Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,442)
  • Open Access

    ARTICLE

    Provisioning Intelligent Water Wave Optimization Approach for Underwater Acoustic Wireless Sensor Networks

    M. Manikandan1,*, A. Rajiv Kannan

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 625-641, 2022, DOI:10.32604/csse.2022.022662

    Abstract In the Acoustics channel, it is incredibly challenging to offer data transfer for time-sourced applications in an energy-efficient manner due to higher error rate and propagation delay. Subsequently, conventional re-transmission over any failure generally initiates significantly larger end-to-end delay, and therefore it is not probable for time-based services. Moreover, standard techniques without any re-transmission consume enormous energy. This investigation proposes a novel multi-hop energy-aware transmission-based intelligent water wave optimization strategy. It ensures reduced end-to-end while attaining potential amongst overall energy efficiency end-to-end packet delay. It merges a naturally inspired meta-heuristic approach with multi-hop routing for… More >

  • Open Access

    ARTICLE

    Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments

    Saraswathi Shunmuganathan1,*, Sridharan Kannan2, T. V. Madhusudhana Rao3, K. Ambika4, T. Jayasankar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 785-801, 2022, DOI:10.32604/csse.2022.022424

    Abstract The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved… More >

  • Open Access

    ARTICLE

    Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

    A. S. Anakath1,*, S. Ambika2, S. Rajakumar3, R. Kannadasan4, K. S. Sendhil Kumar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 833-847, 2022, DOI:10.32604/csse.2022.022329

    Abstract Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive… More >

  • Open Access

    ARTICLE

    Design of Hybrid True Random Number Generator for Cryptographic Applications

    S. Nithya Devi1,*, S. Sasipriya2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 423-437, 2022, DOI:10.32604/csse.2022.022280

    Abstract In real-time applications, unpredictable random numbers play a major role in providing cryptographic and encryption processes. Most of the existing random number generators are embedded with the complex nature of an amplifier, ring oscillators, or comparators. Hence, this research focused more on implementing a Hybrid Nature of a New Random Number Generator. The key objective of the proposed methodology relies on the utilization of True random number generators. The randomness is unpredictable. The additions of programmable delay lines will reduce the processing time and maintain the quality of randomizing. The performance comparisons are carried out More >

  • Open Access

    ARTICLE

    Efficient Energy-Aware Resource Management Model (EEARMM) Based Dynamic VM Migration

    V. Roopa1,*, K. Malarvizhi2, S. Karthik3

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 657-669, 2022, DOI:10.32604/csse.2022.022173

    Abstract In cloud environment, an efficient resource management establishes the allocation of computational resources of cloud service providers to the requests of users for meeting the user’s demands. The proficient resource management and work allocation determines the accomplishment of the cloud infrastructure. However, it is very difficult to persuade the objectives of the Cloud Service Providers (CSPs) and end users in an impulsive cloud domain with random changes of workloads, huge resource availability and complicated service policies to handle them, With that note, this paper attempts to present an Efficient Energy-Aware Resource Management Model (EEARMM) that… More >

  • Open Access

    ARTICLE

    Cognitive Radio Networks Using Intelligent Reflecting Surfaces

    Raed Alhamad*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.021932

    Abstract In this article, we optimize harvesting and sensing duration for Cognitive Radio Networks (CRN) using Intelligent Reflecting Surfaces (IRS). The secondary source harvests energy using the received signal from node A. Then, it performs spectrum sensing to detect Primary Source PS activity. When PS activity is not detected, The Secondary Source SS transmits data to Secondary Destination SD where all reflected signals on IRS are in phase at SD. We show that IRS offers 14, 20, 26, 32, 38, 44, 50 dB enhancement in throughput using M = 8, 16, 32, 64, 128, 256, 512 reflectors with respect to CRN without… More >

  • Open Access

    ARTICLE

    X-ray Image-Based COVID-19 Patient Detection Using Machine Learning-Based Techniques

    Shabana Habib1, Saleh Alyahya2, Aizaz Ahmed3, Muhammad Islam2,*, Sheroz Khan2, Ishrat Khan4, Muhammad Kamil5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 671-682, 2022, DOI:10.32604/csse.2022.021812

    Abstract In early December 2019, the city of Wuhan, China, reported an outbreak of coronavirus disease (COVID-19), caused by a novel severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2). On January 30, 2020, the World Health Organization (WHO) declared the outbreak a global pandemic crisis. In the face of the COVID-19 pandemic, the most important step has been the effective diagnosis and monitoring of infected patients. Identifying COVID-19 using Machine Learning (ML) technologies can help the health care unit through assistive diagnostic suggestions, which can reduce the health unit's burden to a certain extent. This paper investigates the… More >

  • Open Access

    ARTICLE

    QoS Constrained Network Coding Technique to Data Transmission Using IoT

    A. Sathishkumar1,*, T. Rammohan2, S. Sathish Kumar3, J. Uma3, K. Srujan Raju4, Aarti Sangwan5, M. Sivachitra6, M. Prabu7

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 531-544, 2022, DOI:10.32604/csse.2022.021694

    Abstract The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino (MDND) technique. Both FSD and MDND technique need wide area compared to existing single node-keeper domino technique. The aim of this research is to minimize dissipation of power and to achieve less consumption of power. The… More >

  • Open Access

    ARTICLE

    Efficient Single-Stage Bridgeless AC to DC Converter Using Grey Wolf Optimization

    Prema Kandasamy1,*, K. Prem Kumar2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 487-499, 2022, DOI:10.32604/csse.2022.021693

    Abstract Bridgeless single-stage converters are used for efficient (alternative current) AC-(direct current) DC conversion. These converters control generators, like electromagnetic meso- and micro-scale generators with low voltage. Power factor correction helps increase the factor of the power supply. The main advantage of the power factor is it shapes the input current for increasing the real power of the AC supply. In this paper, a two-switch bridgeless rectifier topology is designed with a power factor correction capability. For the proposed converter topology to have good power quality parameters, the closed loop scheme, which uses the grey wolf… More >

  • Open Access

    ARTICLE

    An Efficient Deep Learning-based Content-based Image Retrieval Framework

    M. Sivakumar1,*, N. M. Saravana Kumar2, N. Karthikeyan1

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 683-700, 2022, DOI:10.32604/csse.2022.021459

    Abstract The use of massive image databases has increased drastically over the few years due to evolution of multimedia technology. Image retrieval has become one of the vital tools in image processing applications. Content-Based Image Retrieval (CBIR) has been widely used in varied applications. But, the results produced by the usage of a single image feature are not satisfactory. So, multiple image features are used very often for attaining better results. But, fast and effective searching for relevant images from a database becomes a challenging task. In the previous existing system, the CBIR has used the… More >

Displaying 901-910 on page 91 of 1442. Per Page