Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Hopping-Aware Cluster Header Capability for Sensor Relocation in Mobile IoT Networks

    Moonseong Kim1, Jaeyoung Park2, Young-Joon Kim3, Woochan Lee4,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1613-1625, 2023, DOI:10.32604/iasc.2023.033081

    Abstract Mobile sensor nodes such as hopping sensors are of critical importance in data collection. However, the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes. Thus, it is evident that the relocation of mobile sensors is the most desirable method to recover the sensing holes. The previous research conducted by the authors so far demonstrated the most realistic hopping sensor relocation scheme, which is suitable for the distributed environment. In previous studies, the cluster header plays an essential role in detecting the sensing hole and requesting the neighboring cluster to recover the sensing hole that… More >

  • Open Access

    ARTICLE

    Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

    A. Ramachandran1,*, P. Ramadevi2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2055-2070, 2023, DOI:10.32604/iasc.2023.032942

    Abstract Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly convenient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentication process. Blockchain technology is utilized in this study to enable… More >

  • Open Access

    ARTICLE

    Computing Connected Resolvability of Graphs Using Binary Enhanced Harris Hawks Optimization

    Basma Mohamed1,*, Linda Mohaisen2, Mohamed Amin1

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2349-2361, 2023, DOI:10.32604/iasc.2023.032930

    Abstract In this paper, we consider the NP-hard problem of finding the minimum connected resolving set of graphs. A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the vertices in B. A resolving set B of G is connected if the subgraph induced by B is a nontrivial connected subgraph of G. The cardinality of the minimal resolving set is the metric dimension of G and the cardinality of minimum connected resolving set is the connected metric dimension of G. The problem is solved heuristically… More >

  • Open Access

    ARTICLE

    Prediction of Link Failure in MANET-IoT Using Fuzzy Linear Regression

    R. Mahalakshmi1,*, V. Prasanna Srinivasan2, S. Aghalya3, D. Muthukumaran4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1627-1637, 2023, DOI:10.32604/iasc.2023.032709

    Abstract A Mobile Ad-hoc NETwork (MANET) contains numerous mobile nodes, and it forms a structure-less network associated with wireless links. But, the node movement is the key feature of MANETs; hence, the quick action of the nodes guides a link failure. This link failure creates more data packet drops that can cause a long time delay. As a result, measuring accurate link failure time is the key factor in the MANET. This paper presents a Fuzzy Linear Regression Method to measure Link Failure (FLRLF) and provide an optimal route in the MANET-Internet of Things (IoT). This work aims to predict link… More >

  • Open Access

    ARTICLE

    Novel Multimodal Biometric Feature Extraction for Precise Human Identification

    J. Vasavi1, M. S. Abirami2,*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1349-1363, 2023, DOI:10.32604/iasc.2023.032604

    Abstract In recent years, biometric sensors are applicable for identifying important individual information and accessing the control using various identifiers by including the characteristics like a fingerprint, palm print, iris recognition, and so on. However, the precise identification of human features is still physically challenging in humans during their lifetime resulting in a variance in their appearance or features. In response to these challenges, a novel Multimodal Biometric Feature Extraction (MBFE) model is proposed to extract the features from the noisy sensor data using a modified Ranking-based Deep Convolution Neural Network (RDCNN). The proposed MBFE model enables the feature extraction from… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Enabled Decision Support System on E-Healthcare Environment

    B. Karthikeyan1,*, K. Nithya2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2299-2313, 2023, DOI:10.32604/iasc.2023.032585

    Abstract In today’s digital era, e-healthcare systems exploit digital technologies and telecommunication devices such as mobile devices, computers and the internet to provide high-quality healthcare services. E-healthcare decision support systems have been developed to optimize the healthcare services and enhance a patient’s health. These systems enable rapid access to the specialized healthcare services via reliable information, retrieved from the cases or the patient histories. This phenomenon reduces the time taken by the patients to physically visit the healthcare institutions. In the current research work, a new Shuffled Frog Leap Optimizer with Deep Learning-based Decision Support System (SFLODL-DSS) is designed for the… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Swot Analysis in Construction and Demolition Waste Management

    R. Rema*, N. Nalanth

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1497-1506, 2023, DOI:10.32604/iasc.2023.032540

    Abstract Researchers worldwide have employed a varied array of sources to calculate the successful management of Construction and Demolition (C&DW). Limited research has been undertaken in the domain of Construction and Demolition Waste Management (C&DWM) and consequently leaving a large gap in the availability of effective management techniques. Due to the limited time available for building removal and materials collection, preparing for building materials reuse at the end of life is frequently a challenging task. In this research work Convolutional Neural Network-Long Short-Term Memory (CNN-LSTM) is proposed to predict the number of waste materials that are obtained from a building at… More >

  • Open Access

    ARTICLE

    A Multi-Modal Deep Learning Approach for Emotion Recognition

    H. M. Shahzad1,3, Sohail Masood Bhatti1,3,*, Arfan Jaffar1,3, Muhammad Rashid2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1561-1570, 2023, DOI:10.32604/iasc.2023.032525

    Abstract In recent years, research on facial expression recognition (FER) under mask is trending. Wearing a mask for protection from Covid 19 has become a compulsion and it hides the facial expressions that is why FER under the mask is a difficult task. The prevailing unimodal techniques for facial recognition are not up to the mark in terms of good results for the masked face, however, a multimodal technique can be employed to generate better results. We proposed a multimodal methodology based on deep learning for facial recognition under a masked face using facial and vocal expressions. The multimodal has been… More >

  • Open Access

    ARTICLE

    Sustainable Learning of Computer Programming Languages Using Mind Mapping

    Shahla Gul1, Muhammad Asif1, Zubair Nawaz2, Muhammad Haris Aziz3, Shahzada Khurram4, Muhammad Qaiser Saleem5, Elturabi Osman Ahmed Habib5, Muhammad Shafiq6,*, Osama E. Sheta7

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1687-1697, 2023, DOI:10.32604/iasc.2023.032494

    Abstract In the current era of information technology, students need to learn modern programming languages efficiently. The art of teaching/learning programming requires many logical and conceptual skills. So it’s a challenging task for the instructors/learners to teach/learn these programming languages effectively and efficiently. Mind mapping is a useful visual tool for establishing ideas and connecting them to solve problems. This research proposed an effective way to teach programming languages through visual tools. This experimental study uses a mind mapping tool to teach two programming environments: Text-based Programming and Blocks-based Programming. We performed the experiments with one hundred and sixty undergraduate students… More >

  • Open Access

    ARTICLE

    Improved Network Validity Using Various Soft Computing Techniques

    M. Yuvaraju*, R. Elakkiyavendan

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1465-1477, 2023, DOI:10.32604/iasc.2023.032417

    Abstract Nowadays, when a life span of sensor nodes are threatened by the shortage of energy available for communication, sink mobility is an excellent technique for increasing its lifespan. When communicating via a WSN, the use of nodes as a transmission method eliminates the need for a physical medium. Sink mobility in a dynamic network topology presents a problem for sensor nodes that have reserved resources. Unless the route is revised and changed to reflect the location of the mobile sink location, it will be inefficient for delivering data effectively. In the clustering strategy, nodes are grouped together to improve communication,… More >

Displaying 321-330 on page 33 of 1767. Per Page