Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis

    Sumit Kumar1,*, S. Indu2, Gurjit Singh Walia1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1035-1051, 2023, DOI:10.32604/iasc.2023.024469

    Abstract Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad of fields. The increased popularity of the android platform entices malware developers to design malicious apps to achieve their malevolent intents. Also, static analysis approaches fail to detect run-time behaviors of malicious apps. To address these issues, an optimal unification of static and dynamic features for smartphone security analysis is proposed. The proposed solution exploits both static and dynamic features for generating a highly distinct unified feature vector using graph based cross-diffusion strategy. Further, a unified feature is subjected to the fuzzy-based classification… More >

  • Open Access

    ARTICLE

    Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm

    R. S. Aashmi1, T. Jaya2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 79-95, 2023, DOI:10.32604/iasc.2023.024291

    Abstract

    Cloud computing is the technology that is currently used to provide users with infrastructure, platform, and software services effectively. Under this system, Platform as a Service (PaaS) offers a medium headed for a web development platform that uniformly distributes the requests and resources. Hackers using Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks abruptly interrupt these requests. Even though several existing methods like signature-based, statistical anomaly-based, and stateful protocol analysis are available, they are not sufficient enough to get rid of Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks and hence there is a… More >

  • Open Access

    ARTICLE

    Design and Analysis of Novel Three-Phase PFC for IM Drives

    V. Kavitha1,*, K. Subramanian2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 231-241, 2023, DOI:10.32604/iasc.2023.024257

    Abstract Induction motor drives (IMDs) can achieve high performance levels comparable to dc motor drives. A major problem in getting high dynamic performance in an IMD is the coupling between the flux and torque producing components of stator current. This is successfully overcome in FOC (Field-Oriented Control) IM, making it to the industry standard control. The performance of an IMD with an improved power quality converter at the front end is presented in this study. In the IMD, boost converter is employed to reduce power quality difficulties at the utility interface. As the boost converter contains only one switch, it results… More >

  • Open Access

    ARTICLE

    Machine Learning Controller for DFIG Based Wind Conversion System

    P. Srinivasan1,*, P. Jagatheeswari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 381-397, 2023, DOI:10.32604/iasc.2023.024179

    Abstract Renewable energy production plays a major role in satisfying electricity demand. Wind power conversion is one of the most popular renewable energy sources compared to other sources. Wind energy conversion has two major types of generators such as the Permanent Magnet Synchronous Generator (PMSG) and the Doubly Fed Induction Generator (DFIG). The maximum power tracking algorithm is a crucial controller, a wind energy conversion system for generating maximum power in different wind speed conditions. In this article, the DFIG wind energy conversion system was developed in Matrix Laboratory (MATLAB) and designed a machine learning (ML) algorithm for the rotor and… More >

  • Open Access

    ARTICLE

    A Substrate Integrated Waveguide Based Filtenna for X and Ku Band Application

    S. Leo Pauline1,*, T. R. GaneshBabu2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 465-473, 2023, DOI:10.32604/iasc.2023.024030

    Abstract In this paper Substrate Integrated Waveguide-based filtenna operating at Ku band is proposed. The model is designed on a low loss dielectric substrate having a thickness of 0.508 mm and comprises of shorting vias along two edges of the substrate walls. To realize a bandpass filter, secondary shorting vias are placed close to primary shorting vias. The dimension and position of the vias are carefully analyzed for Ku band frequencies. The model is fabricated on Roger RT/duroid 5880 and the performance characteristics are measured. The proposed model achieves significant impedance characteristics with wider bandwidth in the Ku band. The model also… More >

  • Open Access

    ARTICLE

    A Novel Radial Basis Function Neural Network Approach for ECG Signal Classification

    S. Sathishkumar1,*, R. Devi Priya2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 129-148, 2023, DOI:10.32604/iasc.2023.023817

    Abstract Electrocardiogram (ECG) is a diagnostic method that helps to assess and record the electrical impulses of heart. The traditional methods in the extraction of ECG features is inneffective for avoiding the computational abstractions in the ECG signal. The cardiologist and medical specialist find numerous difficulties in the process of traditional approaches. The specified restrictions are eliminated in the proposed classifier. The fundamental aim of this work is to find the R-R interval. To analyze the blockage, different approaches are implemented, which make the computation as facile with high accuracy. The information are recovered from the MIT-BIH dataset. The retrieved data… More >

  • Open Access

    ARTICLE

    A Hybrid Approach to Neighbour Discovery in Wireless Sensor Networks

    Sagar Mekala1,*, K. Shahu Chatrapati2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 581-593, 2023, DOI:10.32604/iasc.2023.023539

    Abstract In the contemporary era of unprecedented innovations such as Internet of Things (IoT), modern applications cannot be imagined without the presence of Wireless Sensor Network (WSN). Nodes in WSN use neighbour discovery (ND) protocols to have necessary communication among the nodes. Neighbour discovery process is crucial as it is to be done with energy efficiency and minimize discovery latency and maximize percentage of neighbours discovered. The current ND approaches that are indirect in nature are categorized into methods of removal of active slots from wake-up schedules and intelligent addition of new slots. The two methods are found to have certain… More >

  • Open Access

    ARTICLE

    Pre-Trained Deep Neural Network-Based Computer-Aided Breast Tumor Diagnosis Using ROI Structures

    Venkata Sunil Srikanth*, S. Krithiga

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 63-78, 2023, DOI:10.32604/iasc.2023.023474

    Abstract Deep neural network (DNN) based computer-aided breast tumor diagnosis (CABTD) method plays a vital role in the early detection and diagnosis of breast tumors. However, a Brightness mode (B-mode) ultrasound image derives training feature samples that make closer isolation toward the infection part. Hence, it is expensive due to a meta-heuristic search of features occupying the global region of interest (ROI) structures of input images. Thus, it may lead to the high computational complexity of the pre-trained DNN-based CABTD method. This paper proposes a novel ensemble pre-trained DNN-based CABTD method using global- and local-ROI-structures of B-mode ultrasound images. It conveys… More >

  • Open Access

    ARTICLE

    Detection of Toxic Content on Social Networking Platforms Using Fine Tuned ULMFiT Model

    Hafsa Naveed1, Abid Sohail2, Jasni Mohamad Zain3,*, Noman Saleem4, Rao Faizan Ali5, Shahid Anwar6

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 15-30, 2023, DOI:10.32604/iasc.2023.023277

    Abstract Question and answer websites such as Quora, Stack Overflow, Yahoo Answers and Answer Bag are used by professionals. Multiple users post questions on these websites to get the answers from domain specific professionals. These websites are multilingual meaning they are available in many different languages. Current problem for these types of websites is to handle meaningless and irrelevant content. In this paper we have worked on the Quora insincere questions (questions which are based on false assumptions or questions which are trying to make a statement rather than seeking for helpful answers) dataset in order to identify user insincere questions,… More >

  • Open Access

    ARTICLE

    Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction

    Huiyu Sun*, Ralph Grishman

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1415-1423, 2022, DOI:10.32604/iasc.2022.030794

    Abstract Active learning methods which present selected examples from the corpus for annotation provide more efficient learning of supervised relation extraction models, but they leave the developer in the unenviable role of a passive informant. To restore the developer’s proper role as a partner with the system, we must give the developer an ability to inspect the extraction model during development. We propose to make this possible through a representation based on lexicalized dependency paths (LDPs) coupled with an active learner for LDPs. We apply LDPs to both simulated and real active learning with ACE as evaluation and a year’s newswire… More >

Displaying 681-690 on page 69 of 1767. Per Page