Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,429)
  • Open Access

    ARTICLE

    Classification of Glaucoma in Retinal Images Using EfficientnetB4 Deep Learning Model

    A. Geetha, N. B. Prakash*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1041-1055, 2022, DOI:10.32604/csse.2022.023680

    Abstract Today, many eye diseases jeopardize our everyday lives, such as Diabetic Retinopathy (DR), Age-related Macular Degeneration (AMD), and Glaucoma. Glaucoma is an incurable and unavoidable eye disease that damages the vision of optic nerves and quality of life. Classification of Glaucoma has been an active field of research for the past ten years. Several approaches for Glaucoma classification are established, beginning with conventional segmentation methods and feature-extraction to deep-learning techniques such as Convolution Neural Networks (CNN). In contrast, CNN classifies the input images directly using tuned parameters of convolution and pooling layers by extracting features.… More >

  • Open Access

    ARTICLE

    A Learning Model to Detect Android C&C Applications Using Hybrid Analysis

    Attia Qammar1, Ahmad Karim1,*, Yasser Alharbi2, Mohammad Alsaffar2, Abdullah Alharbi2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 915-930, 2022, DOI:10.32604/csse.2022.023652

    Abstract Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination More >

  • Open Access

    ARTICLE

    Modeling and Experimental Verification of Electric Vehicles Off-Grid Photovoltaic Powered Charging Station

    Essam Hendawi1,*, Sattam Al Otaibi1, Sherif Zaid2,3,4, Ayman Hoballah1, Salah K. ElSayed1, Nagy I. Elkalashy1, Yasser Ahmed1

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.022927

    Abstract With the increasing development of EVs, the energy demand from the conventional utility grid increases in proportion. On the other hand, photovoltaic (PV) energy sources can overcome several problems when charging EVs from the utility grid especially in remote areas. This paper presents an effective photovoltaic stand-alone charging station for EV applications. The proposed charging station incorporates PV array, a lithium-ion battery representing the EV battery, and a lead-acid battery representing the energy storage system (ESS). A bidirectional DC-DC converter is employed for charging/discharging the ESS and a unidirectional DC-DC converter is utilized for charging… More >

  • Open Access

    ARTICLE

    Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm

    D. Jeyakumar*, C. Rajabhushanam

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1131-1144, 2022, DOI:10.32604/csse.2022.022480

    Abstract In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network node function and to build a block that may connect the chain, communication services. Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has been used to define the connection between the VNF and to give the best end-to-end services. In the existing method, VNF mapping and backup VNF were proposed but there was no profit and reliability improvement of the backup and mapping of the primary VNF. As a consequence, this paper offers a Hybrid Hexagon-Cost Efficient… More >

  • Open Access

    ARTICLE

    Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing

    S. Lakshmi Narayanan*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 931-946, 2022, DOI:10.32604/csse.2022.022459

    Abstract The main aim of this work is to improve the security of data hiding for secret image sharing. The privacy and security of digital information have become a primary concern nowadays due to the enormous usage of digital technology. The security and the privacy of users’ images are ensured through reversible data hiding techniques. The efficiency of the existing data hiding techniques did not provide optimum performance with multiple end nodes. These issues are solved by using Separable Data Hiding and Adaptive Particle Swarm Optimization (SDHAPSO) algorithm to attain optimal performance. Image encryption, data embedding,… More >

  • Open Access

    ARTICLE

    An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases

    Norwini Zaidi1, Iskandar Ishak2,*, Fatimah Sidi2, Lilly Suriani Affendey2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1175-1188, 2022, DOI:10.32604/csse.2022.021969

    Abstract Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However, there is no standard guideline for data transformation from relational database to NoSQL database. A number of schema transformation techniques have been proposed to improve data transformation process and resulted better query processing time when compared to the relational database query processing time. However, these approaches produced redundant tables in the resulted schema that in turn consume large unnecessary storage size and produce high query processing time due to the generated schema with redundant column… More >

  • Open Access

    ARTICLE

    Secure Key Management Based Mobile Authentication in Cloud

    S. Shanmuga Priya1, D. Yuvaraj2,*, T. Satyanarayana Murthy3, Varghese S. Chooralil4, S. Navaneetha Krishnan5, P. Banumathy6, P. SundaraVadivel7

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 887-896, 2022, DOI:10.32604/csse.2022.021845

    Abstract Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The… More >

  • Open Access

    ARTICLE

    A Novel Soft Clustering Approach for Gene Expression Data

    E. Kavitha1,*, R. Tamilarasan2, Arunadevi Baladhandapani3, M. K. Jayanthi Kannan4

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 871-886, 2022, DOI:10.32604/csse.2022.021215

    Abstract Gene expression data represents a condition matrix where each row represents the gene and the column shows the condition. Micro array used to detect gene expression in lab for thousands of gene at a time. Genes encode proteins which in turn will dictate the cell function. The production of messenger RNA along with processing the same are the two main stages involved in the process of gene expression. The biological networks complexity added with the volume of data containing imprecision and outliers increases the challenges in dealing with them. Clustering methods are hence essential to… More >

  • Open Access

    ARTICLE

    Improving Throughput of Transmission Control Protocol Using Cross Layer Approach

    Jansi Rani Sella Veluswami*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1231-1239, 2022, DOI:10.32604/csse.2022.020230

    Abstract Most of the internet users connect through wireless networks. Major part of internet traffic is carried by Transmission Control Protocol (TCP). It has some design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestion in the network, TCP used acknowledgment to delivery of packets by the end host. In wired network, packet loss signals congestion in the network. But rather in wireless networks, loss is mainly because of the wireless characteristics such as fading, signal strength etc. When a packet travels across wired and wireless… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, More >

Displaying 861-870 on page 87 of 1429. Per Page