Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,734)
  • Open Access

    ARTICLE

    The Crime Scene Tools Identification Algorithm Based on GVF‐Harris‐SIFT and KNN

    Nan Pan1, Dilin Pan2, Yi Liu2

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 413-419, 2019, DOI:10.31209/2019.100000103

    Abstract In order to solve the cutting tools classification problem, a crime tool identification algorithm based on GVF-Harris-SIFT and KNN is put forward. The proposed algorithm uses a gradient vector to smooth the gradient field of the image, and then uses the Harris angle detection algorithm to detect the tool angle. After that, the descriptors of the eigenvectors in corresponding feature points were using SIFT to obtained. Finally, the KNN machine learning algorithms is employed to for classification and recognition. The experimental results of the comparison of the cutting tools show the accuracy and reliability of More >

  • Open Access

    ARTICLE

    Hardware Design of Codebook‐Based Moving Object Detecting Method for Dynamic Gesture Recognition

    Ching‐Han Chena, Ching‐Yi Chenb, Nai‐Yuan Liua

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 375-384, 2019, DOI:10.31209/2019.100000099

    Abstract This study introduces a dynamic gesture recognition system applicable in IPTV remote control. In this system, we developed a hardware accelerator for realtime moving object detection. It is able to detect the position of hand block in each frame at high speed. After acquiring the information of hand block, the system can capture the robust dynamic gesture feature with the moving trail of hand block in the continuous images, and input to FNN classifier for starting recognition process. The experimental results show that our method has a good recognition performance, and more applicable to real More >

  • Open Access

    ARTICLE

    Study of Shearing Line Traces Laser Detection System

    Nan Pan1*, Dilin Pan2, Yi Liu2, Gang Li3

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 367-373, 2019, DOI:10.31209/2019.100000098

    Abstract A set of laser detection system for shearing tools is developed, By holding breakage of the cable, firstly, using single-point laser displacement sensors to pick up surface features signal of line trace, then wavelet decomposition is used to reduce the noise, and the signal after noise reduction is obtained. After that, the threshold based sequence comparison method is used to achieve matches of similar coincidence for trace features, and then using a gradient descent method to getting the minimum cost of cost function value through continuous iterative, and finally realizing the fast traceability of corresponding More >

  • Open Access

    ARTICLE

    Line Trace Effective Comparison Algorithm Based on Wavelet Domain DTW

    Nan Pan1, Yi Liu2, Dilin Pan2, Junbing Qian1, Gang Li3

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 359-366, 2019, DOI:10.31209/2019.100000097

    Abstract It will face a lot of problems when using existing image-processing and 3D scanning methods to do the similarity analysis of the line traces, therefore, an effective comparison algorithm is put forward for the purpose of making effective trace analysis and infer the criminal tools. The proposed algorithm applies wavelet decomposition to the line trace 1-D detection signals to partially reduce background noises. After that, the sequence comparison strategy based on wavelet domain DTW is employed to do trace feature similarity matching. Finally, using linear regression machine learning algorithm based on gradient descent method to More >

  • Open Access

    ARTICLE

    Intrusion Detection and Anticipation System (IDAS) for IEEE 802.15.4 Devices

    Usman Tariq

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 231-242, 2019, DOI:10.31209/2018.100000040

    Abstract Wireless Sensor Networks (WSNs) empower the reflection of the environment with an extraordinary resolve. These systems are combination of several minuscule squat-cost, and stumpy-power on-chip transceiver sensing motes. Characteristically, a sensing device comprises of four key gears: an identifying element for data attainment, a microcontroller for native data dispensation, a message component to permit the broadcast/response of data to/from additional associated hardware, and lastly, a trivial energy source. Near field frequency series and inadequate bandwidth of transceiver device drags to multi-stage data transactions at minimum achievable requirements. State of art, and prevailing operating systems, such… More >

  • Open Access

    ARTICLE

    Active Detecting DDoS Attack Approach Based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones

    Hsing‐Chung Chen1,2, Shyi‐Shiun Kuo1,3

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 217-228, 2019, DOI:10.31209/2018.100000057

    Abstract Nowadays, more and more smartphones communicate to each other’s by using some popular Next Generation Instant Messaging (NGIM) applications (Apps) which are based on the blockchain (BC) technologies, such as XChat, via IPv4/IPv6 dual stack network environments. Owing to XChat addresses are soon to be implemented as stealth addresses, any DoS attack activated form malicious XChat node will be treated as a kind of DDoS attack. Therefore, the huge NGIM usages with stealth addresses in IPv4/IPv6 dual stack mobile networks, mobile devices will suffer the Distributed Denial of Service (DDoS) attack from Internet. The probing More >

  • Open Access

    ARTICLE

    Visual Object Detection and Tracking Using Analytical Learning Approach of Validity Level

    Yong‐Hwan Lee, Hyochang Ahn, Hyo‐Beom Ahn, Sun‐Young Lee

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 205-215, 2019, DOI:10.31209/2018.100000056

    Abstract Object tracking plays an important role in many vision applications. This paper proposes a novel and robust object detection and tracking method to localize and track a visual object in video stream. The proposed method is consisted of three modules; object detection, tracking and learning. Detection module finds and localizes all apparent objects, corrects the tracker if necessary. Tracking module follows the interest object by every frame of sequences. Learning module estimates a detecting error, and updates its value of credibility level. With a validity level where the tracking is failed on tracing the learned More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, More >

  • Open Access

    ARTICLE

    Protecting Android Applications with Multiple DEX Files Against Static Reverse Engineering Attacks

    Kyeonghwan Lim1, Nak Young Kim1, Younsik Jeong1, Seong-je Cho1, Sangchul Han2, Minkyu Park2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 143-153, 2019, DOI:10.31209/2018.100000051

    Abstract The Android application package (APK) uses the DEX format as an executable file format. Since DEX files are in Java bytecode format, you can easily get Java source code using static reverse engineering tools. This feature makes it easy to steal Android applications. Tools such as ijiami, liapp, alibaba, etc. can be used to protect applications from static reverse engineering attacks. These tools typically save encrypted classes.dex in the APK file, and then decrypt and load dynamically when the application starts. However, these tools do not protect multidex Android applications. A multidex Android application is More >

  • Open Access

    ARTICLE

    The Design and Implementation of a Multidimensional and Hierarchical Web Anomaly Detection System

    Jianfeng Guan*, Jiawei Li, Zhongbai Jiang

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 131-141, 2019, DOI:10.31209/2018.100000050

    Abstract The traditional web anomaly detection systems face the challenges derived from the constantly evolving of the web malicious attacks, which therefore result in high false positive rate, poor adaptability, easy over-fitting, and high time complexity. Due to these limitations, we need a new anomaly detection system to satisfy the requirements of enterprise-level anomaly detection. There are lots of anomaly detection systems designed for different application domains. However, as for web anomaly detection, it has to describe the network accessing behaviours characters from as many dimensions as possible to improve the performance. In this paper we… More >

Displaying 3141-3150 on page 315 of 3734. Per Page