Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Resource Based Automatic Calibration System (RBACS) Using Kubernetes Framework

    Tahir Alyas1, Nadia Tabassum2, Muhammad Waseem Iqbal3,*, Abdullah S. Alshahrani4, Ahmed Alghamdi5, Syed Khuram Shahzad6

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1165-1179, 2023, DOI:10.32604/iasc.2023.028815

    Abstract Kubernetes, a container orchestrator for cloud-deployed applications, allows the application provider to scale automatically to match the fluctuating intensity of processing demand. Container cluster technology is used to encapsulate, isolate, and deploy applications, addressing the issue of low system reliability due to interlocking failures. Cloud-based platforms usually entail users define application resource supplies for eco container virtualization. There is a constant problem of over-service in data centers for cloud service providers. Higher operating costs and incompetent resource utilization can occur in a waste of resources. Kubernetes revolutionized the orchestration of the container in the cloud-native age. It can adaptively manage… More >

  • Open Access

    ARTICLE

    Minimizing Total Tardiness in a Two-Machine Flowshop Scheduling Problem with Availability Constraints

    Mohamed Ali Rakrouki1,2,*, Abeer Aljohani1, Nawaf Alharbe1, Abdelaziz Berrais2, Talel Ladhari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1119-1134, 2023, DOI:10.32604/iasc.2023.028604

    Abstract In this paper, we consider the problem of minimizing the total tardiness in a deterministic two-machine permutation flowshop scheduling problem subject to release dates of jobs and known unavailability periods of machines. The theoretical and practical importance of minimizing tardiness in flowshop scheduling environment has motivated us to investigate and solve this interested two-machine scheduling problem. Methods that solve this important optimality criterion in flowshop environment are mainly heuristics. In fact, despite the -hardness in the strong sense of the studied problem, to the best of our knowledge there are no approximate algorithms (constructive heuristics or metaheuristics) or an algorithm… More >

  • Open Access

    ARTICLE

    Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography

    B. Murugeshwari1,*, D. Selvaraj2, K. Sudharson3, S. Radhika4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 839-851, 2023, DOI:10.32604/iasc.2023.028548

    Abstract Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique that protects the privacy of individual data while mining those data. The most significant task entails obtaining data from numerous remote databases. Mining algorithms can obtain sensitive information once the data is in the data warehouse. Many traditional algorithms/techniques promise to provide safe data transfer, storing, and retrieving over the cloud platform. These strategies are primarily concerned with protecting the privacy of user data. This study aims to present data mining with privacy protection (DMPP) using precise elliptic curve cryptography (PECC), which builds… More >

  • Open Access

    ARTICLE

    Qualitative Abnormalities of Peripheral Blood Smear Images Using Deep Learning Techniques

    G. Arutperumjothi1,*, K. Suganya Devi2, C. Rani3, P. Srinivasan4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1069-1086, 2023, DOI:10.32604/iasc.2023.028423

    Abstract In recent years, Peripheral blood smear is a generic analysis to assess the person’s health status. Manual testing of Peripheral blood smear images are difficult, time-consuming and is subject to human intervention and visual error. This method encouraged for researchers to present algorithms and techniques to perform the peripheral blood smear analysis with the help of computer-assisted and decision-making techniques. Existing CAD based methods are lacks in attaining the accurate detection of abnormalities present in the images. In order to mitigate this issue Deep Convolution Neural Network (DCNN) based automatic classification technique is introduced with the classification of eight groups… More >

  • Open Access

    ARTICLE

    An Efficient ResNetSE Architecture for Smoking Activity Recognition from Smartwatch

    Narit Hnoohom1, Sakorn Mekruksavanich2, Anuchit Jitpattanakul3,4,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1245-1259, 2023, DOI:10.32604/iasc.2023.028290

    Abstract Smoking is a major cause of cancer, heart disease and other afflictions that lead to early mortality. An effective smoking classification mechanism that provides insights into individual smoking habits would assist in implementing addiction treatment initiatives. Smoking activities often accompany other activities such as drinking or eating. Consequently, smoking activity recognition can be a challenging topic in human activity recognition (HAR). A deep learning framework for smoking activity recognition (SAR) employing smartwatch sensors was proposed together with a deep residual network combined with squeeze-and-excitation modules (ResNetSE) to increase the effectiveness of the SAR framework. The proposed model was tested against… More >

  • Open Access

    ARTICLE

    Artificial Potential Field Incorporated Deep-Q-Network Algorithm for Mobile Robot Path Prediction

    A. Sivaranjani1,*, B. Vinod2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1135-1150, 2023, DOI:10.32604/iasc.2023.028126

    Abstract Autonomous navigation of mobile robots is a challenging task that requires them to travel from their initial position to their destination without collision in an environment. Reinforcement Learning methods enable a state action function in mobile robots suited to their environment. During trial-and-error interaction with its surroundings, it helps a robot to find an ideal behavior on its own. The Deep Q Network (DQN) algorithm is used in TurtleBot 3 (TB3) to achieve the goal by successfully avoiding the obstacles. But it requires a large number of training iterations. This research mainly focuses on a mobility robot’s best path prediction… More >

  • Open Access

    ARTICLE

    Frequency Control Approach and Load Forecasting Assessment for Wind Systems

    K. Sukanya*, P. Vijayakumar

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 971-982, 2023, DOI:10.32604/iasc.2023.028047

    Abstract Frequency deviation has to be controlled in power generation units when there are fluctuations in system frequency. With several renewable energy sources, wind energy forecasting is majorly focused in this work which is a tough task due to its variations and uncontrollable nature. Whenever there is a mismatch between generation and demand, the frequency deviation may arise from the actual frequency 50 Hz (in India). To mitigate the frequency deviation issue, it is necessary to develop an effective technique for better frequency control in wind energy systems. In this work, heuristic Fuzzy Logic Based Controller (FLC) is developed for providing… More >

  • Open Access

    ARTICLE

    Enhanced Sentiment Analysis Algorithms for Multi-Weight Polarity Selection on Twitter Dataset

    Ayman Mohamed Mostafa*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1015-1034, 2023, DOI:10.32604/iasc.2023.028041

    Abstract Sentiment analysis is based on the orientation of user attitudes and satisfaction towards services and subjects. Different methods and techniques have been introduced to analyze sentiments for obtaining high accuracy. The sentiment analysis accuracy depends mainly on supervised and unsupervised mechanisms. Supervised mechanisms are based on machine learning algorithms that achieve moderate or high accuracy but the manual annotation of data is considered a time-consuming process. In unsupervised mechanisms, a lexicon is constructed for storing polarity terms. The accuracy of analyzing data is considered moderate or low if the lexicon contains small terms. In addition, most research methodologies analyze datasets… More >

  • Open Access

    ARTICLE

    Encryption with User Authentication Model for Internet of Medical Things Environment

    K. S. Riya1, R. Surendran2,*, Carlos Andrés Tavera Romero3, M. Sadish Sendil4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 507-520, 2023, DOI:10.32604/iasc.2023.027779

    Abstract Internet of Medical Things (IoMT) enabled e-healthcare has the potential to greately improve conventional healthcare services significantly. However, security and privacy become major issues of IoMT because of the restricted processing abilities, storage, and energy constraints of the sensors. Therefore, it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors. In order to ensure security on sensitive medical data, effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers. In this view, this study designs an effective metaheuristic optimization based encryption with user authentication (EMOE-UA) technique for IoMT… More >

  • Open Access

    ARTICLE

    Deep Learning Based Autonomous Transport System for Secure Vehicle and Cargo Matching

    T. Shanthi1,*, M. Ramprasath2, A. Kavitha3, T. Muruganantham4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 957-969, 2023, DOI:10.32604/iasc.2023.027775

    Abstract The latest 6G improvements secured autonomous driving's realism in Intelligent Autonomous Transport Systems (IATS). Despite the IATS's benefits, security remains a significant challenge. Blockchain technology has grown in popularity as a means of implementing safe, dependable, and decentralised independent IATS systems, allowing for more utilisation of legacy IATS infrastructures and resources, which is especially advantageous for crowdsourcing technologies. Blockchain technology can be used to address security concerns in the IATS and to aid in logistics development. In light of the inadequacy of reliance and inattention to rights created by centralised and conventional logistics systems, this paper discusses the creation of… More >

Displaying 611-620 on page 62 of 1767. Per Page