Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,781)
  • Open Access

    ARTICLE

    Evaluation of Codebook Design Using SCMA Scheme Based on An and Dn Lattices

    G. Rajamanickam1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3037-3048, 2023, DOI:10.32604/iasc.2023.029996

    Abstract The sparse code multiple access (SCMA) scheme is a Non-Orthogonal Multiple Access (NOMA) type of scheme that is used to handle the uplink component of mobile communication in the current generation. A need of the 5G mobile network is the ability to handle more users. To accommodate this, the SCMA allows each user to deploy a variety of sub-carrier broadcasts, and several consumers may contribute to the same frequency using superposition coding. The SCMA approach, together with codebook design for each user, is used to improve channel efficiency through better management of the available spectrum. However, developing a codebook with… More >

  • Open Access

    ARTICLE

    Breakdown Voltage Prediction by Utilizing the Behavior of Natural Ester for Transformer Applications

    P. Samuel Pakianathan*, R. V. Maheswari

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2717-2736, 2023, DOI:10.32604/iasc.2023.029950

    Abstract This research investigates the dielectric performance of Natural Ester (NE) using the Partial Differential Equation (PDE) tool and analyzes dielectric performance using fuzzy logic. NE nowadays is found to replace Mineral Oil (MO) due to its extensive dielectric properties. Here, the heat-tolerant Natural Esters Olive oil (NE1), Sunflower oil (NE2), and Ricebran oil (NE3) are subjected to High Voltage AC (HVAC) under different electrodes configurations. The breakdown voltage and leakage current of NE1, NE2, and NE3 under Point-Point (P-P), Sphere-Sphere (S-S), Plane-Plane (PL-PL), and Rod-Rod (R-R) are measured, and survival probability is presented. The electric field distribution is analyzed using… More >

  • Open Access

    ARTICLE

    Optimal Deep Belief Network Enabled Malware Detection and Classification Model

    P. Pandi Chandran1,*, N. Hema Rajini2, M. Jeyakarthic3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3349-3364, 2023, DOI:10.32604/iasc.2023.029946

    Abstract Cybercrime has increased considerably in recent times by creating new methods of stealing, changing, and destroying data in daily lives. Portable Document Format (PDF) has been traditionally utilized as a popular way of spreading malware. The recent advances of machine learning (ML) and deep learning (DL) models are utilized to detect and classify malware. With this motivation, this study focuses on the design of mayfly optimization with a deep belief network for PDF malware detection and classification (MFODBN-MDC) technique. The major intention of the MFODBN-MDC technique is for identifying and classifying the presence of malware exist in the PDFs. The… More >

  • Open Access

    ARTICLE

    An Adaptive Neuro-Fuzzy Inference System to Improve Fractional Order Controller Performance

    N. Kanagaraj*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3213-3226, 2023, DOI:10.32604/iasc.2023.029901

    Abstract The design and analysis of a fractional order proportional integral derivate (FOPID) controller integrated with an adaptive neuro-fuzzy inference system (ANFIS) is proposed in this study. A first order plus delay time plant model has been used to validate the ANFIS combined FOPID control scheme. In the proposed adaptive control structure, the intelligent ANFIS was designed such that it will dynamically adjust the fractional order factors (λ and µ) of the FOPID (also known as PIλDµ) controller to achieve better control performance. When the plant experiences uncertainties like external load disturbances or sudden changes in the input parameters, the stability… More >

  • Open Access

    ARTICLE

    User Interface-Based Repeated Sequence Detection Method for Authentication

    Shin Jin Kang1, Soo Kyun Kim2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2573-2588, 2023, DOI:10.32604/iasc.2023.029893

    Abstract In this paper, we propose an authentication method that use mouse and keystroke dynamics to enhance online privacy and security. The proposed method identifies personalized repeated user interface (UI) sequences by analyzing mouse and keyboard data. To this end, an Apriori algorithm based on the keystroke-level model (KLM) of the human–computer interface domain was used. The proposed system can detect repeated UI sequences based on KLM for authentication in the software. The effectiveness of the proposed method is verified through access testing using commercial applications that require intensive UI interactions. The results show using our cognitive mouse-and-keystroke dynamics system can… More >

  • Open Access

    ARTICLE

    Honey Badger Algorithm Based Clustering with Routing Protocol for Wireless Sensor Networks

    K. Arutchelvan1, R. Sathiya Priya1,*, C. Bhuvaneswari2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3199-3212, 2023, DOI:10.32604/iasc.2023.029804

    Abstract Wireless sensor network (WSN) includes a set of self-organizing and homogenous nodes employed for data collection and tracking applications. It comprises a massive set of nodes with restricted energy and processing abilities. Energy dissipation is a major concern involved in the design of WSN. Clustering and routing protocols are considered effective ways to reduce the quantity of energy dissipation using metaheuristic algorithms. In order to design an energy aware cluster-based route planning scheme, this study introduces a novel Honey Badger Based Clustering with African Vulture Optimization based Routing (HBAC-AVOR) protocol for WSN. The presented HBAC-AVOR model mainly aims to cluster… More >

  • Open Access

    ARTICLE

    A Pattern Classification Model for Vowel Data Using Fuzzy Nearest Neighbor

    Monika Khandelwal1, Ranjeet Kumar Rout1, Saiyed Umer2, Kshira Sagar Sahoo3, NZ Jhanjhi4,*, Mohammad Shorfuzzaman5, Mehedi Masud5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3587-3598, 2023, DOI:10.32604/iasc.2023.029785

    Abstract Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. One of the problems observed in the fuzzification of an unknown pattern is that importance is given only to the known patterns but not to their features. In contrast, features of the patterns play an essential role when their respective patterns overlap. In this paper, an optimal fuzzy nearest neighbor model has been introduced in which a fuzzification process has been carried out for the unknown pattern using… More >

  • Open Access

    ARTICLE

    Improved Rat Swarm Based Multihop Routing Protocol for Wireless Sensor Networks

    H. Manikandan1,*, D. Narasimhan2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2925-2939, 2023, DOI:10.32604/iasc.2023.029754

    Abstract Wireless sensor networks (WSNs) encompass a massive set of sensor nodes, which are self-configurable, inexpensive, and compact. The sensor nodes undergo random deployment in the target area and transmit data to base station using inbuilt transceiver. For reducing energy consumption and lengthen lifetime of WSN, multihop routing protocols can be designed. This study develops an improved rat swarm optimization based energy aware multi-hop routing (IRSO-EAMHR) protocol for WSN. An important intention of the IRSO-EAMHR method is for determining optimal routes to base station (BS) in the clustered WSN. Primarily, a weighted clustering process is performed to group the nodes into… More >

  • Open Access

    ARTICLE

    Recent Advances in Fatigue Detection Algorithm Based on EEG

    Fei Wang1,2, Yinxing Wan1, Man Li1,2, Haiyun Huang1,2, Li Li1, Xueying Hou1, Jiahui Pan1,2, Zhenfu Wen3, Jingcong Li1,2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3573-3586, 2023, DOI:10.32604/iasc.2023.029698

    Abstract Fatigue is a state commonly caused by overworked, which seriously affects daily work and life. How to detect mental fatigue has always been a hot spot for researchers to explore. Electroencephalogram (EEG) is considered one of the most accurate and objective indicators. This article investigated the development of classification algorithms applied in EEG-based fatigue detection in recent years. According to the different source of the data, we can divide these classification algorithms into two categories, intra-subject (within the same subject) and cross-subject (across different subjects). In most studies, traditional machine learning algorithms with artificial feature extraction methods were commonly used… More >

  • Open Access

    ARTICLE

    Integrated Privacy Preserving Healthcare System Using Posture-Based Classifier in Cloud

    C. Santhosh Kumar1, K. Vishnu Kumar2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2893-2907, 2023, DOI:10.32604/iasc.2023.029669

    Abstract Privacy-preserving online disease prediction and diagnosis are critical issues in the emerging edge-cloud-based healthcare system. Online patient data processing from remote places may lead to severe privacy problems. Moreover, the existing cloud-based healthcare system takes more latency and energy consumption during diagnosis due to offloading of live patient data to remote cloud servers. Solve the privacy problem. The proposed research introduces the edge-cloud enabled privacy-preserving healthcare system by exploiting additive homomorphic encryption schemes. It can help maintain the privacy preservation and confidentiality of patients’ medical data during diagnosis of Parkinson’s disease. In addition, the energy and delay aware computational offloading… More >

Displaying 501-510 on page 51 of 1781. Per Page