Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,393)
  • Open Access

    ARTICLE

    QKD in Cloud-Fog Computing for Personal Health Record

    L. Arulmozhiselvan*, E. Uma

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 45-57, 2022, DOI:10.32604/csse.2022.022024

    Abstract Cloud computing is a rapid growing technology which delivers computing services such as servers, storage, database, networking, software and analytics. It has brought a new way to securely store and share information and data with multiple users. When authorized person access these clouds, the released data should not compromise any individual’s privacy and identity should not be revealed. Fog Computing is the extension of cloud with decentralized structure which stores the data in locations somewhere between the data source and cloud. The goal of fog computing is to provide high security, improve performance and network efficiency. We use quantum key… More >

  • Open Access

    ARTICLE

    An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks

    A. Arivazhagi1,*, S. Raja Kumar2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 141-157, 2022, DOI:10.32604/csse.2022.021851

    Abstract Intelligent Intrusion Detection System (IIDS) for networks provide a resourceful solution to network security than conventional intrusion defence mechanisms like a firewall. The efficiency of IIDS highly relies on the algorithm performance. The enhancements towards these methods are utilized to enhance the classification accuracy and diminish the testing and training time of these algorithms. Here, a novel and intelligent learning approach are known as the stabbing of intrusion with learning framework (SILF), is proposed to learn the attack features and reduce the dimensionality. It also reduces the testing and training time effectively and enhances Linear Support Vector Machine (l-SVM). It… More >

  • Open Access

    ARTICLE

    Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering

    S. Navaneetha Krishnan1, P. Sundara Vadivel2,*, D. Yuvaraj3, T. Satyanarayana Murthy4, Sree Jagadeesh Malla5, S. Nachiyappan6, S. Shanmuga Priya7

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 17-26, 2022, DOI:10.32604/csse.2022.021590

    Abstract Wireless Sensor Networks (WSN) are commonly used to observe and monitor precise environments. WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments. The base station received the amount of data collected by the numerous sensors. The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale. The Trust-Based Adaptive Acknowledgement (TRAACK) Intrusion-Detection System for Wireless Sensor Networks (WSN) is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization (MPSO) has… More >

  • Open Access

    ARTICLE

    Pattern Analysis and Regressive Linear Measure for Botnet Detection

    B. Padmavathi1,2,*, B. Muthukumar3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 119-139, 2022, DOI:10.32604/csse.2022.021431

    Abstract Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various researchers. However, certain limitations need to be addressed efficiently. The provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective constraints. The bots’ patterns or features over the network have to be analyzed in both linear and non-linear manner. The linear and non-linear features are composed of high-level and low-level features. The collected features are maintained over the Bag of Features (BoF) where the most influencing features are collected and provided into the classifier model. Here, the linearity… More >

  • Open Access

    ARTICLE

    Detection of Parkinson’s Disease with Multiple Feature Extraction Models and Darknet CNN Classification

    G. Prema Arokia Mary1,*, N. Suganthi2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 333-345, 2022, DOI:10.32604/csse.2022.021164

    Abstract Parkinson’s disease (PD) is a neurodegenerative disease in the central nervous system. Recently, more researches have been conducted in the determination of PD prediction which is really a challenging task. Due to the disorders in the central nervous system, the syndromes like off sleep, speech disorders, olfactory and autonomic dysfunction, sensory disorder symptoms will occur. The earliest diagnosing of PD is very challenging among the doctors community. There are techniques that are available in order to predict PD using symptoms and disorder measurement. It helps to save a million lives of future by early prediction. In this article, the early… More >

  • Open Access

    ARTICLE

    Secured Cloud Communication Using Lightweight Hash Authentication with PUF

    R. Padmavathy*, M. Newlin Rajkumar

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 233-243, 2022, DOI:10.32604/csse.2022.021129

    Abstract Internet-of-Things (IoT) is an awaited technology in real-world applications to process daily tasks using intelligent techniques. The main process of data in IoT involves communication, integration, and coordination with other real-world applications. The security of transferred, stored, and processed data in IoT is not ensured in many constraints. Internet-enabled smart devices are widely used among populations for all types of applications, thus increasing the popularity of IoT among widely used server technologies. Smart grid is used in this article with IoT to manage large data. A smart grid is a collection of numerous users in the network with the fastest… More >

  • Open Access

    ARTICLE

    Home Monitoring of Pets Based on AIoT

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 59-75, 2022, DOI:10.32604/csse.2022.020745

    Abstract With technological and social development in recent decades, people have begun pursuing more comfortable lives that frequently feature household pets that are treated like members of the family. On average, one out of every three households has a pet. This has also led to the creation and growth of many businesses in the pet industry. A few companies have developed a system that allows busy office workers to remotely care for pets at home based on the Internet of Things and an intelligent adjustment function. As owners of two dogs, the authors of this study observed their pets’ living habits… More >

  • Open Access

    ARTICLE

    Feature Selection Using Grey Wolf Optimization with Random Differential Grouping

    R. S. Latha1,*, B. Saravana Balaji2, Nebojsa Bacanin3, Ivana Strumberger3, Miodrag Zivkovic3, Milos Kabiljo3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 317-332, 2022, DOI:10.32604/csse.2022.020487

    Abstract Big data are regarded as a tremendous technology for processing a huge variety of data in a short time and with a large storage capacity. The user’s access over the internet creates massive data processing over the internet. Big data require an intelligent feature selection model by addressing huge varieties of data. Traditional feature selection techniques are only applicable to simple data mining. Intelligent techniques are needed in big data processing and machine learning for an efficient classification. Major feature selection algorithms read the input features as they are. Then, the features are preprocessed and classified. Here, an algorithm does… More >

  • Open Access

    ARTICLE

    Document Clustering Using Graph Based Fuzzy Association Rule Generation

    P. Perumal*

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 203-218, 2022, DOI:10.32604/csse.2022.020459

    Abstract With the wider growth of web-based documents, the necessity of automatic document clustering and text summarization is increased. Here, document summarization that is extracting the essential task with appropriate information, removal of unnecessary data and providing the data in a cohesive and coherent manner is determined to be a most confronting task. In this research, a novel intelligent model for document clustering is designed with graph model and Fuzzy based association rule generation (gFAR). Initially, the graph model is used to map the relationship among the data (multi-source) followed by the establishment of document clustering with the generation of association… More >

  • Open Access

    ARTICLE

    Early Diagnosis of Alzheimer’s Disease Based on Convolutional Neural Networks

    Atif Mehmood1,*, Ahed Abugabah1, Ahmed Ali AlZubi2, Louis Sanzogni3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 305-315, 2022, DOI:10.32604/csse.2022.018520

    Abstract Alzheimer’s disease (AD) is a neurodegenerative disorder, causing the most common dementia in the elderly peoples. The AD patients are rapidly increasing in each year and AD is sixth leading cause of death in USA. Magnetic resonance imaging (MRI) is the leading modality used for the diagnosis of AD. Deep learning based approaches have produced impressive results in this domain. The early diagnosis of AD depends on the efficient use of classification approach. To address this issue, this study proposes a system using two convolutional neural networks (CNN) based approaches for an early diagnosis of AD automatically. In the proposed… More >

Displaying 881-890 on page 89 of 1393. Per Page