Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483

    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the Quantum Elliptical Curve Cryptography (QECC)… More >

  • Open Access

    ARTICLE

    Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins

    M. Kavitha1, B. Sankara Babu2, B. Sumathy3, T. Jackulin4, N. Ramkumar5, A. Manimaran6, Ranjan Walia7, S. Neelakandan8,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1571-1586, 2022, DOI:10.32604/iasc.2022.026385

    Abstract With the advancement of communication and computing technologies, multimedia technologies involving video and image applications have become an important part of the information society and have become inextricably linked to people's daily productivity and lives. Simultaneously, there is a growing interest in super-resolution (SR) video reconstruction techniques. At the moment, the design of digital twins in video computing and video reconstruction is based on a number of difficult issues. Although there are several SR reconstruction techniques available in the literature, most of the works have not considered the spatio-temporal relationship between the video frames. With this motivation in mind, this… More >

  • Open Access

    ARTICLE

    Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems

    P. Ramadevi1,*, K. N. Baluprithviraj2, V. Ayyem Pillai3, Kamalraj Subramaniam4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2067-2081, 2022, DOI:10.32604/iasc.2022.026377

    Abstract Cyber Physical Systems (CPSs) are network systems containing cyber (computation, communication) and physical (sensors, actuators) components that interact with each other through feedback loop with the help of human intervention. The dynamic and disseminated characteristics of CPS environment makes it vulnerable to threats that exist in virtualization process. Due to this, several security issues are presented in CPS. In order to address the challenges, there is a need exists to extend the conventional security solutions such as Intrusion Detection Systems (IDS) to handle high speed network data traffic and adaptive network pattern in cloud. Additionally, the identification of feasible network… More >

  • Open Access

    ARTICLE

    Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks

    Maganti Srinivas*, M. Ramesh Patnaik

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1755-1767, 2022, DOI:10.32604/iasc.2022.026355

    Abstract In recent times, Mobile Ad Hoc Network (MANET) becomes a familiar research field owing to its applicability in distinct scenarios. MANET comprises a set of autonomous mobile nodes which independently move and send data through wireless channels. Energy efficiency is considered a critical design issue in MANET and can be addressed by the use of the clustering process. Clustering is treated as a proficient approach, which partitions the mobile nodes into groups called clusters and elects a node as cluster head (CH). On the other hand, the nature of wireless links poses security as a major design issue. Therefore, this… More >

  • Open Access

    ARTICLE

    Resource Allocation Using Phase Change Hyper Switching Algorithm in the Cloud Environment

    J. Praveenchandar1,*, A. Tamilarasi2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1839-1850, 2022, DOI:10.32604/iasc.2022.026354

    Abstract Cloud computing is one of the emerging technology; it provides various services like Software as a Service, Platform as a Service, and Infrastructure as a Service on demand. It reduces the cost of traditional computing by renting the resources instead of buying them for a huge cost. The usage of cloud resources is increasing day by day. Due to the heavy workload, all users cannot get uninterrupted service at some time. And the response time of some users also gets increased. Resource allocation is one of the primary issues of a cloud environment, one of the challenging problems is improving… More >

  • Open Access

    ARTICLE

    Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks

    Ashit Kumar Dutta1,*, Yasser Albagory2, Farhan M. Obesat3, Anas Waleed Abulfaraj4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1659-1674, 2022, DOI:10.32604/iasc.2022.026263

    Abstract Energy is considered a valuable source in wireless sensor networks (WSN) for effectively improving the survivability of the network. The non-uniform dispersion of load in the network causes unbalanced energy dissipation which can result in network interruption. The route selection process can be considered as an optimization problem and is solved by utilize of artificial intelligence (AI) techniques. This study introduces an energy efficient chaotic krill herd algorithm with adaptive neuro fuzzy inference system based routing (EECKHA-ANFIS) protocol for WSN. The goal of the EECKHA-ANFIS method is for deriving a better set of routes to destination in such a way… More >

  • Open Access

    ARTICLE

    Efficient Medical Image Encryption Framework against Occlusion Attack

    May A. Al-Otaibi1,*, Hesham Alhumyani1, Saleh Ibrahim2, Alaa M. Abbas2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1523-1536, 2022, DOI:10.32604/iasc.2022.026161

    Abstract Image encryption has attracted a lot of interest as an important security application for protecting confidential image data against unauthorized access. An adversary with the power to manipulate cipher image data can crop part of the image out to prevent decryption or render the decrypted image useless. This is known as the occlusion attack. In this paper, we address a vulnerability to the occlusion attack identified in the medical image encryption framework recently proposed in []. We propose adding a pixel scrambling phase to the framework and show through simulation that the extended framework effectively mitigates the occlusion attack while… More >

  • Open Access

    ARTICLE

    Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network

    M. Vanitha1,*, C. T. Kalaivani1, J. Kirubakaran2, R. Praveena2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1617-1627, 2022, DOI:10.32604/iasc.2022.026154

    Abstract Hybrid networks are a rising innovation for maximizing wireless network coverage without any extra need for resources. This research paper focuses on effective channel allocation for Wireless Fidelity (Wi-Fi) and cellular networks. As a novel work in this area, the Beyond Access Point Coverage (BAPC) has been presented for adequately installing cellular networks on the unlicensed Wi-Fi spectrum. Networks can straightforwardly exploit Wi-Fi distributed coordination. Our BAPC commits and permits a combat-free period to cellular network subscribers and customary Wi-Fi subscribers to encourage concurrence. This research focuses on the maximization of combined subscriber affiliation and frequency channel distribution to improve… More >

  • Open Access

    ARTICLE

    Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm

    N. Sureka*, K. Gunaseelan

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1893-1906, 2022, DOI:10.32604/iasc.2022.026098

    Abstract Cognitive Radio (CR) is a competent technique devised to smart sense its surroundings and address the spectrum scarcity issues in wireless communication networks. The Primary User Emulation Attack (PUEA) is one of the most serious security threats affecting the performance of CR networks. In this paper, machine learning (ML) principles have been applied to detect PUEA with superior decision-making ability. To distinguish the attacking nodes, Reinforced Learning (RL) and Extreme Machine Learning (EML-RL) algorithms are proposed to be based on Reinforced Learning (EML). Various dynamic parameters like estimation error, attack detection efficiency, attack estimation rate, and learning rate have been… More >

  • Open Access

    ARTICLE

    Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval

    Anil Sharma1,*, Suresh Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1989-2005, 2022, DOI:10.32604/iasc.2022.026095

    Abstract Information Retrieval (IR) systems are developed to fetch the most relevant content matching the user’s information needs from a pool of information. A user expects to get IR results based on the conceptual contents of the query rather than keywords. But traditional IR approaches index documents based on the terms that they contain and ignore semantic descriptions of document contents. This results in a vocabulary gap when queries and documents use different terms to describe the same concept. As a solution to this problem and to improve the performance of IR systems, we have designed a Shallow Neural Network and… More >

Displaying 721-730 on page 73 of 1781. Per Page