Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Roughsets-based Approach for Predicting Battery Life in IoT

    Rajesh Kaluri1, Dharmendra Singh Rajput1, Qin Xin2,*, Kuruva Lakshmanna1, Sweta Bhattacharya1, Thippa Reddy Gadekallu1, Praveen Kumar Reddy Maddikunta1

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 453-469, 2021, DOI:10.32604/iasc.2021.014369

    Abstract Internet of Things (IoT) and related applications have successfully contributed towards enhancing the value of life in this planet. The advanced wireless sensor networks and its revolutionary computational capabilities have enabled various IoT applications become the next frontier, touching almost all domains of life. With this enormous progress, energy optimization has also become a primary concern with the need to attend to green technologies. The present study focuses on the predictions pertinent to the sustainability of battery life in IoT frameworks in the marine environment. The data used is a publicly available dataset collected from the Chicago district beach water.… More >

  • Open Access

    ARTICLE

    Tampering Detection Approach of Arabic-Text Based on Contents Interrelationship

    Fahd N. Al-Wesabi1, Abdelzahir Abdelmaboud2,*, Adnan A. Zain3, Mohammed M. Almazah4, Ammar Zahary5

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 483-498, 2021, DOI:10.32604/iasc.2021.014322

    Abstract Text information depends primarily on natural languages processing. Improving the security and usability of text information shared through the public internet has therefore been the most demanding problem facing researchers. In contact and knowledge sharing through the Internet, the authentication of content and the identification of digital content are becoming a key problem. Therefore, in this paper, a fragile approach of zero-watermarking based on natural language processing has been developed for authentication of content and prevention of misuse of Arabic texts distributed over the Internet. According to the proposed approach, watermark embedding, and identification was technically carried out such that… More >

  • Open Access

    ARTICLE

    CMMI Compliant Modernization Framework to Transform Legacy Systems

    Musawwer Khan1, Islam Ali1, Waqar Mehmood1, Wasif Nisar1, Waqar Aslam2, Muhammad Shafiq3, Jin-Ghoo Choi3,*

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 311-331, 2021, DOI:10.32604/iasc.2021.014280

    Abstract Legacy systems deteriorate due to changing business practices and recurrent problems such as high maintenance cost, lack of agility, and degraded performance. Modernization is highly desired especially for those organizations where key business processes are managed by legacy systems. During modernizing, two important aspects are usually ignored, i.e., the transformation of a legacy system to an enterprise solution, and considerations of quality concerns. This overlooking leads to a modernized information system that partially achieves the expected outcome. In this paper, we propose a Capability Maturity Model Integration (CMMI) Compliant Modernization Framework (CCMF) that addresses the problems of legacy systems by… More >

  • Open Access

    ARTICLE

    Automated Meter Reading Detection Using Inception with Single Shot Multi-Box Detector

    Arif Iqbal*, Abdul Basit, Imran Ali, Junaid Babar, Ihsan Ullah

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 299-309, 2021, DOI:10.32604/iasc.2021.014250

    Abstract Automated meter reading has recently been adopted by utility service providers for improving the reading and billing process. Images captured during meter reading are incorporated in consumer bills to prevent reporting false reading and ensure transparency. The availability of images captured during the meter reading process presents the potential of completely automating the meter reading process. This paper proposes a convolutional network-based multi-box model for the automatic meter reading. The proposed research leverages the inception model with a single shot detector to achieve high accuracy and efficiency compared to the existing state-of-the-art machine learning methods. We tested the multi-box detector… More >

  • Open Access

    ARTICLE

    Study of Sugarcane Buds Classification Based on Convolutional Neural Networks

    Huaning Song1, Jiansheng Peng1,2,*, Nianyang Tuo1, Haiying Xia2, Yiyun Peng3

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 581-592, 2021, DOI:10.32604/iasc.2021.014152

    Abstract Accurate identification of sugarcane buds, as one of the key technologies in sugarcane plantation, becomes very necessary for its mechanized and intelligent advancements. In the traditional methods of sugarcane bud recognition, a significant amount of algorithms work goes into the location and recognition of sugarcane bud images. A Convolutional Neural Network (CNN) for classifying the bud conditions is proposed in this paper. Firstly, we convert the colorful sugarcane images into gray ones, unify the size of them, and make a TFRecord format data set, which contains 1100 positive samples and 1100 negative samples. Then, a CNN mode is developed to… More >

  • Open Access

    ARTICLE

    Generation of Synthetic Images of Randomly Stacked Object Scenes for Network Training Applications

    Yajun Zhang1,*, Jianjun Yi1, Jiahao Zhang1, Yuanhao Chen1, Liang He2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 425-439, 2021, DOI:10.32604/iasc.2021.013795

    Abstract Image recognition algorithms based on deep learning have been widely developed in recent years owing to their capability of automatically capturing recognition features from image datasets and constantly improving the accuracy and efficiency of the image recognition process. However, the task of training deep learning networks is time-consuming and expensive because large training datasets are generally required, and extensive manpower is needed to annotate each of the images in the training dataset to support the supervised learning process. This task is particularly arduous when the image scenes involve randomly stacked objects. The present work addresses this issue by developing a… More >

  • Open Access

    ARTICLE

    Self-Adaptive Fault Recovery Mechanism Based on Task Migration Negotiation

    Ruijun Chai1, Sujie Shao1,*, Shaoyong Guo1, Yuqi Wang1, Xuesong Qiu1, Linna Ruan2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 471-482, 2021, DOI:10.32604/iasc.2021.013373

    Abstract Long Range Radio (LoRa) has become one of the widely adopted Low-Power Wide Area Network (LPWAN) technologies in power Internet of Things (PIoT). Its major advantages include long-distance, large links and low power consumption. However, in LoRa-based PIoT, terminals are often deployed in the wild place and are easily affected by bad weather or disaster, which could easily lead to large-scale operation faults and could seriously affect the normal operation of the network. Simultaneously, the distribution characteristics of outdoor terminals with wide coverage and large links lead to a sharp increase in the difficulty and cost of fault recovery. Given… More >

  • Open Access

    ARTICLE

    Hybridized Model with Activity Load Adjusting and QOS for Wi-Fi Network System

    S. Praveen Kumar1,*, S. Appavu alias Balamurugan2, S. Kannan3

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 333-346, 2021, DOI:10.32604/iasc.2021.013310

    Abstract The establishment of multi-channel routing systems in WSNs has shown the reliability of the transmission across several channels. Meeting the service quality needs of all the applications is still a challenging task. Various surveys carried out, have suggested for the development of user-oriented Wireless Sensor Network (WSN) architectures. Throughout WSNs, the Optimized Link State Routing (OLSR) and the Adhoc On Demand Vector (AODV) are the multi-way routing systems that exhibit the reliability of the multipath delivery to fulfill the customer service quality requirements. The topology is modified only on requests, by selecting the best route based on the route weights… More >

  • Open Access

    ARTICLE

    An Enhanced Decentralized Virtual Machine Migration Approach for Energy-Aware Cloud Data Centers

    R. Jayamala*, A. Valarmathi

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 347-358, 2021, DOI:10.32604/iasc.2021.012401

    Abstract Cloud computing is an increasingly important technology to deliver pay-as-you-go online computing services. In this study, the cloud service provider permits the cloud user to pay according to the user’s needs. Various methods have been used to reduce energy utilization in the cloud. The rapid increase of cloud users has led to increased energy consumption and higher operating costs for cloud providers. A key issue in cloud data centers is their massive energy consumption to operate and maintain computing services. Virtual machine (VM) migration is a method to reduce energy consumption. This study proposes enhanced decentralized virtual machine migration (EDVMM),… More >

  • Open Access

    ARTICLE

    A Fuzzy-Based Bio-Inspired Neural Network Approach for Target Search by Multiple Autonomous Underwater Vehicles in Underwater Environments

    Aolin Sun, Xiang Cao*, Xu Xiao, Liwen Xu

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 551-564, 2021, DOI:10.32604/iasc.2021.01008

    Abstract An essential issue in a target search is safe navigation while quickly finding targets. In order to improve the efficiency of a target search and the smoothness of AUV’s (Autonomous Underwater Vehicle) trajectory, a fuzzy-based bio-inspired neural network approach is proposed in this paper. A bio-inspired neural network is applied to a multi-AUV target search, which can effectively plan search paths. In the meantime, a fuzzy algorithm is introduced into the bio-inspired neural network to make the trajectory of AUV obstacle avoidance smoother. Unlike other algorithms that need repeated training in the parameters selection, the proposed approach obtains all the… More >

Displaying 13041-13050 on page 1305 of 22225. Per Page