Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    CMMI Compliant Workflow Models to Track and Control Changes

    Islam Ali1, Syed Muhammad Ali1, Waqar Mehmood2, Wasif Nisar1, Muhammad Qaiser Saleem3, Majzoob K. Omer3, Mahmood Niazi4, Muhammad Shafiq5, Jin-Ghoo Choi5,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 387-405, 2022, DOI:10.32604/iasc.2022.015955

    Abstract The Capability Maturity Model Integration (CMMI) is a renowned Software Process Improvement (SPI) framework. Research studies have revealed that CMMI adoption needs a lot of resources in terms of training, funds, and professional workers. However, the software SMEs (SSMEs) have few resources and cannot adopt CMMI. One of the challenges of adopting CMMI is that CMMI tells “What to do?” as requirements to be met, and leaves “How to do?” to the implementers. The software industry especially SSMEs faces difficulties in successfully implementing various process areas (PAs) particularly Configuration Management Process Area (CM-PA). SG-2 (Track and control changes) is one… More >

  • Open Access

    ARTICLE

    Particle Swarm Optimization with New Initializing Technique to Solve Global Optimization Problems

    Adnan Ashraf1, Abdulwahab Ali Almazroi2, Waqas Haider Bangyal3,*, Mohammed A. Alqarni4

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 191-206, 2022, DOI:10.32604/iasc.2022.015810

    Abstract Particle Swarm Optimization (PSO) is a well-known extensively utilized algorithm for a distinct type of optimization problem. In meta-heuristic algorithms, population initialization plays a vital role in solving the classical problems of optimization. The population’s initialization in meta-heuristic algorithms urges the convergence rate and diversity, besides this, it is remarkably beneficial for finding the efficient and effective optimal solution. In this study, we proposed an enhanced variation of the PSO algorithm by using a quasi-random sequence (QRS) for population initialization to improve the convergence rate and diversity. Furthermore, this study represents a new approach for population initialization by incorporating the… More >

  • Open Access

    ARTICLE

    The Data Acquisition and Control System Based on IoT-CAN Bus

    He Gong1,2,3,4, Ji Li1, RuiWen Ni1, Pei Xiao1, Hang Ouyang1, Ye Mu1,*, Thobela Louis Tyasi5

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 1049-1062, 2021, DOI:10.32604/iasc.2021.019730

    Abstract Presently, the adoption of Internet of things(IOT)-related technologies in the Smart Farming domain is rapidly emerging. The increasing number of sensors used in diverse applications has provided a massive number of continuous, unbounded, rapid data and requires the management of distinct protocols, interfaces and intermittent connections. A low-cost, low-power, and low data-rate solution is proposed to fulfill the requirements of information monitoring for actual large-scale agricultural farms, which we will need pressingly in the future. This paper designs a heterogeneous data acquisition and control system for differentiated agricultural information monitoring terminal. Based on the IoT-CAN bus architecture, the system can… More >

  • Open Access

    ARTICLE

    Adversarial Examples Generation Algorithm through DCGAN

    Biying Deng1, Ziyong Ran1, Jixin Chen1, Desheng Zheng1,*, Qiao Yang2, Lulu Tian3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 889-898, 2021, DOI:10.32604/iasc.2021.019727

    Abstract In recent years, due to the popularization of deep learning technology, more and more attention has been paid to the security of deep neural networks. A wide variety of machine learning algorithms can attack neural networks and make its classification and judgement of target samples wrong. However, the previous attack algorithms are based on the calculation of the corresponding model to generate unique adversarial examples, and cannot extract attack features and generate corresponding samples in batches. In this paper, Generative Adversarial Networks (GAN) is used to learn the distribution of adversarial examples generated by FGSM and establish a generation model,… More >

  • Open Access

    ARTICLE

    Cryptanalysis of an Online/Offline Certificateless Signature Scheme for Internet of Health Things

    Saddam Hussain1, Syed Sajid Ullah2,*, Mohammad Shorfuzzaman3, Mueen Uddin4, Mohammed Kaosar5

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 983-993, 2021, DOI:10.32604/iasc.2021.019486

    Abstract Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal of Healthcare Engineering, vol. 2020] presented a new certificateless offline/online signature scheme for Internet of Health Things (IoHT) to fulfill the authenticity requirements of the resource-constrained environment of (IoHT) devices. The authors claimed that the newly proposed scheme is formally secured against Type-I adversary under the Random Oracle Model (ROM). Unfortunately, their scheme is insecure against adaptive chosen message attacks. It is demonstrated that an adversary can forge a valid signature on a message by replacing the public key. Furthermore, we performed a comparative analysis… More >

  • Open Access

    ARTICLE

    Radio Labeling Associated with a Class of Commutative Rings Using Zero-Divisor Graph

    Azeem Haider1,*, Ali N.A. Koam1, Ali Ahmad2

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 787-794, 2021, DOI:10.32604/iasc.2021.019391

    Abstract Graph labeling is useful in networks because each transmitter has a different transmission capacity to send or receive wired or wireless links. An interference of signals can occur when transmitters that are close together receive close frequencies. This problem has been modeled mathematically in the radio labeling problem on graphs, where vertices represent transmitters and edges indicate closeness of the transmitters. For this purpose, each vertex is labeled with a unique positive integer, and to minimize the interference, the difference between maximum and minimum used labels has to be minimized. A radio labeling for a graph is a function from… More >

  • Open Access

    ARTICLE

    Lowest-Opportunities User First-Based Subcarrier Allocation Algorithm for Downlink NOMA Systems

    Mohammed Abd-Elnaby*, Sameer Alsharif, Hesham Alhumyani, Fahad Alraddady

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 1033-1048, 2021, DOI:10.32604/iasc.2021.019341

    Abstract Non-orthogonal multiple access (NOMA) is one of the promising 5G technologies to improve spectral efficiency massive connectivity and cell-edge throughput. The performance of NOMA systems mainly depends on the efficiency of the subcarrier allocation algorithm. This paper aims to jointly optimize spectral efficiency (SE), outage probability, and fairness among users with respect to the subcarrier allocation for downlink NOMA systems. We propose a low-complexity greedy-based subcarrier allocation algorithm based on the lowest-opportunities user’s first precept. This precept is based on computing the number of opportunities for each user to select a subcarrier with good channel gain by counting the number… More >

  • Open Access

    ARTICLE

    Performance Comparison of PoseNet Models on an AIoT Edge Device

    Min-Jun Kim1, Seng-Phil Hong2, Mingoo Kang1, Jeongwook Seo1,*

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 743-753, 2021, DOI:10.32604/iasc.2021.019329

    Abstract In this paper, we present an oneM2M-compliant system including an artificial intelligence of things (AIoT) edge device whose principal function is to estimate human poses by using two PoseNet models built on MobileNet v1 and ResNet-50 backbone architectures. Although MobileNet v1 is generally known to be much faster but less accurate than ResNet50, it is necessary to analyze the performances of whole PoseNet models carefully and select one of them suitable for the AIoT edge device. For this reason, we first investigate the computational complexity of the models about their neural network layers and parameters and then compare their performances… More >

  • Open Access

    ARTICLE

    Compression of Grayscale Images in DRPE-based Encrypted Domain

    Osama S. Faragallah1,*, Ensherah A. Naeem2, Hala S. Elsayed3, Fathi E. Abd El-Samie4

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 1019-1031, 2021, DOI:10.32604/iasc.2021.019185

    Abstract Compressing the encrypted images is considered an important issue in many applications such as cloud computing. From this perspective, this paper introduces an efficient approach for compression processing of images in the encrypted domain. The images are optically encrypted using the Double Random Phase Encoding (DRPE). The Joint Photographic Experts Group (JPEG) and the Set Partitioning in Hierarchical Trees (SPIHT) compression schemes have been used to compress the encrypted images. The process starts by converting the original image into an optical signal by an optical emitter like an optical source and encrypting it with DRPE. The DRPE applies two-phase modulations… More >

  • Open Access

    ARTICLE

    Computational Methods for Non-Linear Equations with Some Real-World Applications and Their Graphical Analysis

    Amir Naseem1, M.A. Rehman1, Thabet Abdeljawad2,3,4,*

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 805-819, 2021, DOI:10.32604/iasc.2021.019164

    Abstract In this article, we propose some novel computational methods in the form of iteration schemes for computing the roots of non-linear scalar equations in a new way. The construction of these iteration schemes is purely based on exponential series expansion. The convergence criterion of the suggested schemes is also given and certified that the newly developed iteration schemes possess quartic convergence order. To analyze the suggested schemes numerically, several test examples have been given and then solved. These examples also include some real-world problems such as van der Wall’s equation, Plank’s radiation law and kinetic problem equation whose numerical results… More >

Displaying 1201-1210 on page 121 of 1767. Per Page