Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (262)
  • Open Access

    ARTICLE

    An Improved Pairing-Free Ciphertext Policy Framework for IoT

    M. Amirthavalli*, S. Chithra, R. Yugha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3079-3095, 2023, DOI:10.32604/csse.2023.032486 - 21 December 2022

    Abstract Internet of Things (IoT) enables devices to get connected to the internet. Once they are connected, they behave as smart devices thereby releasing sensitive data periodically. There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices. The objective of this research work is to create a framework encompassing Ciphertext policy More >

  • Open Access

    ARTICLE

    Multi-label Emotion Classification of COVID–19 Tweets with Deep Learning and Topic Modelling

    K. Anuratha1,*, M. Parvathy2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3005-3021, 2023, DOI:10.32604/csse.2023.031553 - 21 December 2022

    Abstract The COVID-19 pandemic has become one of the severe diseases in recent years. As it majorly affects the common livelihood of people across the universe, it is essential for administrators and healthcare professionals to be aware of the views of the community so as to monitor the severity of the spread of the outbreak. The public opinions are been shared enormously in microblogging media like twitter and is considered as one of the popular sources to collect public opinions in any topic like politics, sports, entertainment etc., This work presents a combination of Intensity Based… More >

  • Open Access

    ARTICLE

    N×N Clos Digital Cross-Connect Switch Using Quantum Dot Cellular Automata (QCA)

    Amita Asthana1,*, Anil Kumar1, Preeta Sharan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2901-2917, 2023, DOI:10.32604/csse.2023.030548 - 21 December 2022

    Abstract Quantum dot cellular automata (QCA) technology is emerging as a future technology which designs the digital circuits at quantum levels. The technology has gained popularity in terms of designing digital circuits, which occupy very less area and less power dissipation in comparison to the present complementary metal oxide semiconductor (CMOS) technology. For designing the routers at quantum levels with non-blocking capabilities various multi-stage networks have been proposed. This manuscript presents the design of the N×N Clos switch matrix as a multistage interconnecting network using quantum-dot cellular automata technology. The design of the Clos switch matrix… More >

  • Open Access

    ARTICLE

    Prognostic model for prostate cancer based on glycolysis-related genes and non-negative matrix factorization analysis

    ZECHAO LU1,#, FUCAI TANG1,#, HAOBIN ZHOU2,#, ZEGUANG LU3,#, WANYAN CAI4,#, JIAHAO ZHANG5, ZHICHENG TANG6, YONGCHANG LAI1,*, ZHAOHUI HE1,*

    BIOCELL, Vol.47, No.2, pp. 339-350, 2023, DOI:10.32604/biocell.2023.023750 - 18 November 2022

    Abstract Background: Establishing an appropriate prognostic model for PCa is essential for its effective treatment. Glycolysis is a vital energy-harvesting mechanism for tumors. Developing a prognostic model for PCa based on glycolysis-related genes is novel and has great potential. Methods: First, gene expression and clinical data of PCa patients were downloaded from The Cancer Genome Atlas (TCGA) and Gene Expression Omnibus (GEO), and glycolysis-related genes were obtained from the Molecular Signatures Database (MSigDB). Gene enrichment analysis was performed to verify that glycolysis functions were enriched in the genes we obtained, which were used in non-negative matrix factorization… More >

  • Open Access

    ARTICLE

    Attribute Reduction for Information Systems via Strength of Rules and Similarity Matrix

    Mohsen Eid1, Tamer Medhat2,*, Manal E. Ali3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1531-1544, 2023, DOI:10.32604/csse.2023.031745 - 03 November 2022

    Abstract An information system is a type of knowledge representation, and attribute reduction is crucial in big data, machine learning, data mining, and intelligent systems. There are several ways for solving attribute reduction problems, but they all require a common categorization. The selection of features in most scientific studies is a challenge for the researcher. When working with huge datasets, selecting all available attributes is not an option because it frequently complicates the study and decreases performance. On the other side, neglecting some attributes might jeopardize data accuracy. In this case, rough set theory provides a… More >

  • Open Access

    ARTICLE

    Image Enhancement Using Adaptive Fractional Order Filter

    Ayesha Heena1,*, Nagashettappa Biradar1, Najmuddin M. Maroof2, Surbhi Bhatia3, Arwa Mashat4, Shakila Basheer5

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1409-1422, 2023, DOI:10.32604/csse.2023.029611 - 03 November 2022

    Abstract Image enhancement is an important preprocessing task as the contrast is low in most of the medical images, Therefore, enhancement becomes the mandatory process before actual image processing should start. This research article proposes an enhancement of the model-based differential operator for the images in general and Echocardiographic images, the proposed operators are based on Grunwald-Letnikov (G-L), Riemann-Liouville (R-L) and Caputo (Li & Xie), which are the definitions of fractional order calculus. In this fractional-order, differentiation is well focused on the enhancement of echocardiographic images. This provoked for developing a non-linear filter mask for image… More >

  • Open Access

    ARTICLE

    An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

    Muhammad Nadeem1, Ali Arshad2,*, Saman Riaz2, Syeda Wajiha Zahra1, Ashit Kumar Dutta3, Moteeb Al Moteri4, Sultan Almotairi5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4059-4079, 2023, DOI:10.32604/cmc.2023.032882 - 31 October 2022

    Abstract Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430 - 31 October 2022

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature… More >

  • Open Access

    ARTICLE

    Data Mining with Comprehensive Oppositional Based Learning for Rainfall Prediction

    Mohammad Alamgeer1, Amal Al-Rasheed2, Ahmad Alhindi3, Manar Ahmed Hamza4,*, Abdelwahed Motwakel4, Mohamed I. Eldesouki5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2725-2738, 2023, DOI:10.32604/cmc.2023.029163 - 31 October 2022

    Abstract Data mining process involves a number of steps from data collection to visualization to identify useful data from massive data set. the same time, the recent advances of machine learning (ML) and deep learning (DL) models can be utilized for effectual rainfall prediction. With this motivation, this article develops a novel comprehensive oppositional moth flame optimization with deep learning for rainfall prediction (COMFO-DLRP) Technique. The proposed CMFO-DLRP model mainly intends to predict the rainfall and thereby determine the environmental changes. Primarily, data pre-processing and correlation matrix (CM) based feature selection processes are carried out. In More >

  • Open Access

    ARTICLE

    Computational Modeling of Reaction-Diffusion COVID-19 Model Having Isolated Compartment

    Muhammad Shoaib Arif1,2,*, Kamaleldin Abodayeh1, Asad Ejaz2

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1719-1743, 2023, DOI:10.32604/cmes.2022.022235 - 27 October 2022

    Abstract Cases of COVID-19 and its variant omicron are raised all across the world. The most lethal form and effect of COVID-19 are the omicron version, which has been reported in tens of thousands of cases daily in numerous nations. Following WHO (World health organization) records on 30 December 2021, the cases of COVID-19 were found to be maximum for which boarding individuals were found 1,524,266, active, recovered, and discharge were found to be 82,402 and 34,258,778, respectively. While there were 160,989 active cases, 33,614,434 cured cases, 456,386 total deaths, and 605,885,769 total samples tested. So… More >

Displaying 41-50 on page 5 of 262. Per Page