Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Adaptive Multicale Transformation Run-Length Code-Based Test Data Compression in Benchmark Circuits

    P. Thilagavathi*, S. Karthikeyan

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2035-2050, 2022, DOI:10.32604/iasc.2022.026651

    Abstract Test data volume reduction and power consumption during testing time outlines are two main problems for Very Large Scale Integration (VLSI) gadgets. Most the code-based arrangements have been utilized to diminish test data volume, although the most notable way that test data volume is high. The switching action that happens between the test carriers leads would expand power consumption. This work presents a compression/decompression methodology for limiting the amount of test data that should be kept on a tester and conveyed to each center in a System on a Chip (SOC) during a test utilizing the Adaptive Multiscale Transformation Run… More >

  • Open Access

    ARTICLE

    A Novel Anomaly Detection Method in Sensor Based Cyber-Physical Systems

    K. Muthulakshmi1,*, N. Krishnaraj2, R. S. Ravi Sankar3, A. Balakumar4, S. Kanimozhi5, B. Kiruthika6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2083-2096, 2022, DOI:10.32604/iasc.2022.026628

    Abstract In recent times, Cyber-physical system (CPS) integrates the cyber systems and physical world for performing critical processes that are started from the development in digital electronics. The sensors deployed in CPS are commonly employed for monitoring and controlling processes that are susceptible to anomalies. For identifying and detecting anomalies, an effective anomaly detection system (ADS) is developed. But ADS faces high false alarms and miss detection rate, which led to the degraded performance in CPS applications. This study develops a novel deep learning (DL) approach for anomaly detection in sensor-based CPS using Bidirectional Long Short Term Memory with Red Deer… More >

  • Open Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483

    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the Quantum Elliptical Curve Cryptography (QECC)… More >

  • Open Access

    ARTICLE

    Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins

    M. Kavitha1, B. Sankara Babu2, B. Sumathy3, T. Jackulin4, N. Ramkumar5, A. Manimaran6, Ranjan Walia7, S. Neelakandan8,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1571-1586, 2022, DOI:10.32604/iasc.2022.026385

    Abstract With the advancement of communication and computing technologies, multimedia technologies involving video and image applications have become an important part of the information society and have become inextricably linked to people's daily productivity and lives. Simultaneously, there is a growing interest in super-resolution (SR) video reconstruction techniques. At the moment, the design of digital twins in video computing and video reconstruction is based on a number of difficult issues. Although there are several SR reconstruction techniques available in the literature, most of the works have not considered the spatio-temporal relationship between the video frames. With this motivation in mind, this… More >

  • Open Access

    ARTICLE

    Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems

    P. Ramadevi1,*, K. N. Baluprithviraj2, V. Ayyem Pillai3, Kamalraj Subramaniam4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2067-2081, 2022, DOI:10.32604/iasc.2022.026377

    Abstract Cyber Physical Systems (CPSs) are network systems containing cyber (computation, communication) and physical (sensors, actuators) components that interact with each other through feedback loop with the help of human intervention. The dynamic and disseminated characteristics of CPS environment makes it vulnerable to threats that exist in virtualization process. Due to this, several security issues are presented in CPS. In order to address the challenges, there is a need exists to extend the conventional security solutions such as Intrusion Detection Systems (IDS) to handle high speed network data traffic and adaptive network pattern in cloud. Additionally, the identification of feasible network… More >

  • Open Access

    ARTICLE

    Energy-Efficient Secure Adaptive Neuro Fuzzy Based Clustering Technique for Mobile Adhoc Networks

    Maganti Srinivas*, M. Ramesh Patnaik

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1755-1767, 2022, DOI:10.32604/iasc.2022.026355

    Abstract In recent times, Mobile Ad Hoc Network (MANET) becomes a familiar research field owing to its applicability in distinct scenarios. MANET comprises a set of autonomous mobile nodes which independently move and send data through wireless channels. Energy efficiency is considered a critical design issue in MANET and can be addressed by the use of the clustering process. Clustering is treated as a proficient approach, which partitions the mobile nodes into groups called clusters and elects a node as cluster head (CH). On the other hand, the nature of wireless links poses security as a major design issue. Therefore, this… More >

  • Open Access

    ARTICLE

    Resource Allocation Using Phase Change Hyper Switching Algorithm in the Cloud Environment

    J. Praveenchandar1,*, A. Tamilarasi2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1839-1850, 2022, DOI:10.32604/iasc.2022.026354

    Abstract Cloud computing is one of the emerging technology; it provides various services like Software as a Service, Platform as a Service, and Infrastructure as a Service on demand. It reduces the cost of traditional computing by renting the resources instead of buying them for a huge cost. The usage of cloud resources is increasing day by day. Due to the heavy workload, all users cannot get uninterrupted service at some time. And the response time of some users also gets increased. Resource allocation is one of the primary issues of a cloud environment, one of the challenging problems is improving… More >

  • Open Access

    ARTICLE

    Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks

    Ashit Kumar Dutta1,*, Yasser Albagory2, Farhan M. Obesat3, Anas Waleed Abulfaraj4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1659-1674, 2022, DOI:10.32604/iasc.2022.026263

    Abstract Energy is considered a valuable source in wireless sensor networks (WSN) for effectively improving the survivability of the network. The non-uniform dispersion of load in the network causes unbalanced energy dissipation which can result in network interruption. The route selection process can be considered as an optimization problem and is solved by utilize of artificial intelligence (AI) techniques. This study introduces an energy efficient chaotic krill herd algorithm with adaptive neuro fuzzy inference system based routing (EECKHA-ANFIS) protocol for WSN. The goal of the EECKHA-ANFIS method is for deriving a better set of routes to destination in such a way… More >

  • Open Access

    ARTICLE

    Efficient Medical Image Encryption Framework against Occlusion Attack

    May A. Al-Otaibi1,*, Hesham Alhumyani1, Saleh Ibrahim2, Alaa M. Abbas2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1523-1536, 2022, DOI:10.32604/iasc.2022.026161

    Abstract Image encryption has attracted a lot of interest as an important security application for protecting confidential image data against unauthorized access. An adversary with the power to manipulate cipher image data can crop part of the image out to prevent decryption or render the decrypted image useless. This is known as the occlusion attack. In this paper, we address a vulnerability to the occlusion attack identified in the medical image encryption framework recently proposed in []. We propose adding a pixel scrambling phase to the framework and show through simulation that the extended framework effectively mitigates the occlusion attack while… More >

  • Open Access

    ARTICLE

    Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network

    M. Vanitha1,*, C. T. Kalaivani1, J. Kirubakaran2, R. Praveena2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1617-1627, 2022, DOI:10.32604/iasc.2022.026154

    Abstract Hybrid networks are a rising innovation for maximizing wireless network coverage without any extra need for resources. This research paper focuses on effective channel allocation for Wireless Fidelity (Wi-Fi) and cellular networks. As a novel work in this area, the Beyond Access Point Coverage (BAPC) has been presented for adequately installing cellular networks on the unlicensed Wi-Fi spectrum. Networks can straightforwardly exploit Wi-Fi distributed coordination. Our BAPC commits and permits a combat-free period to cellular network subscribers and customary Wi-Fi subscribers to encourage concurrence. This research focuses on the maximization of combined subscriber affiliation and frequency channel distribution to improve… More >

Displaying 7951-7960 on page 796 of 22248. Per Page