Home / Journals / CSSE / Vol.36, No.2, 2021
  • Open Access

    ARTICLE

    Blockchain Consistency Check Protocol for Improved Reliability

    Mohammed Alwabel, Youngmi Kwon*
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 281-292, 2021, DOI:10.32604/csse.2021.014630
    Abstract Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies. Blockchain achieves security by saving the information of one block in the next block. Changing the information of one block will require changes to all the next block in order for that change to take effect. Which makes it unfeasible for such an attack to happen. However, the structure of how blockchain works makes the last block always vulnerable for attacks, given that its information is not saved yet in any block. This allows malicious node to change the information of the last… More >

  • Open Access

    ARTICLE

    Comparative Study of Valency-Based Topological Descriptor for Hexagon Star Network

    Ali N. A. Koam1, Ali Ahmad2,*, M. F. Nadeem3
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 293-306, 2021, DOI:10.32604/csse.2021.014896
    Abstract A class of graph invariants referred to today as topological indices are inefficient progressively acknowledged by scientific experts and others to be integral assets in the depiction of structural phenomena. The structure of an interconnection network can be represented by a graph. In the network, vertices represent the processor nodes and edges represent the links between the processor nodes. Graph invariants play a vital feature in graph theory and distinguish the structural properties of graphs and networks. A topological descriptor is a numerical total related to a structure that portray the topology of structure and is invariant under structure automorphism.… More >

  • Open Access

    ARTICLE

    Optimal Robust Control for Unstable Delay System

    Rihem Farkh1,2,*, Khaled A. Aljaloud1, Moufida Ksouri2, Faouzi Bouani2
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 307-321, 2021, DOI:10.32604/csse.2021.014334
    Abstract Proportional-Integral-Derivative control system has been widely used in industrial applications. For uncertain and unstable systems, tuning controller parameters to satisfy the process requirements is very challenging. In general, the whole system’s performance strongly depends on the controller’s efficiency and hence the tuning process plays a key role in the system’s response. This paper presents a robust optimal Proportional-Integral-Derivative controller design methodology for the control of unstable delay system with parametric uncertainty using a combination of Kharitonov theorem and genetic algorithm optimization based approaches. In this study, the Generalized Kharitonov Theorem (GKT) for quasi-polynomials is employed for the purpose of designing… More >

  • Open Access

    ARTICLE

    Atrocious Impinging of COVID-19 Pandemic on Software Development Industries

    Wajdi Alhakami1, Ahmed Binmahfoudh2, Abdullah Baz3, Hosam Alhakami4, Md Tarique Jamal Ansari5, Raees Ahmad Khan5,*
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 323-338, 2021, DOI:10.32604/csse.2021.014929
    Abstract COVID-19 is the contagious disease transmitted by Coronavirus. The majority of people diagnosed with COVID-19 may suffer from moderate-to- severe respiratory illnesses and stabilize without preferential treatment. Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medical issues including heart disease, diabetes, or chronic breathing problems. The novel Coronavirus has affected not only the physical and mental health of the people but also had adverse impact on their emotional well-being. For months on end now, due to constant monitoring and containment measures to combat COVID-19, people have been… More >

  • Open Access

    ARTICLE

    Aligning Education with Vision 2030 Using Augmented Reality

    Raniyah Wazirali*
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 339-351, 2021, DOI:10.32604/csse.2021.014301
    Abstract Vision 2030 requires a new generation of people with a wide variety of abilities, talents, and skills. The adoption of augmented reality (AR) and virtual reality is one possible way to align education with Vision 2030. Immersive technologies like AR are rapidly becoming powerful and versatile enough to be adopted in education to achieve this goal. Technologies such as AR could be beneficial tools to enhance maintainable growth in education. We reviewed the most recent studies in augmented reality to check its appropriateness in aligning with the educational goals of Vision 2030. First, the various definitions, terminologies, and technologies of… More >

  • Open Access

    REVIEW

    A Review of Energy-Related Cost Issues and Prediction Models in Cloud Computing Environments

    Mohammad Aldossary*
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 353-368, 2021, DOI:10.32604/csse.2021.014974
    Abstract With the expansion of cloud computing, optimizing the energy efficiency and cost of the cloud paradigm is considered significantly important, since it directly affects providers’ revenue and customers’ payment. Thus, providing prediction information of the cloud services can be very beneficial for the service providers, as they need to carefully predict their business growths and efficiently manage their resources. To optimize the use of cloud services, predictive mechanisms can be applied to improve resource utilization and reduce energy-related costs. However, such mechanisms need to be provided with energy awareness not only at the level of the Physical Machine (PM) but… More >

  • Open Access

    ARTICLE

    A Quantum Spatial Graph Convolutional Network for Text Classification

    Syed Mustajar Ahmad Shah1, Hongwei Ge1,*, Sami Ahmed Haider2, Muhammad Irshad3, Sohail M. Noman4, Jehangir Arshad5, Asfandeyar Ahmad6, Talha Younas7
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 369-382, 2021, DOI:10.32604/csse.2021.014234
    Abstract The data generated from non-Euclidean domains and its graphical representation (with complex-relationship object interdependence) applications has observed an exponential growth. The sophistication of graph data has posed consequential obstacles to the existing machine learning algorithms. In this study, we have considered a revamped version of a semi-supervised learning algorithm for graph-structured data to address the issue of expanding deep learning approaches to represent the graph data. Additionally, the quantum information theory has been applied through Graph Neural Networks (GNNs) to generate Riemannian metrics in closed-form of several graph layers. In further, to pre-process the adjacency matrix of graphs, a new… More >

  • Open Access

    ARTICLE

    Cross-Modal Hashing Retrieval Based on Deep Residual Network

    Zhiyi Li1,2,*, Xiaomian Xu2, Du Zhang1, Peng Zhang2
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 383-405, 2021, DOI:10.32604/csse.2021.014563
    Abstract In the era of big data rich in We Media, the single mode retrieval system has been unable to meet people’s demand for information retrieval. This paper proposes a new solution to the problem of feature extraction and unified mapping of different modes: A Cross-Modal Hashing retrieval algorithm based on Deep Residual Network (CMHR-DRN). The model construction is divided into two stages: The first stage is the feature extraction of different modal data, including the use of Deep Residual Network (DRN) to extract the image features, using the method of combining TF-IDF with the full connection network to extract the… More >

  • Open Access

    ARTICLE

    Motion-Blurred Image Restoration Based on Joint Invertibility of PSFs

    Yuye Zhang1,*, Jingli Huang1, Jiandong Liu1, Hakeel Ahmed Chohan2
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 407-416, 2021, DOI:10.32604/csse.2021.014154
    Abstract To implement restoration in a single motion blurred image, the PSF (Point Spread Function) is difficult to estimate and the image deconvolution is ill-posed as a result that a good recovery effect cannot be obtained. Considering that several different PSFs can get joint invertibility to make restoration well-posed, we proposed a motion-blurred image restoration method based on joint invertibility of PSFs by means of computational photography. Firstly, we designed a set of observation device which composed by multiple cameras with the same parameters to shoot the moving target in the same field of view continuously to obtain the target images… More >

  • Open Access

    ARTICLE

    Clustering Collision Power Attack on RSA-CRT

    Wunan Wan1,*, Jun Chen1, Jinyue Xia2, Jinquan Zhang1, Shibin Zhang1, Hao Chen1
    Computer Systems Science and Engineering, Vol.36, No.2, pp. 417-434, 2021, DOI:10.32604/csse.2021.014460
    Abstract In this paper, we propose two new attack algorithms on RSA implementations with CRT (Chinese remainder theorem). To improve the attack efficiency considerably, a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs. This attack method is that the key parameters dp and dq are segmented by byte, and the modular multiplication collisions are identified by k-means clustering. The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs, and the exponent d was obtained. We also propose a second order clustering collision power analysis attack against RSA… More >

Share Link

WeChat scan