Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Modeling and Experimental Verification of Electric Vehicles Off-Grid Photovoltaic Powered Charging Station

    Essam Hendawi1,*, Sattam Al Otaibi1, Sherif Zaid2,3,4, Ayman Hoballah1, Salah K. ElSayed1, Nagy I. Elkalashy1, Yasser Ahmed1

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.022927

    Abstract With the increasing development of EVs, the energy demand from the conventional utility grid increases in proportion. On the other hand, photovoltaic (PV) energy sources can overcome several problems when charging EVs from the utility grid especially in remote areas. This paper presents an effective photovoltaic stand-alone charging station for EV applications. The proposed charging station incorporates PV array, a lithium-ion battery representing the EV battery, and a lead-acid battery representing the energy storage system (ESS). A bidirectional DC-DC converter is employed for charging/discharging the ESS and a unidirectional DC-DC converter is utilized for charging the EV battery. The proposed… More >

  • Open Access

    ARTICLE

    Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm

    D. Jeyakumar*, C. Rajabhushanam

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1131-1144, 2022, DOI:10.32604/csse.2022.022480

    Abstract In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network node function and to build a block that may connect the chain, communication services. Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has been used to define the connection between the VNF and to give the best end-to-end services. In the existing method, VNF mapping and backup VNF were proposed but there was no profit and reliability improvement of the backup and mapping of the primary VNF. As a consequence, this paper offers a Hybrid Hexagon-Cost Efficient algorithm for determining the best… More >

  • Open Access

    ARTICLE

    Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing

    S. Lakshmi Narayanan*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 931-946, 2022, DOI:10.32604/csse.2022.022459

    Abstract The main aim of this work is to improve the security of data hiding for secret image sharing. The privacy and security of digital information have become a primary concern nowadays due to the enormous usage of digital technology. The security and the privacy of users’ images are ensured through reversible data hiding techniques. The efficiency of the existing data hiding techniques did not provide optimum performance with multiple end nodes. These issues are solved by using Separable Data Hiding and Adaptive Particle Swarm Optimization (SDHAPSO) algorithm to attain optimal performance. Image encryption, data embedding, data extraction/image recovery are the… More >

  • Open Access

    ARTICLE

    An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases

    Norwini Zaidi1, Iskandar Ishak2,*, Fatimah Sidi2, Lilly Suriani Affendey2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1175-1188, 2022, DOI:10.32604/csse.2022.021969

    Abstract Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However, there is no standard guideline for data transformation from relational database to NoSQL database. A number of schema transformation techniques have been proposed to improve data transformation process and resulted better query processing time when compared to the relational database query processing time. However, these approaches produced redundant tables in the resulted schema that in turn consume large unnecessary storage size and produce high query processing time due to the generated schema with redundant column families in the transformed column-oriented… More >

  • Open Access

    ARTICLE

    Secure Key Management Based Mobile Authentication in Cloud

    S. Shanmuga Priya1, D. Yuvaraj2,*, T. Satyanarayana Murthy3, Varghese S. Chooralil4, S. Navaneetha Krishnan5, P. Banumathy6, P. SundaraVadivel7

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 887-896, 2022, DOI:10.32604/csse.2022.021845

    Abstract Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on… More >

  • Open Access

    ARTICLE

    A Novel Soft Clustering Approach for Gene Expression Data

    E. Kavitha1,*, R. Tamilarasan2, Arunadevi Baladhandapani3, M. K. Jayanthi Kannan4

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 871-886, 2022, DOI:10.32604/csse.2022.021215

    Abstract Gene expression data represents a condition matrix where each row represents the gene and the column shows the condition. Micro array used to detect gene expression in lab for thousands of gene at a time. Genes encode proteins which in turn will dictate the cell function. The production of messenger RNA along with processing the same are the two main stages involved in the process of gene expression. The biological networks complexity added with the volume of data containing imprecision and outliers increases the challenges in dealing with them. Clustering methods are hence essential to identify the patterns present in… More >

  • Open Access

    ARTICLE

    Improving Throughput of Transmission Control Protocol Using Cross Layer Approach

    Jansi Rani Sella Veluswami*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1231-1239, 2022, DOI:10.32604/csse.2022.020230

    Abstract Most of the internet users connect through wireless networks. Major part of internet traffic is carried by Transmission Control Protocol (TCP). It has some design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestion in the network, TCP used acknowledgment to delivery of packets by the end host. In wired network, packet loss signals congestion in the network. But rather in wireless networks, loss is mainly because of the wireless characteristics such as fading, signal strength etc. When a packet travels across wired and wireless networks, TCP congestion control theory… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, including revocation. This issue is… More >

  • Open Access

    ARTICLE

    Spatio-Temporal Wind Speed Prediction Based on Variational Mode Decomposition

    Yingnan Zhao1,*, Guanlan Ji1, Fei Chen1, Peiyuan Ji1, Yi Cao2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 719-735, 2022, DOI:10.32604/csse.2022.027288

    Abstract Improving short-term wind speed prediction accuracy and stability remains a challenge for wind forecasting researchers. This paper proposes a new variational mode decomposition (VMD)-attention-based spatio-temporal network (VASTN) method that takes advantage of both temporal and spatial correlations of wind speed. First, VASTN is a hybrid wind speed prediction model that combines VMD, squeeze-and-excitation network (SENet), and attention mechanism (AM)-based bidirectional long short-term memory (BiLSTM). VASTN initially employs VMD to decompose the wind speed matrix into a series of intrinsic mode functions (IMF). Then, to extract the spatial features at the bottom of the model, each IMF employs an improved convolutional… More >

  • Open Access

    ARTICLE

    Vulnerability of Regional Aviation Networks Based on DBSCAN and Complex Networks

    Hang He1,*, Wanggen Liu1, Zhenhan Zhao1, Shan He1, Jinghui Zhang2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 643-655, 2022, DOI:10.32604/csse.2022.027211

    Abstract To enhance the accuracy of performance analysis of regional airline network, this study applies complex network theory and Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm to investigate the topology of regional airline network, constructs node importance index system, and clusters 161 airport nodes of regional airline network. Besides, entropy power method and approximating ideal solution method (TOPSIS) is applied to comprehensively evaluate the importance of airport nodes and complete the classification of nodes and identification of key points; adopt network efficiency, maximum connectivity subgraph and network connectivity as vulnerability measurement indexes, and observe the changes of vulnerability indexes… More >

Displaying 841-850 on page 85 of 1407. Per Page