Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Optimum Design of Stair-Climbing Robots Using Taguchi Method

    A. Arunkumar1,*, S. Ramabalan1, D. Elayaraja2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1229-1244, 2023, DOI:10.32604/iasc.2023.027388

    Abstract Environmental issues like pollution are major threats to human health. Many systems are developed to reduce pollution. In this paper, an optimal mobile robot design to reduce pollution in Green supply chain management system. Green supply chain management involves as similating environmentally and economically feasible solutions into the supply chain life-cycle. Smartness, advanced technologies, and advanced networks are becoming pillars of a sustainable supply chain management system. At the same time, there is much change happening in the logistics industry. They are moving towards a new logistics model. In the new model, robotic logistics has a vital role. The reasons… More >

  • Open Access

    ARTICLE

    Cross-Tier Interference Mitigation in 3D HetNets for LTE and Wi-Fi Access

    M. Rekha1,*, M. Bhuvaneswari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1211-1227, 2023, DOI:10.32604/iasc.2023.027368

    Abstract Due to the unprecedented rate of transformation in the field of wireless communication industry, there is a need to prioritise the coverage, network power and throughput as preconditions. In Heterogeneous Networks (HetNets) the low power node inclusion like Femto and Pico cells creates a network of Multi-Tier (M-Tier) which is regarded as the most significant strategy for enhancing the coverage, throughput, 4G Long Term Evolution (LTE) ability. This work mainly focuses on M-Tier 3D Heterogeneous Networks Energy Efficiency (EE) based Carrier Aggregation (CA) scheme for streaming real-time huge data like images. At first, M-Tier 3D HetNets scheme was made for… More >

  • Open Access

    ARTICLE

    Intelligent Deployment Model for Target Coverage in Wireless Sensor Network

    K. Subramanian*, S. Shanmugavel

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 739-754, 2023, DOI:10.32604/iasc.2023.027248

    Abstract Target coverage and continuous connection are the major recital factors for Wireless Sensor Network (WSN). Several previous research works studied various algorithms for target coverage difficulties; however they lacked to focus on improving the network’s life time in terms of energy. This research work mainly focuses on target coverage and area coverage problem in a heterogeneous WSN with increased network lifetime. The dynamic behavior of the target nodes is unpredictable, because the target nodes may move at any time in any direction of the network. Thus, target coverage becomes a major problem in WSN and its applications. To solve the… More >

  • Open Access

    ARTICLE

    Main Melody Configuration and Chord Algorithm for Relaxing Music Generation

    Chih-Fang Huang1,*, Ai-Hsien Fan2, Jin-Huang Huang3, Hsing-Cheng Huang3

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 661-673, 2023, DOI:10.32604/iasc.2023.027165

    Abstract This study applies the diatonic chord in music theory, utilization rate, and the close relationship between the main chord system, the dominant chord system, and the subordinate chord system. From the perspective of music theory, the computer can automatically and quickly analyze the music, and establish a set of algorithms for configuring the chord accompaniment for the main melody, called the symmetrical circle of fifths algorithm, SCFA (Symmetrical Circle of Fifths Algorithm). SCFA can immediately confirm the key, perform harmony analysis, configure chord accompaniment for the main melody, and effectively and correctly complete any given melody or interval. It can… More >

  • Open Access

    ARTICLE

    Fuzzy with Metaheuristics Based Routing for Clustered Wireless Sensor Networks

    Ashit Kumar Dutta1,*, Yasser Albagory2, Majed Alsanea3, Abdul Rahaman Wahab Sait4, Hazim Saleh AlRawashdeh5

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 367-380, 2023, DOI:10.32604/iasc.2023.027076

    Abstract Wireless sensor network (WSN) plays a vital part in real time tracking and data collection applications. WSN incorporates a set of numerous sensor nodes (SNs) commonly utilized to observe the target region. The SNs operate using an inbuilt battery and it is not easier to replace or charge it. Therefore, proper utilization of available energy in the SNs is essential to prolong the lifetime of the WSN. In this study, an effective Type-II Fuzzy Logic with Butterfly Optimization Based Route Selection (TFL-BOARS) has been developed for clustered WSN. The TFL-BOARS technique intends to optimally select the cluster heads (CHs) and… More >

  • Open Access

    ARTICLE

    A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform

    Amishi Mahesh Kapadia*, P. Nithyanandam

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 537-552, 2023, DOI:10.32604/iasc.2023.027070

    Abstract Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image. We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform. The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload. By scrambling the cover image, Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.… More >

  • Open Access

    ARTICLE

    Intrusion Detection Using Ensemble Wrapper Filter Based Feature Selection with Stacking Model

    D. Karthikeyan1,*, V. Mohan Raj2, J. Senthilkumar2, Y. Suresh2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 645-659, 2023, DOI:10.32604/iasc.2023.027039

    Abstract The number of attacks is growing tremendously in tandem with the growth of internet technologies. As a result, protecting the private data from prying eyes has become a critical and tough undertaking. Many intrusion detection solutions have been offered by researchers in order to decrease the effect of these attacks. For attack detection, the prior system has created an SMSRPF (Stacking Model Significant Rule Power Factor) classifier. To provide creative instance detection, the SMSRPF combines the detection of trained classifiers such as DT (Decision Tree) and RF (Random Forest). Nevertheless, it does not generate any accurate findings that are adequate.… More >

  • Open Access

    ARTICLE

    An Intelligent Medical Expert System Using Temporal Fuzzy Rules and Neural Classifier

    Praveen Talari1,*, A. Suresh2, M. G. Kavitha3

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1053-1067, 2023, DOI:10.32604/iasc.2023.027024

    Abstract As per World Health Organization report which was released in the year of 2019, Diabetes claimed the lives of approximately 1.5 million individuals globally in 2019 and around 450 million people are affected by diabetes all over the world. Hence it is inferred that diabetes is rampant across the world with the majority of the world population being affected by it. Among the diabetics, it can be observed that a large number of people had failed to identify their disease in the initial stage itself and hence the disease level moved from Type-1 to Type-2. To avoid this situation, we… More >

  • Open Access

    ARTICLE

    An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform

    K. Meenakshi1,*, G. Maragatham2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 627-643, 2023, DOI:10.32604/iasc.2023.026961

    Abstract Deep Learning is one of the most popular computer science techniques, with applications in natural language processing, image processing, pattern identification, and various other fields. Despite the success of these deep learning algorithms in multiple scenarios, such as spam detection, malware detection, object detection and tracking, face recognition, and automatic driving, these algorithms and their associated training data are rather vulnerable to numerous security threats. These threats ultimately result in significant performance degradation. Moreover, the supervised based learning models are affected by manipulated data known as adversarial examples, which are images with a particular level of noise that is invisible… More >

  • Open Access

    ARTICLE

    Modeling Target Detection and Performance Analysis of Electronic Countermeasures for Phased Radar

    T. Jagadesh1,2, B. Sheela Rani3,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 449-463, 2023, DOI:10.32604/iasc.2023.026868

    Abstract Interference is a key factor in radar return misdetection. Strong interference might make it difficult to detect the signal or targets. When interference occurs in the sidelobes of the antenna pattern, Sidelobe Cancellation (SLC) and Sidelobe Blanking are two unique solutions to solve this problem (SLB). Aside from this approach, the probability of false alert and likelihood of detection are the most essential parameters in radar. The chance of a false alarm for any radar system should be minimal, and as a result, the probability of detection should be high. There are several interference cancellation strategies in the literature that… More >

Displaying 631-640 on page 64 of 1767. Per Page