Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,442)
  • Open Access

    ARTICLE

    Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol

    Waseem Ullah Khan*, Safdar Nawaz Khan Marwat, Salman Ahmed

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1297-1313, 2022, DOI:10.32604/csse.2022.024018

    Abstract The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the Internet which communicate and exchange data among each other. Applications of IoT can be found in many fields of engineering and sciences such as healthcare, traffic, agriculture, oil and gas industries, and logistics. In logistics, the products which are to be transported may be sensitive and perishable, and require controlled environment. Most of the commercially available logistic containers are not integrated with IoT devices to provide controlled environment parameters inside the container and to transmit data to a remote… More >

  • Open Access

    ARTICLE

    An Animated GIF Steganography Using Variable Block Partition Scheme

    Maram Abdullah M. Alyahya1, Arshiya S. Ansari1,*, Mohammad Sajid Mohammadi2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 897-914, 2022, DOI:10.32604/csse.2022.023904

    Abstract The paper presents a novel Graphics Interchange Format (GIF) Steganography system. The algorithm uses an animated (GIF) file format video to apply on, a secured and variable image partition scheme for data embedding. The secret data could be any character text, any image, an audio file, or a video file; that is converted in the form of bits. The proposed method uses a variable partition scheme structure for data embedding in the (GIF) file format video. The algorithm estimates the capacity of the cover (GIF) image frames to embed data bits. Our method built variable… More >

  • Open Access

    ARTICLE

    Multi-Site Air Pollutant Prediction Using Long Short Term Memory

    Chitra Paulpandi*, Murukesh Chinnasamy, Shanker Nagalingam Rajendiran

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1341-1355, 2022, DOI:10.32604/csse.2022.023882

    Abstract The current pandemic highlights the significance and impact of air pollution on individuals. When it comes to climate sustainability, air pollution is a major challenge. Because of the distinctive nature, unpredictability, and great changeability in the reality of toxins and particulates, detecting air quality is a puzzling task. Simultaneously, the ability to predict or classify and monitor air quality is becoming increasingly important, particularly in urban areas, due to the well documented negative impact of air pollution on resident’s health and the environment. To better comprehend the current condition of air quality, this research proposes… More >

  • Open Access

    ARTICLE

    Classification of Glaucoma in Retinal Images Using EfficientnetB4 Deep Learning Model

    A. Geetha, N. B. Prakash*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1041-1055, 2022, DOI:10.32604/csse.2022.023680

    Abstract Today, many eye diseases jeopardize our everyday lives, such as Diabetic Retinopathy (DR), Age-related Macular Degeneration (AMD), and Glaucoma. Glaucoma is an incurable and unavoidable eye disease that damages the vision of optic nerves and quality of life. Classification of Glaucoma has been an active field of research for the past ten years. Several approaches for Glaucoma classification are established, beginning with conventional segmentation methods and feature-extraction to deep-learning techniques such as Convolution Neural Networks (CNN). In contrast, CNN classifies the input images directly using tuned parameters of convolution and pooling layers by extracting features.… More >

  • Open Access

    ARTICLE

    A Learning Model to Detect Android C&C Applications Using Hybrid Analysis

    Attia Qammar1, Ahmad Karim1,*, Yasser Alharbi2, Mohammad Alsaffar2, Abdullah Alharbi2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 915-930, 2022, DOI:10.32604/csse.2022.023652

    Abstract Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination More >

  • Open Access

    ARTICLE

    Modeling and Experimental Verification of Electric Vehicles Off-Grid Photovoltaic Powered Charging Station

    Essam Hendawi1,*, Sattam Al Otaibi1, Sherif Zaid2,3,4, Ayman Hoballah1, Salah K. ElSayed1, Nagy I. Elkalashy1, Yasser Ahmed1

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.022927

    Abstract With the increasing development of EVs, the energy demand from the conventional utility grid increases in proportion. On the other hand, photovoltaic (PV) energy sources can overcome several problems when charging EVs from the utility grid especially in remote areas. This paper presents an effective photovoltaic stand-alone charging station for EV applications. The proposed charging station incorporates PV array, a lithium-ion battery representing the EV battery, and a lead-acid battery representing the energy storage system (ESS). A bidirectional DC-DC converter is employed for charging/discharging the ESS and a unidirectional DC-DC converter is utilized for charging… More >

  • Open Access

    ARTICLE

    Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm

    D. Jeyakumar*, C. Rajabhushanam

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1131-1144, 2022, DOI:10.32604/csse.2022.022480

    Abstract In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network node function and to build a block that may connect the chain, communication services. Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has been used to define the connection between the VNF and to give the best end-to-end services. In the existing method, VNF mapping and backup VNF were proposed but there was no profit and reliability improvement of the backup and mapping of the primary VNF. As a consequence, this paper offers a Hybrid Hexagon-Cost Efficient… More >

  • Open Access

    ARTICLE

    Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing

    S. Lakshmi Narayanan*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 931-946, 2022, DOI:10.32604/csse.2022.022459

    Abstract The main aim of this work is to improve the security of data hiding for secret image sharing. The privacy and security of digital information have become a primary concern nowadays due to the enormous usage of digital technology. The security and the privacy of users’ images are ensured through reversible data hiding techniques. The efficiency of the existing data hiding techniques did not provide optimum performance with multiple end nodes. These issues are solved by using Separable Data Hiding and Adaptive Particle Swarm Optimization (SDHAPSO) algorithm to attain optimal performance. Image encryption, data embedding,… More >

  • Open Access

    ARTICLE

    An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases

    Norwini Zaidi1, Iskandar Ishak2,*, Fatimah Sidi2, Lilly Suriani Affendey2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1175-1188, 2022, DOI:10.32604/csse.2022.021969

    Abstract Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However, there is no standard guideline for data transformation from relational database to NoSQL database. A number of schema transformation techniques have been proposed to improve data transformation process and resulted better query processing time when compared to the relational database query processing time. However, these approaches produced redundant tables in the resulted schema that in turn consume large unnecessary storage size and produce high query processing time due to the generated schema with redundant column… More >

  • Open Access

    ARTICLE

    Secure Key Management Based Mobile Authentication in Cloud

    S. Shanmuga Priya1, D. Yuvaraj2,*, T. Satyanarayana Murthy3, Varghese S. Chooralil4, S. Navaneetha Krishnan5, P. Banumathy6, P. SundaraVadivel7

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 887-896, 2022, DOI:10.32604/csse.2022.021845

    Abstract Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The… More >

Displaying 871-880 on page 88 of 1442. Per Page