Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    A Cloud-Based Secure Emergency Message Dissemination Scheme in Vehicular Adhoc Networks

    R. Rajasekar1,*, P. Sivakumar2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 117-131, 2022, DOI:10.32604/iasc.2022.023372

    Abstract The Internet of vehicles and vehicular ad-hoc networks (VANET) offers numerous opportunities for managing the transportation problems effectively. The high mobility and wireless communication in VANET lead to adequate network topology modifications, resulting in network instability and insecure data communication. With an unsteady flow of traffic, vehicles are unevenly distributed in the geographical areas in practice. A new type 2 fuzzy logic-based secure clustering (T2FLSC) with cloud-based data dissemination scheme called the T2FLSC-CDD model for the VANET has been introduced for resolving this issue. The vehicles are dynamically clustered by the use of the T2FLSC technique, which elects the CHs… More >

  • Open Access

    ARTICLE

    Robust Node Localization with Intrusion Detection for Wireless Sensor Networks

    R. Punithavathi1, R. Thanga Selvi2, R. Latha3, G. Kadiravan4,*, V. Srikanth5, Neeraj Kumar Shukla6

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 143-156, 2022, DOI:10.32604/iasc.2022.023344

    Abstract Wireless sensor networks comprise a set of autonomous sensor nodes, commonly used for data gathering and tracking applications. Node localization and intrusion detection are considered as the major design issue in WSN. Therefore, this paper presents a new multi-objective manta ray foraging optimization (MRFO) based node localization with intrusion detection (MOMRFO-NLID) technique for WSN. The goal of the MOMRFO-NLID technique is to optimally localize the unknown nodes and determine the existence of intrusions in the network. The MOMRFO-NLID technique encompasses two major stages namely MRFO based localization of nodes and optimal Siamese Neural Network (OSNN) based intrusion detection. The OSNN… More >

  • Open Access

    ARTICLE

    Forward Flight Performance Analysis of Supercritical Airfoil in Helicopter Main Rotor

    Inamul Hasan1,2,*, R. Mukesh2, P. Radha Krishnan1,2, R. Srinath1, R. B. Dhanya Prakash2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 567-584, 2022, DOI:10.32604/iasc.2022.023252

    Abstract In this research, the aerodynamic performance and flow characteristics of NASA SC (2)-0714 airfoil and HH02 airfoil in the helicopter main rotor are evidently analyzed. The supercritical airfoil is used in the aircraft for attaining better transonic and high-speed flow characteristics. Moreover, a specialized helicopter airfoil called HH02 is used in the Apache helicopter rotor for increasing the operational speed. As most of the high-speed helicopters are using four-bladed main rotor configuration, it is analyzed with prior attention. The lift and thrust act in different directions for the forward phase of the flight whereas the lift and thrust act in… More >

  • Open Access

    ARTICLE

    Semantic Annotation of Land Cover Remote Sensing Images Using Fuzzy CNN

    K. Saranya1,*, K. Selva Bhuvaneswari2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 399-414, 2022, DOI:10.32604/iasc.2022.023149

    Abstract This paper presents a novel fuzzy logic based Convolution Neural Network intelligent classifier for accurate image classification. The proposed approach employs a semantic class label model that classifies the input land cover images into a set of semantic categories and classes depending on the content. The intelligent feature selection algorithm selects the prominent attributes from the given data set using weighted attribute functions and uses fuzzy logic to build the rules based on the membership values. To annotate remote sensing images, the CNN method effectively creates semantics and categorises images. The decision manager then integrates the fuzzy logic rules with… More >

  • Open Access

    ARTICLE

    A Machine-Learning Framework to Improve Wi-Fi Based Indoorpositioning

    Venkateswari Pichaimani1, K. R. Manjula2,*

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 383-397, 2022, DOI:10.32604/iasc.2022.023105

    Abstract The indoor positioning system comprises portable wireless devices that aid in finding the location of people or objects within the buildings. Identification of the items is through the capacity level of the signal received from various access points (i.e., Wi-Fi routers). The positioning of the devices utilizing some algorithms has drawn more attention from the researchers. Yet, the designed algorithm still has problems for accurate floor planning. So, the accuracy of position estimation with minimum error is made possible by introducing Gaussian Distributive Feature Embedding based Deep Recurrent Perceptive Neural Learning (GDFE-DRPNL), a novel framework. Novel features from the dataset… More >

  • Open Access

    ARTICLE

    To Control Diabetes Using Machine Learning Algorithm and Calorie Measurement Technique

    T. Viveka1,*, C. Christopher Columbus2, N. Senthil Velmurugan3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 535-547, 2022, DOI:10.32604/iasc.2022.022976

    Abstract Because of the increasing workload, people are having several clinical examinations to determine their health status, resulting in limited time. Here, we present a healthful consuming device based on rule mining that can modify your parameter dependency and recommend the varieties of meals that will boost your fitness and assist you to avoid the types of meals that increase your risk for sicknesses. Using the meals database, the data mining technique is useful for gathering meal energy from breakfast, after breakfast, lunch, after lunch, dinner, after dinner, and bedtime for ninety days. The purpose of this study is to determine… More >

  • Open Access

    ARTICLE

    An Advanced Integrated Approach in Mobile Forensic Investigation

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 87-102, 2022, DOI:10.32604/iasc.2022.022972

    Abstract Rapid advancement of digital technology has encouraged its use in all aspects of life, including the workplace, education, and leisure. As technology advances, so does the number of users, which leads to an increase in criminal activity and demand for a cyber-crime investigation. Mobile phones have been the epicenter of illegal activity in recent years. Sensitive information is transferred due to numerous technical applications available at one’s fingertips, which play an essential part in cyber-crime attacks in the mobile environment. Mobile forensic is a technique of recovering or retrieving digital evidence from mobile devices so that it may be submitted… More >

  • Open Access

    ARTICLE

    Optimized Compressive Sensing Based ECG Signal Compression and Reconstruction

    Ishani Mishra1,*, Sanjay Jain2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 415-428, 2022, DOI:10.32604/iasc.2022.022860

    Abstract In wireless body sensor network (WBSN), the set of electrocardiograms (ECG) data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient. However, due to the size of the ECG data, the performance of the signal compression and reconstruction is degraded. For efficient wireless transmission of ECG data, compressive sensing (CS) frame work plays significant role recently in WBSN. So, this work focuses to present CS for ECG signal compression and reconstruction. Although CS minimizes mean square error (MSE), compression rate and reconstruction probability of the CS is… More >

  • Open Access

    ARTICLE

    Multi-Domain Deep Convolutional Neural Network for Ancient Urdu Text Recognition System

    K. O. Mohammed Aarif1,*, P. Sivakumar2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 275-289, 2022, DOI:10.32604/iasc.2022.022805

    Abstract Deep learning has achieved magnificent success in the field of pattern recognition. In recent years Urdu character recognition system has significantly benefited from the effectiveness of the deep convolutional neural network. Majority of the research on Urdu text recognition are concentrated on formal handwritten and printed Urdu text document. In this paper, we experimented the Challenging issue of text recognition in Urdu ancient literature documents. Due to its cursiveness, complex word formation (ligatures), and context-sensitivity, and inadequate benchmark dataset, recognition of Urdu text from the literature document is very difficult to process compared to the formal Urdu text document. In… More >

  • Open Access

    ARTICLE

    Social Networks Fake Account and Fake News Identification with Reliable Deep Learning

    N. Kanagavalli1,*, S. Baghavathi Priya2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 191-205, 2022, DOI:10.32604/iasc.2022.022720

    Abstract Recent developments of the World Wide Web (WWW) and social networking (Twitter, Instagram, etc.) paves way for data sharing which has never been observed in the human history before. A major security issue in this network is the creation of fake accounts. In addition, the automatic classification of the text article as true or fake is also a crucial process. The ineffectiveness of humans in distinguishing the true and false information exposes the fake news as a risk to credibility, democracy, logical truth, and journalism in government sectors. Besides, the automatic fake news or rumors from the social networking sites… More >

Displaying 9481-9490 on page 949 of 22248. Per Page