Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,318)
  • Open Access


    Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3801-3813, 2023, DOI:10.32604/iasc.2023.032267

    Abstract Due to the mobility of users in an organization, inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). By considering this challenge; we focus to present dynamic time and location information in CP-ABE with multi-authorization. At first, along with the set of attributes of the users, their corresponding location is also embedded. Geohash is used to encode the latitude and longitude of the user’s position. Then, decrypt time period and access time period of users are defined using the new time tree (NTT) structure. The NTT sets the encrypted duration of… More >

  • Open Access


    An IoT-Based Energy Conservation Smart Classroom System

    Talal H. Noor1,*, El-Sayed Atlam2, Abdulqader M. Almars1, Ayman Noor3, Amer S. Malki1

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3785-3799, 2023, DOI:10.32604/iasc.2023.032250

    Abstract With the increase of energy consumption worldwide in several domains such as industry, education, and transportation, several technologies played an influential role in energy conservation such as the Internet of Things (IoT). In this article, we describe the design and implementation of an IoT-based energy conservation smart classroom system that contributes to energy conservation in the education domain. The proposed system not only allows the user to access and control IoT devices (e.g., lights, projectors, and air conditions) in real-time, it also has the capability to aggregate the estimated energy consumption of an IoT device, the smart classroom, and the… More >

  • Open Access


    A Rule-Based Approach for Grey Hole Attack Prediction in Wireless Sensor Networks

    C. Gowdham*, S. Nithyanandam

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3815-3827, 2023, DOI:10.32604/iasc.2023.031876

    Abstract The Wireless Sensor Networks (WSN) are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the internet. A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network. Additionally, the nodes are discarding and modifying the data packets according to the requirements of the system. The assault modifies the fundamental concept of the WSNs, which is that different devices should communicate with one another. In the proposed system, there is a fuzzy idea offered for the… More >

  • Open Access


    Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning

    Mohamed Ezz1, Ayman Mohamed Mostafa1,*, Ayman Elshenawy2,3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3659-3675, 2023, DOI:10.32604/iasc.2023.031561

    Abstract Face authentication is an important biometric authentication method commonly used in security applications. It is vulnerable to different types of attacks that use authorized users’ facial images and videos captured from social media to perform spoofing attacks and dynamic movements for penetrating security applications. This paper presents an innovative challenge-response emotions authentication model based on the horizontal ensemble technique. The proposed model provides high accurate face authentication process by challenging the authorized user using a random sequence of emotions to provide a specific response for every authentication trial with a different sequence of emotions. The proposed model is applied to… More >

  • Open Access


    Novel ARC-Fuzzy Coordinated Automatic Tracking Control of Four-Wheeled Mobile Robot

    G. Pandiaraj*, S. Muralidharan

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3713-3726, 2023, DOI:10.32604/iasc.2023.031463

    Abstract Four-wheeled, individual-driven, nonholonomic structured mobile robots are widely used in industries for automated work, inspection and exploration purposes. The trajectory tracking control of the four-wheel individual-driven mobile robot is one of the most blooming research topics due to its nonholonomic structure. The wheel velocities are separately adjusted to follow the trajectory in the old-fashioned kinematic control of skid-steered mobile robots. However, there is no consideration for robot dynamics when using a kinematic controller that solely addresses the robot chassis’s motion. As a result, the mobile robot has limited performance, such as chattering during curved movement. In this research work, a… More >

  • Open Access


    Data Mining Approach Based on Hierarchical Gaussian Mixture Representation Model

    Hanan A. Hosni Mahmoud1,*, Alaaeldin M. Hafez2, Fahd Althukair3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3727-3741, 2023, DOI:10.32604/iasc.2023.031442

    Abstract Infinite Gaussian mixture process is a model that computes the Gaussian mixture parameters with order. This process is a probability density distribution with adequate training data that can converge to the input density curve. In this paper, we propose a data mining model namely Beta hierarchical distribution that can solve axial data modeling. A novel hierarchical Two-Hyper-Parameter Poisson stochastic process is developed to solve grouped data modelling. The solution uses data mining techniques to link datum in groups by linking their components. The learning techniques are novel presentations of Gaussian modelling that use prior knowledge of the representation hyper-parameters and… More >

  • Open Access


    Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET

    S. Maheswari, R. Vijayabhasker*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3677-3692, 2023, DOI:10.32604/iasc.2023.031422

    Abstract Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes. The trust values are estimated based on the reputation values of each node in the network by using different mechanisms. However, these mechanisms have various challenging issues which degrade the network performance. Hence, a novel Quality of Service (QoS) Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work. Initially, the QoS-based trust estimation is proposed by using a Fuzzy logic scheme. The trust… More >

  • Open Access


    Energy Efficient Load Balancing and Routing Using Multi-Objective Based Algorithm in WSN

    Hemant Kumar Vijayvergia1,*, Uma Shankar Modani2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3227-3239, 2023, DOI:10.32604/iasc.2023.031357

    Abstract In wireless sensor network (WSN), the gateways which are placed far away from the base station (BS) forward the collected data to the BS through the gateways which are nearer to the BS. This leads to more energy consumption because the gateways nearer to the BS manages heavy traffic load. So, to overcome this issue, loads around the gateways are to be balanced by presenting energy efficient clustering approach. Besides, to enhance the lifetime of the network, optimal routing path is to be established between the source node and BS. For energy efficient load balancing and routing, multi objective based… More >

  • Open Access


    Context-Aware Practice Problem Recommendation Using Learners’ Skill Level Navigation Patterns

    P. N. Ramesh1,*, S. Kannimuthu2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3845-3860, 2023, DOI:10.32604/iasc.2023.031329

    Abstract The use of programming online judges (POJs) has risen dramatically in recent years, owing to the fact that the auto-evaluation of codes during practice motivates students to learn programming. Since POJs have greater number of programming problems in their repository, learners experience information overload. Recommender systems are a common solution to information overload. Current recommender systems used in e-learning platforms are inadequate for POJ since recommendations should consider learners’ current context, like learning goals and current skill level (topic knowledge and difficulty level). To overcome the issue, we propose a context-aware practice problem recommender system based on learners’ skill level… More >

  • Open Access


    Generative Adversarial Networks for Secure Data Transmission in Wireless Network

    E. Jayabalan*, R. Pugazendi

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3757-3784, 2023, DOI:10.32604/iasc.2023.031200

    Abstract In this paper, a communication model in cognitive radios is developed and uses machine learning to learn the dynamics of jamming attacks in cognitive radios. It is designed further to make their transmission decision that automatically adapts to the transmission dynamics to mitigate the launched jamming attacks. The generative adversarial learning neural network (GALNN) or generative dynamic neural network (GDNN) automatically learns with the synthesized training data (training) with a generator and discriminator type neural networks that encompass minimax game theory. The elimination of the jamming attack is carried out with the assistance of the defense strategies and with an… More >

Displaying 1-10 on page 1 of 1318. Per Page  

Share Link

WeChat scan