Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    A Novel Controller for Microgrid Interactive Hybrid Renewable Power Sources

    P. Kavitha*, P. Subha Karuvelam

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 821-836, 2022, DOI:10.32604/iasc.2022.023035

    Abstract In this paper, a self-sufficient electric power generation is proposed by using hybrid renewable sources like solar and wind turbines to favor a smart and green environment. This distributed generation unit is connected to the grid through an 3Φ inverter. The power drawn from the hybrid unit is stored in the batteries to transfer power during the non-availability of power sources. This standalone power conversion and storage system are developed by using power electronic converters and controllers to ensure balanced power flow operation. A PI (Proportional Integral) controller is utilized for generating the PWM (Pulse Width Modulation) pulses for the… More >

  • Open Access

    ARTICLE

    Multi-Classification and Distributed Reinforcement Learning-Based Inspection Swarm Offloading Strategy

    Yuping Deng1, Tao Wu1, Xi Chen2,*, Amir Homayoon Ashrafzadeh3

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1157-1174, 2022, DOI:10.32604/iasc.2022.022606

    Abstract In meteorological and electric power Internet of Things scenarios, in order to extend the service life of relevant facilities and reduce the cost of emergency repair, the intelligent inspection swarm is introduced to cooperate with monitoring tasks, which collect and process the current scene data through a variety of sensors and cameras, and complete tasks such as emergency handling and fault inspection. Due to the limitation of computing resources and battery life of patrol inspection equipment, it will cause problems such as slow response in emergency and long time for fault location. Mobile Edge Computing is a promising technology, which… More >

  • Open Access

    ARTICLE

    Field Programmable Gate Arrays (FPGA) Based Computational Complexity Analysis of Multicarrier Waveforms

    C. Ajitha1,*, T. Jaya2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1033-1048, 2022, DOI:10.32604/iasc.2022.021984

    Abstract Multicarrier waveforms with enhanced spectral efficiency, low latency, and high throughput are required for 5G wireless networks. The Orthogonal Frequency Division Multiplexing (OFDM) method is well-known in research, but due to its limited spectral efficiency, various alternative waveforms are being considered for 5G systems. In the recent communication world, NOMA (non-orthogonal multiple access) plays a significant part due to its wider transmission of data with less bandwidth allocation. Even if a high data rate can be attained, the transmission problem will arise due to the spread of multiple paths. In order to reduce complexity and area utilization, a novel PL-based… More >

  • Open Access

    ARTICLE

    Secure Multi-Party Quantum Summation Based on Quantum Homomorphic Encryption

    Gang Xu1,2, Fan Yun1, Xiu-Bo Chen3,*, Shiyuan Xu1, Jingzhong Wang1, Tao Shang4, Yan Chang5, Mianxiong Dong6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 531-541, 2022, DOI:10.32604/iasc.2022.028264

    Abstract Secure multi-party computation has been playing a fundamental role in terms of classical cryptography. Quantum homomorphic encryption (QHE) could compute the encrypted data without decryption. At present, most protocols use a semi-honest third party (TP) to protect participants’ secrets. We use a quantum homomorphic encryption scheme instead of TP to protect the privacy of parties. Based on quantum homomorphic encryption, a secure multi-party quantum summation scheme is proposed in which N participants can delegate a server with strong quantum computing power to assist computation. By delegating the computation and key update processes to a server and a semi-honest key center,… More >

  • Open Access

    ARTICLE

    Influencing Factors Analysis of Rehabilitation for Patients with Spinal Cord Injury

    Min Rao1, Yufeng Li1,*, Hongye Liu2, Isabel Wang3, Yongjun Ren4

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 455-466, 2022, DOI:10.32604/iasc.2022.027694

    Abstract The aim of spinal cord injury rehabilitation is to increase the independent ability of patients, so that patients can return to society and live a creative life. Regaining independence living is the primary goal of rehabilitation. Rehabilitation of patients with spinal cord injury is a long and lengthy process, which needs comprehensive dimensions support from medical workers, family members, and social support. At present, medical institutions and researchers mainly focus on the level of physical recovery and the treatment of complications in patients with spinal cord injury and pay less attention to social factors during the rehabilitation treatment of patients.… More >

  • Open Access

    ARTICLE

    Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data

    Ling Wang1, Shan Ji2, Zhaokang Wang3, Xiaowan Wang4,*, Ghulam Mohiuddin5, Yongjun Ren1

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 221-234, 2022, DOI:10.32604/iasc.2022.027536

    Abstract As the data scale exceeds the petabyte level, more and more users outsource their local databases to third-party service providers to save local storage costs and avoid cumbersome local data management. However, because third-party service providers are not fully trusted, they may leak outsourced data and bring security risks to the personal privacy of data users. The service provider may also return incorrect or incomplete query results to the data user. Therefore, in this paper, we propose a Lightweight and Verifiable Multi-keyword Query Scheme for the integrity verification of multi-keyword query of outsourced data. This scheme supports multi-keyword query integrity… More >

  • Open Access

    ARTICLE

    End-to-end Handwritten Chinese Paragraph Text Recognition Using Residual Attention Networks

    Yintong Wang1,2,*, Yingjie Yang2, Haiyan Chen3, Hao Zheng1, Heyou Chang1

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 371-388, 2022, DOI:10.32604/iasc.2022.027146

    Abstract Handwritten Chinese recognition which involves variant writing style, thousands of character categories and monotonous data mark process is a long-term focus in the field of pattern recognition research. The existing methods are facing huge challenges including the complex structure of character/line-touching, the discriminate ability of similar characters and the labeling of training datasets. To deal with these challenges, an end-to-end residual attention handwritten Chinese paragraph text recognition method is proposed, which uses fully convolutional neural networks as the main structure of feature extraction and employs connectionist temporal classification as a loss function. The novel residual attention gate block is more… More >

  • Open Access

    ARTICLE

    Movie Recommendation Algorithm Based on Ensemble Learning

    Wei Fang1,2,*, Yu Sha1, Meihan Qi1, Victor S. Sheng3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 609-622, 2022, DOI:10.32604/iasc.2022.027067

    Abstract With the rapid development of personalized services, major websites have launched a recommendation module in recent years. This module will recommend information you are interested in based on your viewing history and other information, thereby improving the economic benefits of the website and increasing the number of users. This paper has introduced content-based recommendation algorithm, K-Nearest Neighbor (KNN)-based collaborative filtering (CF) algorithm and singular value decomposition-based (SVD) collaborative filtering algorithm. However, the mentioned recommendation algorithms all recommend for a certain aspect, and do not realize the recommendation of specific movies input by specific users which will cause the recommended content… More >

  • Open Access

    ARTICLE

    Negative Emotions Sensitive Humanoid Robot with Attention-Enhanced Facial Expression Recognition Network

    Rongrong Ni1, Xiaofeng Liu1,*, Yizhou Chen1, Xu Zhou1, Huili Cai1, Loo Chu Kiong2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 149-164, 2022, DOI:10.32604/iasc.2022.026813

    Abstract Lonely older adults and persons restricted in movements are apt to cause negative emotions, which is harmful to their mental health. A humanoid robot with audiovisual interactions is presented, which can correspondingly output positive facial expressions to relieve human's negative facial expressions. The negative emotions are identified through an attention-enhanced facial expression recognition (FER) network. The network is firstly trained on MMEW macro-and micro-expression databases to discover expression-related features. Then, macro-expression recognition tasks are performed by fine-tuning the trained models on several benchmarking FER databases, including CK+ and Oulu-CASIA. A transformer network is introduced to process the sequential features engineered… More >

  • Open Access

    ARTICLE

    Hybrid Invasive Weed Improved Grasshopper Optimization Algorithm for Cloud Load Balancing

    K. Naveen Durai*, R. Subha, Anandakumar Haldorai

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 467-483, 2022, DOI:10.32604/iasc.2022.026020

    Abstract In cloud computing, the processes of load balancing and task scheduling are major concerns as they are the primary mechanisms responsible for executing tasks by allocating and utilizing the resources of Virtual Machines (VMs) in a more optimal way. This problem of balancing loads and scheduling tasks in the cloud computing scenario can be categorized as an NP-hard problem. This problem of load balancing needs to be efficiently allocated tasks to VMs and sustain the trade-off among the complete set of VMs. It also needs to maintain equilibrium among VMs with the objective of maximizing throughput with a minimized time… More >

Displaying 791-800 on page 80 of 1781. Per Page