Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Automated Teller Machine Authentication Using Biometric

    Shumukh M. Aljuaid*, Arshiya S. Ansari

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.020785

    Abstract This paper presents a novel method of a secured card-less Automated Teller Machine (ATM) authentication based on the three bio-metrics measures. It would help in the identification and authorization of individuals and would provide robust security enhancement. Moreover, it would assist in providing identification in ways that cannot be impersonated. To the best of our knowledge, this method of Biometric_ fusion way is the first ATM security algorithm that utilizes a fusion of three biometric features of an individual such as Fingerprint, Face, and Retina simultaneously for recognition and authentication. These biometric images have been collected as input data for… More >

  • Open Access

    ARTICLE

    Profile and Rating Similarity Analysis for Recommendation Systems Using Deep Learning

    Lakshmi Palaniappan1,*, K. Selvaraj2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 903-917, 2022, DOI:10.32604/csse.2022.020670

    Abstract Recommendation systems are going to be an integral part of any E-Business in near future. As in any other E-business, recommendation systems also play a key role in the travel business where the user has to be recommended with a restaurant that best suits him. In general, the recommendations to a user are made based on similarity that exists between the intended user and the other users. This similarity can be calculated either based on the similarity between the user profiles or the similarity between the ratings made by the users. First phase of this work concentrates on experimentally analyzing… More >

  • Open Access

    ARTICLE

    Clustering Gene Expression Data Through Modified Agglomerative M-CURE Hierarchical Algorithm

    E. Kavitha1,*, R. Tamilarasan2, N. Poonguzhali3, M. K. Jayanthi Kannan4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1027-141, 2022, DOI:10.32604/csse.2022.020634

    Abstract Gene expression refers to the process in which the gene information is used in the functional gene product synthesis. They basically encode the proteins which in turn dictate the functionality of the cell. The first step in gene expression study involves the clustering usage. This is due to the reason that biological networks are very complex and the genes volume increases the comprehending challenges along with the data interpretation which itself inhibit vagueness, noise and imprecision. For a biological system to function, the essential cellular molecules must interact with its surrounding including RNA, DNA, metabolites and proteins. Clustering methods will… More >

  • Open Access

    ARTICLE

    Digital Mammogram Inferencing System Using Intuitionistic Fuzzy Theory

    Susmita Mishra1,*, M. Prakash2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1099-1115, 2022, DOI:10.32604/csse.2022.020439

    Abstract In the medical field, the detection of breast cancer may be a mysterious task. Physicians must deduce a conclusion from a significantly vague knowledge base. A mammogram can offer early diagnosis at a low cost if the breasts' satisfactory mammogram images are analyzed. A multi-decision Intuitionistic Fuzzy Evidential Reasoning (IFER) approach is introduced in this paper to deal with imprecise mammogram classification efficiently. The proposed IFER approach combines intuitionistic trapezoidal fuzzy numbers and inclusion measures to improve representation and reasoning accuracy. The results of the proposed technique are approved through simulation. The simulation is created utilizing MATLAB software. The screening… More >

  • Open Access

    ARTICLE

    Energy Efficient QoS Aware Cluster Based Multihop Routing Protocol for WSN

    M.S. Maharajan1,*, T. Abirami2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1173-1189, 2022, DOI:10.32604/csse.2022.020312

    Abstract Wireless sensor networks (WSN) have become a hot research area owing to the unique characteristics and applicability in diverse application areas. Clustering and routing techniques can be considered as an NP hard optimization problem, which can be addressed by metaheuristic optimization algorithms. With this motivation, this study presents a chaotic sandpiper optimization algorithm based clustering with groundwater flow optimization based routing technique (CSPOC-GFLR). The goal of the CSOC-GFLR technique is to cluster the sensor nodes in WSN and elect an optimal set of routes with an intention of achieving energy efficiency and maximizing network lifetime. The CSPOC algorithm is derived… More >

  • Open Access

    ARTICLE

    Software Reliability Assessment Using Hybrid Neuro-Fuzzy Model

    Parul Gandhi1, Mohammad Zubair Khan2, Ravi Kumar Sharma3, Omar H. Alhazmi2, Surbhi Bhatia4,*, Chinmay Chakraborty5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 891-902, 2022, DOI:10.32604/csse.2022.019943

    Abstract Software reliability is the primary concern of software development organizations, and the exponentially increasing demand for reliable software requires modeling techniques to be developed in the present era. Small unnoticeable drifts in the software can culminate into a disaster. Early removal of these errors helps the organization improve and enhance the software’s reliability and save money, time, and effort. Many soft computing techniques are available to get solutions for critical problems but selecting the appropriate technique is a big challenge. This paper proposed an efficient algorithm that can be used for the prediction of software reliability. The proposed algorithm is… More >

  • Open Access

    ARTICLE

    A Generalized State Space Average Model for Parallel DC-to-DC Converters

    Hasan Alrajhi*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 717-734, 2022, DOI:10.32604/csse.2022.021279

    Abstract The high potentiality of integrating renewable energies, such as photovoltaic, into a modern electrical microgrid system, using DC-to-DC converters, raises some issues associated with controller loop design and system stability. The generalized state space average model (GSSAM) concept was consequently introduced to design a DC-to-DC converter controller in order to evaluate DC-to-DC converter performance and to conduct stability studies. This paper presents a GSSAM for parallel DC-to-DC converters, namely: buck, boost, and buck-boost converters. The rationale of this study is that modern electrical systems, such as DC networks, hybrid microgrids, and electric ships, are formed by parallel DC-to-DC converters with… More >

  • Open Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888

    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol is proposed. Internet of things… More >

  • Open Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843

    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the web application. Indeed, security mechanisms… More >

  • Open Access

    ARTICLE

    Stochastic Gradient Boosting Model for Twitter Spam Detection

    K. Kiruthika Devi1,*, G. A. Sathish Kumar2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 849-859, 2022, DOI:10.32604/csse.2022.020836

    Abstract

    In today’s world of connectivity there is a huge amount of data than we could imagine. The number of network users are increasing day by day and there are large number of social networks which keeps the users connected all the time. These social networks give the complete independence to the user to post the data either political, commercial or entertainment value. Some data may be sensitive and have a greater impact on the society as a result. The trustworthiness of data is important when it comes to public social networking sites like facebook and twitter. Due to the large… More >

Displaying 1011-1020 on page 102 of 1407. Per Page