Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Total Cross Tied-Inverted Triangle View Configuration for PV System Power Enhancement

    P. Rajesh1,*, K. S. Saji2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1531-1545, 2022, DOI:10.32604/iasc.2022.023331

    Abstract Electricity can be generated from a photovoltaic cell depending on the amount of solar radiation received from the solar system. But due to some factors such as partial shade conditions, as the thickness of the shade increases, the peak power output from the solar photovoltaic system decreases. Photovoltaic cells can be connected in parallel and in series to generate the required voltage and power. Peak power can be obtained even under shade conditions using the appropriate configuration of solar cells. A novel configuration as Total Cross Tied-Inverted Triangle View (TCT-ITV) is developed in the research by augmenting the Total Cross… More >

  • Open Access

    ARTICLE

    Design of Logically Obfuscated Memory and Arithmetic Logic Unit for Improved Hardware Security

    M. Usharani1,*, B. Sakthivel2, K. Jayaram3, R. Renugadevi4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1665-1675, 2022, DOI:10.32604/iasc.2022.023284

    Abstract In any kind of digital system, the processor and memories are used to play a vital role in today’s trend. The processors and memories are done many critical tasks in the system. Whereas the processor used to do several functions and memories used to store and retrieve the data. But these processors and memories are more vulnerable to various hardware attacks. By using several new devices may lead to many security issues which the attackers can leverage to introduce a new hardware attack. Various hardware security (HS) studies have been presented to prevent hardware from a security issue. Some of… More >

  • Open Access

    ARTICLE

    Modified Optimization for Efficient Cluster-based Routing Protocol in Wireless Sensor Network

    Marwah Mohammad Almasri1,*, Abrar Mohammed Alajlan2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1687-1710, 2022, DOI:10.32604/iasc.2022.023240

    Abstract Wireless Sensor Networks (WSN) comprise numerous sensor nodes for monitoring specific areas. Great deals of efforts have been achieved to obtain effective routing approaches using clustering methods. Clustering is considered an effective way to provide a better route for transmitting the data, but cluster head selection and route generation is considered as a complicated task. To manage such complex issues and to enhance network lifetime and energy consumption, an energy-effective cluster-based routing approach is proposed. As the major intention of this paper is to select an optimal cluster head, this paper proposes a modified golden eagle optimization (M-GEO) algorithm to… More >

  • Open Access

    ARTICLE

    Context-Aware Service Model of a Mobile Library Based on Internet of Things

    Wei Gao1, Haixu Xi1,2,*, Gyun Yeol Park3

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1893-1906, 2022, DOI:10.32604/iasc.2022.023207

    Abstract Appropriate technology needs to be applied in libraries to provide users with more humanized, intelligent, and convenient services to improve service quality. Using theories from library science, management, and modeling, this paper examines library personalized service in the intelligent Internet of Things (IoT) environment using a literature review, comparative analysis, and UML modeling to analyze the influencing factors of mobile library users’ acceptance of personalized recommendation services. Based on the situational awareness framework, the experimental results of the effect of these personalized service recommendations show that the load factor is greater than 0.6, which indicates that the dimensions of a… More >

  • Open Access

    ARTICLE

    Improving the Efficiency of HEV Electronic Applications Using CAN-BUS Communication

    A. George Ansfer*, M. Marsaline Beno

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1455-1472, 2022, DOI:10.32604/iasc.2022.023058

    Abstract A new energy management technique with aid of Controller Area Network (CAN) bus for hybrid electric vehicle (HEV) is proposed in this research. HEV is a type of hybrid vehicle that combines with an electric propulsion system a conventional internal combustion engine system. The electric powertrain operation is intended to achieve greater fuel economy than a conventional vehicle. To accurately distribute power from one of the battery sources, the Energy Management System determines the reference speed for the electric motor drive and the internal combustion engine. The Proportional and Integral (PI) controller is used to maximize the gain of the… More >

  • Open Access

    ARTICLE

    Interleaved Boost Integrated Flyback Converter for Power Factor Correction in Brushless DC Motor Drive

    S. Benisha1,*, J. Anitha Roseline2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1363-1378, 2022, DOI:10.32604/iasc.2022.023012

    Abstract The scope of this research is to manage the speed of Permanent Magnet Brushless DC Motor Drive (PMBLDCMD) for various less capacity applications. In the circuit, a 1ϕ AC power is given to Diode Rectifier and the converted DC supply is given to condenser, which leads to abnormal pulsating current. Because of this pulsating current, the power quality disturbances arise at the supply point. Hence, the PMBLDCMD requires Power Factor Correction (PFC) converter for many household and profitable applications. The rotors of PMBLDCMD are driven by 3ϕ voltage source inverter (VSI), which performs electronic commutation. The range of PFC converter… More >

  • Open Access

    ARTICLE

    Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN

    P. Saravanakumar1, T. V. P. Sundararajan2, Rajesh Kumar Dhanaraj3, Kashif Nisar4,*, Fida Hussain Memon5,6, Ag. Asri Bin Ag. Ibrahim4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1835-1847, 2022, DOI:10.32604/iasc.2022.018953

    Abstract Confidentiality and data integrity are essential paradigms in data aggregation owing to the various cyberattacks in wireless sensor networks (WSNs). This study proposes a novel technique named Lamport certificateless signcryption-based shift-invariant connectionist artificial deep neural networks (LCS-SICADNN) by using artificial deep neural networks to develop the data aggregation security model. This model utilises the input layer with several sensor nodes, four hidden layers to overcome different attacks (data injection, compromised node, Sybil and black hole attacks) and the output layer to analyse the given input. The Lamport one-time certificateless signcryption technique involving three different processes (key generation, signcryption and unsigncryption)… More >

  • Open Access

    ARTICLE

    Sensor Location Optimisation Design Based on IoT and Geostatistics in Greenhouse

    Yang Liu1,3, Xiaoyu Liu2,3, Xiu Dai1, Guanglian Xun1, Ni Ren1,*, Rui Kang1,4, Xiaojuan Mao1

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1653-1663, 2022, DOI:10.32604/iasc.2022.017049

    Abstract Environmental parameters such as air temperature (T) and air relative humidity (RH) should be intensively monitored in a greenhouse in real time. In most cases, one set of sensors is installed in the centre of a greenhouse. However, as the microclimate of a greenhouse is always heterogeneous, the sensor installation location is crucial for practical cultivation. In this study, the T and RH monitoring performance of different sensors were compared. Two types of real-time environmental sensors (Air Temperature and Humidity sensor and Activity Monitoring sensor, referred as ATH and AM) were selected and calibrated by reliable non-real-time sensors (Honest Observer… More >

  • Open Access

    ARTICLE

    Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward

    Lanlan Ni1, Lanzheng Bian2, Rugang Lu1, Ting Chen1,*, Jinyue Xia3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 219-231, 2022, DOI:10.32604/csse.2022.026594

    Abstract Children's fractures are very common, and many children's fractures need internal fixation. When the children are treated and recovered, it needs to be internally fixed and then taken out. With the development of internal fixation materials, the research of surgical methods and the improvement of surgical skills, postoperative removal of orthopedic surgery patients has gradually been included in daytime surgery. While ensuring the safety of children's surgery, it is necessary to shorten the postoperative limb and joint function recovery time, promote the recovery of limb and joint function, the healing of wounds and bones, and reduce the occurrence of these… More >

  • Open Access

    ARTICLE

    Cooperative Detection Method for DDoS Attacks Based on Blockchain

    Jieren Cheng1,2, Xinzhi Yao1,2,*, Hui Li3, Hao Lu4, Naixue Xiong5, Ping Luo1,2, Le Liu1,2, Hao Guo1,2, Wen Feng1,2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 103-117, 2022, DOI:10.32604/csse.2022.025668

    Abstract Distributed Denial of Service (DDoS) attacks is always one of the major problems for service providers. Using blockchain to detect DDoS attacks is one of the current popular methods. However, the problems of high time overhead and cost exist in the most of the blockchain methods for detecting DDoS attacks. This paper proposes a blockchain-based collaborative detection method for DDoS attacks. First, the trained DDoS attack detection model is encrypted by the Intel Software Guard Extensions (SGX), which provides high security for uploading the DDoS attack detection model to the blockchain. Secondly, the service provider uploads the encrypted model to… More >

Displaying 8641-8650 on page 865 of 22098. Per Page