Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    A Novel Method of User Identity Recognition Based on Finger Trajectory

    Xia Zhou1, Zijian Wang2, Tianyu Wang2, Jin Han2,*, Zhiling Wang2, Yannan Qian3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 473-481, 2022, DOI:10.32604/iasc.2022.022493

    Abstract User identity recognition is the key shield to protect users’ privacy data from disclosure and embezzlement. The user identity of mobile devices such as mobile phones mainly includes fingerprint recognition, nine-grid password, face recognition, digital password, etc. Due to the requirements of computing resources and convenience of mobile devices, these verification methods have their own shortcomings. In this paper, a user identity recognition technology based on finger trajectory is proposed. Based on the analysis of the users’ finger trajectory data, the feature of the user's finger movement trajectory is extracted to realize the identification of the user. Also, in this… More >

  • Open Access

    ARTICLE

    Adaptive XGBOOST Hyper Tuned Meta Classifier for Prediction of Churn Customers

    B. Srikanth1,*, Swarajya Lakshmi V. Papineni2, Gutta Sridevi3, D. N. V. S. L. S. Indira4, K. S. R. Radhika5, Khasim Syed6

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 21-34, 2022, DOI:10.32604/iasc.2022.022423

    Abstract In India, the banks have a formidable edge in maintaining their customer retention ratio for past few decades. Downfall makes the private banks to reduce their operations and the nationalised banks merge with other banks. The researchers have used the traditional and ensemble algorithms with relevant feature engineering techniques to better classify the customers. The proposed algorithm uses a Meta classifier instead of an ensemble algorithm with an adaptive genetic algorithm for feature selection. Churn prediction is the number of customers who wants to terminate their services in the banking sector. The model considers twelve attributes like credit score, geography,… More >

  • Open Access

    ARTICLE

    Three to Six Phase Power Converter with Partial Resonant AC Link

    V. Ravikumar1,*, S. Muralidharan2, C. Vidhya1

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 207-225, 2022, DOI:10.32604/iasc.2022.022370

    Abstract A six phase system is a balanced multiphase system that can be replace, in certain applications, the three phase system and the application becomes much fault tolerant. In the six phase system a phase angle of 60 degrees is maintained between the phases. Handling power with more number of phases reduces the maximum current in each of the phase in the system. In this work a six phase balanced AC output is derived from a three phase AC source. The proposed system uses a resonant single phase AC link driven by a three phase bidirectional converter unit AC link is… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks

    M. Maheswari1,2,*, R. A. Karthika1

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 365-382, 2022, DOI:10.32604/iasc.2022.022259

    Abstract With the advent of wireless communication and digital technology, low power, Internet-enabled, and reconfigurable wireless devices have been developed, which revolutionized day-to-day human life and the economy across the globe. These devices are realized by leveraging the features of sensing, processing the data and nodes communications. The scale of Internet-enabled wireless devices has increased daily, and these devices are exposed to various cyber-attacks. Since the complexity and dynamics of the attacks on the devices are computationally high, intelligent, scalable and high-speed intrusion detection systems (IDS) are required. Moreover, the wireless devices are battery-driven; implementing them would consume more energy, weakening… More >

  • Open Access

    ARTICLE

    Deep Embedded Fuzzy Clustering Model for Collaborative Filtering Recommender System

    Adel Binbusayyis*

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 501-513, 2022, DOI:10.32604/iasc.2022.022239

    Abstract The increasing user of Internet has witnessed a continued exploration in applications and services that can bring more convenience in people's life than ever before. At the same time, with the exploration of online services, the people face unprecedented difficulty in selecting the most relevant service on the fly. In this context, the need for recommendation system is of paramount importance especially in helping the users to improve their experience with best value-added service. But, most of the traditional techniques including collaborative filtering (CF) which is one of the most successful recommendation technique suffer from two inherent issues namely, rating… More >

  • Open Access

    ARTICLE

    Enhanced Mesh Network Using Novel Forgotten Polynomial Algorithm for Pharmaceutical Design

    D. Ahila Jeyanthi*, T. M. Selvarajan

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 669-680, 2022, DOI:10.32604/iasc.2022.022187

    Abstract The molecular structures are modelled as graphs which are called the molecular graphs. In these graphs, each vertex represents an atom and each edge denotes covalent bond between atoms. It is shown that the topological indices defined on the molecular graphs can reflect the chemical characteristics of chemical compounds and drugs. A large number of previous drug experiments revealed that there are strong inherent connections between the drug’s molecular structures and the bio-medical and pharmacology characteristics. The forgotten topological index is introduced to be applied into chemical compound and drug molecular structures, which is quite helpful for medical and pharmaceutical… More >

  • Open Access

    ARTICLE

    Hybrid Microgrid based on PID Controller with the Modified Particle Swarm Optimization

    R. K. Rojin1,*, M. Mary Linda2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 245-258, 2022, DOI:10.32604/iasc.2022.021834

    Abstract Microgrids (MG) are distribution networks encompassing distributed energy sources. As it obtains the power from these resources, few problems such as instability along with Steady-State (SS) issues are noticed. To address the stability issues, that arise due to disturbances of low magnitude. Small-Signals Stability (SSS) becomes mandatory in the network. Convergence at local optimum is one of the major issues noticed with the existing optimization algorithms. This paper proposes a detailed model of SSS in Direct Current (DC)-Alternate Current (AC) Hybrid MG (HMG) using Proportional Integral and Derivative Controller (PIDC) tuned with Modified Particle Swarm Optimization (MPSO) algorithm to alleviate… More >

  • Open Access

    ARTICLE

    Insider Threat Detection Based on NLP Word Embedding and Machine Learning

    Mohd Anul Haq1, Mohd Abdul Rahim Khan1,*, Mohammed Alshehri2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 619-635, 2022, DOI:10.32604/iasc.2022.021430

    Abstract The growth of edge computing, the Internet of Things (IoT), and cloud computing have been accompanied by new security issues evolving in the information security infrastructure. Recent studies suggest that the cost of insider attacks is higher than the external threats, making it an essential aspect of information security for organizations. Efficient insider threat detection requires state-of-the-art Artificial Intelligence models and utility. Although significant have been made to detect insider threats for more than a decade, there are many limitations, including a lack of real data, low accuracy, and a relatively low false alarm, which are major concerns needing further… More >

  • Open Access

    ARTICLE

    Light-Weight Present Block Cipher Model for IoT Security on FPGA

    R. Bharathi*, N. Parvatham

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 35-49, 2022, DOI:10.32604/iasc.2022.020681

    Abstract The Internet of Things (IoT) plays an essential role in connecting a small number of billion devices with people for diverse applications. The security and privacy with authentication are challenging work for IoT devices. A light-weight block cipher is designed and modeled with IoT security for real-time scenarios to overcome the above challenges. The light-weight PRESENT module with the integration of encryption (E)-decryption (D) is modeled and implemented on FPGA. The PRESENT module has 64-bit data input with 80/128/256-bit symmetric keys for IoT security. The PRESENT module performs16/32/64 round operations for state register and key updation. The design mainly uses… More >

  • Open Access

    ARTICLE

    Bidirectional Long Short-Term Memory Network for Taxonomic Classification

    Naglaa. F. Soliman1,*, Samia M. Abd Alhalem2, Walid El-Shafai2, Salah Eldin S. E. Abdulrahman3, N. Ismaiel3, El-Sayed M. El-Rabaie2, Abeer D. Algarni1, Fatimah Algarni4, Fathi E. Abd El-Samie1,2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 103-116, 2022, DOI:10.32604/iasc.2022.017691

    Abstract Identifying and classifying Deoxyribonucleic Acid (DNA) sequences and their functions have been considered as the main challenges in bioinformatics. Advances in machine learning and Deep Learning (DL) techniques are expected to improve DNA sequence classification. Since the DNA sequence classification depends on analyzing textual data, Bidirectional Long Short-Term Memory (BLSTM) algorithms are suitable for tackling this task. Generally, classifiers depend on the patterns to be processed and the pre-processing method. This paper is concerned with a new proposed classification framework based on Frequency Chaos Game Representation (FCGR) followed by Discrete Wavelet Transform (DWT) and BLSTM. Firstly, DNA strings are transformed… More >

Displaying 9471-9480 on page 948 of 22225. Per Page