Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Optimized ANFIS Model for Stable Clustering in Cognitive Radio Network

    C. Ambhika1,*, C. Murukesh2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 827-838, 2023, DOI:10.32604/iasc.2023.026832

    Abstract With the demand for wireless technology, Cognitive Radio (CR) technology is identified as a promising solution for effective spectrum utilization. Connectivity and robustness are the two main difficulties in cognitive radio networks due to their dynamic nature. These problems are solved by using clustering techniques which group the cognitive users into logical groups. The performance of clustering in cognitive network purely depends on cluster head selection and parameters considered for clustering. In this work, an adaptive neuro-fuzzy inference system (ANFIS) based clustering is proposed for the cognitive network. The performance of ANFIS improved using hybrid particle swarm and whale optimization… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification

    Rasha Almarshdi1,2,*, Laila Nassef1, Etimad Fadel1, Nahed Alowidi1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 297-320, 2023, DOI:10.32604/iasc.2023.026799

    Abstract Internet of Things (IoT) is the most widespread and fastest growing technology today. Due to the increasing of IoT devices connected to the Internet, the IoT is the most technology under security attacks. The IoT devices are not designed with security because they are resource constrained devices. Therefore, having an accurate IoT security system to detect security attacks is challenging. Intrusion Detection Systems (IDSs) using machine learning and deep learning techniques can detect security attacks accurately. This paper develops an IDS architecture based on Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) deep learning algorithms. We implement our model… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System for SDN Using Machine Learning

    G. Logeswari*, S. Bose, T. Anitha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 867-880, 2023, DOI:10.32604/iasc.2023.026769

    Abstract Software Defined Networking (SDN) has emerged as a promising and exciting option for the future growth of the internet. SDN has increased the flexibility and transparency of the managed, centralized, and controlled network. On the other hand, these advantages create a more vulnerable environment with substantial risks, culminating in network difficulties, system paralysis, online banking frauds, and robberies. These issues have a significant detrimental impact on organizations, enterprises, and even economies. Accuracy, high performance, and real-time systems are necessary to achieve this goal. Using a SDN to extend intelligent machine learning methodologies in an Intrusion Detection System (IDS) has stimulated… More >

  • Open Access

    ARTICLE

    Impact of Data Quality on Question Answering System Performances

    Rachid Karra*, Abdelali Lasfar

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 335-349, 2023, DOI:10.32604/iasc.2023.026695

    Abstract In contrast with the research of new models, little attention has been paid to the impact of low or high-quality data feeding a dialogue system. The present paper makes the first attempt to fill this gap by extending our previous work on question-answering (QA) systems by investigating the effect of misspelling on QA agents and how context changes can enhance the responses. Instead of using large language models trained on huge datasets, we propose a method that enhances the model's score by modifying only the quality and structure of the data feed to the model. It is important to identify… More >

  • Open Access

    ARTICLE

    Economic Analysis of Demand Response Incorporated Optimal Power Flow

    Ulagammai Meyyappan*, S. Joyal Isac

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 399-413, 2023, DOI:10.32604/iasc.2023.026627

    Abstract Demand Response (DR) is one of the most cost-effective and unfailing techniques used by utilities for consumer load shifting. This research paper presents different DR programs in deregulated environments. The description and the classification of DR along with their potential benefits and associated cost components are presented. In addition, most DR measurement indices and their evaluation are also highlighted. Initially, the economic load model incorporated thermal, wind, and energy storage by considering the elasticity market price from its calculated locational marginal pricing (LMP). The various DR programs like direct load control, critical peak pricing, real-time pricing, time of use, and… More >

  • Open Access

    ARTICLE

    A Novel MegaBAT Optimized Intelligent Intrusion Detection System in Wireless Sensor Networks

    G. Nagalalli*, G. Ravi

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 475-490, 2023, DOI:10.32604/iasc.2023.026571

    Abstract Wireless Sensor Network (WSN), which finds as one of the major components of modern electronic and wireless systems. A WSN consists of numerous sensor nodes for the discovery of sensor networks to leverage features like data sensing, data processing, and communication. In the field of medical health care, these network plays a very vital role in transmitting highly sensitive data from different geographic regions and collecting this information by the respective network. But the fear of different attacks on health care data typically increases day by day. In a very short period, these attacks may cause adversarial effects to the… More >

  • Open Access

    ARTICLE

    Enhanced Disease Identification Model for Tea Plant Using Deep Learning

    Santhana Krishnan Jayapal1, Sivakumar Poruran2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1261-1275, 2023, DOI:10.32604/iasc.2023.026564

    Abstract Tea plant cultivation plays a significant role in the Indian economy. The Tea board of India supports tea farmers to increase tea production by preventing various diseases in Tea Plant. Various climatic factors and other parameters cause these diseases. In this paper, the image retrieval model is developed to identify whether the given input tea leaf image has a disease or is healthy. Automation in image retrieval is a hot topic in the industry as it doesn’t require any form of metadata related to the images for storing or retrieval. Deep Hashing with Integrated Autoencoders is our proposed method for… More >

  • Open Access

    ARTICLE

    Combined Economic and Emission Power Dispatch Control Using Substantial Augmented Transformative Algorithm

    T. R. Manikandan*, Venkatesan Thangavelu

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 431-447, 2023, DOI:10.32604/iasc.2023.026546

    Abstract The purpose of the Combined Economic Emission Dispatch (CEED) of electric power is to offer the most exceptional schedule for production units, which must run with both low fuel costs and emission levels concurrently, thereby meeting the lack of system equality and inequality constraints. Economic and emissions dispatching has become a primary and significant concern in power system networks. Consequences of using non-renewable fuels as input to exhaust power systems with toxic gas emissions and depleted resources for future generations. The optimal power allocation to generators serves as a solution to this problem. Emission dispatch reduces emissions while ignoring economic… More >

  • Open Access

    ARTICLE

    Base Station Energy Management in 5G Networks Using Wide Range Control Optimization

    J. Premalatha*, A. SahayaAnselin Nisha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 811-826, 2023, DOI:10.32604/iasc.2023.026523

    Abstract The traffic activity of fifth generation (5G) networks demand for new energy management techniques that is dynamic deep and longer duration of sleep as compared to the fourth generation (4G) network technologies that demand always for varied control and data signalling based on control base station (CBS) and data base station (DBS). Hence, this paper discusses the energy management in wireless cellular networks using wide range of control for twice the reduction in energy conservation in non-standalone deployment of 5G network. As the new radio (NR) based 5G network is configured to transmit signal blocks for every 20 ms, the proposed… More >

  • Open Access

    ARTICLE

    Effective Energy Management Scheme by IMPC

    Smarajit Ghosh*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 181-197, 2023, DOI:10.32604/iasc.2023.026496

    Abstract The primary purpose of the Energy Management Scheme (EMS) is to monitor the energy fluctuations present in the load profile. In this paper, the improved model predictive controller is adopted for the EMS in the power system. Emperor Penguin Optimization (EPO) algorithm optimized Artificial Neural Network (ANN) with Model Predictive Control (MPC) scheme for accurate prediction of load and power forecasting at the time of pre-optimizing EMS is presented. For the power generation, Renewable Energy Sources (RES) such as photo voltaic (PV) and wind turbine (WT) are utilized along with that the fuel cell is also presented in case of… More >

Displaying 641-650 on page 65 of 1767. Per Page