Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Security Data Sharing of Shipbuilding Information Based on Blockchain

    Jun Zhu1,*, Chaosong Yan2, Yinglong Ouyang3, Yao Chen4, Xiaowan Wang5

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1747-1756, 2022, DOI:10.32604/iasc.2022.026934

    Abstract The shipbuilding industry has problems such as long transaction cycles, many participating suppliers, and data sensitivity. A time-dimensional shipbuilding information security sharing scheme based on an alliance chain is proposed to solve this problem. The blockchain can better deliver value and protect user privacy, the blockchain can directly complete the instant transfer of value through smart contracts and tokens on the blockchain. We divide the program into three parts: data preprocessing, data storage, and data sharing. For data sensitivity, data confidentiality and reliability are handled separately. Aiming at the problem of user privacy leakage in data storage, a privacy-protecting blockchain… More >

  • Open Access

    ARTICLE

    CI-Block: A Blockchain System for Information Management of Collaborative Innovation

    Ruhao Ma1,*, Fansheng Meng1, Haiwen Du2,3

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1623-1637, 2022, DOI:10.32604/iasc.2022.026748

    Abstract Blockchain technology ensures the security of cross-organizational data sharing in the process of collaborative innovation. It drives the development of collaborative innovation in discrete manufacturing to intelligent innovation. However, collaborative innovation is a multi-role, networked, and open resource-sharing process. Therefore, it is easy to form information barriers and increase the risk of cooperation between organizations. In this paper, we firstly analyze the blockchain-based information management models in the traditional discrete manufacturing collaborative innovation process. Then, we found that in the process of industry-university-research (IUR) collaborative innovation, consensus servers maintain too many connections due to the high latency between them, which… More >

  • Open Access

    ARTICLE

    Multilayer Functional Connectome Fingerprints: Individual Identification via Multimodal Convolutional Neural Network

    Yuhao Chen1, Jiajun Liu1, Yaxi Peng1, Ziyi Liu2, Zhipeng Yang1,*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1501-1516, 2022, DOI:10.32604/iasc.2022.026346

    Abstract As a neural fingerprint, functional connectivity networks (FCNs) have been used to identify subjects from group. However, a number of studies have only paid attention to cerebral cortex when constructing the brain FCN. Other areas of the brain also play important roles in brain activities. It is widely accepted that the human brain is composed of many highly complex functional networks of cortex. Moreover, recent studies have confirmed correlations between signals of cortex and white matter (WM) bundles. Therefore, it is difficult to reflect the functional characteristics of the brain through a single-layer FCN. In this paper, a multilayer FCN… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction-error Label Map

    Yu Ren1, Jiaohua Qin1,*, Yun Tan1, Neal N. Xiong2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1439-1453, 2022, DOI:10.32604/iasc.2022.025485

    Abstract In the field of reversible data hiding in encrypted images (RDH-EI), predict an image effectively and embed a message into the image with lower distortion are two crucial aspects. However, due to the linear regression prediction being sensitive to outliers, it is a challenge to improve the accuracy of predictions. To address this problem, this paper proposes an RDH-EI scheme based on adaptive prediction-error label map. In the prediction stage, an adaptive threshold estimation algorithm based on local complexity is proposed. Then, the pixels selection method based on gradient of image is designed to train the parameters of the prediction… More >

  • Open Access

    ARTICLE

    Design of Clustering Enabled Intrusion Detection with Blockchain Technology

    S. Vimal1, S. Nalini2,*, K. Anguraj3, T. Chelladurai4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1907-1921, 2022, DOI:10.32604/iasc.2022.025219

    Abstract Recent advancements in hardware and networking technologies have resulted in a large growth in the number of Internet of Things (IoT) devices connected to the Internet, which is likely to continue growing in the coming years. Traditional security solutions are insufficiently suited to the IoT context due to the restrictions and diversity of the resources available to objects. Security techniques such as intrusion detection and authentication are considered to be effective. Additionally, the decentralised and distributed nature of Blockchain technology makes it an excellent solution for overcoming the security issue. This paper proposes a chaotic bird swarm algorithm (CBSA)-based clustering… More >

  • Open Access

    ARTICLE

    Research on Cross-domain Representation Learning Based on Multi-network Space Fusion

    Ye Yang1, Dongjie Zhu2,*, Xiaofang Li3, Haiwen Du4, Yundong Sun4, Zhixin Huo2, Mingrui Wu2, Ning Cao1, Russell Higgs5

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1379-1391, 2022, DOI:10.32604/iasc.2022.025181

    Abstract In recent years, graph representation learning has played a huge role in the fields and research of node clustering, node classification, link prediction, etc., among which many excellent models and methods have emerged. These methods can achieve better results for model training and verification of data in a single space domain. However, in real scenarios, the solution of cross-domain problems of multiple information networks is very practical and important, and the existing methods cannot be applied to cross-domain scenarios, so we research on cross-domain representation is based on multi-network space integration. This paper conducts representation learning research for cross-domain scenarios.… More >

  • Open Access

    ARTICLE

    Stream Cipher Based on Game Theory and DNA Coding

    Khaled Suwais*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1815-1834, 2022, DOI:10.32604/iasc.2022.025076

    Abstract Securing communication over public communication channels is one of the challenging issues in the field of cryptography and information security. A stream cipher is presented as an approach for securing exchanged data between different parties through encryption. The core of stream cipher relies on its keystream generator, that is responsible for generating random and secure keystream of encrypting streaming data. Thus, the security of the keystream is measured by its randomness and its resistance to statistical and cryptanalytic attacks. As there is always a trade-off between the security and performance while designing new cryptographic primitives, we introduce a game theory-based… More >

  • Open Access

    ARTICLE

    Computational Approximations for Real-World Application of Epidemic Model

    Shami A. M. Alsallami1, Ali Raza2,*, Mona Elmahi3, Muhammad Rafiq4, Shamas Bilal5, Nauman Ahmed6, Emad E. Mahmoud7

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1923-1939, 2022, DOI:10.32604/iasc.2022.024993

    Abstract The real-world applications and analysis have a significant role in the scientific literature. For instance, mathematical modeling, computer graphics, camera, operating system, Java, disk encryption, web, streaming, and many more are the applications of real-world problems. In this case, we consider disease modeling and its computational treatment. Computational approximations have a significant role in different sciences such as behavioral, social, physical, and biological sciences. But the well-known techniques that are widely used in the literature have many problems. These methods are not consistent with the physical nature and even violate the actual behavior of the continuous model. The structural properties… More >

  • Open Access

    ARTICLE

    Image Masking and Enhancement System for Melanoma Early Stage Detection

    Fikret Yalcinkaya*, Ali Erbas

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1961-1977, 2022, DOI:10.32604/iasc.2022.024961

    Abstract Early stage melanoma detection (ESMD) is crucial as late detection kills. Computer aided diagnosis systems (CADS) integrated with high level algorithms are major tools capable of ESMD with high degree of accuracy, specificity, and sensitivity. CADS use the image and the information within the pixels of the image. Pixels’ characteristics and orientations determine the colour and shapes of the images as the pixels and associated environment are closely interrelated with the lesion. CADS integrated with Convolutional Neural Networks (CNN) specifically play a major role for ESMD with high degree of accuracy. The proposed system has two steps to produce high… More >

  • Open Access

    ARTICLE

    A New Color Model for Fire Pixels Detection in PJF Color Space

    Amal Ben Hamida1,*, Chokri Ben Amar2, Yasser Albagory2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1607-1621, 2022, DOI:10.32604/iasc.2022.024939

    Abstract Since the number of fires in the world is rising rapidly, automatic fire detection is getting more and more interest in computer vision community. Instead of the usual inefficient sensors, captured videos by video surveillance cameras can be analyzed to quickly detect fires and prevent damages. This paper presents an early fire-alarm raising method based on image processing. The developed work is able to discriminate fire and non-fire pixels. Fire pixels are identified thanks to a rule-based color model built in the PJF color space. PJF is a newly designed color space that enables to better reflect the structure of… More >

Displaying 8761-8770 on page 877 of 22248. Per Page