Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,435)
  • Open Access

    ARTICLE

    Mobile Robots’ Collision Prediction Based on Virtual Cocoons

    Virginijus Baranauskas1,*, Žydrūnas Jakas1, Kastytis Kiprijonas Šarkauskas1, Stanislovas Bartkevičius2, Gintaras Dervinis1, Alma Dervinienė3, Leonas Balaševičius1, Vidas Raudonis1, Renaldas Urniežius1, Jolanta Repšytė1

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1343-1356, 2022, DOI:10.32604/iasc.2022.022288

    Abstract The research work presents a collision prediction method of mobile robots. The authors of the work use so-called, virtual cocoons to evaluate the collision criteria of two robots. The idea, mathematical representation of the calculations and experimental simulations are presented in the paper work. A virtual model of the industrial process with moving mobile robots was created. Obstacle avoidance was not solved here. The authors of the article were working on collision avoidance problem solving between moving robots. Theoretical approach presents mathematical calculations and dependences of path angles of mobile robots. Experimental simulations, using the software Centaurus CPN, based on… More >

  • Open Access

    ARTICLE

    Optimized Fuzzy Enabled Semi-Supervised Intrusion Detection System for Attack Prediction

    Gautham Praveen Ramalingam1, R. Arockia Xavier Annie1, Shobana Gopalakrishnan2,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1479-1492, 2022, DOI:10.32604/iasc.2022.022211

    Abstract Detection of intrusion plays an important part in data protection. Intruders will carry out attacks from a compromised user account without being identified. The key technology is the effective detection of sundry threats inside the network. However, process automation is experiencing expanded use of information communication systems, due to high versatility of interoperability and ease off 34 administration. Traditional knowledge technology intrusion detection systems are not completely tailored to process automation. The combined use of fuzziness-based and RNN-IDS is therefore highly suited to high-precision classification, and its efficiency is better compared to that of conventional machine learning approaches. This model… More >

  • Open Access

    ARTICLE

    An Automated Word Embedding with Parameter Tuned Model for Web Crawling

    S. Neelakandan1,*, A. Arun2, Raghu Ram Bhukya3, Bhalchandra M. Hardas4, T. Ch. Anil Kumar5, M. Ashok6

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1617-1632, 2022, DOI:10.32604/iasc.2022.022209

    Abstract In recent years, web crawling has gained a significant attention due to the drastic advancements in the World Wide Web. Web Search Engines have the issue of retrieving massive quantity of web documents. One among the web crawlers is the focused crawler, that intends to selectively gather web pages from the Internet. But the efficiency of the focused crawling can easily be affected by the environment of web pages. In this view, this paper presents an Automated Word Embedding with Parameter Tuned Deep Learning (AWE-PTDL) model for focused web crawling. The proposed model involves different processes namely pre-processing, Incremental Skip-gram… More >

  • Open Access

    ARTICLE

    Autonomous Exploration Based on Multi-Criteria Decision-Making and Using D* Lite Algorithm

    Novak Zagradjanin1,*, Dragan Pamucar2, Kosta Jovanovic1, Nikola Knezevic1, Bojan Pavkovic3

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1369-1386, 2022, DOI:10.32604/iasc.2022.021979

    Abstract An autonomous robot is often in a situation to perform tasks or missions in an initially unknown environment. A logical approach to doing this implies discovering the environment by the incremental principle defined by the applied exploration strategy. A large number of exploration strategies apply the technique of selecting the next robot position between candidate locations on the frontier between the unknown and the known parts of the environment using the function that combines different criteria. The exploration strategies based on Multi-Criteria Decision-Making (MCDM) using the standard SAW, COPRAS and TOPSIS methods are presented in the paper. Their performances are… More >

  • Open Access

    ARTICLE

    Energy Aware Seagull Optimization-Based Unequal Clustering Technique in WSN Communication

    D. Anuradha1,*, R. Srinivasan2, T. Ch. Anil Kumar3, J. Faritha Banu4, Aditya Kumar Singh Pundir5, D. Vijendra Babu6

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1325-1341, 2022, DOI:10.32604/iasc.2022.021946

    Abstract Wireless sensor network (WSN) becomes a hot research area owing to an extensive set of applications. In order to accomplish energy efficiency in WSN, most of the earlier works have focused on the clustering process which enables to elect CHs and organize unequal clusters. However, the clustering process results in hot spot problem and can be addressed by the use of unequal clustering techniques, which enables to construct of clusters of unequal sizes to equalize the energy dissipation in the WSN. Unequal clustering can be formulated as an NP-hard issue and can be solved by metaheuristic optimization algorithms. With this… More >

  • Open Access

    ARTICLE

    Classification of Elephant Sounds Using Parallel Convolutional Neural Network

    T. Thomas Leonid1,*, R. Jayaparvathy2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1415-1426, 2022, DOI:10.32604/iasc.2022.021939

    Abstract Human-elephant conflict is the most common problem across elephant habitat Zones across the world. Human elephant conflict (HEC) is due to the migration of elephants from their living habitat to the residential areas of humans in search of water and food. One of the important techniques used to track the movements of elephants is based on the detection of Elephant Voice. Our previous work [] on Elephant Voice Detection to avoid HEC was based on Feature set Extraction using Support Vector Machine (SVM). This research article is an improved continuum of the previous method using Deep learning techniques. The current… More >

  • Open Access

    ARTICLE

    Fault Tolerance Techniques for Multi-Hop Clustering in Wireless Sensor Networks

    Adel Rajab*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1743-1761, 2022, DOI:10.32604/iasc.2022.021922

    Abstract Wireless sensor networks (WSN) deploy many nodes over an extended area for traffic surveillance, environmental monitoring, healthcare, tracking wildlife, and military sensing. Nodes of the WSN have a limited amount of energy. Each sensor node collects information from the surrounding area and forwards it onto the cluster head, which then sends it on to the base station (BS). WSNs extend the lifetime of the network through clustering techniques. Choosing nodes with the greatest residual energy as cluster heads is based on the idea that energy consumption is periodically distributed between nodes. The sink node gathers information from its environment that… More >

  • Open Access

    ARTICLE

    Blockchain for Securing Healthcare Data Using Squirrel Search Optimization Algorithm

    B. Jaishankar1,*, Santosh Vishwakarma2, Prakash Mohan3, Aditya Kumar Singh Pundir4, Ibrahim Patel5, N. Arulkumar6

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1815-1829, 2022, DOI:10.32604/iasc.2022.021822

    Abstract The Healthcare system is an organization that consists of important requirements corresponding to security and privacy, for example, protecting patients’ medical information from unauthorized access, communication with transport like ambulance and smart e-health monitoring. Due to lack of expert design of security protocols, the healthcare system is facing many security threats such as authenticity, data sharing, the conveying of medical data. In such situation, block chain protocol is used. In this manuscript, Efficient Block chain Network for securing Healthcare data using Multi-Objective Squirrel Search Optimization Algorithm (MOSSA) is proposed to generate smart and secure Healthcare system. In this the block… More >

  • Open Access

    ARTICLE

    Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security

    Rashad Mahmood Saqib1, Adnan Shahid Khan1,*, Yasir Javed2, Shakil Ahmad2, Kashif Nisar3, Irshad A. Abbasi4, Muhammad Reazul Haque5, Azlina Ahmadi Julaihi1

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1633-1647, 2022, DOI:10.32604/iasc.2022.021786

    Abstract This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentication discipline, and most of them proposed the best possible approaches, but there are very limited studies in the area that… More >

  • Open Access

    ARTICLE

    Energy Conservation of Adiabatic ECRL-Based Kogge-Stone Adder Circuits for FFT Applications

    P. Dhilipkumar1,*, G. Mohanbabu2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1445-1458, 2022, DOI:10.32604/iasc.2022.021663

    Abstract Low Power circuits play a significant role in designing large-scale devices with high energy and power consumption. Adiabatic circuits are one such energy-saving circuits that utilize reversible power. Several methodologies used previously infer the use of CMOS circuits for reducing power dissipation in logic circuits. However, CMOS devices hardly manage in maintaining their performance when it comes to fast switching networks. Adiabatic technology is employed to overcome these difficulties, which can further scale down the dissipation of power by charging and discharging. An Efficient Charge Recovery Logic (ECRL) based adiabatic technology is used here to evaluate arithmetic operations in circuits… More >

Displaying 9911-9920 on page 992 of 22435. Per Page