Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    EDITORIAL

    Guest Editorial: Special Section on Recent Advances in Data Driven Modeling & Soft Computing

    Wen-Hsiang Hsieh, Jerzy W. Rozenblit, Minvydas Ragulskis

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 315-317, 2019, DOI:10.31209/2019.100000091

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Robust EM Algorithm for Iris Segmentation Based on Mixture of Gaussian Distribution

    Fatma Mallouli

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 243-248, 2019, DOI:10.31209/2019.100000069

    Abstract Density estimation via Gaussian mixture modelling has been successfully applied to image segmentation. In this paper, we have learned distributions mixture model to the pixel of an iris image as training data. We introduce the proposed algorithm by adapting the Expectation-Maximization (EM) algorithm. To further improve the accuracy for iris segmentation, we consider the EM algorithm in Markovian and non Markovian cases. Simulated data proves the accuracy of our algorithm. The proposed method is tested on a subset of the CASIA database by Chinese Academy of Sciences Institute of Automation-IrisTwins. The obtained results have shown a significant improvement of our… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Anticipation System (IDAS) for IEEE 802.15.4 Devices

    Usman Tariq

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 231-242, 2019, DOI:10.31209/2018.100000040

    Abstract Wireless Sensor Networks (WSNs) empower the reflection of the environment with an extraordinary resolve. These systems are combination of several minuscule squat-cost, and stumpy-power on-chip transceiver sensing motes. Characteristically, a sensing device comprises of four key gears: an identifying element for data attainment, a microcontroller for native data dispensation, a message component to permit the broadcast/response of data to/from additional associated hardware, and lastly, a trivial energy source. Near field frequency series and inadequate bandwidth of transceiver device drags to multi-stage data transactions at minimum achievable requirements. State of art, and prevailing operating systems, such as TinyOS (Levis, et.al. 2005),… More >

  • Open Access

    ARTICLE

    Image Classification Using Optimized MKL for SSPM

    Lu Wu, Quan Liu, Ping Lou

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 249-257, 2019, DOI:10.31209/2018.100000010

    Abstract The scheme of spatial pyramid matching (SPM) causes feature ambiguity near dividing lines because it divides an image into different scales in a fixed manner. A new method called soft SPM (sSPM) is proposed in this paper to reduce feature ambiguity. First, an auxiliary area rotating around a dividing line in four orientations is used to correlate the feature relativity. Second, sSPM is performed to combine these four orientations to describe the image. Finally, an optimized multiple kernel learning (MKL) algorithm with three basic kernels for the support vector machine is applied. Specifically, for each level, a suitable kernel is… More >

  • Open Access

    ARTICLE

    Adaptive Hybrid Control Scheme for Controlling the Position of Coaxial Tri‐ Rotor UAS

    Rana Javed Masood1, DaoBo Wang1, Zain Anwar Ali2, Muhammad Anwar2

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 295-304, 2019, DOI:10.31209/2018.100000009

    Abstract In this article, adaptive hybrid control scheme is proposed for controlling the position of a coaxial tri-rotor unmanned aerial system (UAS) in the presence of input saturation and external wind disturbance. The adaptive hybrid controller consists of model reference adaptive control with integral feedback (MRACI) and proportional integral derivative (PID) controller. The adaptive controller deals with the flight dynamics uncertainties and PID controller is used for tuning the gains of MRACI whereas the stability of system is verified by Lyapunov stability criterion. The integrator improves the order of the system thereby improving the convergence rate by rejecting the noise and… More >

  • Open Access

    ARTICLE

    Optimal Tuning for Load Frequency Control Using Ant Lion Algorithm in Multi‐Area Interconnected Power System

    Nour EL Yakine Koubaa, Mohamed Menaaa, Kambiz Tehranib, Mohamed Boudoura

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 279-294, 2019, DOI:10.31209/2018.100000007

    Abstract This paper presents the use of a novel nature inspired meta-heuristic algorithm namely Ant Lion Optimizer (ALO), which is inspired from the ant lions hunting mechanism to enhance the frequency regulation and optimize the load frequency control (LFC) loop parameters. The frequency regulation issue was formulated as an optimal load frequency control problem (OLFC). The proposed ALO algorithm was applied to reach the best combination of the PID controller parameters in each control area to achieve both frequency and tie-line power flow exchange deviations minimization. The control strategy has been tested firstly with the standard two-area power system, followed by… More >

  • Open Access

    ARTICLE

    A Method for Decision Making Problems by Using Graph Representation of Soft Set Relations

    Nazan Çakmak Polat, Gözde Yaylali, Bekir Tanay

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 305-311, 2019, DOI:10.31209/2018.100000006

    Abstract Soft set theory, which was defined by D. Molodtsov, has a rich potential for applications in several fields of life. One of the successful application of the soft set theory is to construct new methods for Decision Making problems. In this study, we are introducing a method using graph representation of soft set relations to solve Decision Making problems. We have successfully applied this method to various examples. More >

  • Open Access

    ARTICLE

    Developing a Holistic Model for Assessing the ICT Impact on Organizations: A Managerial Perspective

    Farrukh Saleem1,2, Naomie Salim2, Abdulrahman H. Altalhi1, Abdullah AL‐Malaise AL‐Ghamdi1, Zahid Ullah1, Noor ul Qayyum1

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 259-277, 2019, DOI:10.31209/2018.100000002

    Abstract Organizations are currently more dependent on Information and Communication Technology (ICT) resources. The main purpose of this research is to help the organization in order to maintain the quality of their ICT project based on evaluation criteria presented in this research. This paper followed several steps to support the methodology section. Firstly, an experimental investigation conducted to explore the values assessment criterion, an organization may realize from ICT project such as information systems, enterprise systems and IT infrastructure. Secondly, the investigation is further based on empirical data collected and analyzed from the respondents of six case studies using questionnaire based… More >

  • Open Access

    ARTICLE

    PID Tuning Method Using Single-Valued Neutrosophic Cosine Measure and Genetic Algorithm

    Jun Ye

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 15-23, 2019, DOI:10.31209/2018.100000067

    Abstract Because existing proportional-integral-derivative (PID) tuning method using similarity measures of single-valued neutrosophic sets (SVNSs) and an increasing step algorithm shows its complexity and inconvenience, this paper proposes a PID tuning method using a cosine similarity measure of SVNSs and genetic algorithm (GA) to improve the existing PID tuning method. In the tuning process, the step response characteristic values (rising time, settling time, overshoot ratio, undershoot ratio, peak time, and steady-state error) of the control system are converted into the single-valued neutrosophic set (SVNS) by the neutrosophic membership functions (Neutrosophication). Then the values of three appropriate parameters in a PID controller… More >

  • Open Access

    ARTICLE

    Active Detecting DDoS Attack Approach Based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones

    Hsing‐Chung Chen1,2, Shyi‐Shiun Kuo1,3

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 217-228, 2019, DOI:10.31209/2018.100000057

    Abstract Nowadays, more and more smartphones communicate to each other’s by using some popular Next Generation Instant Messaging (NGIM) applications (Apps) which are based on the blockchain (BC) technologies, such as XChat, via IPv4/IPv6 dual stack network environments. Owing to XChat addresses are soon to be implemented as stealth addresses, any DoS attack activated form malicious XChat node will be treated as a kind of DDoS attack. Therefore, the huge NGIM usages with stealth addresses in IPv4/IPv6 dual stack mobile networks, mobile devices will suffer the Distributed Denial of Service (DDoS) attack from Internet. The probing method is deployed in this… More >

Displaying 1741-1750 on page 175 of 1767. Per Page