{"title":"Multi-Domain Deep Convolutional Neural Network for Ancient Urdu Text Recognition System","authors":"K. O. Mohammed Aarif, P. Sivakumar","doi":"10.32604/iasc.2022.022805","DOIUrl":"https://doi.org/10.32604/iasc.2022.022805","url":null,"abstract":"Deep learning has achieved magnificent success in the field of pattern recognition. In recent years Urdu character recognition system has significantly benefited from the effectiveness of the deep convolutional neural network. Majority of the research on Urdu text recognition are concentrated on formal handwritten and printed Urdu text document. In this paper, we experimented the Challenging issue of text recognition in Urdu ancient literature documents. Due to its cursiveness, complex word formation (ligatures), and context-sensitivity, and inadequate benchmark dataset, recognition of Urdu text from the literature document is very difficult to process compared to the formal Urdu text document. In this work, first, we generated a dataset by extracting the recurrent ligatures from an ancient Urdu fatawa book. Secondly, we categorized and augment the ligatures to generate batches of augmented images that improvise the training efficiency and classification accuracy. Finally, we proposed a multi-domain deep Convolutional Neural Network which integrates a spatial domain and a frequency domain CNN to learn the modular relations between features originating from the two different domain networks to train and improvise the classification accuracy. The experimental results show that the proposed network with the augmented dataset achieves an averaged accuracy of 97.8% which outperforms the other CNN models in this class. The experimental results also show that for the recognition of ancient Urdu literature, well-known benchmark datasets are not appropriate which is also verified with our prepared dataset.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"16 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87874911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Quality-of-Service Allocation Scheme for Improving Video Quality over a Wireless Network","authors":"R. Alsaqour, Ammar Hadi, Maha S. Abdelhaq","doi":"10.32604/iasc.2022.020482","DOIUrl":"https://doi.org/10.32604/iasc.2022.020482","url":null,"abstract":"The need to ensure the quality of video streaming transmitted over wireless networks is growing every day. Video streaming is typically used for applications that are sensitive to poor quality of service (QoS) due to insufficient bandwidth, packet loss, or delay. These challenges hurt video streaming quality since they affect throughput and packet delivery of the transmitted video. To achieve better video streaming quality, throughput must be high, with minimal packet delay and loss ratios. A current study, however, found that the adoption of the adaptive multiple TCP connections (AM-TCP), as a transport layer protocol, improves the quality of video streaming by increasing throughput and lowering packet delay and loss on high QoS wireless networks. The main objective of this study is to develop a Quality of Service (QoS) method for enhancing video streaming quality over wireless networks. For that, this paper proposes a bandwidth aggregation adaptive multiple TCP-connection (BAM-TCP) scheme to enhance the video streaming quality. BAM-TCP combines AM-TCP with a bandwidth aggregation (BAG) method to aggregate bandwidth from numerous connections. Simulation experiments demonstrate that the BAM-TCP method enhances throughput while minimizing packet loss ratio and end-to-end delay.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"8 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89499045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Feature Subset Selection for Occluded Face Recognition","authors":"Najlaa Alsaedi, E. S. Jaha","doi":"10.32604/iasc.2022.019538","DOIUrl":"https://doi.org/10.32604/iasc.2022.019538","url":null,"abstract":"Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to achieve better recognition for occluded faces. The proposed DFSS methods are based on resilient algorithms attempting to minimize the negative influence of confusing and low-quality features extracted from occluded areas by either exclusion or weight reduction. Principal Component Analysis and Gabor filtering based approaches are initially used for face feature extraction, then the proposed DFSS methods are dynamically enforced. This is leading to more effective feature representation and an improved recognition performance. To validate their effectiveness, multiple experiments are conducted and the performance of different methods is compared. The experimental work is carried out using AR database and Extended Yale Face Database B. The obtained results of face identification and verification show that both proposed DFSS methods outperform the standard (static) use of the whole number of features and the equal feature weights.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69778346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Adaptive Firefly Algorithm for Flexible Job Shop Scheduling","authors":"K. Devi, R. Mishra, A. Madan","doi":"10.32604/IASC.2022.019330","DOIUrl":"https://doi.org/10.32604/IASC.2022.019330","url":null,"abstract":"An NP-hard problem like Flexible Job Shop Scheduling (FJSP) tends to be more complex and requires more computational effort to optimize the objectives with contradictory measures. This paper aims to address the FJSP problem with combined and contradictory objectives, like minimization of make-span, maximum workload, and total workload. This paper proposes ‘Hybrid Adaptive Firefly Algorithm’ (HAdFA), a new enhanced version of the classic Firefly Algorithm (FA) embedded with adaptive parameters to optimize the multi objectives concurrently. The proposed algorithm has adopted two adaptive strategies, i.e., an adaptive randomization parameter (α) and an effective heterogeneous update rule for fireflies. The adaptations proposed by this paper can help the optimization process to strike a balance between diversification and intensification. Further, an enhanced local search algorithm, Simulated Annealing (SA), is hybridized with Adaptive FA to explore the local solution space more efficiently. This paper has also attempted to solve FJSP by a rarely used integrated approach where assignment and sequencing are done simultaneously. Empirical simulations on benchmark instances demonstrate the efficacy of our proposed algorithms, thus providing a competitive edge over other nature-inspired algorithms to solve FJSP.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"31 1","pages":"429-448"},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69778513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Parametric Study of Arabic Text-Based CAPTCHA Difficulty for Humans","authors":"Suliman A. Alsuhibany, Hessah Abdulaziz Alhodathi","doi":"10.32604/IASC.2022.019913","DOIUrl":"https://doi.org/10.32604/IASC.2022.019913","url":null,"abstract":"The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been an interesting topic for several years. An Arabic CAPTCHA has recently been proposed to serve Arab users. Since there have been few scientific studies supporting a systematic design or tuning for users, this paper aims to analyze the Arabic text-based CAPTCHA at the parameter level by conducting an experimental study. Based on the results of this study, we propose an Arabic text-based CAPTCHA scheme with Fast Gradient Sign Method (FGSM) adversarial images. To evaluate the security of the proposed scheme, we ran four filter attacks, which led to a success rate of less than 5%. Thus, we developed a defensive method against adaptive attacks which is a standard for evaluating defenses to adversarial examples. This method is ensemble adversarial training, and it gave an accuracy result of 41.51%. For the usability aspect, we conducted an experimental study, and the results showed that it can be solved by humans in a few seconds with a success rate of 93.10%.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"31 1","pages":"523-537"},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69779067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arwa A. Mashat, Surbhi Bhatia, Ankit Kumar, P. Dadheech, A. Alabdali
{"title":"Medical Image Transmission Using Novel Crypto-Compression Scheme","authors":"Arwa A. Mashat, Surbhi Bhatia, Ankit Kumar, P. Dadheech, A. Alabdali","doi":"10.32604/iasc.2022.021636","DOIUrl":"https://doi.org/10.32604/iasc.2022.021636","url":null,"abstract":"The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of techniques: discrete cosine transform, steganography, and watermarking. The novel algorithm takes patients’ information in the form of images and uses a discrete cosine transform method with artificial intelligence and watermarking to calculate peak signal-to-noise ratio values for the images. The proposed framework uses the underlying algorithms to perform encryption and decryption of images while retaining a high peak signal-to-noise ratio value. This value is hidden using a scrambling algorithm; therefore, a unique patient password is required to access the real image. The proposed technique is demonstrated to be robust and thus able to prevent stealing of data. The results of simulation experiments are presented, and the accuracy of the new method is demonstrated by comparisons with various previously validated algorithms.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"17 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74772887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fully Authentication Services Scheme for NFC Mobile Payment Systems","authors":"Munefah Alshammari, S. Nashwan","doi":"10.32604/iasc.2022.022065","DOIUrl":"https://doi.org/10.32604/iasc.2022.022065","url":null,"abstract":"One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent various types of attacks. However, the proposed schemes remain inadequate to secure payment transactions in such systems. In this paper, we propose a fully authentication services scheme for NFC mobile payment systems in order to support a high security level. The proposed scheme has security services, such as a full authentication process, perfect forward secrecy, and simultaneous anonymity of the smartphone and POS. These security services have been validated using the BAN logic model and an automatic cryptographic protocol verifier (ProVerif) tool. A security analysis has clarified that the proposed scheme can prevent various types attacks. A comparison with recent authentication schemes demonstrates that the proposed scheme has an appropriate cost in different sides such as computation, communication and storage space. Therefore, the proposed scheme not only has appealing security features, but can also clearly be utilized in mobile payment systems.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"69 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76130647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sine Power Lindley Distribution with Applications","authors":"Abdullah M. Almarashi","doi":"10.32604/iasc.2022.018043","DOIUrl":"https://doi.org/10.32604/iasc.2022.018043","url":null,"abstract":"Sine power Lindley distribution (SPLi), a new distribution with two parameters that extends the Lindley model, is introduced and studied in this paper. The SPLi distribution is more flexible than the power Lindley distribution, and we show that in the application part. The statistical properties of the proposed distribution are calculated, including the quantile function, moments, moment generating function, upper incomplete moment, and lower incomplete moment. Meanwhile, some numerical values of the mean, variance, skewness, and kurtosis of the SPLi distribution are obtained. Besides, the SPLi distribution is evaluated by different measures of entropy such as Rényi entropy, Havrda and Charvat entropy, Arimoto entropy, Arimoto entropy, and Tsallis entropy. Moreover, the maximum likelihood method is exploited to estimate the parameters of the SPLi distribution. The applications of the SPLi distribution to two real data sets illustrate the flexibility of the SPLi distribution, and the superiority of the SPLi distribution over some well-known distributions, including the alpha power transformed Lindley, power Lindley, extended Lindley, Lindley, and inverse Lindley distributions.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"11 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78409573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tauqeer Safdar Malik, Kaleem Razzaq Malik, M. Sanaullah, Mohd Hilmi Hasan, Norshakirah Aziz
{"title":"Non-Cooperative Learning Based Routing for 6G-IoT Cognitive Radio Network","authors":"Tauqeer Safdar Malik, Kaleem Razzaq Malik, M. Sanaullah, Mohd Hilmi Hasan, Norshakirah Aziz","doi":"10.32604/iasc.2022.021128","DOIUrl":"https://doi.org/10.32604/iasc.2022.021128","url":null,"abstract":"","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"6 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74296138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}