Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Sport-Related Activity Recognition from Wearable Sensors Using Bidirectional GRU Network

    Sakorn Mekruksavanich1, Anuchit Jitpattanakul2,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1907-1925, 2022, DOI:10.32604/iasc.2022.027233

    Abstract Numerous learning-based techniques for effective human activity recognition (HAR) have recently been developed. Wearable inertial sensors are critical for HAR studies to characterize sport-related activities. Smart wearables are now ubiquitous and can benefit people of all ages. HAR investigations typically involve sensor-based evaluation. Sport-related activities are unpredictable and have historically been classified as complex, with conventional machine learning (ML) algorithms applied to resolve HAR issues. The efficiency of machine learning techniques in categorizing data is limited by the human-crafted feature extraction procedure. A deep learning model named MBiGRU (multimodal bidirectional gated recurrent unit) neural network was proposed to recognize everyday… More >

  • Open Access

    ARTICLE

    Deep Learning Based Residual Network Features for Telugu Printed Character Recognition

    Vijaya Krishna Sonthi1,*, S. Nagarajan1, N. Krishnaraj2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1725-1736, 2022, DOI:10.32604/iasc.2022.026940

    Abstract In India, Telugu is one of the official languages and it is a native language in the Andhra Pradesh and Telangana states. Although research on Telugu optical character recognition (OCR) began in the early 1970s, it is still necessary to develop effective printed character recognition for the Telugu language. OCR is a technique that aids machines in identifying text. The main intention in the classifier design of the OCR systems is supervised learning where the training process takes place on the labeled dataset with numerous characters. The existing OCR makes use of patterns and correlations to differentiate words from other… More >

  • Open Access

    ARTICLE

    Smart Greenhouse Control via NB-IoT

    Wen-Tsai Sung1, Ching-Hao Weng1, Sung-Jung Hsiao2,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1971-1988, 2022, DOI:10.32604/iasc.2022.026927

    Abstract The Internet of Things (IoT) has flourished in recent years, which brings convenience to people’s lives, improves the quality of life, allows more effectively managing and maximizing benefits in industry, and improves weather predictions as the impact of global warming has complicated traditional methods to infer the weather. To this end, agriculture has also given more attention to greenhouse cultivation. In the early days of industrial research, Wi-Fi and ZigBee were used as short-or medium-distance communication technologies for transmissions in the network layer of the IoT architecture. Instead of long-distance communication technologies, such as LoRa and NB-IoT, the features of… More >

  • Open Access

    ARTICLE

    Multi-Objective Immune Algorithm for Internet of Vehicles for Data Offloading

    B. Gomathi1, S. T. Suganthi2,*, T. N. Prabhu3, Andriy Kovalenko4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1851-1860, 2022, DOI:10.32604/iasc.2022.026779

    Abstract On the Internet of Vehicle (IoV) devices, offloading data is the major problem because massive amounts of data generate energy consumption, and the execution cost is high. At present, accidents traffic management is highly prominent due to increased vehicles among the population. IoV is the only technology to help the transport system effectively. This data outreach the memory also has high energy consumption, and the storage cost is high. To overcome these issues, a Mobility aware Offloading scheme with Multi-Objective Immune Optimization algorithm (MOS-MOIO) is used in the cloud storage. The data is generated from the online sensor system. The… More >

  • Open Access

    ARTICLE

    Adaptive Multicale Transformation Run-Length Code-Based Test Data Compression in Benchmark Circuits

    P. Thilagavathi*, S. Karthikeyan

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2035-2050, 2022, DOI:10.32604/iasc.2022.026651

    Abstract Test data volume reduction and power consumption during testing time outlines are two main problems for Very Large Scale Integration (VLSI) gadgets. Most the code-based arrangements have been utilized to diminish test data volume, although the most notable way that test data volume is high. The switching action that happens between the test carriers leads would expand power consumption. This work presents a compression/decompression methodology for limiting the amount of test data that should be kept on a tester and conveyed to each center in a System on a Chip (SOC) during a test utilizing the Adaptive Multiscale Transformation Run… More >

  • Open Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628

    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short Term Memory with Red Deer… More >

  • Open Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483

    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the Quantum Elliptical Curve Cryptography (QECC)… More >

  • Open Access

    ARTICLE

    Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins

    M. Kavitha1, B. Sankara Babu2, B. Sumathy3, T. Jackulin4, N. Ramkumar5, A. Manimaran6, Ranjan Walia7, S. Neelakandan8,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1571-1586, 2022, DOI:10.32604/iasc.2022.026385

    Abstract With the advancement of communication and computing technologies, multimedia technologies involving video and image applications have become an important part of the information society and have become inextricably linked to people's daily productivity and lives. Simultaneously, there is a growing interest in super-resolution (SR) video reconstruction techniques. At the moment, the design of digital twins in video computing and video reconstruction is based on a number of difficult issues. Although there are several SR reconstruction techniques available in the literature, most of the works have not considered the spatio-temporal relationship between the video frames. With this motivation in mind, this… More >

  • Open Access

    ARTICLE

    Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems

    P. Ramadevi1,*, K. N. Baluprithviraj2, V. Ayyem Pillai3, Kamalraj Subramaniam4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2067-2081, 2022, DOI:10.32604/iasc.2022.026377

    Abstract Cyber Physical Systems (CPSs) are network systems containing cyber (computation, communication) and physical (sensors, actuators) components that interact with each other through feedback loop with the help of human intervention. The dynamic and disseminated characteristics of CPS environment makes it vulnerable to threats that exist in virtualization process. Due to this, several security issues are presented in CPS. In order to address the challenges, there is a need exists to extend the conventional security solutions such as Intrusion Detection Systems (IDS) to handle high speed network data traffic and adaptive network pattern in cloud. Additionally, the identification of feasible network… More >

  • Open Access

    ARTICLE

    Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks

    Maganti Srinivas*, M. Ramesh Patnaik

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1755-1767, 2022, DOI:10.32604/iasc.2022.026355

    Abstract In recent times, Mobile Ad Hoc Network (MANET) becomes a familiar research field owing to its applicability in distinct scenarios. MANET comprises a set of autonomous mobile nodes which independently move and send data through wireless channels. Energy efficiency is considered a critical design issue in MANET and can be addressed by the use of the clustering process. Clustering is treated as a proficient approach, which partitions the mobile nodes into groups called clusters and elects a node as cluster head (CH). On the other hand, the nature of wireless links poses security as a major design issue. Therefore, this… More >

Displaying 701-710 on page 71 of 1767. Per Page