Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,889)
  • Open Access

    ARTICLE

    An Efficient Optimized Handover in Cognitive Radio Networks Using Cooperative Spectrum Sensing

    H. Anandakumara, K. Umamaheswarib

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 843-849, 2018, DOI:10.1080/10798587.2017.1364931

    Abstract Cognitive radio systems necessitate the incorporation of cooperative spectrum sensing among cognitive users to increase the reliability of detection. We have found that cooperative spectrum sensing is not only advantageous, but is also essential to avoid interference with any primary users. Interference by licensed users becomes a chief concern and issue, which affects primary as well as secondary users leading to restrictions in spectrum sensing in cognitive radios. When the number of cognitive users increases, the overheads of the systems, which are meant to report the sensing results to the common receiver, which becomes massive. When the spectrum, which is… More >

  • Open Access

    ARTICLE

    A Novel Cardholder Behavior Model for Detecting Credit Card Fraud

    Yiğit Kültür, Mehmet Ufuk Çağlayan

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 807-817, 2018, DOI:10.1080/10798587.2017.1342415

    Abstract Because credit card fraud costs the banking sector billions of dollars every year, decreasing the losses incurred from credit card fraud is an important driver for the sector and end-users. In this paper, we focus on analyzing cardholder spending behavior and propose a novel cardholder behavior model for detecting credit card fraud. The model is called the Cardholder Behavior Model (CBM). Two focus points are proposed and evaluated for CBMs. The first focus point is building the behavior model using single-card transactions versus multi-card transactions. As the second focus point, we introduce holiday seasons as spending periods that are different… More >

  • Open Access

    ARTICLE

    A Novel Strategy for Mining Highly Imbalanced Data in Credit Card Transactions

    Masoumeh Zareapoor, Jie Yang

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 721-727, 2018, DOI:10.1080/10798587.2017.1321228

    Abstract The design of an efficient credit card fraud detection technique is, however, particularly challenging, due to the most striking characteristics which are; imbalancedness and non-stationary environment of the data. These issues in credit card datasets limit the machine learning algorithm to show a good performance in detecting the frauds. The research in the area of credit card fraud detection focused on detection the fraudulent transaction by analysis of normality and abnormality concepts. Balancing strategy which is designed in this paper can facilitate classification and retrieval problems in this domain. In this paper, we consider the classification problem in supervised learning… More >

  • Open Access

    ARTICLE

    The Machine Learning Based Finite Element Analysis on Road Engineering of Built-in Carbon Fiber Heating Wire

    Yuhua Penga, Dingyue Chena, Lihao Chenb, Jiayu Yub, Mengjie Baoa

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 531-539, 2018, DOI:10.31209/2018.100000020

    Abstract For the study of the effect of deicing with carbon fiber heating wire in the bridge pavement structure, through built-in carbon fiber heating wire in the bridge pavement structure, experimental studies were carried out indoor on the effects of thermal conductivity in different embedding positions, layout spacing and the installs power of carbon fiber heating wire. With indoor laboratory test data as the basic parameters, using ABAQUS finite element software simulation, an analysis was carried out of the degree that the surface temperature of the heating wire, the thermal physical parameters of asphalt concrete, and environmental conditions have influence on… More >

  • Open Access

    ARTICLE

    Hyperspectral Reflectance Imaging for Detecting Typical Defects of Durum Kernel Surface

    Feng-Nong Chena,b#, Pu-Lan Chenc#, Kai Fana, Fang Chengd

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 351-358, 2018, DOI:10.1080/10798587.2017.1293927

    Abstract In recent years, foodstuff quality has triggered tremendous interest and attention in our society as a series of food safety problems. The hyperspectral imaging techniques have been widely applied for foodstuff quality. In this study, we were undertaken to explore the possibility of unsound kernel detecting (Triticum durum Desf), which were defined as black germ kernels, moldy kernels and broken kernels, by selecting the best band in hyperspectral imaging system. The system possessed a wavelength in the range of 400 to 1,000  nm with neighboring bands 2.73  nm apart, acquiring images of bulk wheat samples from different wheat varieties. A… More >

  • Open Access

    ARTICLE

    Soft Computing Techniques for Classification of Voiced/Unvoiced Phonemes

    Mohammed Algabria,c, Mohamed Abdelkader Bencherifc, Mansour Alsulaimanb,c, Ghulam Muhammadb, Mohamed Amine Mekhtichec

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 267-274, 2018, DOI:10.1080/10798587.2017.1278961

    Abstract A method that uses fuzzy logic to classify two simple speech features for the automatic classification of voiced and unvoiced phonemes is proposed. In addition, two variants, in which soft computing techniques are used to enhance the performance of fuzzy logic by tuning the parameters of the membership functions, are also presented. The three methods, manually constructed fuzzy logic (VUFL), fuzzy logic optimized with genetic algorithm (VUFL-GA), and fuzzy logic with optimized particle swarm optimization (VUFL-PSO), are implemented and then evaluated using the TIMIT speech corpus. Performance is evaluated using the TIMIT database in both clean and noisy environments. Four… More >

  • Open Access

    ARTICLE

    The Big Data Analysis on the Camera-based Face Image in Surveillance Cameras*

    Zhiguo Yan, Zheng Xu, Jie Dai

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 123-132, 2018, DOI:10.1080/10798587.2016.1267251

    Abstract In the Big-Data era, currently how to automatically realize acquisition, refining and fast retrieval of the target information in a surveillance video has become an urgent demand in the public security video surveillance field. This paper proposes a new gun-dome camera cooperative system, which solves the above problem partly. The system adopts a master-slave static panorama-variable view dualcamera cooperative video-monitoring system. In this dual-camera system the gun camera static camera) with a wide viewing -angle lenses is in charge of the pedestrian detection and the dome camera can maneuver its focus and cradle orientation to get the clear and enlarged… More >

  • Open Access

    ARTICLE

    Research on Application of Location Technology in 3D Virtual Environment Modeling System for Substation Switch Indicator

    Lijuan Qina,b, Ting Wangb, Chen Yaob

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 115-122, 2018, DOI:10.1080/10798587.2016.1267250

    Abstract Substation inspection work plays a very important role in ensuring the normal production and the safe operation of a transformer substation. Use of a substation inspection robot can effectively solve the omission problems of a manual inspection. It can further improve the unmanned and automation of substation and improve security of station. A substation inspection system requires the establishment of a spatial position relation between the robot and the inspection object in the monitoring station. Key technology is the spatial location of the object being detected in the substation. The position of inspection object is unknown. This paper gives technical… More >

  • Open Access

    ARTICLE

    Public Health Emergency Management and Multi-Source Data Technology in China

    Xinzhi Wanga, Yi Liub, Hui Zhanga, Qiuju Maa, Zhidong Caoc

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 89-96, 2018, DOI:10.1080/10798587.2016.1267246

    Abstract Public health emergency is governed by the physical rules, which are related to the propagation of diseases in the physical space, and the social rules, which are related to government structures, social behaviors, and social media in cyber space. Effective preparedness and response of public health emergency is strongly related to interoperation, collaboration and cooperation among different levels of government agencies and among different regions, as well as information flow and data mining between agencies and general public. In this paper, we review the technologies using multi-source data for public health emergency in China. At the micro-level, risk analysis and… More >

  • Open Access

    ARTICLE

    Hyperspectral Mineral Target Detection Based on Density Peak

    Yani Hou, Wenzhong Zhu, Erli Wang

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 805-814, 2019, DOI:10.31209/2019.100000084

    Abstract Hyperspectral remote sensing, with its narrow band imaging, provides the potential for fine identification of ground objects, and has unique advantages in mineral detection. However, the image is nonlinear and the pure pixel is scarce, so using standard spectrum detection will lead to an increase of the number of false alarm and missed detection. The density peak algorithm performs well in high-dimensional space and data clustering with irregular category shape. This paper used the density peak clustering to determine the cluster centers of various categories of images, and took it as the target spectrum, and took the clustering results as… More >

Displaying 2381-2390 on page 239 of 2889. Per Page