Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Multiobjective Economic/Environmental Dispatch Using Harris Hawks Optimization Algorithm

    T. Mahalekshmi1,*, P. Maruthupandi2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 445-460, 2023, DOI:10.32604/iasc.2023.028718

    Abstract The eminence of Economic Dispatch (ED) in power systems is significantly high as it involves in scheduling the available power from various power plants with less cost by compensating equality and inequality constrictions. The emission of toxic gases from power plants leads to environmental imbalance and so it is highly mandatory to rectify this issues for obtaining optimal performance in the power systems. In this present study, the Economic and Emission Dispatch (EED) problems are resolved as multi objective Economic Dispatch problems by using Harris Hawk’s Optimization (HHO), which is capable enough to resolve the concerned issue in a wider… More >

  • Open Access

    ARTICLE

    Malicious Activities Prediction Over Online Social Networking Using Ensemble Model

    S. Sadhasivam1, P. Valarmathie2, K. Dinakaran3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 461-479, 2023, DOI:10.32604/iasc.2023.028650

    Abstract With the vast advancements in Information Technology, the emergence of Online Social Networking (OSN) has also hit its peak and captured the attention of the young generation people. The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user. However, the attackers also target this height of OSN utilization, explicitly creating the clones of the user’s account. Various clone detection mechanisms are designed based on social-network activities. For instance, monitoring the occurrence of clone edges is done to restrict the generation of clone activities. However, this assumption is unsuitable… More >

  • Open Access

    ARTICLE

    Improved Clamped Diode Based Z-Source Network for Three Phase Induction Motor

    D. Bensiker Raja Singh1,*, R. Suja Mani Malar2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 683-702, 2023, DOI:10.32604/iasc.2023.028492

    Abstract The 3Φ induction motor is a broadly used electric machine in industrial applications, which plays a vital role in industries because of having plenty of beneficial impacts like low cost and easiness but the problems like decrease in motor speed due to load, high consumption of current and high ripple occurrence of ripples have reduced its preferences. The ultimate objective of this study is to control change in motor speed due to load variations. An improved Trans Z Source Inverter (ΓZSI) with a clamping diode is employed to maintain constant input voltage, reduce ripples and voltage overshoot. To operate induction… More >

  • Open Access

    ARTICLE

    DC-Link Capacitor Optimization in AC–DC Converter by Load Current Prediction

    V. V. Nijil*, P. Selvan

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1043-1062, 2023, DOI:10.32604/iasc.2023.028028

    Abstract Alternating Current–Direct Current (AC–DC) converters require a high value bulk capacitor or a filter capacitor between the DC–DC conversion stages, which in turn causes many problems in the design of a AC–DC converter. The component package size for this capacitor is large due to its high voltage rating and capacitance value. In addition, the high charging current creates more problems during the product compliance testing phase. The shelf life of these specific high value capacitors is less than that of Multilayer Ceramic Capacitors (MLCC), which limits its use for the highly reliable applications. This paper presents a feasibility study to… More >

  • Open Access

    ARTICLE

    A Novel ANFIS Based SMC with Fractional Order PID Controller

    A. Jegatheesh1,*, M. Germin Nisha2, N. Kopperundevi3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 745-760, 2023, DOI:10.32604/iasc.2023.028011

    Abstract Interacting The highest storage capacity of a circular tank makes it popular in process industries. Because of the varying surface area of the cross-sections of the tank, this two-tank level system has nonlinear characteristics. Controlling the flow rate of liquid is one of the most difficult challenges in the production process. This proposed effort is critical in preventing time delays and errors by managing the fluid level. Several scholars have explored and explored ways to reduce the problem of nonlinearity, but their techniques have not yielded better results. Different types of controllers with various techniques are implemented by the proposed… More >

  • Open Access

    ARTICLE

    Optimized PI Controller Based Reboost Luo Converter for Micro Grid Application

    R. K. Negesh1,*, S. Karthikeyan2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1151-1172, 2023, DOI:10.32604/iasc.2023.027764

    Abstract In the recent era, the significance of Renewable Energy (RE) sources in the process of power generation has attained considerable attention as it provides multiple beneficial impacts without harming the environment. The Photovoltaic (PV) and Doubly-Fed Induction Generator (DFIG) fed wind turbine are employed as hybrid power sources in this study. The output voltages of these sources are independently controlled by separate controllers in an optimal manner for effectively maximizing the overall performance of the system. The Reboost Luo converter is introduced in this work to maximize the output voltage of PV in an efficient manner whereas the Grey Wolf… More >

  • Open Access

    ARTICLE

    Robust Frequency Estimation Under Additive Symmetric α-Stable Gaussian Mixture Noise

    Peng Wang1, Yulu Tian2, Bolong Men1,*, Hailong Song1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 83-95, 2023, DOI:10.32604/iasc.2023.027602

    Abstract Here the estimating problem of a single sinusoidal signal in the additive symmetric α-stable Gaussian (ASαSG) noise is investigated. The ASαSG noise here is expressed as the additive of a Gaussian noise and a symmetric α-stable distributed variable. As the probability density function (PDF) of the ASαSG is complicated, traditional estimators cannot provide optimum estimates. Based on the Metropolis-Hastings (M-H) sampling scheme, a robust frequency estimator is proposed for ASαSG noise. Moreover, to accelerate the convergence rate of the developed algorithm, a new criterion of reconstructing the proposal covariance is derived, whose main idea is updating the proposal variance using… More >

  • Open Access

    ARTICLE

    Enhanced Detection of Cerebral Atherosclerosis Using Hybrid Algorithm of Image Segmentation

    Shakunthala Masi*, Helenprabha Kuttiappan

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 733-744, 2023, DOI:10.32604/iasc.2023.025919

    Abstract In medical science for envisaging human body’s phenomenal structure a major part has been driven by image processing techniques. Major objective of this work is to detect of cerebral atherosclerosis for image segmentation application. Detection of some abnormal structures in human body has become a difficult task to complete with some simple images. For expounding and distinguishing neural architecture of human brain in an effective manner, MRI (Magnetic Resonance Imaging) is one of the most suitable and significant technique. Here we work on detection of Cerebral Atherosclerosis from MRI images of patients. Cerebral Atherosclerosis is a cerebral vascular disease causes… More >

  • Open Access

    ARTICLE

    NDN Content Poisoning Mitigation Using Bird Swarm Optimization and Trust Value

    S. V. Vijaya Karthik*, J. Arputha Vijaya Selvi

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 833-847, 2023, DOI:10.32604/iasc.2023.025404

    Abstract Information-Centric Networking (ICN) is considered a viable strategy for regulating Internet consumption using the Internet’s underlying architecture. Although Named Data Networking (NDN) and its reference-based implementation, the NDN Forwarding Daemon (NFD), are the most established ICN solutions, their vulnerability to the Content Poisoning Attack (CPA) is regarded as a severe threat that might dramatically impact this architecture. Content Poisoning can significantly minimize the impact of NDN’s universal data caching. Using verification signatures to protect against content poisoning attacks may be impractical due to the associated costs and the volume of messages sent across the network, resulting in high computational costs.… More >

  • Open Access

    ARTICLE

    Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3801-3813, 2023, DOI:10.32604/iasc.2023.032267

    Abstract Due to the mobility of users in an organization, inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). By considering this challenge; we focus to present dynamic time and location information in CP-ABE with multi-authorization. At first, along with the set of attributes of the users, their corresponding location is also embedded. Geohash is used to encode the latitude and longitude of the user’s position. Then, decrypt time period and access time period of users are defined using the new time tree (NTT) structure. The NTT sets the encrypted duration of… More >

Displaying 441-450 on page 45 of 1767. Per Page