Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Nonlinear Dynamic System Identification of ARX Model for Speech Signal Identification

    Rakesh Kumar Pattanaik1, Mihir N. Mohanty1,*, Srikanta Ku. Mohapatra2, Binod Ku. Pattanayak3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 195-208, 2023, DOI:10.32604/csse.2023.029591

    Abstract System Identification becomes very crucial in the field of nonlinear and dynamic systems or practical systems. As most practical systems don’t have prior information about the system behaviour thus, mathematical modelling is required. The authors have proposed a stacked Bidirectional Long-Short Term Memory (Bi-LSTM) model to handle the problem of nonlinear dynamic system identification in this paper. The proposed model has the ability of faster learning and accurate modelling as it can be trained in both forward and backward directions. The main advantage of Bi-LSTM over other algorithms is that it processes inputs in two ways: one from the past… More >

  • Open Access

    ARTICLE

    Ring Oscillator for 60 Meter Bandwidth

    Rachana Arya1,*, B. K. Singh2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 93-105, 2023, DOI:10.32604/csse.2023.029220

    Abstract The 60-meter band range is tremendously useful in telecommunication, military and governmental applications. The I. T. U. (International Telecommunication Union) required isolationism to former radio frequency services because the various frequency bands are extremely overloaded. The allocation of new frequency bands are a lengthy procedure as well as time taking. As a result, the researchers use bidirectional, amateur radio frequency communication for 60-meter band, usually the frequency slot of 5250–5450 KHz, although the entire band is not essentially obtainable for all countries. For transmission and reception of these frequencies, a local oscillator is used in the mixer unit to generate… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses a fuzzy logic model to… More >

  • Open Access

    ARTICLE

    A Personalized Video Synopsis Framework for Spherical Surveillance Video

    S. Priyadharshini*, Ansuman Mahapatra

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2603-2616, 2023, DOI:10.32604/csse.2023.032506

    Abstract Video synopsis is an effective way to easily summarize long-recorded surveillance videos. The omnidirectional view allows the observer to select the desired fields of view (FoV) from the different FoV available for spherical surveillance video. By choosing to watch one portion, the observer misses out on the events occurring somewhere else in the spherical scene. This causes the observer to experience fear of missing out (FOMO). Hence, a novel personalized video synopsis approach for the generation of non-spherical videos has been introduced to address this issue. It also includes an action recognition module that makes it easy to display necessary… More >

  • Open Access

    ARTICLE

    A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques

    Anitha Thangasamy*, Bose Sundan, Logeswari Govindaraj

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2553-2567, 2023, DOI:10.32604/csse.2023.032078

    Abstract The recent development of cloud computing offers various services on demand for organization and individual users, such as storage, shared computing space, networking, etc. Although Cloud Computing provides various advantages for users, it remains vulnerable to many types of attacks that attract cyber criminals. Distributed Denial of Service (DDoS) is the most common type of attack on cloud computing. Consequently, Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS attacks. Since DDoS attacks have become increasingly widespread, it becomes difficult for some DDoS attack methods based on individual network flow features to distinguish… More >

  • Open Access

    ARTICLE

    Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics

    S. Aanjanadevi1,*, S. Aanjankumar2, K. R. Ramela3, V. Palanisamy4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2351-2362, 2023, DOI:10.32604/csse.2023.031893

    Abstract Due to the enormous usage of the internet for transmission of data over a network, security and authenticity become major risks. Major challenges encountered in biometric system are the misuse of enrolled biometric templates stored in database server. To describe these issues various algorithms are implemented to deliver better protection to biometric traits such as physical (Face, fingerprint, Ear etc.) and behavioural (Gesture, Voice, tying etc.) by means of matching and verification process. In this work, biometric security system with fuzzy extractor and convolutional neural networks using face attribute is proposed which provides different choices for supporting cryptographic processes to… More >

  • Open Access

    ARTICLE

    Efficient Heuristic Replication Techniques for High Data Availability in Cloud

    H. L. Chandrakala1,*, R. Loganathan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3151-3164, 2023, DOI:10.32604/csse.2022.027873

    Abstract Most social networks allow connections amongst many people based on shared interests. Social networks have to offer shared data like videos, photos with minimum latency to the group, which could be challenging as the storage cost has to be minimized and hence entire data replication is not a solution. The replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response time. Though simple and adaptive replication strategies exist, the solution is non-deterministic; the replicas of the data need to be optimized to the data usability, performance, and… More >

  • Open Access

    ARTICLE

    CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters

    Sayyed Mudassar Shah1, Tariq Hussain2, Babar Shah3, Farman Ali4, Khalid Zaman1, Kyung-Sup Kwak5,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2587-2602, 2023, DOI:10.32604/csse.2023.034489

    Abstract Underwater acoustic sensor networks (UWASNs) aim to find varied offshore ocean monitoring and exploration applications. In most of these applications, the network is composed of several sensor nodes deployed at different depths in the water. Sensor nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface level; these nodes need multi-hop communication facilitated by a suitable routing scheme. In this research work, a Cluster-based Cooperative Energy Efficient Routing (CEER) mechanism for UWSNs is proposed to overcome the shortcomings of the Co-UWSN and LEACH mechanisms. The optimal role of clustering and cooperation provides load balancing… More >

  • Open Access

    ARTICLE

    Stable Computer Method for Solving Initial Value Problems with Engineering Applications

    Mudassir Shams1, Nasreen Kausar2, Ebru Ozbilge3,*, Alper Bulut3

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2617-2633, 2023, DOI:10.32604/csse.2023.034370

    Abstract Engineering and applied mathematics disciplines that involve differential equations in general, and initial value problems in particular, include classical mechanics, thermodynamics, electromagnetism, and the general theory of relativity. A reliable, stable, efficient, and consistent numerical scheme is frequently required for modelling and simulation of a wide range of real-world problems using differential equations. In this study, the tangent slope is assumed to be the contra-harmonic mean, in which the arithmetic mean is used as a correction instead of Euler’s method to improve the efficiency of the improved Euler’s technique for solving ordinary differential equations with initial conditions. The stability, consistency,… More >

  • Open Access

    ARTICLE

    Al-Biruni Based Optimization of Rainfall Forecasting in Ethiopia

    El-Sayed M. El-kenawy1, Abdelaziz A. Abdelhamid2,3, Fadwa Alrowais4,*, Mostafa Abotaleb5, Abdelhameed Ibrahim6, Doaa Sami Khafaga4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2885-2899, 2023, DOI:10.32604/csse.2023.034206

    Abstract Rainfall plays a significant role in managing the water level in the reservoir. The unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the reservoir. Many individuals, especially those in the agricultural sector, rely on rain forecasts. Forecasting rainfall is challenging because of the changing nature of the weather. The area of Jimma in southwest Oromia, Ethiopia is the subject of this research, which aims to develop a rainfall forecasting model. To estimate Jimma’s daily rainfall, we propose a novel approach based on optimizing the parameters of long short-term memory (LSTM) using Al-Biruni… More >

Displaying 431-440 on page 44 of 1407. Per Page