Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship

    K. Meenakshi*, K. Sashi Rekha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 111-128, 2023, DOI:10.32604/iasc.2023.025032

    Abstract Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network. Both transactions in the system are carried out by consensus processes and to preserve confidentiality all the files contained cannot be changed. Blockchain technology is the fundamental software behind digital currencies like Bitcoin, which is common in the marketplace. Cloud computing is a method of using a network of external machines to store, monitor, and process information, rather than using the local computer or a local personal computer. The software is currently facing multiple problems including lack of data… More >

  • Open Access

    ARTICLE

    Voice Response Questionnaire System for Speaker Recognition Using Biometric Authentication Interface

    Chang-Yi Kao1, Hao-En Chueh2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 913-924, 2023, DOI:10.32604/iasc.2023.024734

    Abstract

    The use of voice to perform biometric authentication is an important technological development, because it is a non-invasive identification method and does not require special hardware, so it is less likely to arouse user disgust. This study tries to apply the voice recognition technology to the speech-driven interactive voice response questionnaire system aiming to upgrade the traditional speech system to an intelligent voice response questionnaire network so that the new device may offer enterprises more precise data for customer relationship management (CRM). The intelligence-type voice response gadget is becoming a new mobile channel at the current time, with functions of… More >

  • Open Access

    ARTICLE

    Application of Intuitionistic Z-Numbers in Supplier Selection

    Nik Muhammad Farhan Hakim Nik Badrul Alam1,2, Ku Muhammad Naim Ku Khalif1,*, Nor Izzati Jaini1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 47-61, 2023, DOI:10.32604/iasc.2023.024660

    Abstract Intuitionistic fuzzy numbers incorporate the membership and non-membership degrees. In contrast, Z-numbers consist of restriction components, with the existence of a reliability component describing the degree of certainty for the restriction. The combination of intuitionistic fuzzy numbers and Z-numbers produce a new type of fuzzy numbers, namely intuitionistic Z-numbers (IZN). The strength of IZN is their capability of better handling the uncertainty compared to Zadeh's Z-numbers since both components of Z-numbers are characterized by the membership and non-membership functions, exhibiting the degree of the hesitancy of decision-makers. This paper presents the application of such numbers in fuzzy multi-criteria decision-making problems.… More >

  • Open Access

    ARTICLE

    Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis

    Sumit Kumar1,*, S. Indu2, Gurjit Singh Walia1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1035-1051, 2023, DOI:10.32604/iasc.2023.024469

    Abstract Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad of fields. The increased popularity of the android platform entices malware developers to design malicious apps to achieve their malevolent intents. Also, static analysis approaches fail to detect run-time behaviors of malicious apps. To address these issues, an optimal unification of static and dynamic features for smartphone security analysis is proposed. The proposed solution exploits both static and dynamic features for generating a highly distinct unified feature vector using graph based cross-diffusion strategy. Further, a unified feature is subjected to the fuzzy-based classification… More >

  • Open Access

    ARTICLE

    Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm

    R. S. Aashmi1, T. Jaya2,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 79-95, 2023, DOI:10.32604/iasc.2023.024291

    Abstract

    Cloud computing is the technology that is currently used to provide users with infrastructure, platform, and software services effectively. Under this system, Platform as a Service (PaaS) offers a medium headed for a web development platform that uniformly distributes the requests and resources. Hackers using Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks abruptly interrupt these requests. Even though several existing methods like signature-based, statistical anomaly-based, and stateful protocol analysis are available, they are not sufficient enough to get rid of Denial of service (DoS) and Distributed Denial of Service (DDoS) attacks and hence there is a… More >

  • Open Access

    ARTICLE

    Design and Analysis of Novel Three-Phase PFC for IM Drives

    V. Kavitha1,*, K. Subramanian2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 231-241, 2023, DOI:10.32604/iasc.2023.024257

    Abstract Induction motor drives (IMDs) can achieve high performance levels comparable to dc motor drives. A major problem in getting high dynamic performance in an IMD is the coupling between the flux and torque producing components of stator current. This is successfully overcome in FOC (Field-Oriented Control) IM, making it to the industry standard control. The performance of an IMD with an improved power quality converter at the front end is presented in this study. In the IMD, boost converter is employed to reduce power quality difficulties at the utility interface. As the boost converter contains only one switch, it results… More >

  • Open Access

    ARTICLE

    Machine Learning Controller for DFIG Based Wind Conversion System

    P. Srinivasan1,*, P. Jagatheeswari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 381-397, 2023, DOI:10.32604/iasc.2023.024179

    Abstract Renewable energy production plays a major role in satisfying electricity demand. Wind power conversion is one of the most popular renewable energy sources compared to other sources. Wind energy conversion has two major types of generators such as the Permanent Magnet Synchronous Generator (PMSG) and the Doubly Fed Induction Generator (DFIG). The maximum power tracking algorithm is a crucial controller, a wind energy conversion system for generating maximum power in different wind speed conditions. In this article, the DFIG wind energy conversion system was developed in Matrix Laboratory (MATLAB) and designed a machine learning (ML) algorithm for the rotor and… More >

  • Open Access

    ARTICLE

    A Substrate Integrated Waveguide Based Filtenna for X and Ku Band Application

    S. Leo Pauline1,*, T. R. GaneshBabu2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 465-473, 2023, DOI:10.32604/iasc.2023.024030

    Abstract In this paper Substrate Integrated Waveguide-based filtenna operating at Ku band is proposed. The model is designed on a low loss dielectric substrate having a thickness of 0.508 mm and comprises of shorting vias along two edges of the substrate walls. To realize a bandpass filter, secondary shorting vias are placed close to primary shorting vias. The dimension and position of the vias are carefully analyzed for Ku band frequencies. The model is fabricated on Roger RT/duroid 5880 and the performance characteristics are measured. The proposed model achieves significant impedance characteristics with wider bandwidth in the Ku band. The model also… More >

  • Open Access

    ARTICLE

    A Novel Radial Basis Function Neural Network Approach for ECG Signal Classification

    S. Sathishkumar1,*, R. Devi Priya2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 129-148, 2023, DOI:10.32604/iasc.2023.023817

    Abstract Electrocardiogram (ECG) is a diagnostic method that helps to assess and record the electrical impulses of heart. The traditional methods in the extraction of ECG features is inneffective for avoiding the computational abstractions in the ECG signal. The cardiologist and medical specialist find numerous difficulties in the process of traditional approaches. The specified restrictions are eliminated in the proposed classifier. The fundamental aim of this work is to find the R-R interval. To analyze the blockage, different approaches are implemented, which make the computation as facile with high accuracy. The information are recovered from the MIT-BIH dataset. The retrieved data… More >

  • Open Access

    ARTICLE

    A Hybrid Approach to Neighbour Discovery in Wireless Sensor Networks

    Sagar Mekala1,*, K. Shahu Chatrapati2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 581-593, 2023, DOI:10.32604/iasc.2023.023539

    Abstract In the contemporary era of unprecedented innovations such as Internet of Things (IoT), modern applications cannot be imagined without the presence of Wireless Sensor Network (WSN). Nodes in WSN use neighbour discovery (ND) protocols to have necessary communication among the nodes. Neighbour discovery process is crucial as it is to be done with energy efficiency and minimize discovery latency and maximize percentage of neighbours discovered. The current ND approaches that are indirect in nature are categorized into methods of removal of active slots from wake-up schedules and intelligent addition of new slots. The two methods are found to have certain… More >

Displaying 7741-7750 on page 775 of 22212. Per Page