Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    Protecting Data Mobility in Cloud Networks Using Metadata Security

    R. Punithavathi1,*, M. Kowsigan2, R. Shanthakumari3, Miodrag Zivkovic4, Nebojsa Bacanin4, Marko Sarac4

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 105-120, 2022, DOI:10.32604/csse.2022.020486 - 02 December 2021

    Abstract At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data. Sometimes, data may have highly sensitive information, leading users to consider using big data and cloud processing regardless of whether they are secured are not. Threats to sensitive data in cloud systems produce high risks, and existing security methods do not provide enough security to sensitive user data in cloud and big data environments. At present, several security solutions… More >

  • Open Access

    ARTICLE

    Performance Enhancement of PV Based Boost Cascaded Fifteen Level Inverter for AC Loads

    M. P. Viswanathan*, B. Anand

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 165-181, 2022, DOI:10.32604/csse.2022.020400 - 02 December 2021

    Abstract In this research work, single-stage fifteen levels cascaded DC-interface converter (CDDCLC) is proposed for sun arranged photovoltaic technology (PV) applications. The proposed geography is joined with help DC chopper and H-associate inverter to upgrade the power converter to accomplish the diminished harmonic profile. In assessment with the customary inverter structures, the proposed system is used with diminished voltage stress, decreased switch count and DC source tally. The proposed research work with cascaded DC link converter design requires three DC sources for combining fifteen-level AC output. This investigation structure switching technique is phase opposition and disposition More >

  • Open Access

    ARTICLE

    Vision Based Real Time Monitoring System for Elderly Fall Event Detection Using Deep Learning

    G. Anitha1,*, S. Baghavathi Priya2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 87-103, 2022, DOI:10.32604/csse.2022.020361 - 02 December 2021

    Abstract Human fall detection plays a vital part in the design of sensor based alarming system, aid physical therapists not only to lessen after fall effect and also to save human life. Accurate and timely identification can offer quick medical services to the injured people and prevent from serious consequences. Several vision-based approaches have been developed by the placement of cameras in diverse everyday environments. At present times, deep learning (DL) models particularly convolutional neural networks (CNNs) have gained much importance in the fall detection tasks. With this motivation, this paper presents a new vision based… More >

  • Open Access

    ARTICLE

    Application of ANFIS Model for Thailand’s Electric Vehicle Consumption

    Narongkorn Uthathip1,*, Pornrapeepat Bhasaputra1, Woraratana Pattaraprakorn2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 69-86, 2022, DOI:10.32604/csse.2022.020120 - 02 December 2021

    Abstract Generally, road transport is a major energy-consuming sector. Fuel consumption of each vehicle is an important factor that affects the overall energy consumption, driving behavior and vehicle characteristic are the main factors affecting the change of vehicle fuel consumption. It is difficult to analyze the influence of fuel consumption with multiple and complex factors. The Adaptive Neuro-Fuzzy Inference System (ANFIS) approach was employed to develop a vehicle fuel consumption model based on multivariate input. The ANFIS network was constructed by various experiments based on the ANFIS Parameter setting. The performance of the ANFIS network was… More >

  • Open Access

    ARTICLE

    Operation Optimal Control of Urban Rail Train Based on Multi-Objective Particle Swarm Optimization

    Liang Jin1,*, Qinghui Meng1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 387-395, 2022, DOI:10.32604/csse.2022.017745 - 02 December 2021

    Abstract The energy consumption of train operation occupies a large proportion of the total consumption of railway transportation. In order to improve the operating energy utilization rate of trains, a multi-objective particle swarm optimization (MPSO) algorithm with energy consumption, punctuality and parking accuracy as the objective and safety as the constraint is built. To accelerate its the convergence process, the train operation progression is divided into several modes according to the train speed-distance curve. A human-computer interactive particle swarm optimization algorithm is proposed, which presents the optimized results after a certain number of iterations to the… More >

  • Open Access

    ARTICLE

    LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

    Jin Wang1, Changqing Zhao1, Shiming He1,*, Yu Gu2, Osama Alfarraj3, Ahed Abugabah4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1207-1222, 2022, DOI:10.32604/csse.2022.022365 - 10 November 2021

    Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models.… More >

  • Open Access

    ARTICLE

    Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

    Hao Yan1,2, Yanan Liu1, Shuo Qiu1, Shengzhou Hu3, Weijian Zhang4,*, Jinyue Xia5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1129-1142, 2022, DOI:10.32604/csse.2022.022317 - 10 November 2021

    Abstract With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third… More >

  • Open Access

    ARTICLE

    A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

    Xiaorui Zhang1,3,*, Wenfang Zhang1, Wei Sun2, Xingming Sun1, Sunil Kumar Jha4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1043-1056, 2022, DOI:10.32604/csse.2022.022305 - 10 November 2021

    Abstract In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100 - 10 November 2021

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of… More >

  • Open Access

    ARTICLE

    Interactive Middleware Services for Heterogeneous Systems

    Vasanthi Raghupathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, Sudhakar Sengan4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1241-1253, 2022, DOI:10.32604/csse.2022.021997 - 10 November 2021

    Abstract Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Systems. This resulted in the delivery of interactive services throughout Heterogeneous Environments (HE). Users are given free navigation between devices in a widespread environment and continuously interact with each other from any chosen device. Numerous interactive devices with recent interactive platforms (for example, Smart Phones, Mobile… More >

Displaying 1071-1080 on page 108 of 1494. Per Page