Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,889)
  • Open Access

    ARTICLE

    Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine)

    Iftikhar Ahmad1, *, Rayan Atteah Alsemmeari1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1097-1111, 2020, DOI:10.32604/cmc.2020.011732

    Abstract An IDS (intrusion detection system) provides a foremost front line mechanism to guard networks, systems, data, and information. That’s why intrusion detection has grown as an active study area and provides significant contribution to cyber-security techniques. Multiple techniques have been in use but major concern in their implementation is variation in their detection performance. The performance of IDS lies in the accurate detection of attacks, and this accuracy can be raised by improving the recognition rate and significant reduction in the false alarms rate. To overcome this problem many researchers have used different machine learning techniques. These techniques have limitations… More >

  • Open Access

    ARTICLE

    Discrete Wavelet Transmission and Modified PSO with ACO Based Feed Forward Neural Network Model for Brain Tumour Detection

    Machiraju Jayalakshmi1, *, S. Nagaraja Rao2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1081-1096, 2020, DOI:10.32604/cmc.2020.011710

    Abstract In recent years, the development in the field of computer-aided diagnosis (CAD) has increased rapidly. Many traditional machine learning algorithms have been proposed for identifying the pathological brain using magnetic resonance images. The existing algorithms have drawbacks with respect to their accuracy, efficiency, and limited learning processes. To address these issues, we propose a pathological brain tumour detection method that utilizes the Weiner filter to improve the image contrast, 2D- discrete wavelet transformation (2D-DWT) to extract the features, probabilistic principal component analysis (PPCA) and linear discriminant analysis (LDA) to normalize and reduce the features, and a feed-forward neural network (FNN)… More >

  • Open Access

    ARTICLE

    Enhancing the Classification Accuracy in Sentiment Analysis with Computational Intelligence Using Joint Sentiment Topic Detection with MEDLDA

    PCD Kalaivaani1,*, Dr. R Thangarajan2

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 71-79, 2020, DOI:10.31209/2019.100000152

    Abstract Web mining is the process of integrating the information from web by traditional data mining methodologies and techniques. Opinion mining is an application of natural language processing to extract subjective information from web. Online reviews require efficient classification algorithms for analysing the sentiments, which does not perform an in–depth analysis in current methods. Sentiment classification is done at document level in combination with topics and sentiments. It is based on weakly supervised Joint Sentiment-Topic mode which extends the topic model Maximum Entropy Discrimination Latent Dirichlet Allocation by constructing an additional sentiment layer. It is assumed that topics generated are dependent… More >

  • Open Access

    ARTICLE

    Detecting Outlier Behavior of Game Player Players Using Multimodal Physiology Data

    Shinjin Kang1, Taiwoo Park2,*

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 205-214, 2020, DOI:10.31209/2019.100000141

    Abstract This paper describes an outlier detection system based on a multimodal physiology data clustering algorithm in a PC gaming environment. The goal of this system is to provide information on a game player’s abnormal behavior with a bio-signal analysis. Using this information, the game platform can easily identify players with abnormal behavior in specific events. To do this, we propose a mouse device that measures the wearer's skin conductivity, temperature, and motion. We also suggest a Dynamic Time Warping (DTW) based clustering algorithm. The developed system examines the biometric information of 50 players in a bullet dodge game. This paper… More >

  • Open Access

    ARTICLE

    An E-Assessment Methodology Based on Artificial Intelligence Techniques to Determine Students’ Language Quality and Programming Assignments’ Plagiarism

    Farhan Ullah1,4,*, Abdullah Bajahzar2, Hamza Aldabbas3, Muhammad Farhan4, Hamad Naeem1, S. Sabahat H. Bukhari4,5, Kaleem Razzaq Malik6

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 169-180, 2020, DOI:10.31209/2019.100000138

    Abstract This research aims to an electronic assessment (e-assessment) of students’ replies in response to the standard answer of teacher’s question to automate the assessment by WordNet semantic similarity. For this purpose, a new methodology for Semantic Similarity through WordNet Semantic Similarity Techniques (SS-WSST) has been proposed to calculate semantic similarity among teacher’ query and student’s reply. In the pilot study-1 42 words’ pairs extracted from 8 students’ replies, which marked by semantic similarity measures and compared with manually assigned teacher’s marks. The teacher is provided with 4 bins of the mark while our designed methodology provided an exact measure of… More >

  • Open Access

    ARTICLE

    Noise Cancellation Based on Voice Activity Detection Using Spectral Variation for Speech Recognition in Smart Home Devices

    Jeong-Sik Park1, Seok-Hoon Kim2,*

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 149-159, 2020, DOI:10.31209/2019.100000136

    Abstract Variety types of smart home devices have a main function of a human-machine interaction by speech recognition. Speech recognition system may be vulnerable to rapidly changing noises in home environments. This study proposes an efficient noise cancellation approach to eliminate the noises directly on the devices in real time. Firstly, we propose an advanced voice activity detection (VAD) technique to efficiently detect speech and non-speech regions on the basis of spectral property of speech signals. The VAD is then employed to enhance the conventional spectral subtraction method by steadily estimating noise signals in non-speech regions. On several experiments, our approach… More >

  • Open Access

    ARTICLE

    Word Embedding Based Knowledge Representation with Extracting Relationship Between Scientific Terminologies

    Mucheol Kim*, Junho Kim, Mincheol Shin

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 141-147, 2020, DOI:10.31209/2019.100000135

    Abstract With the trends of big data era, many people want to acquire the reliable and refined information from web environments. However, it is difficult to find appropriate information because the volume and complexity of web information is increasing rapidly. So many researchers are focused on text mining and personalized recommendation for extracting users’ interests. The proposed approach extracted semantic relationship between scientific terminologies with word embedding approach. We aggregated science data in BT for supporting users’ wellness. In our experiments, query expansion is performed with relationship between scientific terminologies with user’s intention. More >

  • Open Access

    EDITORIAL

    Advanced ICT and IoT Technologies for the Fourth Industrial Revolution

    Soo Kyun Kim*, Mario Köppen, Ali Kashif Bashir, Yuho Jin

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 83-85, 2020, DOI:10.31209/2019.100000129

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A LoRaWAN Access Technology Based on Channel Adaptive Adjustment

    Li Ma, Meng Zhao*, Dongchao Ma, Yingxun Fu

    Journal of New Media, Vol.2, No.1, pp. 11-20, 2020, DOI:10.32604/jnm.2020.09715

    Abstract Low-power wide area network (LPWAN) has developed rapidly in recent years and is widely used in various Internet of Things (IoT) services. In order to reduce cost and power consumption, wide coverage, LPWAN tends to use simple channel access control protocols, such as the Aloha protocol. This protocol is simple with poor extension capability. In high-density environment, Aloha protocol will lead to low channel utilization, prolonged access and high conflict probability. Therefore, in order to solve the above problems, we propose an enhanced channel access control mechanism based on the existing LoRaWAN protocol, that is, a dynamic listening backoff mechanism.… More >

  • Open Access

    ARTICLE

    Hybrid Architecture for Autonomous Load Balancing in Distributed Systems Based on Smooth Fuzzy Function

    Moazam Ali, Susmit Bagchi*

    Intelligent Automation & Soft Computing, Vol.24, No.4, 2018, DOI:10.31209/2018.100000043

    Abstract Due to the rapid advancements and developments in wide area networks and powerful computational resources, the load balancing mechanisms in distributed systems have gained pervasive applications covering wired as well as mobile distributed systems. In large-scale distributed systems, sharing of distributed resources is required for enhancing overall resource utilization. This paper presents a comprehensive study and detailed comparative analysis of different load balancing algorithms employing fuzzy logic and mobile agents. We have proposed a hybrid architecture for integrated load balancing and monitoring in distributed computing systems employing fuzzy logic and autonomous mobile agents. Furthermore, we have proposed a smooth and… More >

Displaying 2371-2380 on page 238 of 2889. Per Page