Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    Resource Allocation Using Phase Change Hyper Switching Algorithm in the Cloud Environment

    J. Praveenchandar1,*, A. Tamilarasi2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1839-1850, 2022, DOI:10.32604/iasc.2022.026354

    Abstract Cloud computing is one of the emerging technology; it provides various services like Software as a Service, Platform as a Service, and Infrastructure as a Service on demand. It reduces the cost of traditional computing by renting the resources instead of buying them for a huge cost. The usage of cloud resources is increasing day by day. Due to the heavy workload, all users cannot get uninterrupted service at some time. And the response time of some users also gets increased. Resource allocation is one of the primary issues of a cloud environment, one of the challenging problems is improving… More >

  • Open Access

    ARTICLE

    Chaotic Krill Herd with Fuzzy Based Routing Protocol for Wireless Networks

    Ashit Kumar Dutta1,*, Yasser Albagory2, Farhan M. Obesat3, Anas Waleed Abulfaraj4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1659-1674, 2022, DOI:10.32604/iasc.2022.026263

    Abstract Energy is considered a valuable source in wireless sensor networks (WSN) for effectively improving the survivability of the network. The non-uniform dispersion of load in the network causes unbalanced energy dissipation which can result in network interruption. The route selection process can be considered as an optimization problem and is solved by utilize of artificial intelligence (AI) techniques. This study introduces an energy efficient chaotic krill herd algorithm with adaptive neuro fuzzy inference system based routing (EECKHA-ANFIS) protocol for WSN. The goal of the EECKHA-ANFIS method is for deriving a better set of routes to destination in such a way… More >

  • Open Access

    ARTICLE

    Efficient Medical Image Encryption Framework against Occlusion Attack

    May A. Al-Otaibi1,*, Hesham Alhumyani1, Saleh Ibrahim2, Alaa M. Abbas2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1523-1536, 2022, DOI:10.32604/iasc.2022.026161

    Abstract Image encryption has attracted a lot of interest as an important security application for protecting confidential image data against unauthorized access. An adversary with the power to manipulate cipher image data can crop part of the image out to prevent decryption or render the decrypted image useless. This is known as the occlusion attack. In this paper, we address a vulnerability to the occlusion attack identified in the medical image encryption framework recently proposed in []. We propose adding a pixel scrambling phase to the framework and show through simulation that the extended framework effectively mitigates the occlusion attack while… More >

  • Open Access

    ARTICLE

    Effective Channel Allocation for Hybrid Network Usage Between Wi-Fi and Cellular Network

    M. Vanitha1,*, C. T. Kalaivani1, J. Kirubakaran2, R. Praveena2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1617-1627, 2022, DOI:10.32604/iasc.2022.026154

    Abstract Hybrid networks are a rising innovation for maximizing wireless network coverage without any extra need for resources. This research paper focuses on effective channel allocation for Wireless Fidelity (Wi-Fi) and cellular networks. As a novel work in this area, the Beyond Access Point Coverage (BAPC) has been presented for adequately installing cellular networks on the unlicensed Wi-Fi spectrum. Networks can straightforwardly exploit Wi-Fi distributed coordination. Our BAPC commits and permits a combat-free period to cellular network subscribers and customary Wi-Fi subscribers to encourage concurrence. This research focuses on the maximization of combined subscriber affiliation and frequency channel distribution to improve… More >

  • Open Access

    ARTICLE

    Enhanced Primary User Emulation Attack Inference in Cognitive Radio Networks Using Machine Learning Algorithm

    N. Sureka*, K. Gunaseelan

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1893-1906, 2022, DOI:10.32604/iasc.2022.026098

    Abstract Cognitive Radio (CR) is a competent technique devised to smart sense its surroundings and address the spectrum scarcity issues in wireless communication networks. The Primary User Emulation Attack (PUEA) is one of the most serious security threats affecting the performance of CR networks. In this paper, machine learning (ML) principles have been applied to detect PUEA with superior decision-making ability. To distinguish the attacking nodes, Reinforced Learning (RL) and Extreme Machine Learning (EML-RL) algorithms are proposed to be based on Reinforced Learning (EML). Various dynamic parameters like estimation error, attack detection efficiency, attack estimation rate, and learning rate have been… More >

  • Open Access

    ARTICLE

    Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval

    Anil Sharma1,*, Suresh Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1989-2005, 2022, DOI:10.32604/iasc.2022.026095

    Abstract Information Retrieval (IR) systems are developed to fetch the most relevant content matching the user’s information needs from a pool of information. A user expects to get IR results based on the conceptual contents of the query rather than keywords. But traditional IR approaches index documents based on the terms that they contain and ignore semantic descriptions of document contents. This results in a vocabulary gap when queries and documents use different terms to describe the same concept. As a solution to this problem and to improve the performance of IR systems, we have designed a Shallow Neural Network and… More >

  • Open Access

    ARTICLE

    Intelligent Measurement and Monitoring by Integrating Fieldbus and Robotic Arm

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1737-1753, 2022, DOI:10.32604/iasc.2022.026055

    Abstract In response to the rapid global development of industrial technologies and the resulting rapid growth in the production lines of industry and manufacturing, traditional manufacturing must become intelligent and automated, and undergo the process of informatization. Machines can reduce human errors, replace manpower, and even work better than manpower in certain aspects. Over recent years, the Internet of Things (IoT) has been applied in a wide range of fields. IoT helps control all the production information of factories in real time, and accordingly, reduces labor cost, improves quality, efficiently handles exceptions, and swiftly meets market demands, and how to achieve… More >

  • Open Access

    ARTICLE

    Data De-Duplication Process and Authentication Using ERCE with Poisson Filter in Cloud Data Storage

    B. Venkatesan1,*, S. Chitra2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1603-1615, 2022, DOI:10.32604/iasc.2022.026049

    Abstract The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in cloud, there will be a… More >

  • Open Access

    ARTICLE

    Energy Management of an Isolated Wind/Photovoltaic Microgrid Using Cuckoo Search Algorithm

    Hani Albalawi1,3, Ahmed M. Kassem2, Sherif A. Zaid1,3,4,*, Abderrahim Lakhouit5, Muhammed A. Arshad6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2051-2066, 2022, DOI:10.32604/iasc.2022.026032

    Abstract This paper introduces a renewable-energy-based microgrid that includes Photovoltaic (PV) energy and wind energy generation units. Also, an energy storage system is present. The proposed microgrid is loaded with a constant load impedance. To improve the performance of the proposed microgrid, an optimal control algorithm utilizing Cuckoo Search Algorithm (CSA) is adapted. It has many merits such as fast convergence, simple tunning, and high efficiency. Commonly, the PV and wind energies are suitable for supplying loads under normal conditions. However, the energy storage system recovers the excess load demand. The load frequency and voltage are regulated using the CSA optimal… More >

  • Open Access

    ARTICLE

    Optimized Reinforcement Learning Based Multipath Transfer Protocol in Wireless Mesh Network

    S. Rajeswari1,*, S. A. Arunmozhi1, Y. Venkataramani2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1959-1970, 2022, DOI:10.32604/iasc.2022.025957

    Abstract Multiple radios working on different channels are used in Wireless Mesh Networks (WMNs) to improve network performance and reduce Energy Consumption (EC). Effective routing in Backbone WMNs is where each cross-section switch is well-organized with multiple Radio Interfaces (RI), and a subset of hubs is occupied as a gateway to the Internet. Most routing methods decrease the forward overheads by evolving one dimension, e.g., hop count and traffic proportion. With that idea, while considering these dimensions together, the complexity of the routing issue increases drastically. Consequently, an effective EC routing method considers a few performances simultaneously, and the requirement of… More >

Displaying 711-720 on page 72 of 1767. Per Page