Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Asaad Balla1, Mohammad Tahir2, Elfatih A. A. Elsheikh3, F. M. Suliman3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1345-1360, 2022, DOI:10.32604/iasc.2022.020801

    Abstract Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. The testbed is equipped with real-time attacks using in-house… More >

  • Open Access

    ARTICLE

    IoT and Machine Learning Based Stem Borer Pest Prediction

    Rana Muhammad Nadeem1, Arfan Jaffar2, Rana Muhammad Saleem3,*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1377-1392, 2022, DOI:10.32604/iasc.2022.020680

    Abstract Global climatic changes have severe impacts on agricultural productivity. Enhanced pest attacks on crops are one of the major impacts on sustainable developments in agriculture to come up with the needs of the ever-increasing human population. Early warning of a pest attack is important for Integrated Pest Management (IPM) activities to be effective. Early warning of pest attacks is also important for judicious use of pesticides for efficient use of resources for minimal impacts on the environment. Sugarcane is the major cash crop and is also severely affected by different types of pests. This study proposed stem borer attack prediction… More >

  • Open Access

    ARTICLE

    IIoT Framework Based ML Model to Improve Automobile Industry Product

    S. Gopalakrishnan1,*, M. Senthil Kumaran2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1435-1449, 2022, DOI:10.32604/iasc.2022.020660

    Abstract In the automotive industry, multiple predictive maintenance units run behind the scenes in every production process to support significant product development, particularly among Accessories Manufacturers (AMs). As a result, they wish to maintain a positive relationship with vehicle manufacturers by providing 100 percent quality assurances for accessories. This is only achievable if they implement an effective anticipatory strategy that prioritizes quality control before and after product development. To do this, many sensors devices are interconnected in the production area to collect operational data (humanity, viscosity, and force) continuously received from machines and sent to backend computers for control operations and… More >

  • Open Access

    ARTICLE

    Low Cost Autonomous Learning and Advising Smart Home Automation System

    Daniel Chioran*, Honoriu Valean

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1939-1952, 2022, DOI:10.32604/iasc.2022.020649

    Abstract In today’s world, more than ever before, we are fascinated and drawn towards smart autonomous devices that make our lives safer and more comfortable. Devices that aid in reducing our energy consumption are also highly appreciated but often quite expensive to buy. This context is favorable for developing an autonomous smart home automation system (SHAS) with energy-saving potential and low price, making it widely accessible. This paper presents the design and prototype implementation of such a low-cost micro-controller based autonomous SHAS that learns the resident’s work schedule and integrates a wide array of sensors and actuators to automatically control the… More >

  • Open Access

    ARTICLE

    Time-Efficient Fire Detection Convolutional Neural Network Coupled with Transfer Learning

    Hanan A. Hosni Mahmoud, Amal H. Alharbi, Norah S. Alghamdi*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1393-1403, 2022, DOI:10.32604/iasc.2022.020629

    Abstract The detection of fires in surveillance videos are usually done by utilizing deep learning. In Spite of the advances in processing power, deep learning methods usually need extensive computations and require high memory resources. This leads to restriction in real time fire detection. In this research, we present a time-efficient fire detection convolutional neural network coupled with transfer learning for surveillance systems. The model utilizes CNN architecture with reasonable computational time that is deemed possible for real time applications. At the same time, the model will not compromise accuracy for time efficiency by tuning the model with respect to fire… More >

  • Open Access

    ARTICLE

    Modeling the Spread of COVID-19 by Leveraging Machine and Deep Learning Models

    Muhammad Adnan1, Maryam Altalhi2, Ala Abdulsalam Alarood3, M.Irfan Uddin1,*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1857-1872, 2022, DOI:10.32604/iasc.2022.020606

    Abstract Corona Virus disease 2019 (COVID-19) has caused a worldwide pandemic of cough, fever, headache, body aches, and respiratory ailments. COVID- 19 has now become a severe disease and one of the leading causes of death globally. Modeling and prediction of COVID-19 have become inevitable as it has affected people worldwide. With the availability of a large-scale universal COVID-19 dataset, machine learning (ML) techniques and algorithms occur to be the best choice for the analysis, modeling, and forecasting of this disease. In this research study, we used one deep learning algorithm called Artificial Neural Network (ANN) and several ML algorithms such… More >

  • Open Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598

    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile traffic, perform account frauds, track… More >

  • Open Access

    ARTICLE

    Real Time Feature Extraction Deep-CNN for Mask Detection

    Hanan A. Hosni Mahmoud, Norah S. Alghamdi, Amal H. Alharbi*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1423-1434, 2022, DOI:10.32604/iasc.2022.020586

    Abstract COVID-19 pandemic outbreak became one of the serious threats to humans. As there is no cure yet for this virus, we have to control the spread of Coronavirus through precautions. One of the effective precautions as announced by the World Health Organization is mask wearing. Surveillance systems in crowded places can lead to detection of people wearing masks. Therefore, it is highly urgent for computerized mask detection methods that can operate in real-time. As for now, most countries demand mask-wearing in public places to avoid the spreading of this virus. In this paper, we are presenting an object detection technique… More >

  • Open Access

    ARTICLE

    Design of Higher Order Matched FIR Filter Using Odd and Even Phase Process

    V. Magesh1,*, N. Duraipandian2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1499-1510, 2022, DOI:10.32604/iasc.2022.020552

    Abstract The current research paper discusses the implementation of higher order-matched filter design using odd and even phase processes for efficient area and time delay reduction. Matched filters are widely used tools in the recognition of specified task. When higher order taps are implemented upon the transposed form of matched filters, it can enhance the image recognition application and its performance in terms of identification and accuracy. The proposed method i.e., odd and even phases’ process of FIR filter can reduce the number of multipliers and adders, used in existing system. The main advantage of using higher order tap-matched filter is… More >

  • Open Access

    ARTICLE

    Quantum Firefly Secure Routing for Fog Based Wireless Sensor Networks

    R. Dayana1,*, G. Maria Kalavathy2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1511-1528, 2022, DOI:10.32604/iasc.2022.020551

    Abstract Wireless Sensor Networks (WSNs) become an integral part of Internet of Things (IoT) and finds their applicability in several domains. As classical WSN faces several issues in service-based IoT applications, fog computing has been introduced in real-time, enabling local data processing and avoid raw data transmission to cloud servers. The Fog-based WSN generally involves advanced nodes, normal nodes, and some Fog Nodes (FN). Though the Fog-based WSN offers several benefits, there is a need to develop an effective trust-based secure routing protocol for data transmission among Cluster Heads (CHs) and FNs. In this view, this paper presents a Quantum Firefly… More >

Displaying 10501-10510 on page 1051 of 22233. Per Page