Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,827)
  • Open Access

    ARTICLE

    Optimal Tuning for Load Frequency Control Using Ant Lion Algorithm in Multi‐Area Interconnected Power System

    Nour EL Yakine Koubaa, Mohamed Menaaa, Kambiz Tehranib, Mohamed Boudoura

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 279-294, 2019, DOI:10.31209/2018.100000007

    Abstract This paper presents the use of a novel nature inspired meta-heuristic algorithm namely Ant Lion Optimizer (ALO), which is inspired from the ant lions hunting mechanism to enhance the frequency regulation and optimize the load frequency control (LFC) loop parameters. The frequency regulation issue was formulated as an optimal load frequency control problem (OLFC). The proposed ALO algorithm was applied to reach the best combination of the PID controller parameters in each control area to achieve both frequency and tie-line power flow exchange deviations minimization. The control strategy has been tested firstly with the standard More >

  • Open Access

    ARTICLE

    A Method for Decision Making Problems by Using Graph Representation of Soft Set Relations

    Nazan Çakmak Polat, Gözde Yaylali, Bekir Tanay

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 305-311, 2019, DOI:10.31209/2018.100000006

    Abstract Soft set theory, which was defined by D. Molodtsov, has a rich potential for applications in several fields of life. One of the successful application of the soft set theory is to construct new methods for Decision Making problems. In this study, we are introducing a method using graph representation of soft set relations to solve Decision Making problems. We have successfully applied this method to various examples. More >

  • Open Access

    ARTICLE

    Developing a Holistic Model for Assessing the ICT Impact on Organizations: A Managerial Perspective

    Farrukh Saleem1,2, Naomie Salim2, Abdulrahman H. Altalhi1, Abdullah AL‐Malaise AL‐Ghamdi1, Zahid Ullah1, Noor ul Qayyum1

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 259-277, 2019, DOI:10.31209/2018.100000002

    Abstract Organizations are currently more dependent on Information and Communication Technology (ICT) resources. The main purpose of this research is to help the organization in order to maintain the quality of their ICT project based on evaluation criteria presented in this research. This paper followed several steps to support the methodology section. Firstly, an experimental investigation conducted to explore the values assessment criterion, an organization may realize from ICT project such as information systems, enterprise systems and IT infrastructure. Secondly, the investigation is further based on empirical data collected and analyzed from the respondents of six… More >

  • Open Access

    ARTICLE

    PID Tuning Method Using Single-Valued Neutrosophic Cosine Measure and Genetic Algorithm

    Jun Ye

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 15-23, 2019, DOI:10.31209/2018.100000067

    Abstract Because existing proportional-integral-derivative (PID) tuning method using similarity measures of single-valued neutrosophic sets (SVNSs) and an increasing step algorithm shows its complexity and inconvenience, this paper proposes a PID tuning method using a cosine similarity measure of SVNSs and genetic algorithm (GA) to improve the existing PID tuning method. In the tuning process, the step response characteristic values (rising time, settling time, overshoot ratio, undershoot ratio, peak time, and steady-state error) of the control system are converted into the single-valued neutrosophic set (SVNS) by the neutrosophic membership functions (Neutrosophication). Then the values of three appropriate More >

  • Open Access

    ARTICLE

    Active Detecting DDoS Attack Approach Based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones

    Hsing‐Chung Chen1,2, Shyi‐Shiun Kuo1,3

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 217-228, 2019, DOI:10.31209/2018.100000057

    Abstract Nowadays, more and more smartphones communicate to each other’s by using some popular Next Generation Instant Messaging (NGIM) applications (Apps) which are based on the blockchain (BC) technologies, such as XChat, via IPv4/IPv6 dual stack network environments. Owing to XChat addresses are soon to be implemented as stealth addresses, any DoS attack activated form malicious XChat node will be treated as a kind of DDoS attack. Therefore, the huge NGIM usages with stealth addresses in IPv4/IPv6 dual stack mobile networks, mobile devices will suffer the Distributed Denial of Service (DDoS) attack from Internet. The probing More >

  • Open Access

    ARTICLE

    Visual Object Detection and Tracking Using Analytical Learning Approach of Validity Level

    Yong‐Hwan Lee, Hyochang Ahn, Hyo‐Beom Ahn, Sun‐Young Lee

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 205-215, 2019, DOI:10.31209/2018.100000056

    Abstract Object tracking plays an important role in many vision applications. This paper proposes a novel and robust object detection and tracking method to localize and track a visual object in video stream. The proposed method is consisted of three modules; object detection, tracking and learning. Detection module finds and localizes all apparent objects, corrects the tracker if necessary. Tracking module follows the interest object by every frame of sequences. Learning module estimates a detecting error, and updates its value of credibility level. With a validity level where the tracking is failed on tracing the learned More >

  • Open Access

    ARTICLE

    User Authentication System Based on Baseline‐corrected ECG for Biometrics

    Gyu Ho Choia, Jae Hyo Jungb, Hae Min Moonc, Youn Tae Kimb, Sung Bum Panc

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 193-204, 2019, DOI:10.31209/2018.100000055

    Abstract Recently, ECG-based user authentication technology, which is strong against forgery and falsification, has been actively studied compared to fingerprint and face authentication. It is impossible to measure the open ECG DB measured with expensive medical equipment in daily living, and the ECG measured with the developed device for easy ECG measurement has much noise. In this paper, we developed a device that easily measures the ECG for user authentication in everyday life, measured the ECG through the development equipment, adjusted the baseline correction of the measured ECG, extracted it from the adjusted ECG do. The More >

  • Open Access

    ARTICLE

    Cracking of WPA & WPA2 Using GPUs and Rule‐based Method

    Tien‐Ho Chang1, Chia‐Mei Chen2, Han‐Wei Hsiao3, Gu‐Hsin Lai4

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 183-192, 2019, DOI:10.31209/2018.100000054

    Abstract Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols developed by the Wi-Fi Alliance to secure wireless computer networks. The prevailing usage of GPUs improves the brute force attacks and cryptanalysis on access points of the wireless networks. It is time-consuming for the cryptanalysis with the huge total combinations of 9563 max. Now, it is the turning point that the leap progress of GPUs makes the Wi-Fi cryptanalysis much more efficient than before. In this research, we proposed a rule-based password cracking scheme without dictionary files which improves the efficiency More >

  • Open Access

    ARTICLE

    A Novel Privacy‐Preserving Multi‐Attribute Reverse Auction Scheme with Bidder Anonymity Using Multi‐Server Homomorphic Computation

    Wenbo Shi1, Jiaqi Wang2, Jinxiu Zhu3, YuPeng Wang4, Dongmin Choi5

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 171-181, 2019, DOI:10.31209/2018.100000053

    Abstract With the further development of Internet, the decision-making ability of the smart service is getting stronger and stronger, and the electronic auction is paid attention to as one of the ways of decision system. In this paper, a secure multi-attribute reverse auction protocol without the trusted third party is proposed. It uses the Paillier public key cryptosystem with homomorphism and combines with oblivious transfer and anonymization techniques. A single auction server easily collides with a bidder, in order to solve this problem, a single auction server is replaced with multiple auction servers. The proposed scheme More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, More >

Displaying 1711-1720 on page 172 of 1827. Per Page