Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    Low Complexity Decoding Algorithm for Uplink SCMA Based on Aerial Spherical Decoding

    Xiaohong Ji1, Junjun Du1, Guoqing Jia1,*, Weidong Fang2,3

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 737-746, 2021, DOI:10.32604/iasc.2021.013009

    Abstract As a new non-orthogonal multiple access technology for 5G massive machine type communication scenario, the sparse code multiple access (SCMA) has greatly improved the spectrum efficiency due to the high connection density. SCMA combines QAM (Quadrature Amplitude Modulation) modulation and sparse spreading into a codebook set to obtain forming gain. The user binary bit data is directly mapped into multi-dimensional codewords in the transmitter. The receiver uses the message passing algorithm (MPA) for multi-user detection to achieve efficient decoding. However, MPA is a good solution for SCMA, though its high complexity limits the application in practical systems. In order to… More >

  • Open Access

    ARTICLE

    Secure and Energy Efficient Data Transmission Model for WSN

    Anuj Kumar Singh1, Mohammed Alshehri2,*, Shashi Bhushan3, Manoj Kumar3, Osama Alfarraj4, Kamal Raj Pardarshani5

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 761-769, 2021, DOI:10.32604/iasc.2021.012806

    Abstract Wireless sensor networks (WSNs) have been used in numerous delicate checking, observation, and surveillance systems that use sensitive data. When a WSN utilizes various data clustering techniques, data is moved to the cluster head (CH) of the corresponding cluster area. Cluster Head further communicates the information to the sink node. In a WSN, a network owner (NO) does not validate a sensor before connecting to the network, so faulty nodes may likely attach to the network to sense the data and attempt to release the information to unauthorized persons. Further, a malicious node may become a mobile node (MN) equipped… More >

  • Open Access

    ARTICLE

    Maximizing Throughput in Wireless Multimedia Sensor Network using Soft Computing Techniques

    Krishnan Muthumayil1,*, Thangaiyan Jayasankar2, Nagappan Krishnaraj3, Mohamed Yacin Sikkandar4, Prakash Nattanmai Balasubramanian5, Chokkalingam Bharatiraja6

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 771-784, 2021, DOI:10.32604/iasc.2021.012462

    Abstract Wireless Multimedia Sensor Networks (WMSN) provides valuable information for scalar data, images, audio, and video processing in monitoring and surveillance applications. Multimedia streaming, however, is highly challenging for networks as energy restriction sensor nodes limit the potential data transmission bandwidth and lead to reduced throughput. WMSN’s two key design challenges, which can be achieved by the clustering process, are energy efficiency and throughput maximization. The use of the clustering technique helps to organise the sensor nodes into clusters, and between each cluster a cluster head (CH) will be chosen. This paper introduces a new Artificial Fish Swarm Optimization Algorithm (AFSA)… More >

  • Open Access

    ARTICLE

    Mammographic Image Classification Using Deep Neural Network for Computer-Aided Diagnosis

    Charles Arputham1,*, Krishnaraj Nagappan2, Lenin Babu Russeliah3, AdalineSuji Russeliah4

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 747-759, 2021, DOI:10.32604/iasc.2021.012077

    Abstract Breast cancer detection is a crucial topic in the healthcare sector. Breast cancer is a major reason for the increased mortality rate in recent years among women, specifically in developed and underdeveloped countries around the world. The incidence rate is less in India than in developed countries, but awareness must be increased. This paper focuses on an efficient deep learning-based diagnosis and classification technique to detect breast cancer from mammograms. The model includes preprocessing, segmentation, feature extraction, and classification. At the initial level, Laplacian filtering is applied to identify the portions of edges in mammogram images that are highly sensitive… More >

  • Open Access

    ARTICLE

    Computer Vision Based Robotic Arm Controlled Using Interactive GUI

    Muhatasim Intisar1, Mohammad Monirujjaman Khan1,*, Mohammad Rezaul Islam1, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 533-550, 2021, DOI:10.32604/iasc.2021.015482

    Abstract This paper presents the design and implementation of a robotic vision system operated using an interactive Graphical User Interface (GUI) application. As robotics continue to become a more integral part of the industrial complex, there is a need for automated systems that require minimal to no user training to operate. With this motivation in mind, the system is designed so that a beginner user can operate the device with very little instruction. The application allows users to determine their desired object, which will be picked up and placed by a robotic arm into the target location. The application allows users… More >

  • Open Access

    ARTICLE

    Healthcare Device Security: Insights and Implications

    Wajdi Alhakami1, Abdullah Baz2, Hosam Alhakami3, Masood Ahmad4, Raees Ahmad Khan4,*

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 409-424, 2021, DOI:10.32604/iasc.2021.015351

    Abstract Healthcare devices play an essential role in tracking and managing patient’s safety. However, the complexities of healthcare devices often remain ambiguous due to hardware, software, or the interoperable healthcare system problems. There are essentially two critical factors for targeting healthcare: First, healthcare data is the most valuable entity on the dark web; and the second, it is the easiest to hack. Data pilferage has become a major hazard for healthcare organizations as the hackers now demand ransom and threaten to disclose the sensitive data if not paid within the stipulated timeline. The present study enlists a thorough research on the… More >

  • Open Access

    ARTICLE

    Optimal Eighth-Order Solver for Nonlinear Equations with Applications in Chemical Engineering

    Obadah Said Solaiman, Ishak Hashim*

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 379-390, 2021, DOI:10.32604/iasc.2021.015285

    Abstract A new iterative technique for nonlinear equations is proposed in this work. The new scheme is of three steps, of which the first two steps are based on the sixth-order modified Halley’s method presented by the authors, and the last is a Newton step, with suitable approximations for the first derivatives appeared in the new scheme. The eighth-order of convergence of the new method is proved via Mathematica code. Every iteration of the presented scheme needs the evaluation of three functions and one first derivative. Therefore, the scheme is optimal in the sense of Kung-Traub conjecture. Several test nonlinear problems… More >

  • Open Access

    ARTICLE

    Live Data Analytics with IoT Intelligence-Sensing System in Public Transportation for COVID-19 Pandemic

    Abdullah Alamri1,*, Sultan Alamri2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 441-452, 2021, DOI:10.32604/iasc.2021.015198

    Abstract The COVID-19 pandemic has presented an unprecedented challenge to the entire world. It is a humanitarian crisis on a global scale. The virus continues to spread throughout nations, putting health systems under enormous pressure in the battle to save lives. With this growing crisis, companies and researchers worldwide are searching for ways to overcome the challenges associated with this virus. Also, the transport sector will play a critical role in revitalizing economies while simultaneously containing the spread of COVID-19. As the virus is still circulating, the only solution is to redesign public transportation to make people feel safe. In this… More >

  • Open Access

    ARTICLE

    Device Security Assessment of Internet of Healthcare Things

    Abdulaziz Attaallah1, Masood Ahmad2, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 593-603, 2021, DOI:10.32604/iasc.2021.015092

    Abstract Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients’ data. Infringement of patients’ data is not only a violation of privacy but can also jeopardize patients’ health if the health records are tampered with. Once the device has been intruded upon, attackers can not only change the… More >

  • Open Access

    ARTICLE

    Ontology-Based Verification of UML Class Model XOR Constraint and Dependency Relationship Constraints

    Asadullah Shaikh1,*, Abdul Hafeez2, M. A. Elmagzoub1, Abdullah Alghamdi1, Ansar Siddique3, Basit Shahzad4

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 565-579, 2021, DOI:10.32604/iasc.2021.015071

    Abstract Unified Modeling Language (UML) models are considered important artifacts of model-driven engineering (MDE). This can automatically transform models to other paradigms and programming languages. If a model has bugs, then MDE can transfer these to a new code. The class model is a key component of UML that is used in analysis and design. Without a formal foundation, UML can create only graphical diagrams, making it impossible to verify properties such as satisfiability, consistency and consequences. Different techniques have been used to verify UML class models, but these do not support some important components. This paper transforms and verifies unsupported… More >

Displaying 1431-1440 on page 144 of 1781. Per Page