Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Modified Satin Bowerbird for Distributed Generation in Remotely Controlled Voltage Bus

    K. Dharani Sree*, P. Karpagavalli

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1181-1195, 2023, DOI:10.32604/iasc.2023.025303

    Abstract The distributed generators in the radial distribution network are to improve the Grid performance and its efficiency. These Distributed Generators control the PV bus; it is converted as a remote controlled PVQ bus. This PVQ bus reduces the power loss and reactive power. Initially, the distributed generators were placed in the system using mathematical modelling or the optimization. This approach improves the efficiency but it has no effect in loss minimization. To minimize the loss the reconfigured network with Genetic algorithm based Distributed generator placement proposed as existing work. This approach minimizes the loss effectively; but the genetic algorithm takes… More >

  • Open Access

    ARTICLE

    Behavior of Delivery Robot in Human-Robot Collaborative Spaces During Navigation

    Kiran Jot Singh1, Divneet Singh Kapoor1,*, Mohamed Abouhawwash2,3, Jehad F. Al-Amri4, Shubham Mahajan5, Amit Kant Pandit5

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 795-810, 2023, DOI:10.32604/iasc.2023.025177

    Abstract Navigation is an essential skill for robots. It becomes a cumbersome task for the robot in a human-populated environment, and Industry 5.0 is an emerging trend that focuses on the interaction between humans and robots. Robot behavior in a social setting is the key to human acceptance while ensuring human comfort and safety. With the advancement in robotics technology, the true use cases of robots in the tourism and hospitality industry are expanding in number. There are very few experimental studies focusing on how people perceive the navigation behavior of a delivery robot. A robotic platform named “PI” has been… More >

  • Open Access

    ARTICLE

    Monitoring and Prediction of Indoor Air Quality for Enhanced Occupational Health

    Adela POP (Puscasiu), Alexandra Fanca*, Dan Ioan Gota, Honoriu Valean

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 925-940, 2023, DOI:10.32604/iasc.2023.025069

    Abstract The amount of moisture in the air is represented by relative humidity (RH); an ideal level of humidity in the interior environment is between 40% and 60% at temperatures between 18° and 20° Celsius. When the RH falls below this level, the environment becomes dry, which can cause skin dryness, irritation, and discomfort at low temperatures. When the humidity level rises above 60%, a wet atmosphere develops, which encourages the growth of mold and mites. Asthma and allergy symptoms may occur as a result. Human health is harmed by excessive humidity or a lack thereof. Dehumidifiers can be used to… More >

  • Open Access

    ARTICLE

    An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship

    K. Meenakshi*, K. Sashi Rekha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 111-128, 2023, DOI:10.32604/iasc.2023.025032

    Abstract Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network. Both transactions in the system are carried out by consensus processes and to preserve confidentiality all the files contained cannot be changed. Blockchain technology is the fundamental software behind digital currencies like Bitcoin, which is common in the marketplace. Cloud computing is a method of using a network of external machines to store, monitor, and process information, rather than using the local computer or a local personal computer. The software is currently facing multiple problems including lack of data… More >

  • Open Access

    ARTICLE

    Voice Response Questionnaire System for Speaker Recognition Using Biometric Authentication Interface

    Chang-Yi Kao1, Hao-En Chueh2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 913-924, 2023, DOI:10.32604/iasc.2023.024734

    Abstract

    The use of voice to perform biometric authentication is an important technological development, because it is a non-invasive identification method and does not require special hardware, so it is less likely to arouse user disgust. This study tries to apply the voice recognition technology to the speech-driven interactive voice response questionnaire system aiming to upgrade the traditional speech system to an intelligent voice response questionnaire network so that the new device may offer enterprises more precise data for customer relationship management (CRM). The intelligence-type voice response gadget is becoming a new mobile channel at the current time, with functions of… More >

  • Open Access

    ARTICLE

    Application of Intuitionistic Z-Numbers in Supplier Selection

    Nik Muhammad Farhan Hakim Nik Badrul Alam1,2, Ku Muhammad Naim Ku Khalif1,*, Nor Izzati Jaini1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 47-61, 2023, DOI:10.32604/iasc.2023.024660

    Abstract Intuitionistic fuzzy numbers incorporate the membership and non-membership degrees. In contrast, Z-numbers consist of restriction components, with the existence of a reliability component describing the degree of certainty for the restriction. The combination of intuitionistic fuzzy numbers and Z-numbers produce a new type of fuzzy numbers, namely intuitionistic Z-numbers (IZN). The strength of IZN is their capability of better handling the uncertainty compared to Zadeh's Z-numbers since both components of Z-numbers are characterized by the membership and non-membership functions, exhibiting the degree of the hesitancy of decision-makers. This paper presents the application of such numbers in fuzzy multi-criteria decision-making problems.… More >

  • Open Access

    ARTICLE

    Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis

    Sumit Kumar1,*, S. Indu2, Gurjit Singh Walia1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1035-1051, 2023, DOI:10.32604/iasc.2023.024469

    Abstract Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad of fields. The increased popularity of the android platform entices malware developers to design malicious apps to achieve their malevolent intents. Also, static analysis approaches fail to detect run-time behaviors of malicious apps. To address these issues, an optimal unification of static and dynamic features for smartphone security analysis is proposed. The proposed solution exploits both static and dynamic features for generating a highly distinct unified feature vector using graph based cross-diffusion strategy. Further, a unified feature is subjected to the fuzzy-based classification… More >

  • Open Access

    ARTICLE

    Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm

    R. S. Aashmi1, T. Jaya2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 79-95, 2023, DOI:10.32604/iasc.2023.024291

    Abstract

    Cloud computing is the technology that is currently used to provide users with infrastructure, platform, and software services effectively. Under this system, Platform as a Service (PaaS) offers a medium headed for a web development platform that uniformly distributes the requests and resources. Hackers using Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks abruptly interrupt these requests. Even though several existing methods like signature-based, statistical anomaly-based, and stateful protocol analysis are available, they are not sufficient enough to get rid of Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks and hence there is a… More >

  • Open Access

    ARTICLE

    Design and Analysis of Novel Three-Phase PFC for IM Drives

    V. Kavitha1,*, K. Subramanian2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 231-241, 2023, DOI:10.32604/iasc.2023.024257

    Abstract Induction motor drives (IMDs) can achieve high performance levels comparable to dc motor drives. A major problem in getting high dynamic performance in an IMD is the coupling between the flux and torque producing components of stator current. This is successfully overcome in FOC (Field-Oriented Control) IM, making it to the industry standard control. The performance of an IMD with an improved power quality converter at the front end is presented in this study. In the IMD, boost converter is employed to reduce power quality difficulties at the utility interface. As the boost converter contains only one switch, it results… More >

  • Open Access

    ARTICLE

    Machine Learning Controller for DFIG Based Wind Conversion System

    P. Srinivasan1,*, P. Jagatheeswari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 381-397, 2023, DOI:10.32604/iasc.2023.024179

    Abstract Renewable energy production plays a major role in satisfying electricity demand. Wind power conversion is one of the most popular renewable energy sources compared to other sources. Wind energy conversion has two major types of generators such as the Permanent Magnet Synchronous Generator (PMSG) and the Doubly Fed Induction Generator (DFIG). The maximum power tracking algorithm is a crucial controller, a wind energy conversion system for generating maximum power in different wind speed conditions. In this article, the DFIG wind energy conversion system was developed in Matrix Laboratory (MATLAB) and designed a machine learning (ML) algorithm for the rotor and… More >

Displaying 7751-7760 on page 776 of 22225. Per Page