Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    Speech Separation Methodology for Hearing Aid

    Joseph Sathiadhas Esra1,*, Y. Sukhi2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1659-1678, 2023, DOI:10.32604/csse.2023.025969

    Abstract In the design of hearing aids (HA), the real-time speech-enhancement is done. The digital hearing aids should provide high signal-to-noise ratio, gain improvement and should eliminate feedback. In generic hearing aids the performance towards different frequencies varies and non uniform. Existing noise cancellation and speech separation methods drops the voice magnitude under the noise environment. The performance of the HA for frequency response is non uniform. Existing noise suppression methods reduce the required signal strength also. So, the performance of uniform sub band analysis is poor when hearing aid is concern. In this paper, a speech separation method using Non-negative… More >

  • Open Access

    ARTICLE

    The Interaction and Life Experiences between the Patient and the Nurse Caring for the Patient with COVID-19 in Turkey: A Qualitative Dyadic Approach

    Nuran Dudaklı1, Hilal Altundal Duru2,*, Mualla Yılmaz2, Serpil Türkleş2

    International Journal of Mental Health Promotion, Vol.24, No.4, pp. 511-525, 2022, DOI:10.32604/ijmhp.2022.020703

    Abstract Previous research and observations have shown that COVID-19 affected both patients’ and nurses’ mental health. Even in the best times, one of the best ways to improve patients’ experiences is to improve the health workers’ experience. Therefore, it is important to be aware of the patterns of interaction between patients diagnosed with COVID-19 and the nurses caring for them and to help them recognize the strengths of their relationship. In this study, we aimed that purposed to discover the interaction and life experiences between the COVID-19 patients and the nurses who provided care for them in Turkey. With the dyadic… More >

  • Open Access

    ARTICLE

    From Network Functions to NetApps: The 5GASP Methodology

    Jorge Gallego-Madrid1, Ramon Sanchez-Iborra2,*, Antonio Skarmeta1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4115-4134, 2022, DOI:10.32604/cmc.2022.021754

    Abstract As the 5G ecosystem continues its consolidation, the testing and validation of the innovations achieved by integrators and verticals service providers is of preponderant importance. In this line, 5GASP is a European H2020-funded project that aims at easing the idea-to-market process through the creation of an European testbed that is fully automated and self-service, in order to foster rapid development and testing of new and innovative 5G Network Applications (NetApps). The main objective of this paper is to present the 5GASP's unified methodology to design, develop and onboard NetApps within the scope of different vertical services, letting them use specific… More >

  • Open Access

    ARTICLE

    Healthcare Device Security Assessment through Computational Methodology

    Masood Ahmad1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Sabita Khatri2, Adil Hussain Seh1, Mohd Nadeem1, Alka Agrawal1,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 811-828, 2022, DOI:10.32604/csse.2022.020097

    Abstract The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to classify the best alternatives to security techniques for healthcare devices to securing the devices. The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights. The ranks of the alternatives consequently decide the order of priority for the techniques. A1 was the most probable alternative… More >

  • Open Access

    ARTICLE

    Combinatorial Method with Static Analysis for Source Code Security in Web Applications

    Juan Ramón Bermejo Higuera1, Javier Bermejo Higuera1, Juan Antonio Sicilia Montalvo1, Tomás Sureda Riera2, Christopher I. Argyros3, Á. Alberto Magreñán4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 541-565, 2021, DOI:10.32604/cmes.2021.017213

    Abstract Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity. The construction of the procedure utilized in the static analysis tools of source code security differs and therefore each tool finds a different number of each weakness type for which it is designed. To utilize the possible synergies different static analysis tools may process, this work uses a new method to combine several source codes aiming to investigate how to increase the performance of security weakness detection while reducing the number of false positives. Specifically, five static analysis tools will be combined with… More >

  • Open Access

    ARTICLE

    Novel Power-Aware Optimization Methodology and Efficient Task Scheduling Algorithm

    K. Sathis Kumar1,*, K. Paramasivam2

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 209-224, 2022, DOI:10.32604/csse.2022.019531

    Abstract The performance of central processing units (CPUs) can be enhanced by integrating multiple cores into a single chip. Cpu performance can be improved by allocating the tasks using intelligent strategy. If Small tasks wait for long time or executes for long time, then CPU consumes more power. Thus, the amount of power consumed by CPUs can be reduced without increasing the frequency. Lines are used to connect cores, which are organized together to form a network called network on chips (NOCs). NOCs are mainly used in the design of processors. However, its performance can still be enhanced by reducing power… More >

  • Open Access

    ARTICLE

    Loss Analysis of Electromagnetic Linear Actuator Coupling Control Electromagnetic Mechanical System

    Jiayu Lu1, Qijing Qin1, Cao Tan1,*, Bo Li1, Xinyu Fan2

    Energy Engineering, Vol.118, No.6, pp. 1741-1754, 2021, DOI:10.32604/EE.2021.014977

    Abstract As an energy converter, electromagnetic linear actuators (EMLAs) have been widely used in industries. Multidisciplinary methodology is a preferred tool for the design and optimization of EMLA. In this paper, a multidisciplinary method was proposed for revealing the influence mechanism of load on EMLA’s loss. The motion trajectory of EMLA is planned through tracking differentiator, an adaptive robust control was adopted to compensate the influence of load on motion trajectory. A control-electromagnetic-mechanical coupling model was established and verified experimentally. The influence laws of load change on EMLA’s loss, loss composition and loss distribution were analyzed quantitatively. The results show that… More >

  • Open Access

    ARTICLE

    Deep Root Memory Optimized Indexing Methodology for Image Search Engines

    R. Karthikeyan1,*, A. Celine Kavida2, P. Suresh3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 661-672, 2022, DOI:10.32604/csse.2022.018744

    Abstract Digitization has created an abundance of new information sources by altering how pictures are captured. Accessing large image databases from a web portal requires an opted indexing structure instead of reducing the contents of different kinds of databases for quick processing. This approach paves a path toward the increase of efficient image retrieval techniques and numerous research in image indexing involving large image datasets. Image retrieval usually encounters difficulties like a) merging the diverse representations of images and their Indexing, b) the low-level visual characters and semantic characters associated with an image are indirectly proportional, and c) noisy and less… More >

  • Open Access

    ARTICLE

    Defect Detection in Printed Circuit Boards with Pre-Trained Feature Extraction Methodology with Convolution Neural Networks

    Mohammed A. Alghassab*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 637-652, 2022, DOI:10.32604/cmc.2022.019527

    Abstract Printed Circuit Boards (PCBs) are very important for proper functioning of any electronic device. PCBs are installed in almost all the electronic device and their functionality is dependent on the perfection of PCBs. If PCBs do not function properly then the whole electric machine might fail. So, keeping this in mind researchers are working in this field to develop error free PCBs. Initially these PCBs were examined by the human beings manually, but the human error did not give good results as sometime defected PCBs were categorized as non-defective. So, researchers and experts transformed this manual traditional examination to automated… More >

  • Open Access

    ARTICLE

    Empirically Modeling Enterprise Architecture Using ArchiMate

    Qiang Zhi1,*, Zhengshu Zhou2,3

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 357-374, 2022, DOI:10.32604/csse.2022.018759

    Abstract Enterprise Architecture (EA) has evolved based on the practice of information systems architecture design and implementation. EA is a rigorous description of a structure, and the objectives of EA modeling not only include clarifying corporate strategies, visualizing business processes, and modeling information systems to manage resources but also include improving organizational structures, adjusting information strategies, and creating new business value. Therefore, EA models cover a wide scope that includes both IT and business architectures. Typically, EA modeling is the initial and most important analysis step for researchers, architects, and developers. ArchiMate is the dominant modeling language for EA and it… More >

Displaying 21-30 on page 3 of 57. Per Page