Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,360)
  • Open Access

    ARTICLE

    Efficient Urban Green Space Destruction and Crop Stress Yield Assessment Model

    G. Chamundeeswari1, S. Srinivasan1,*, S. Prasanna Bharathi1,2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 515-534, 2022, DOI:10.32604/iasc.2022.023449

    Abstract Remote sensing (RS) is a very reliable and effective way to monitor the environment and landscape changes. In today’s world topographic maps are very important in science, research, planning and management. It is quite possible to detect the changes based on RS data which is obtained at two different times. In this paper, we propose an optimal technique that handles problems like urban green space destruction and detection of crop stress assessment. Firstly, the optimal preprocessing is performed on the given RS dataset, for image enhancement using geometric correction and image registration. Secondly, we propose the improved cat swarm optimization… More >

  • Open Access

    ARTICLE

    Achieving State Space Reduction in Generated Ajax Web Application State Machine

    Nadeem Fakhar Malik1,*, Aamer Nadeem1, Muddassar Azam Sindhu2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 429-455, 2022, DOI:10.32604/iasc.2022.023423

    Abstract The testing of Ajax (Asynchronous JavaScript and XML) web applications poses novel challenges for testers because Ajax constructs dynamic web applications by using Asynchronous communication and run time Document Object Model (DOM) manipulation. Ajax involves extreme dynamism, which induces novel kind of issues like state explosion, triggering state changes and unreachable states etc. that require more demanding web-testing methods. Model based testing is amongst the effective approaches to detect faults in web applications. However, the state model generated for an Ajax application can be enormous and may be hit by state explosion problem for large number of user action based… More >

  • Open Access

    ARTICLE

    A Cloud-Based Secure Emergency Message Dissemination Scheme in Vehicular Adhoc Networks

    R. Rajasekar1,*, P. Sivakumar2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 117-131, 2022, DOI:10.32604/iasc.2022.023372

    Abstract The Internet of vehicles and vehicular ad-hoc networks (VANET) offers numerous opportunities for managing the transportation problems effectively. The high mobility and wireless communication in VANET lead to adequate network topology modifications, resulting in network instability and insecure data communication. With an unsteady flow of traffic, vehicles are unevenly distributed in the geographical areas in practice. A new type 2 fuzzy logic-based secure clustering (T2FLSC) with cloud-based data dissemination scheme called the T2FLSC-CDD model for the VANET has been introduced for resolving this issue. The vehicles are dynamically clustered by the use of the T2FLSC technique, which elects the CHs… More >

  • Open Access

    ARTICLE

    Robust Node Localization with Intrusion Detection for Wireless Sensor Networks

    R. Punithavathi1, R. Thanga Selvi2, R. Latha3, G. Kadiravan4,*, V. Srikanth5, Neeraj Kumar Shukla6

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 143-156, 2022, DOI:10.32604/iasc.2022.023344

    Abstract Wireless sensor networks comprise a set of autonomous sensor nodes, commonly used for data gathering and tracking applications. Node localization and intrusion detection are considered as the major design issue in WSN. Therefore, this paper presents a new multi-objective manta ray foraging optimization (MRFO) based node localization with intrusion detection (MOMRFO-NLID) technique for WSN. The goal of the MOMRFO-NLID technique is to optimally localize the unknown nodes and determine the existence of intrusions in the network. The MOMRFO-NLID technique encompasses two major stages namely MRFO based localization of nodes and optimal Siamese Neural Network (OSNN) based intrusion detection. The OSNN… More >

  • Open Access

    ARTICLE

    Forward Flight Performance Analysis of Supercritical Airfoil in Helicopter Main Rotor

    Inamul Hasan1,2,*, R. Mukesh2, P. Radha Krishnan1,2, R. Srinath1, R. B. Dhanya Prakash2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 567-584, 2022, DOI:10.32604/iasc.2022.023252

    Abstract In this research, the aerodynamic performance and flow characteristics of NASA SC (2)-0714 airfoil and HH02 airfoil in the helicopter main rotor are evidently analyzed. The supercritical airfoil is used in the aircraft for attaining better transonic and high-speed flow characteristics. Moreover, a specialized helicopter airfoil called HH02 is used in the Apache helicopter rotor for increasing the operational speed. As most of the high-speed helicopters are using four-bladed main rotor configuration, it is analyzed with prior attention. The lift and thrust act in different directions for the forward phase of the flight whereas the lift and thrust act in… More >

  • Open Access

    ARTICLE

    Semantic Annotation of Land Cover Remote Sensing Images Using Fuzzy CNN

    K. Saranya1,*, K. Selva Bhuvaneswari2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 399-414, 2022, DOI:10.32604/iasc.2022.023149

    Abstract This paper presents a novel fuzzy logic based Convolution Neural Network intelligent classifier for accurate image classification. The proposed approach employs a semantic class label model that classifies the input land cover images into a set of semantic categories and classes depending on the content. The intelligent feature selection algorithm selects the prominent attributes from the given data set using weighted attribute functions and uses fuzzy logic to build the rules based on the membership values. To annotate remote sensing images, the CNN method effectively creates semantics and categorises images. The decision manager then integrates the fuzzy logic rules with… More >

  • Open Access

    ARTICLE

    A Machine-Learning Framework to Improve Wi-Fi Based Indoorpositioning

    Venkateswari Pichaimani1, K. R. Manjula2,*

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 383-397, 2022, DOI:10.32604/iasc.2022.023105

    Abstract The indoor positioning system comprises portable wireless devices that aid in finding the location of people or objects within the buildings. Identification of the items is through the capacity level of the signal received from various access points (i.e., Wi-Fi routers). The positioning of the devices utilizing some algorithms has drawn more attention from the researchers. Yet, the designed algorithm still has problems for accurate floor planning. So, the accuracy of position estimation with minimum error is made possible by introducing Gaussian Distributive Feature Embedding based Deep Recurrent Perceptive Neural Learning (GDFE-DRPNL), a novel framework. Novel features from the dataset… More >

  • Open Access

    ARTICLE

    To Control Diabetes Using Machine Learning Algorithm and Calorie Measurement Technique

    T. Viveka1,*, C. Christopher Columbus2, N. Senthil Velmurugan3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 535-547, 2022, DOI:10.32604/iasc.2022.022976

    Abstract Because of the increasing workload, people are having several clinical examinations to determine their health status, resulting in limited time. Here, we present a healthful consuming device based on rule mining that can modify your parameter dependency and recommend the varieties of meals that will boost your fitness and assist you to avoid the types of meals that increase your risk for sicknesses. Using the meals database, the data mining technique is useful for gathering meal energy from breakfast, after breakfast, lunch, after lunch, dinner, after dinner, and bedtime for ninety days. The purpose of this study is to determine… More >

  • Open Access

    ARTICLE

    An Advanced Integrated Approach in Mobile Forensic Investigation

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 87-102, 2022, DOI:10.32604/iasc.2022.022972

    Abstract Rapid advancement of digital technology has encouraged its use in all aspects of life, including the workplace, education, and leisure. As technology advances, so does the number of users, which leads to an increase in criminal activity and demand for a cyber-crime investigation. Mobile phones have been the epicenter of illegal activity in recent years. Sensitive information is transferred due to numerous technical applications available at one’s fingertips, which play an essential part in cyber-crime attacks in the mobile environment. Mobile forensic is a technique of recovering or retrieving digital evidence from mobile devices so that it may be submitted… More >

  • Open Access

    ARTICLE

    Optimized Compressive Sensing Based ECG Signal Compression and Reconstruction

    Ishani Mishra1,*, Sanjay Jain2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 415-428, 2022, DOI:10.32604/iasc.2022.022860

    Abstract In wireless body sensor network (WBSN), the set of electrocardiograms (ECG) data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient. However, due to the size of the ECG data, the performance of the signal compression and reconstruction is degraded. For efficient wireless transmission of ECG data, compressive sensing (CS) frame work plays significant role recently in WBSN. So, this work focuses to present CS for ECG signal compression and reconstruction. Although CS minimizes mean square error (MSE), compression rate and reconstruction probability of the CS is… More >

Displaying 9591-9600 on page 960 of 22360. Per Page