Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation

    Junaid Rashid1, Sumera Kanwal2, Muhammad Wasif Nisar2, Jungeun Kim1,*, Amir Hussain3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1309-1324, 2023, DOI:10.32604/csse.2023.026018

    Abstract In project management, effective cost estimation is one of the most crucial activities to efficiently manage resources by predicting the required cost to fulfill a given task. However, finding the best estimation results in software development is challenging. Thus, accurate estimation of software development efforts is always a concern for many companies. In this paper, we proposed a novel software development effort estimation model based both on constructive cost model II (COCOMO II) and the artificial neural network (ANN). An artificial neural network enhances the COCOMO model, and the value of the baseline effort constant A is calibrated to use… More >

  • Open Access

    ARTICLE

    Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM

    S. Hariprasad1,*, T. Deepa1, N. Bharathiraja2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1425-1440, 2022, DOI:10.32604/iasc.2022.022856

    Abstract The Internet of Things (IoT) is a global information and communication technology which aims to connect any type of device to the internet at any time and in any location. Nowadays billions of IoT devices are connected to the world, this leads to easily cause vulnerability to IoT devices. The increasing of users in different IoT-related applications leads to more data attacks is happening in the IoT networks after the fog layer. To detect and reduce the attacks the deep learning model is used. In this article, a hybrid sample selected recurrent neural network-extreme learning machine (hybrid SSRNN-ELM) algorithm that… More >

  • Open Access

    ARTICLE

    Research on the Method of Implementing Named Data Network Interconnection Based on IP Network

    Yabin Xu1,2,*, Lufa Qin2, Xiaowei Xu3

    Journal of Cyber Security, Vol.4, No.1, pp. 41-55, 2022, DOI:10.32604/jcs.2022.028265

    Abstract In order to extend the application scope of NDN and realize the transmission of different NDNs across IP networks, a method for interconnecting NDN networks distributed in different areas with IP networks is proposed. Firstly, the NDN data resource is located by means of the DNS mechanism, and the gateway IP address of the NDN network where the data resource is located is found. Then, the transmission between different NDNs across the IP network is implemented based on the tunnel technology. In addition, in order to achieve efficient and fast NDN data forwarding, we have added a small number of… More >

  • Open Access

    ARTICLE

    Errorless Underwater Channel Selection Scheme Using Forward Error Rectification and Modulation

    A. Herald1,*, C. Vennila2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 753-768, 2022, DOI:10.32604/iasc.2022.025362

    Abstract Acoustic and optical communication are the best options for data transmission in underwater communication. This paper presents the simulation model of an underwater wireless optical communication channel using the Errorless Channel Selection Using Forward Error Rectification and Modulation Progression (ECFM). The suitable modulation methods are used to encode and transfer the packets properly, the data is encoded in differential phase shift key mode at the phase of the light wave carrier. In addition, to send and receive data, an error rectification method is developed in the transport layer, which improves network speed. In addition, we create connections by observing the… More >

  • Open Access

    ARTICLE

    Bayesian Feed Forward Neural Network-Based Efficient Anomaly Detection from Surveillance Videos

    M. Murugesan*, S. Thilagamani

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 389-405, 2022, DOI:10.32604/iasc.2022.024641

    Abstract Automatic anomaly activity detection is difficult in video surveillance applications due to variations in size, type, shape, and objects’ location. The traditional anomaly detection and classification methods may affect the overall segmentation accuracy. It requires the working groups to judge their constant attention if the captured activities are anomalous or suspicious. Therefore, this defect creates the need to automate this process with high accuracy. In addition to being extraordinary or questionable, the display does not contain the necessary recording frame and activity standard to help the quick judgment of the parts’ specialized action. Therefore, to reduce the wastage of time… More >

  • Open Access

    ARTICLE

    A Robust Emergency Messages Routing Scheme for Urban VANETs

    Mumtaz Ali Shah1,2,*, Farrukh Zeeshan Khan1, Ghulam Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2617-2632, 2022, DOI:10.32604/cmc.2022.025981

    Abstract Vehicular ad-hoc networks (VANETs) play an essential role in enhancing transport infrastructure by making vehicles intelligent and proficient in preventing traffic fatalities. Direction-based greedy protocols pick the next route vehicle for transmitting emergency messages (EMs) depending upon the present location of adjacent vehicles towards sink vehicles by using an optimal uni-directional road traffic approach. Nevertheless, such protocols suffer performance degradation by ignoring the moving directions of vehicles in bi-directional road traffic where topological changes happen continuously. Due to the high number of vehicles, it is essential to broadcast EMs to all vehicles to prevent traffic delays and collisions. A cluster-based… More >

  • Open Access

    ARTICLE

    Locomotion of Bioinspired Underwater Snake Robots Using Metaheuristic Algorithm

    Souad Larabi-Marie-Sainte1, Taiseer Abdalla Elfadil Eisa2, Fahd N. Al-Wesabi3,4, Amani Abdulrahman Albraikan5, Manar Ahmed Hamza6,*, Abdelwahed Motwakel6, Ishfaq Yaseen6, Mesfer Al Duhayyim7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1293-1308, 2022, DOI:10.32604/cmc.2022.024585

    Abstract Snake Robots (SR) have been successfully deployed and proved to attain bio-inspired solutions owing to its capability to move in harsh environments, a characteristic not found in other kinds of robots (like wheeled or legged robots). Underwater Snake Robots (USR) establish a bioinspired solution in the domain of underwater robotics. It is a key challenge to increase the motion efficiency in underwater robots, with respect to forwarding speed, by enhancing the locomotion method. At the same time, energy efficiency is also considered as a crucial issue for long-term automation of the systems. In this aspect, the current research paper concentrates… More >

  • Open Access

    ARTICLE

    Forward Flight Performance Analysis of Supercritical Airfoil in Helicopter Main Rotor

    Inamul Hasan1,2,*, R. Mukesh2, P. Radha Krishnan1,2, R. Srinath1, R. B. Dhanya Prakash2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 567-584, 2022, DOI:10.32604/iasc.2022.023252

    Abstract In this research, the aerodynamic performance and flow characteristics of NASA SC (2)-0714 airfoil and HH02 airfoil in the helicopter main rotor are evidently analyzed. The supercritical airfoil is used in the aircraft for attaining better transonic and high-speed flow characteristics. Moreover, a specialized helicopter airfoil called HH02 is used in the Apache helicopter rotor for increasing the operational speed. As most of the high-speed helicopters are using four-bladed main rotor configuration, it is analyzed with prior attention. The lift and thrust act in different directions for the forward phase of the flight whereas the lift and thrust act in… More >

  • Open Access

    ARTICLE

    Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems

    Munayfah Alanazi*, Shadi Nashwan

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 703-725, 2022, DOI:10.32604/csse.2022.022962

    Abstract Wireless medical sensor networks (WMSNs) play a significant role in increasing the availability of remote healthcare systems. The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis. The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems. Therefore, an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns. Many authentication schemes for remote patient… More >

  • Open Access

    ARTICLE

    Analysis of the Desynchronization Attack Impact on the E2EA Scheme

    Shadi Nashwan*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 625-644, 2022, DOI:10.32604/csse.2022.020799

    Abstract The healthcare IoT system is considered to be a significant and modern medical system. There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries. Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics. Recently, the author proposed an end-to-end authentication scheme for healthcare IoT systems (E2EA), to provide a mutual authentication with a high data rate between the communication nodes of the healthcare IoT systems. Although the… More >

Displaying 21-30 on page 3 of 57. Per Page