Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Analyzing the Implications of Healthcare Data Breaches through Computational Technique

    Ahmed H. Almulihi1, Fawaz Alassery2, Asif Irshad Khan3, Sarita Shukla4, Bineet Kumar Gupta4, Rajeev Kumar4,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1763-1779, 2022, DOI:10.32604/iasc.2022.023460

    Abstract The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that… More >

  • Open Access

    ARTICLE

    Fuzzy Logic for Underground Mining Method Selection

    D. Palanikkumar1, Kamal Upreti2, S. Venkatraman3,*, J. Roselin Suganthi4, Sridharan Kannan5, S. Srinivasan6

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1843-1854, 2022, DOI:10.32604/iasc.2022.023350

    Abstract The Selection of the mining method for underground minerals extraction is the crucial task for the mining engineers. Underground minerals extraction is a multi-criteria decision making problem due to many criteria to be considered in the selection process. There are many studies on selection of underground mining method using Multi Criteria Decision Making (MCDM) techniques or approaches. Extracting minerals from the underground involves many geological characteristics also called as input parameters. The geological characteristics of any mineral deposit vary from one location to another location. Thus only one mineral extraction method is not suitable for different deposit characteristics. There are… More >

  • Open Access

    ARTICLE

    Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Ashi Khan3,*, Mohd Nadeem4, Md Tarique Jamal Ansari4

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1701-1715, 2022, DOI:10.32604/iasc.2022.023314

    Abstract A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the healthcare industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to determine the impact of mental health in D2 patients. This study will examine the impact assessment in D2 patients. This paper used the integrated methodology of Fuzzy Analytic Hierarchy (FAHP) and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (FTOPSIS).… More >

  • Open Access

    ARTICLE

    Improved Radio Resource Allocation in 5G Network Using Fuzzy Logic Systems

    S. Vimalnath1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1687-1699, 2022, DOI:10.32604/iasc.2022.023083

    Abstract With recent advancements in machine-to-machine (M2M), the demand for fastest communication is an utmost concern of the M2M technology. The advent of 5G telecommunication networks enables to bridge the demand on satisfying the Quality-of-Service (QoS) concerns in M2M communication. The massive number of devices in M2M communication is henceforth do not lie under limited resource allocation by embedding the 5G telecommunication network. In this paper, we address the above limitation of allocation the resource to prominent M2M devices using Adaptive Neuro Fuzzy Inference System (ANFIS). In ANFIS, the adoption of rules will imply the resource allocation with the devices of… More >

  • Open Access

    ARTICLE

    Ontology-Based Semantic Search Framework for Disparate Datasets

    Paramjeet Kaur1, Parma Nand1, Salman Naseer2, Akber Abid Gardezi3, Fawaz Alassery4, Habib Hamam5, Omar Cheikhrouhou6, Muhammad Shafiq7,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1717-1728, 2022, DOI:10.32604/iasc.2022.023063

    Abstract The public sector provides open data to create new opportunities, stimulate innovation, and implement new solutions that benefit academia and society. However, open data is usually available in large quantities and often lacks quality, accuracy, and completeness. It may be difficult to find the right data to analyze a target. There are many rich open data repositories, but they are difficult to understand and use because these data can only be used with a complex set of keyword search options, and even then, irrelevant or insufficient data may eventually be retrieved. To alleviate this situation, ontology-based semantic search has been… More >

  • Open Access

    ARTICLE

    A Cost-Efficient Radiation Monitoring System for Nuclear Sites: Designing and Implementation

    Arfat Ahmad Khan1,*, Faizan Ahmed Khan2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1357-1367, 2022, DOI:10.32604/iasc.2022.022958

    Abstract Radiation monitoring is essential for examining and refraining the unwanted situations in the vicinity of nuclear plants as high levels of radiation are quite dangerous for human beings. Meanwhile, Wireless Sensor Networks (WSNs) are proved to be an auspicious candidate to address that issue. Actually, WSNs are pretty beneficial to monitor an area with the aim of avoiding undesirable situations. In this paper, we have designed and implemented a cost-efficient radiation and the temperature monitoring system. We have used ZigBee to develop the sensor nodes, and the sensor nodes are instilled with the radiation and the temperature sensors. In addition,… More >

  • Open Access

    ARTICLE

    Integration of Renewable Energy Sources into the Smart Grid Using Enhanced SCA

    Shaik Karimulla, K. Ravi*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1557-1572, 2022, DOI:10.32604/iasc.2022.022953

    Abstract The usage of energy in everyday life is growing day by day as a result of the rapid growth in the human population. One solution is to increase electricity generation to the same extent as the human population, but this is usually practically impossible. As the population is increasing, the need for electrical usage is also increasing. Therefore, smart grids play an important role in making efficient use of existing energy sources like solar, wind and battery storage systems. By managing demand, the minimization of power consumption and its consequent costs. On the load side, residential and commercial types use… More >

  • Open Access

    ARTICLE

    IoT-EMS: An Internet of Things Based Environment Monitoring System in Volunteer Computing Environment

    Sourav Kumar Bhoi1, Sanjaya Kumar Panda2, Kalyan Kumar Jena1, Kshira Sagar Sahoo3, N. Z. Jhanjhi4,*, Mehedi Masud5, Sultan Aljahdali5

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1493-1507, 2022, DOI:10.32604/iasc.2022.022833

    Abstract Environment monitoring is an important area apart from environmental safety and pollution control. Such monitoring performed by the physical models of the atmosphere is unstable and inaccurate. Machine Learning (ML) techniques on the other hand are more robust in capturing the dynamics in the environment. In this paper, a novel approach is proposed to build a cost-effective standardized environment monitoring system (IoT-EMS) in volunteer computing environment. In volunteer computing, the volunteers (people) share their resources for distributed computing to perform a task (environment monitoring). The system is based on the Internet of Things and is controlled and accessed remotely through… More >

  • Open Access

    ARTICLE

    Smart Garbage Bin Based on AIoT

    Wen-Tsai Sung1, Ihzany Vilia Devi1, Sung-Jung Hsiao2,*, Fathria Nurul Fadillah1

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1387-1401, 2022, DOI:10.32604/iasc.2022.022828

    Abstract Waste management and monitoring is a major concern in the context of the environment, and has a significant impact on human health. The concept of the Artificial Intelligence of Things (AIoT) can help people in everyday tasks in life. This study proposes a smart trash bin to help solve the problem of waste management and monitoring. Traditional methods of garbage disposal require human labor, and pose a hazard to the worker. The proposed smart garbage bin can move itself by using ultrasonic sensors and a web camera, which serves as its “eyes.” Because the smart garbage bin is designed for… More >

  • Open Access

    ARTICLE

    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation function. Two stages are… More >

Displaying 9681-9690 on page 969 of 22225. Per Page