Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,334)
  • Open Access

    ARTICLE

    A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform

    Amishi Mahesh Kapadia*, P. Nithyanandam

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 537-552, 2023, DOI:10.32604/iasc.2023.027070

    Abstract Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image. We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform. The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload. By scrambling the cover image, Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.… More >

  • Open Access

    ARTICLE

    Intrusion Detection Using Ensemble Wrapper Filter Based Feature Selection with Stacking Model

    D. Karthikeyan1,*, V. Mohan Raj2, J. Senthilkumar2, Y. Suresh2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 645-659, 2023, DOI:10.32604/iasc.2023.027039

    Abstract The number of attacks is growing tremendously in tandem with the growth of internet technologies. As a result, protecting the private data from prying eyes has become a critical and tough undertaking. Many intrusion detection solutions have been offered by researchers in order to decrease the effect of these attacks. For attack detection, the prior system has created an SMSRPF (Stacking Model Significant Rule Power Factor) classifier. To provide creative instance detection, the SMSRPF combines the detection of trained classifiers such as DT (Decision Tree) and RF (Random Forest). Nevertheless, it does not generate any accurate findings that are adequate.… More >

  • Open Access

    ARTICLE

    An Intelligent Medical Expert System Using Temporal Fuzzy Rules and Neural Classifier

    Praveen Talari1,*, A. Suresh2, M. G. Kavitha3

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1053-1067, 2023, DOI:10.32604/iasc.2023.027024

    Abstract As per World Health Organization report which was released in the year of 2019, Diabetes claimed the lives of approximately 1.5 million individuals globally in 2019 and around 450 million people are affected by diabetes all over the world. Hence it is inferred that diabetes is rampant across the world with the majority of the world population being affected by it. Among the diabetics, it can be observed that a large number of people had failed to identify their disease in the initial stage itself and hence the disease level moved from Type-1 to Type-2. To avoid this situation, we… More >

  • Open Access

    ARTICLE

    An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform

    K. Meenakshi1,*, G. Maragatham2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 627-643, 2023, DOI:10.32604/iasc.2023.026961

    Abstract Deep Learning is one of the most popular computer science techniques, with applications in natural language processing, image processing, pattern identification, and various other fields. Despite the success of these deep learning algorithms in multiple scenarios, such as spam detection, malware detection, object detection and tracking, face recognition, and automatic driving, these algorithms and their associated training data are rather vulnerable to numerous security threats. These threats ultimately result in significant performance degradation. Moreover, the supervised based learning models are affected by manipulated data known as adversarial examples, which are images with a particular level of noise that is invisible… More >

  • Open Access

    ARTICLE

    Modeling Target Detection and Performance Analysis of Electronic Countermeasures for Phased Radar

    T. Jagadesh1,2, B. Sheela Rani3,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 449-463, 2023, DOI:10.32604/iasc.2023.026868

    Abstract Interference is a key factor in radar return misdetection. Strong interference might make it difficult to detect the signal or targets. When interference occurs in the sidelobes of the antenna pattern, Sidelobe Cancellation (SLC) and Sidelobe Blanking are two unique solutions to solve this problem (SLB). Aside from this approach, the probability of false alert and likelihood of detection are the most essential parameters in radar. The chance of a false alarm for any radar system should be minimal, and as a result, the probability of detection should be high. There are several interference cancellation strategies in the literature that… More >

  • Open Access

    ARTICLE

    Optimized ANFIS Model for Stable Clustering in Cognitive Radio Network

    C. Ambhika1,*, C. Murukesh2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 827-838, 2023, DOI:10.32604/iasc.2023.026832

    Abstract With the demand for wireless technology, Cognitive Radio (CR) technology is identified as a promising solution for effective spectrum utilization. Connectivity and robustness are the two main difficulties in cognitive radio networks due to their dynamic nature. These problems are solved by using clustering techniques which group the cognitive users into logical groups. The performance of clustering in cognitive network purely depends on cluster head selection and parameters considered for clustering. In this work, an adaptive neuro-fuzzy inference system (ANFIS) based clustering is proposed for the cognitive network. The performance of ANFIS improved using hybrid particle swarm and whale optimization… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification

    Rasha Almarshdi1,2,*, Laila Nassef1, Etimad Fadel1, Nahed Alowidi1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 297-320, 2023, DOI:10.32604/iasc.2023.026799

    Abstract Internet of Things (IoT) is the most widespread and fastest growing technology today. Due to the increasing of IoT devices connected to the Internet, the IoT is the most technology under security attacks. The IoT devices are not designed with security because they are resource constrained devices. Therefore, having an accurate IoT security system to detect security attacks is challenging. Intrusion Detection Systems (IDSs) using machine learning and deep learning techniques can detect security attacks accurately. This paper develops an IDS architecture based on Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) deep learning algorithms. We implement our model… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System for SDN Using Machine Learning

    G. Logeswari*, S. Bose, T. Anitha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 867-880, 2023, DOI:10.32604/iasc.2023.026769

    Abstract Software Defined Networking (SDN) has emerged as a promising and exciting option for the future growth of the internet. SDN has increased the flexibility and transparency of the managed, centralized, and controlled network. On the other hand, these advantages create a more vulnerable environment with substantial risks, culminating in network difficulties, system paralysis, online banking frauds, and robberies. These issues have a significant detrimental impact on organizations, enterprises, and even economies. Accuracy, high performance, and real-time systems are necessary to achieve this goal. Using a SDN to extend intelligent machine learning methodologies in an Intrusion Detection System (IDS) has stimulated… More >

  • Open Access

    ARTICLE

    Impact of Data Quality on Question Answering System Performances

    Rachid Karra*, Abdelali Lasfar

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 335-349, 2023, DOI:10.32604/iasc.2023.026695

    Abstract In contrast with the research of new models, little attention has been paid to the impact of low or high-quality data feeding a dialogue system. The present paper makes the first attempt to fill this gap by extending our previous work on question-answering (QA) systems by investigating the effect of misspelling on QA agents and how context changes can enhance the responses. Instead of using large language models trained on huge datasets, we propose a method that enhances the model's score by modifying only the quality and structure of the data feed to the model. It is important to identify… More >

  • Open Access

    ARTICLE

    Economic Analysis of Demand Response Incorporated Optimal Power Flow

    Ulagammai Meyyappan*, S. Joyal Isac

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 399-413, 2023, DOI:10.32604/iasc.2023.026627

    Abstract Demand Response (DR) is one of the most cost-effective and unfailing techniques used by utilities for consumer load shifting. This research paper presents different DR programs in deregulated environments. The description and the classification of DR along with their potential benefits and associated cost components are presented. In addition, most DR measurement indices and their evaluation are also highlighted. Initially, the economic load model incorporated thermal, wind, and energy storage by considering the elasticity market price from its calculated locational marginal pricing (LMP). The various DR programs like direct load control, critical peak pricing, real-time pricing, time of use, and… More >

Displaying 7821-7830 on page 783 of 22334. Per Page