)
  • Open Access

    REVIEW

    Intelligent Identification over Power Big Data: Opportunities, Solutions, and Challenges

    Liang Luo1, Xingmei Li1, Kaijiang Yang1, Mengyang Wei1, Jiong Chen1, Junqian Yang1, Liang Yao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1565-1595, 2023, DOI:10.32604/cmes.2022.021198 - 20 September 2022

    Abstract The emergence of power dispatching automation systems has greatly improved the efficiency of power industry operations and promoted the rapid development of the power industry. However, with the convergence and increase in power data flow, the data dispatching network and the main station dispatching automation system have encountered substantial pressure. Therefore, the method of online data resolution and rapid problem identification of dispatching automation systems has been widely investigated. In this paper, we perform a comprehensive review of automated dispatching of massive dispatching data from the perspective of intelligent identification, discuss unresolved research issues and More >

  • Open Access

    ARTICLE

    Evaluation of Codebook Design Using SCMA Scheme Based on An and Dn Lattices

    G. Rajamanickam1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3037-3048, 2023, DOI:10.32604/iasc.2023.029996 - 17 August 2022

    Abstract The sparse code multiple access (SCMA) scheme is a Non-Orthogonal Multiple Access (NOMA) type of scheme that is used to handle the uplink component of mobile communication in the current generation. A need of the 5G mobile network is the ability to handle more users. To accommodate this, the SCMA allows each user to deploy a variety of sub-carrier broadcasts, and several consumers may contribute to the same frequency using superposition coding. The SCMA approach, together with codebook design for each user, is used to improve channel efficiency through better management of the available spectrum.… More >

  • Open Access

    ARTICLE

    An Intelligent Intrusion Detection System in Smart Grid Using PRNN Classifier

    P. Ganesan1,*, S. Arockia Edwin Xavier2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2979-2996, 2023, DOI:10.32604/iasc.2023.029264 - 17 August 2022

    Abstract Typically, smart grid systems enhance the ability of conventional power system networks as it is vulnerable to several kinds of attacks. These vulnerabilities might cause the attackers or intruders to collapse the entire network system thus breaching the confidentiality and integrity of smart grid systems. Thus, for this purpose, Intrusion detection system (IDS) plays a pivotal part in offering a reliable and secured range of services in the smart grid framework. Several existing approaches are there to detect the intrusions in smart grid framework, however they are utilizing an old dataset to detect anomaly thus… More >

  • Open Access

    ARTICLE

    Automatic Anomaly Monitoring in Public Surveillance Areas

    Mohammed Alarfaj1, Mahwish Pervaiz2, Yazeed Yasin Ghadi3, Tamara al Shloul4, Suliman A. Alsuhibany5, Ahmad Jalal6, Jeongmin Park7,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2655-2671, 2023, DOI:10.32604/iasc.2023.027205 - 17 August 2022

    Abstract With the dramatic increase in video surveillance applications and public safety measures, the need for an accurate and effective system for abnormal/suspicious activity classification also increases. Although it has multiple applications, the problem is very challenging. In this paper, a novel approach for detecting normal/abnormal activity has been proposed. We used the Gaussian Mixture Model (GMM) and Kalman filter to detect and track the objects, respectively. After that, we performed shadow removal to segment an object and its shadow. After object segmentation we performed occlusion detection method to detect occlusion between multiple human silhouettes and… More >

  • Open Access

    ARTICLE

    An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud

    P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424 - 16 August 2022

    Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence,… More >

  • Open Access

    ARTICLE

    Regularised Layerwise Weight Norm Based Skin Lesion Features Extraction and Classification

    S. Gopikha*, M. Balamurugan

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2727-2742, 2023, DOI:10.32604/csse.2023.028609 - 01 August 2022

    Abstract Melanoma is the most lethal malignant tumour, and its prevalence is increasing. Early detection and diagnosis of skin cancer can alert patients to manage precautions and dramatically improve the lives of people. Recently, deep learning has grown increasingly popular in the extraction and categorization of skin cancer features for effective prediction. A deep learning model learns and co-adapts representations and features from training data to the point where it fails to perform well on test data. As a result, overfitting and poor performance occur. To deal with this issue, we proposed a novel Consecutive Layerwise… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Industrial Internet of Things Cyberattacks

    Rehab Alanazi*, Ahamed Aljuhani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2361-2378, 2023, DOI:10.32604/csse.2023.026712 - 01 August 2022

    Abstract The evolution of the Internet of Things (IoT) has empowered modern industries with the capability to implement large-scale IoT ecosystems, such as the Industrial Internet of Things (IIoT). The IIoT is vulnerable to a diverse range of cyberattacks that can be exploited by intruders and cause substantial reputational and financial harm to organizations. To preserve the confidentiality, integrity, and availability of IIoT networks, an anomaly-based intrusion detection system (IDS) can be used to provide secure, reliable, and efficient IIoT ecosystems. In this paper, we propose an anomaly-based IDS for IIoT networks as an effective security… More >

  • Open Access

    ARTICLE

    Hybrid Color Texture Features Classification Through ANN for Melanoma

    Saleem Mustafa1, Arfan Jaffar1, Muhammad Waseem Iqbal2,*, Asma Abubakar2, Abdullah S. Alshahrani3, Ahmed Alghamdi4

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2205-2218, 2023, DOI:10.32604/iasc.2023.029549 - 19 July 2022

    Abstract Melanoma is of the lethal and rare types of skin cancer. It is curable at an initial stage and the patient can survive easily. It is very difficult to screen all skin lesion patients due to costly treatment. Clinicians are requiring a correct method for the right treatment for dermoscopic clinical features such as lesion borders, pigment networks, and the color of melanoma. These challenges are required an automated system to classify the clinical features of melanoma and non-melanoma disease. The trained clinicians can overcome the issues such as low contrast, lesions varying in size,… More >

  • Open Access

    ARTICLE

    Abnormal Crowd Behavior Detection Using Optimized Pyramidal Lucas-Kanade Technique

    G. Rajasekaran1,*, J. Raja Sekar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2399-2412, 2023, DOI:10.32604/iasc.2023.029119 - 19 July 2022

    Abstract Abnormal behavior detection is challenging and one of the growing research areas in computer vision. The main aim of this research work is to focus on panic and escape behavior detections that occur during unexpected/uncertain events. In this work, Pyramidal Lucas Kanade algorithm is optimized using EMEHOs to achieve the objective. First stage, OPLKT-EMEHOs algorithm is used to generate the optical flow from MIIs. Second stage, the MIIs optical flow is applied as input to 3 layer CNN for detect the abnormal crowd behavior. University of Minnesota (UMN) dataset is used to evaluate the proposed More >

  • Open Access

    ARTICLE

    Robust ACO-Based Landmark Matching and Maxillofacial Anomalies Classification

    Dalel Ben Ismail1, Hela Elmannai2,*, Souham Meshoul2, Mohamed Saber Naceur1

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2219-2236, 2023, DOI:10.32604/iasc.2023.028944 - 19 July 2022

    Abstract Imagery assessment is an efficient method for detecting craniofacial anomalies. A cephalometric landmark matching approach may help in orthodontic diagnosis, craniofacial growth assessment and treatment planning. Automatic landmark matching and anomalies detection helps face the manual labelling limitations and optimize preoperative planning of maxillofacial surgery. The aim of this study was to develop an accurate Cephalometric Landmark Matching method as well as an automatic system for anatomical anomalies classification. First, the Active Appearance Model (AAM) was used for the matching process. This process was achieved by the Ant Colony Optimization (ACO) algorithm enriched with proximity… More >

Displaying 401-410 on page 41 of 1086. Per Page