Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Smart Communication Using 2D and 3D Mesh Network-on-Chip

    Arpit Jain1,*, Adesh Kumar2, Anand Prakash Shukla3, Hammam Alshazly4, Hela Elmannai5, Abeer D. Algarni5, Roushan Kumar6, Jitendra Yadav6

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 2007-2021, 2022, DOI:10.32604/iasc.2022.024770

    Abstract Network on chip (NoC) is an integrated communication system on chip (SoC), efficiently connecting various intellectual property (IP) modules on a single die. NoC has been suggested as an enormously scalable solution to overcome the communication problems in SoC. The performance of NoC depends on several aspects in terms of area, latency, throughput, and power. In this paper, the 2D and 3D mesh NoC performance on Virtex-5 field-programmable gate array (FPGA) is studied. The design is carried in Xilinx ISE 14.7 and the behavior model is followed based on XY and XYZ routing for 2D and 3D mesh NoC respectively.… More >

  • Open Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714

    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based technology is used in… More >

  • Open Access

    ARTICLE

    Shrinkage Linear with Quadratic Gaussian Discriminant Analysis for Big Data Classification

    R. S. Latha1, K. Venkatachalam2, Jehad F. Al-Amri3, Mohamed Abouhawwash4,5,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1803-1818, 2022, DOI:10.32604/iasc.2022.024539

    Abstract Generation of massive data is increasing in big data industries due to the evolution of modern technologies. The big data industries include data source from sensors, Internet of Things, digital and social media. In particular, these big data systems consist of data extraction, preprocessing, integration, analysis, and visualization mechanism. The data encountered from the sources are redundant, incomplete and conflict. Moreover, in real time applications, it is a tedious process for the interpretation of all the data from different sources. In this paper, the gathered data are preprocessed to handle the issues such as redundant, incomplete and conflict. For that,… More >

  • Open Access

    ARTICLE

    Deep Learning Based Power Transformer Monitoring Using Partial Discharge Patterns

    D. Karthik Prabhu1,*, R. V. Maheswari2, B. Vigneshwaran2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1441-1454, 2022, DOI:10.32604/iasc.2022.024128

    Abstract Measurement and recognition of Partial Discharge (PD) in power apparatus is considered a protuberant tool for condition monitoring and assessing the state of a dielectric system. During operating conditions, PD may occur either in the form of single and multiple patterns in nature. Currently, for PD pattern recognition, deep learning approaches are used. To evaluate spatial order less features from the large-scale patterns, a pre-trained network is used. The major drawback of traditional approaches is that they generate high dimensional data or requires additional steps like dictionary learning and dimensionality reduction. However, in real-time applications, interference incorporated in the measured… More >

  • Open Access

    ARTICLE

    Detection of DDoS Attack in IoT Networks Using Sample Selected RNN-ELM

    S. Hariprasad1,*, T. Deepa1, N. Bharathiraja2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1425-1440, 2022, DOI:10.32604/iasc.2022.022856

    Abstract The Internet of Things (IoT) is a global information and communication technology which aims to connect any type of device to the internet at any time and in any location. Nowadays billions of IoT devices are connected to the world, this leads to easily cause vulnerability to IoT devices. The increasing of users in different IoT-related applications leads to more data attacks is happening in the IoT networks after the fog layer. To detect and reduce the attacks the deep learning model is used. In this article, a hybrid sample selected recurrent neural network-extreme learning machine (hybrid SSRNN-ELM) algorithm that… More >

  • Open Access

    ARTICLE

    Medical Image Demosaicing Based Design of Newton Gregory Interpolation Algorithm

    E. P. Kannan1,*, S. S. Vinsley2, T. V. Chithra3

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1675-1691, 2022, DOI:10.32604/iasc.2022.022707

    Abstract In this paper, Field-Programmable Gate Array (FPGA) implementation-based image demosaicing is carried out. The Newton Gregory interpolation algorithm is designed based on FPGA frame work. Interpolation is the method of assessing the value of a function for any in-between value of self-regulating variable, whereas the method of computing the value of the function outside the specified range is named extrapolation. The natural images are collected from Kodak image database and medical images are collected from UPOL (University of Phoenix Online) database. The proposed algorithm is executed on using Xilinx ISE (Integrated Synthesis Environment) Design Suite 14.2 and is confirmed on… More >

  • Open Access

    ARTICLE

    Novel DoS Attack Detection Based on Trust Mode Authentication for IoT

    D. Yuvaraj1, S. Shanmuga Priya2,*, M. Braveen3, S. Navaneetha Krishnan4, S. Nachiyappan5, Abolfazl Mehbodniya6, A. Mohamed Uvaze Ahamed7, M. Sivaram8

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1505-1522, 2022, DOI:10.32604/iasc.2022.022151

    Abstract Wireless sensor networks are extensively utilized as a communication mechanism in the field of the Internet of Things (IoT). Along with these services, numerous IoT based applications need stabilized transmission or delivery over unbalanced wireless connections. To ensure the stability of data packets delivery, prevailing works exploit diverse geographical routing with multi-hop forwarders in WSNs. Furthermore, critical Denial of Service (DoS) attacks frequently has an impact on these techniques, where an enormous amount of invalid data starts replicating and transmitted to receivers to prevent Wireless Sensor Networks (WSN) communication. In this investigation, a novel adaptive endorsement method is designed by… More >

  • Open Access

    ARTICLE

    Experimental Investigation on Prototype Latent Heat Thermal Battery Charging and Discharging Function Integrated with Solar Collector

    Farhood Sarrafzadeh Javadi1, Hendrik Simon Cornelis Metselaar1,2,*, Poo Balan Ganesan1

    Energy Engineering, Vol.119, No.4, pp. 1587-1610, 2022, DOI:10.32604/ee.2022.020304

    Abstract This paper reports the performance investigation of a newly developed Latent Heat Thermal Battery (LHTB) integrated with a solar collector as the main source of heat. The LHTB is a new solution in the field of thermal storage and developed based on the battery concept in terms of recharge ability, portability and usability as a standalone device. It is fabricated based on the thermal battery storage concept and consists of a plate-fin and tube heat exchanger located inside the battery casing and paraffin wax which is used as a latent heat storage material. Solar thermal energy is absorbed by solar… More >

  • Open Access

    ARTICLE

    An Advanced Control Strategy for Dual-Actuator Driving System in Full-Scale Fatigue Test of Wind Turbine Blades

    Guanhua Wang1, Jinghua Wang1, Xuemei Huang1,*, Leian Zhang1, Weisheng Liu2

    Energy Engineering, Vol.119, No.4, pp. 1649-1662, 2022, DOI:10.32604/ee.2022.019695

    Abstract A new dual-actuator fatigue loading system of wind turbine blades was designed. Compared with the traditional pendulum loading mode, the masses in this system only moved linearly along the loading direction to increase the exciting force. However, the two actuators and the blade constituted a complicated non-linear energy transferring system, which led to the non-synchronization of actuators. On-site test results showed that the virtual spindle synchronous strategy commonly used in synchronous control was undesirable and caused the instability of the blade’s amplitude eventually. A cross-coupled control strategy based on the active disturbance rejection algorithm was proposed. Firstly, a control system… More >

  • Open Access

    ARTICLE

    Performance Analysis of a Rooftop Hybrid Connected Solar PV System

    Hasan Falih, Ahmed J. Hamed, Abdul Hadi N. Khalifa*

    Energy Engineering, Vol.119, No.4, pp. 1729-1744, 2022, DOI:10.32604/ee.2022.021190

    Abstract In the present work, a 5-kW hybrid PV solar system was installed on the roof of a house in Diyala, Iraq (33.77° N, 45.14° E elevation 44 m). The system consists of two strings, where each string consists of nine polycrystalline PV modules with 355 Wp in series, and the two strings are in parallel. The energy storage system (ESS) consists of two parallel strings, each with four 12 V and 150 Ah tubular deep cycle batteries in series. A hybrid inverter of 5 kW rated power was operated in different modes. The results showed that May’s monthly energy consumption was about 822.9… More > Graphic Abstract

    Performance Analysis of a Rooftop Hybrid Connected Solar PV System

Displaying 7951-7960 on page 796 of 22225. Per Page