Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Energy Efficient Clustering and Optimized LOADng Protocol for IoT

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 357-370, 2022, DOI:10.32604/iasc.2022.025637

    Abstract In recent years, the use of Internet of Things (IoT) devices has increased exponentially due to the advancement of information and communication technologies. Wireless sensor networks (WSNs) are vital in the development of IoT and include low-cost smart devices for data collection. However, such smart devices hold some restrictions in terms of calculation, processing, storage, and energy resources. With such constraints, one of the primary difficulties for the WSN is to achieve the lowest possible energy consumption across the network. This article aims to develop an Energy-Efficient cluster-based Lightweight On-Demand Ad hoc Distance Vector Routing Protocol–Next Generation (LOADng) routing protocol… More >

  • Open Access

    ARTICLE

    Computer Aided Coronary Atherosclerosis Plaque Detection and Classification

    S. Deivanayagi1,*, P. S. Periasamy2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 639-653, 2022, DOI:10.32604/iasc.2022.025632

    Abstract Coronary artery disease (CAD) remains a major reason for increased mortality over the globe, comprising myocardial infarction and ischemic cardiomyopathy. The CAD is highly linked to coronary stenosis owing to the encumbrance of atherosclerotic plaques. Particularly, diversified atherosclerotic plaques are highly responsible for major cardiac adverse events over the calcified and non-calcified plaques. There, the recognition and classification of atherosclerotic plaques play a vital role to prevent and intervene in CAD. The process of detecting various class labels of the atherosclerotic plaques is significant to identify the disease at the earlier stages. Since several automated coronary plaque recognition models are… More >

  • Open Access

    ARTICLE

    CAD of BCD from Thermal Mammogram Images Using Machine Learning

    D. Banumathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, J. Indra4, Dilip Kumar Sharma5

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 667-685, 2022, DOI:10.32604/iasc.2022.025609

    Abstract Lump in the breast, discharge of blood from the nipple, and deformation of the nipple/breast and its texture are the symptoms of breast cancer. Though breast cancer is very common in women, men can also get breast cancer. In the early stages, BCD makes use of Thermal Mammograms Breast Images (TMBI). The cost of treatment can be severely reduced in the early stages of detection. Based on the techniques of segmentation, the Breast Cancer Detection (BCD) works. Moreover, by providing a balanced, reliable and appropriate second opinion, a tremendous role has been played by ML in medical practices due to… More >

  • Open Access

    ARTICLE

    Gender-specific Facial Age Group Classification Using Deep Learning

    Valliappan Raman1, Khaled ELKarazle2,*, Patrick Then2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 105-118, 2022, DOI:10.32604/iasc.2022.025608

    Abstract Facial age is one of the prominent features needed to make decisions, such as accessing certain areas or resources, targeted advertising, or more straightforward decisions such as addressing one another. In machine learning, facial age estimation is a typical facial analysis subtask in which a model learns the different facial ageing features from several facial images. Despite several studies confirming a relationship between age and gender, very few studies explored the idea of introducing a gender-based system that consists of two separate models, each trained on a specific gender group. This study attempts to bridge this gap by introducing an… More >

  • Open Access

    ARTICLE

    Motor Torque Measurement Using Dual-Function Radar Polarized Signals of Flux

    B. Chinthamani1,*, N. S. Bhuvaneswari2, R. Senthil Kumar3, N. R. Shanker4

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 515-530, 2022, DOI:10.32604/iasc.2022.025410

    Abstract Motor Torque (MT) measurement plays a vital role for evaluating the performance of squirrel cage induction motor during operating conditions. Accurate and continuous measurements of MT provide information regarding driving load capacity, performance degradation of motor, reduces downtime and increases the efficiency. Traditional inline torque sensors-based measurement becomes inaccurate during abrupt change in load during starting condition of motor due to torque spikes. Mounting of torque sensor on motor is a major problem during torque measurement. Improper mounting of sensor acquires signals from other inefficient driveline components such as gearbox, couplings, and bearing. In this paper, we propose a non-contact… More >

  • Open Access

    ARTICLE

    Background Subtraction in Surveillance Systems Using Local Spectral Histograms and Linear Regression

    S. Hariharan1,*, R. Venkatesan2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 407-422, 2022, DOI:10.32604/iasc.2022.025309

    Abstract Background subtraction is a fundamental and crucial task for computer vision-based automatic video analysis due to various challenging situations that occur in real-world scenarios. This paper presents a novel background subtraction method by estimating the background model using linear regression and local spectral histogram which captures combined spectral and texture features. Different linear filters are applied on the image window centered at each pixel location and the features are captured via these filter responses. Each feature has been approximated by a linear combination of two representative features, each of which corresponds to either a background or a foreground pixel. These… More >

  • Open Access

    ARTICLE

    Multi-Agent with Multi Objective-Based Optimized Resource Allocation on Inter-Cloud

    J. Arravinth*, D. Manjula

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 133-147, 2022, DOI:10.32604/iasc.2022.025292

    Abstract Cloud computing is the ability to provide new technologies and standard cloud services. One of the essential features of cloud computing is the provision of “unlimited” computer resources to users on demand. However, single cloud resources are generally limited and may not be able to cope with the sudden rise in user needs. Therefore, the inter-cloud concept is introduced to support resource sharing between clouds. In this system, each cloud can tap the resources of other clouds when there are not enough resources to meet the demands of the consumer. In cloud computing, allocating the available resources of service nodes… More >

  • Open Access

    ARTICLE

    Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip

    S. Parvathi*, S. Umamaheswari

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 15-32, 2022, DOI:10.32604/iasc.2022.025290

    Abstract Network-on-chip (NoC) proves to be the best alternative to replace the traditional bus-based interconnection in Multi-Processor System on a Chip (MPSoCs). Irregular NoC topologies are highly recommended and utilised in various applications as they are application specific. Optimized mapping of the cores in a NoC plays a major role in its performance. Firefly algorithm is a bio-inspired meta-heuristic approach. Discretized firefly algorithm is used in our proposed work. In this work, two optimization algorithms are proposed: Topology Generation using Discrete Firefly Algorithm (TGDFA) and Core Mapping using Discrete Firefly Algorithm (CMDFA) for multimedia benchmark applications, Video Object Plane Decoder (VOPD),… More >

  • Open Access

    ARTICLE

    Wireless Intrusion Detection Based on Optimized LSTM with Stacked Auto Encoder Network

    S. Karthic1,*, S. Manoj Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 439-453, 2022, DOI:10.32604/iasc.2022.025153

    Abstract In recent years, due to the rapid progress of various technologies, wireless computer networks have developed. However, the activities of the security threats and attackers affect the data communication of these technologies. So, to protect the network against these security threats, an efficient IDS (Intrusion Detection System) is presented in this paper. Namely, optimized long short-term memory (OLSTM) network with a stacked auto-encoder (SAE) network is proposed as an IDS system. Using SAE, significant features are extracted from the databases such as input NSL-KDD database and the UNSW-NB15 database. Then extracted features are given as input to the optimized LSTM… More >

  • Open Access

    ARTICLE

    A Secure E-commerce Environment Using Multi-agent System

    Farah Tawfiq Abdul Hussien*, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 499-514, 2022, DOI:10.32604/iasc.2022.025091

    Abstract Providing security for the customers in the e-commerce system is an essential issue. Providing security for each single online customer at the same time is considered a time consuming process. For a huge websites such task may cause several problems including response delay, losing the customer orders and system deadlock or crash, in which reduce system performance. This paper aims to provide a new prototype structure of multi agent system that solve the problem of providing security and avoid the problems that may reduce system performance. This is done by creating a software agent which is settled into the customer… More >

Displaying 8491-8500 on page 850 of 22225. Per Page