Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Wireless Underground Sensor Networks Channel Using Energy Efficient Clustered Communication

    R. Kanthavel1,*, R. Dhaya2

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 649-659, 2022, DOI:10.32604/iasc.2022.019779

    Abstract Wireless Underground Sensor Networks (WUSNs) refer to a group of nodes working underneath the earth plane that has been predicted to render concurrent observation capability in the hostile subversive and underwater surroundings. The accurate monitoring in places like underground earth, water, lubricates so on called non-conventional media need high accuracy of tiny sized sensors with antennas at a similar size. Therefore, an investigation is needed to study the opportunities and drawbacks of utilizing WUSNs without compromising the effectiveness of real-time monitoring procedures. With this, the major confrontation is to institute a trustworthy underground communication regardless of the complex environment that… More >

  • Open Access

    ARTICLE

    Energy Demand Forecasting Using Fused Machine Learning Approaches

    Taher M. Ghazal1,2, Sajida Noreen3, Raed A. Said4, Muhammad Adnan Khan5,*, Shahan Yamin Siddiqui3,6, Sagheer Abbas3, Shabib Aftab3, Munir Ahmad3

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 539-553, 2022, DOI:10.32604/iasc.2022.019658

    Abstract The usage of IoT-based smart meter in electric power consumption shows a significant role in helping the users to manage and control their electric power consumption. It produces smooth communication to build equitable electric power distribution for users and improved management of the entire electric system for providers. Machine learning predicting algorithms have been worked to apply the electric efficiency and response of progressive energy creation, transmission, and consumption. In the proposed model, an IoT-based smart meter uses a support vector machine and deep extreme machine learning techniques for professional energy management. A deep extreme machine learning approach applied to… More >

  • Open Access

    ARTICLE

    Multi-Level Hesitant Fuzzy Based Model for Usable-Security Assessment

    Mohd Nadeem1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Adil Hussain Seh1, Suhel Ahmad Khan4, Alka Agrawal1, Raees Ahmad Khan1,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 61-82, 2022, DOI:10.32604/iasc.2022.019624

    Abstract Present day healthcare sector is frequently victimized by the intruders. Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usable-security evaluation of healthcare information systems is the need of hour so as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. Usable-security assessment will help the software designers and developers to prioritize usable-security attributes according to the… More >

  • Open Access

    ARTICLE

    Target Projection Feature Matching Based Deep ANN with LSTM for Lung Cancer Prediction

    Chandrasekar Thaventhiran, K. R. Sekar*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 495-506, 2022, DOI:10.32604/iasc.2022.019546

    Abstract Prediction of lung cancer at early stages is essential for diagnosing and prescribing the correct treatment. With the continuous development of medical data in healthcare services, Lung cancer prediction is the most concerning area of interest. Therefore, early prediction of cancer helps in reducing the mortality rate of humans. The existing techniques are time-consuming and have very low accuracy. The proposed work introduces a novel technique called Target Projection Feature Matched Deep Artificial Neural Network with LSTM (TPFMDANN-LSTM) for accurate lung cancer prediction with minimum time consumption. The proposed deep learning model consists of multiple layers to learn the given… More >

  • Open Access

    ARTICLE

    Dynamic Feature Subset Selection for Occluded Face Recognition

    Najlaa Hindi Alsaedi*, Emad Sami Jaha

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 407-427, 2022, DOI:10.32604/iasc.2022.019538

    Abstract Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to achieve better recognition for occluded… More >

  • Open Access

    ARTICLE

    Semantic Human Face Analysis for Multi-level Age Estimation

    Rawan Sulaiman Howyan1,2,*, Emad Sami Jaha1

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 555-580, 2022, DOI:10.32604/iasc.2022.019533

    Abstract Human face is one of the most widely used biometrics based on computer-vision to derive various useful information such as gender, ethnicity, age, and even identity. Facial age estimation has received great attention during the last decades because of its influence in many applications, like face recognition and verification, which may be affected by aging changes and signs which appear on human face along with age progression. Thus, it becomes a prominent challenge for many researchers. One of the most influential factors on age estimation is the type of features used in the model training process. Computer-vision is characterized by… More >

  • Open Access

    ARTICLE

    H-infinity Controller Based Disturbance Rejection in Continuous Stirred-Tank Reactor

    Sikander Hans1, Smarajit Ghosh2,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 29-41, 2022, DOI:10.32604/iasc.2022.019525

    Abstract This paper offers an H-infinity (H∞) controller-based disturbance rejection along with the utilization of the water wave optimization (WWO) algorithm. H∞ controller is used to synthesize the guaranteed performance of certain applications as well as it provides maximum gain at any situation. The proposed work focuses on the conflicts of continuous stirred-tank reactor (CSTR) such as variation in temperature and product concentration. The elimination of these issues is performed with the help of the WWO algorithm along with the controller operation. In general, the algorithmic framework of WWO algorithm is simple, and easy to implement with a small-size population and… More >

  • Open Access

    ARTICLE

    An Efficient HAPS Cross-Layer Design to Mitigate COVID-19 Consequences

    Sameer Alsharif*, Rashid A. Saeed, Yasser Albagory

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 43-59, 2022, DOI:10.32604/iasc.2022.019493

    Abstract This paper proposes a new cross-layer communication system for the provision of Internet services and applications to mitigate the negative impacts of COVID-19, due to which the massive online demands are affecting the current communication systems’ infrastructures and capabilities. The system requirements and model are investigated where it utilizes high-altitude platform (HAP) for fast and efficient connectivity provision to bridge the communication infrastructure gap in the current pandemic. The HAP is linked to the main server or gateway station located on ground and can provide communication narrow beams towards isolated areas which suffer from poor terrestrial radio coverage or lack… More >

  • Open Access

    ARTICLE

    Efficacy of Unconventional Penetration Testing Practices

    Bandar Abdulrhman Bin Arfaj1, Shailendra Mishra2,*, Mohammed Alshehri1

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 223-239, 2022, DOI:10.32604/iasc.2022.019485

    Abstract The financial and confidential cost of cyberattack has presented a significant loss to the organization and government where the privacy of worthless information has become vulnerable to cyber threat. In terms of efforts implemented to avoid this risk, the cyberattack continues to evolve, making the cybersecurity systems weekend. This has necessitated the importance of comprehensive penetration testing, assessment techniques, and tools to analyze and present the currently available unconventional penetration techniques and tactics to test and examine their key features and role in supporting cybersecurity and measure their effectiveness. The importance of cyberspace and its value make it an eminent… More >

  • Open Access

    ARTICLE

    Deep Learning Based Stacked Sparse Autoencoder for PAPR Reduction in OFDM Systems

    A. Jayamathi1, T. Jayasankar2,*

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 311-324, 2022, DOI:10.32604/iasc.2022.019473

    Abstract Orthogonal frequency division multiplexing is one of the efficient and flexible modulation techniques, and which is considered as the central part of many wired and wireless standards. Orthogonal frequency division multiplexing (OFDM) and multiple-input multiple-output (MIMO) achieves maximum spectral efficiency and data rates for wireless mobile communication systems. Though it offers better quality of services, high peak-to-average power ratio (PAPR) is the major issue that needs to be resolved in the MIMO-OFDM system. Earlier studies have addressed the high PAPR of OFDM system using clipping, coding, selected mapping, tone injection, peak windowing, etc. Recently, deep learning (DL) models have exhibited… More >

Displaying 1171-1180 on page 118 of 1767. Per Page