Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform

    Hesham Alhumyani*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2933-2945, 2023, DOI:10.32604/iasc.2023.034689

    Abstract This paper introduces an efficient image cryptography system. The proposed image cryptography system is based on employing the two-dimensional (2D) chaotic henon map (CHM) in the Discrete Fourier Transform (DFT). The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures. In the proposed DFT-based CHM image cryptography, the confusion is employed using the CHM while the diffusion is realized using the DFT. So, the proposed DFT-based CHM image cryptography achieves both confusion and diffusion characteristics. The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Approach for PM2.5 Concentration Prediction in Smart Environmental Monitoring

    Minh Thanh Vo1, Anh H. Vo2, Huong Bui3, Tuong Le4,5,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3029-3041, 2023, DOI:10.32604/iasc.2023.034636

    Abstract Nowadays, air pollution is a big environmental problem in developing countries. In this problem, particulate matter 2.5 (PM2.5) in the air is an air pollutant. When its concentration in the air is high in developing countries like Vietnam, it will harm everyone’s health. Accurate prediction of PM2.5 concentrations can help to make the correct decision in protecting the health of the citizen. This study develops a hybrid deep learning approach named PM25-CBL model for PM2.5 concentration prediction in Ho Chi Minh City, Vietnam. Firstly, this study analyzes the effects of variables on PM2.5 concentrations in Air Quality HCMC dataset. Only… More >

  • Open Access

    ARTICLE

    Gender Identification Using Marginalised Stacked Denoising Autoencoders on Twitter Data

    Badriyya B. Al-onazi1, Mohamed K. Nour2, Hassan Alshamrani3, Mesfer Al Duhayyim4,*, Heba Mohsen5, Amgad Atta Abdelmageed6, Gouse Pasha Mohammed6, Abu Sarwar Zamani6

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2529-2544, 2023, DOI:10.32604/iasc.2023.034623

    Abstract Gender analysis of Twitter could reveal significant socio-cultural differences between female and male users. Efforts had been made to analyze and automatically infer gender formerly for more commonly spoken languages’ content, but, as we now know that limited work is being undertaken for Arabic. Most of the research works are done mainly for English and least amount of effort for non-English language. The study for Arabic demographic inference like gender is relatively uncommon for social networking users, especially for Twitter. Therefore, this study aims to design an optimal marginalized stacked denoising autoencoder for gender identification on Arabic Twitter (OMSDAE-GIAT) model.… More >

  • Open Access

    ARTICLE

    An Endogenous Feedback and Entropy Analysis in Machine Learning Model for Stock’s Return Forecast

    Edson Vinicius Pontes Bastos1,*, Jorge Junio Moreira Antunes2, Lino Guimarães Marujo1, Peter Fernandes Wanke2, Roberto Ivo da Rocha Lima Filho1

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3175-3190, 2023, DOI:10.32604/iasc.2023.034582

    Abstract Stock markets exhibit Brownian movement with random, non-linear, uncertain, evolutionary, non-parametric, nebulous, chaotic characteristics and dynamism with a high degree of complexity. Developing an algorithm to predict returns for decision-making is a challenging goal. In addition, the choice of variables that will serve as input to the model represents a non-triviality, since it is possible to observe endogeneity problems between the predictor and the predicted variables. Thus, the goal is to analyze the endogenous origin of the stock return prediction model based on technical indicators. For this, we structure a feed-forward neural network. We evaluate the endogenous feedback between the… More >

  • Open Access

    ARTICLE

    Detection of Phishing in Internet-of-Things Using Hybrid Deep Belief Network

    S. Ashwini*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3043-3056, 2023, DOI:10.32604/iasc.2023.034551

    Abstract Increase in the use of internet of things owned devices is one of the reasons for increased network traffic. While connecting the smart devices with publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system. The Phishing is the slow and resilient attack stacking techniques probe the users. The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm (NWAT). Though Predictive mapping, Predictive Validation and Predictive analysis mechanism is developed. For the test purpose… More >

  • Open Access

    ARTICLE

    Data-Driven Probabilistic System for Batsman Performance Prediction in a Cricket Match

    Fawad Nasim1,2,*, Muhammad Adnan Yousaf1, Sohail Masood1,2, Arfan Jaffar1,2, Muhammad Rashid3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2865-2877, 2023, DOI:10.32604/iasc.2023.034258

    Abstract Batsmen are the backbone of any cricket team and their selection is very critical to the team’s success. A good batsman not only scores run but also provides stability to the team’s innings. The most important factor in selecting a batsman is their ability to score runs. It is a generally accepted notion that the future performance of a batsman can be predicted by observing and analyzing their past record. This hypothesis is based on the fact that a player’s batting average is generally considered to be a good indicator of their future performance. We proposed a data-driven probabilistic system… More >

  • Open Access

    ARTICLE

    Approximations by Ideal Minimal Structure with Chemical Application

    Rodyna A. Hosny1, Radwan Abu-Gdairi2, Mostafa K. El-Bably3,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3073-3085, 2023, DOI:10.32604/iasc.2023.034234

    Abstract The theory of rough set represents a non-statistical methodology for analyzing ambiguity and imprecise information. It can be characterized by two crisp sets, named the upper and lower approximations that are used to determine the boundary region and accurate measure of any subset. This article endeavors to achieve the best approximation and the highest accuracy degree by using the minimal structure approximation space via ideal . The novel approach (indicated by ) modifies the approximation space to diminish the boundary region and enhance the measure of accuracy. The suggested method is more accurate than Pawlak’s and EL-Sharkasy techniques. Via illustrated… More >

  • Open Access

    ARTICLE

    Novel Vegetation Mapping Through Remote Sensing Images Using Deep Meta Fusion Model

    S. Vijayalakshmi*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2915-2931, 2023, DOI:10.32604/iasc.2023.034165

    Abstract Preserving biodiversity and maintaining ecological balance is essential in current environmental conditions. It is challenging to determine vegetation using traditional map classification approaches. The primary issue in detecting vegetation pattern is that it appears with complex spatial structures and similar spectral properties. It is more demandable to determine the multiple spectral analyses for improving the accuracy of vegetation mapping through remotely sensed images. The proposed framework is developed with the idea of ensembling three effective strategies to produce a robust architecture for vegetation mapping. The architecture comprises three approaches, feature-based approach, region-based approach, and texture-based approach for classifying the vegetation… More >

  • Open Access

    ARTICLE

    Generalized Jaccard Similarity Based Recurrent DNN for Virtualizing Social Network Communities

    R. Gnanakumari1,*, P. Vijayalakshmi2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2719-2730, 2023, DOI:10.32604/iasc.2023.034145

    Abstract In social data analytics, Virtual Community (VC) detection is a primary challenge in discovering user relationships and enhancing social recommendations. VC formation is used for personal interaction between communities. But the usual methods didn’t find the Suspicious Behaviour (SB) needed to make a VC. The Generalized Jaccard Suspicious Behavior Similarity-based Recurrent Deep Neural Network Classification and Ranking (GJSBS-RDNNCR) Model addresses these issues. The GJSBS-RDNNCR model comprises four layers for VC formation in Social Networks (SN). In the GJSBS-RDNNCR model, the SN is given as an input at the input layer. After that, the User’s Behaviors (UB) are extracted in the… More >

  • Open Access

    ARTICLE

    Deep Learning Driven Arabic Text to Speech Synthesizer for Visually Challenged People

    Mrim M. Alnfiai1,2, Nabil Almalki1,3, Fahd N. Al-Wesabi4,*, Mesfer Alduhayyem5, Anwer Mustafa Hilal6, Manar Ahmed Hamza6

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2639-2652, 2023, DOI:10.32604/iasc.2023.034069

    Abstract Text-To-Speech (TTS) is a speech processing tool that is highly helpful for visually-challenged people. The TTS tool is applied to transform the texts into human-like sounds. However, it is highly challenging to accomplish the TTS outcomes for the non-diacritized text of the Arabic language since it has multiple unique features and rules. Some special characters like gemination and diacritic signs that correspondingly indicate consonant doubling and short vowels greatly impact the precise pronunciation of the Arabic language. But, such signs are not frequently used in the texts written in the Arabic language since its speakers and readers can guess them… More >

Displaying 251-260 on page 26 of 1767. Per Page