Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,354)
  • Open Access

    ARTICLE

    Edge Cloud Selection in Mobile Edge Computing (MEC)-Aided Applications for Industrial Internet of Things (IIoT) Services

    Dae-Young Kim1, SoYeon Lee2, MinSeung Kim2, Seokhoon Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2049-2060, 2023, DOI:10.32604/csse.2023.040473

    Abstract In many IIoT architectures, various devices connect to the edge cloud via gateway systems. For data processing, numerous data are delivered to the edge cloud. Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency. There are two types of costs for this kind of IoT network: a communication cost and a computing cost. For service efficiency, the communication cost of data transmission should be minimized, and the computing cost in the edge cloud should be also minimized. Therefore, in this paper, the communication cost for data transmission is defined as the delay factor, and the… More >

  • Open Access

    REVIEW

    Managing Smart Technologies with Software-Defined Networks for Routing and Security Challenges: A Survey

    Babangida Isyaku1,2, Kamalrulnizam Bin Abu Bakar2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1839-1879, 2023, DOI:10.32604/csse.2023.040456

    Abstract Smart environments offer various services, including smart cities, e-healthcare, transportation, and wearable devices, generating multiple traffic flows with different Quality of Service (QoS) demands. Achieving the desired QoS with security in this heterogeneous environment can be challenging due to traffic flows and device management, unoptimized routing with resource awareness, and security threats. Software Defined Networks (SDN) can help manage these devices through centralized SDN controllers and address these challenges. Various schemes have been proposed to integrate SDN with emerging technologies for better resource utilization and security. Software Defined Wireless Body Area Networks (SDWBAN) and Software Defined Internet of Things (SDIoT)… More >

  • Open Access

    ARTICLE

    Rockburst Intensity Grade Prediction Model Based on Batch Gradient Descent and Multi-Scale Residual Deep Neural Network

    Yu Zhang1,2,3, Mingkui Zhang1,2,*, Jitao Li1,2, Guangshu Chen1,2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1987-2006, 2023, DOI:10.32604/csse.2023.040381

    Abstract Rockburst is a phenomenon in which free surfaces are formed during excavation, which subsequently causes the sudden release of energy in the construction of mines and tunnels. Light rockburst only peels off rock slices without ejection, while severe rockburst causes casualties and property loss. The frequency and degree of rockburst damage increases with the excavation depth. Moreover, rockburst is the leading engineering geological hazard in the excavation process, and thus the prediction of its intensity grade is of great significance to the development of geotechnical engineering. Therefore, the prediction of rockburst intensity grade is one problem that needs to be… More >

  • Open Access

    ARTICLE

    Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi

    Doaa Sami Khafaga1, Sarah M. Alhammad1,*, Amal Magdi2, Osama ElKomy2, Nabil A. Lashin2, Khalid M. Hosny2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1967-1986, 2023, DOI:10.32604/csse.2023.040345

    Abstract Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access. Due to the wide use of the Internet nowadays, the need to ensure data integrity and authentication increases. Many techniques, such as watermarking and encryption, are used for securing images transmitted via the Internet. The majority of watermarking systems are PC-based, but they are not very portable. Hardware-based watermarking methods need to be developed to accommodate real-time applications and provide portability. This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel… More >

  • Open Access

    ARTICLE

    A Triplet-Branch Convolutional Neural Network for Part-Based Gait Recognition

    Sang-Soo Yeo1, Seungmin Rho2,*, Hyungjoon Kim3, Jibran Safdar4, Umar Zia5, Mehr Yahya Durrani5

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2027-2047, 2023, DOI:10.32604/csse.2023.040327

    Abstract Intelligent vision-based surveillance systems are designed to deal with the gigantic volume of videos captured in a particular environment to perform the interpretation of scenes in form of detection, tracking, monitoring, behavioral analysis, and retrievals. In addition to that, another evolving way of surveillance systems in a particular environment is human gait-based surveillance. In the existing research, several methodological frameworks are designed to use deep learning and traditional methods, nevertheless, the accuracies of these methods drop substantially when they are subjected to covariate conditions. These covariate variables disrupt the gait features and hence the recognition of subjects becomes difficult. To… More >

  • Open Access

    ARTICLE

    A Health Monitoring System Using IoT-Based Android Mobile Application

    Madallah Alruwaili1,*, Muhammad Hameed Siddiqi1, Kamran Farid2, Mohammad Azad1, Saad Alanazi1, Asfandyar Khan2, Abdullah Khan2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2293-2311, 2023, DOI:10.32604/csse.2023.040312

    Abstract Numerous types of research on healthcare monitoring systems have been conducted for calculating heart rate, ECG, nasal/oral airflow, temperature, light sensor, and fall detection sensor. Different researchers have done different work in the field of health monitoring with sensor networks. Different researchers used built-in apps, such as some used a small number of parameters, while some other studies used more than one microcontroller and used senders and receivers among the microcontrollers to communicate, and outdated tools for study development. While no efficient, cheap, and updated work is proposed in the field of sensor-based health monitoring systems. Therefore, this study developed… More >

  • Open Access

    ARTICLE

    An Enhanced Intelligent Intrusion Detection System to Secure E-Commerce Communication Systems

    Adil Hussain1, Kashif Naseer Qureshi2,*, Khalid Javeed3, Musaed Alhussein4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2513-2528, 2023, DOI:10.32604/csse.2023.040305

    Abstract Information and communication technologies are spreading rapidly due to their fast proliferation in many fields. The number of Internet users has led to a spike in cyber-attack incidents. E-commerce applications, such as online banking, marketing, trading, and other online businesses, play an integral role in our lives. Network Intrusion Detection System (NIDS) is essential to protect the network from unauthorized access and against other cyber-attacks. The existing NIDS systems are based on the Backward Oracle Matching (BOM) algorithm, which minimizes the false alarm rate and causes of high packet drop ratio. This paper discussed the existing NIDS systems and different… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intelligent Neural-Based Deep Learning System on Rank Images Classification

    Muhammad Hameed Siddiqi1,*, Asfandyar Khan2, Muhammad Bilal Khan2, Abdullah Khan2, Madallah Alruwaili1, Saad Alanazi1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2219-2239, 2023, DOI:10.32604/csse.2023.040212

    Abstract The use of the internet is increasing all over the world on a daily basis in the last two decades. The increase in the internet causes many sexual crimes, such as sexual misuse, domestic violence, and child pornography. Various research has been done for pornographic image detection and classification. Most of the used models used machine learning techniques and deep learning models which show less accuracy, while the deep learning model ware used for classification and detection performed better as compared to machine learning. Therefore, this research evaluates the performance analysis of intelligent neural-based deep learning models which are based… More >

  • Open Access

    ARTICLE

    MSF-Net: A Multilevel Spatiotemporal Feature Fusion Network Combines Attention for Action Recognition

    Mengmeng Yan1, Chuang Zhang1,2,*, Jinqi Chu1, Haichao Zhang1, Tao Ge1, Suting Chen1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1433-1449, 2023, DOI:10.32604/csse.2023.040132

    Abstract An action recognition network that combines multi-level spatiotemporal feature fusion with an attention mechanism is proposed as a solution to the issues of single spatiotemporal feature scale extraction, information redundancy, and insufficient extraction of frequency domain information in channels in 3D convolutional neural networks. Firstly, based on 3D CNN, this paper designs a new multilevel spatiotemporal feature fusion (MSF) structure, which is embedded in the network model, mainly through multilevel spatiotemporal feature separation, splicing and fusion, to achieve the fusion of spatial perceptual fields and short-medium-long time series information at different scales with reduced network parameters; In the second step,… More >

  • Open Access

    ARTICLE

    High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification

    Li Liu1, Jing Li1, Yingchun Wu1, Chin-Chen Chang2,*, Anhong Wang1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1415-1432, 2023, DOI:10.32604/csse.2023.040039

    Abstract Data hiding (DH) is an important technology for securely transmitting secret data in networks, and has increasing become a research hotspot throughout the world. However, for Joint photographic experts group (JPEG) images, it is difficult to balance the contradiction among embedded capacity, visual quality and the file size increment in existing data hiding schemes. Thus, to deal with this problem, a high-imperceptibility data hiding for JPEG images is proposed based on direction modification. First, this proposed scheme sorts all of the quantized discrete cosine transform (DCT) block in ascending order according to the number of non-consecutive-zero alternating current (AC) coefficients.… More >

Displaying 21-30 on page 3 of 1354. Per Page