Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,393)
  • Open Access


    CNN Based Automated Weed Detection System Using UAV Imagery

    Mohd Anul Haq*

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 837-849, 2022, DOI:10.32604/csse.2022.023016

    Abstract The problem of weeds in crops is a natural problem for farmers. Machine Learning (ML), Deep Learning (DL), and Unmanned Aerial Vehicles (UAV) are among the advanced technologies that should be used in order to reduce the use of pesticides while also protecting the environment and ensuring the safety of crops. Deep Learning-based crop and weed identification systems have the potential to save money while also reducing environmental stress. The accuracy of ML/DL models has been proven to be restricted in the past due to a variety of factors, including the selection of an efficient wavelength, spatial resolution, and the… More >

  • Open Access


    Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems

    Munayfah Alanazi*, Shadi Nashwan

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 703-725, 2022, DOI:10.32604/csse.2022.022962

    Abstract Wireless medical sensor networks (WMSNs) play a significant role in increasing the availability of remote healthcare systems. The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis. The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems. Therefore, an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns. Many authentication schemes for remote patient… More >

  • Open Access


    PAPR Reduction Using Advanced Partial Transmission Scheme for 5G Waveforms

    Arun Kumar1, Sumit Chakravarty2, S. Suganya3, Mehedi Masud4,*, Sultan Aljahdali4

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 483-492, 2022, DOI:10.32604/csse.2022.022899

    Abstract The implementation of Peak Average to Power Ratio (PAPR) reduction technologies will play an important role in the regularization of Fifth Generation (5G) radio communication. PAPR reduction in the advanced waveform will be the key part of designing a 5G network for different applications. This work introduces the simulation of an Advanced Partial Transmission Sequence (A-PTS) reduction techniques for Orthogonal Frequency Division Multiplexing (OFDM) and Filter Bank Multi-Carrier (FBMC) transmission schemes. In the projected A-PTS, the FBMC signals are mapped into the number of sub-blocks and Inverse Fast Fourier transform (IFFT) is performed to estimate the high peak power in… More >

  • Open Access


    An Improved Method for Extractive Based Opinion Summarization Using Opinion Mining

    Surbhi Bhatia*, Mohammed AlOjail

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 779-794, 2022, DOI:10.32604/csse.2022.022579

    Abstract Opinion summarization recapitulates the opinions about a common topic automatically. The primary motive of summarization is to preserve the properties of the text and is shortened in a way with no loss in the semantics of the text. The need of automatic summarization efficiently resulted in increased interest among communities of Natural Language Processing and Text Mining. This paper emphasis on building an extractive summarization system combining the features of principal component analysis for dimensionality reduction and bidirectional Recurrent Neural Networks and Long Short-Term Memory (RNN-LSTM) deep learning model for short and exact synopsis using seq2seq model. It presents a… More >

  • Open Access


    Predicting Mobile Cross-Platform Adaptation Using a Hybrid Sem–ANN Approach

    Ali Alkhalifah*

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 639-658, 2022, DOI:10.32604/csse.2022.022519

    Abstract Owing to constant changes in user needs, new technologies have been introduced to keep pace by building sustainable applications. Researchers and practitioners are keen to understand the factors that create an attractive user interface. Although the use of cross-platform applications and services is increasing, limited research has examined and evaluated cross-platforms for developing mobile applications for different operating systems. This study evaluates cross-platform features, identifying the main factors that help to create an attractive user adaptation when building sustainable applications for both Android and iOS. Flutter and React Native were selected so end-users could test their features using the cross-platform… More >

  • Open Access


    Modeling Rogowski Coils for Monitoring Surge Arrester Discharge Currents

    Nehmdoh A. Sabiha1,*, Hend I. Alkhammash2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 439-449, 2022, DOI:10.32604/csse.2022.022506

    Abstract Rogowski coils (RCs) are widely used to measure power or high frequency currents based on their design. In this paper, two types of RCs that are circular (traditional) and cylindrical shapes wound using wire covered by varnish are constructed. This construction is carried out to be suitable for monitoring the discharge current of the surge arrester installed in the distribution system. Concerning high frequency RC modeling for both types considering transfer function is introduced. Self-integrating for both types is attained. Therefore, the experimental tests using function generator for both coils are carried out to identify the parameters of the transfer… More >

  • Open Access


    User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains

    S. Godfrey Winster1, A. Siva Kumar2,*, R. Ramesh3

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 605-618, 2022, DOI:10.32604/csse.2022.022467

    Abstract Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient manner. The advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation (RMI). The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any user. Due to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient service. To improve the performance in data security, the block chains… More >

  • Open Access


    Contrast Enhancement Based Image Detection Using Edge Preserved Key Pixel Point Filtering

    Balakrishnan Natarajan1,*, Pushpalatha Krishnan2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 423-438, 2022, DOI:10.32604/csse.2022.022376

    Abstract In existing methods for segmented images, either edge point extraction or preservation of edges, compromising contrast images is so sensitive to noise. The Degeneration Threshold Image Detection (DTID) framework has been proposed to improve the contrast of edge filtered images. Initially, DTID uses a Rapid Bilateral Filtering process for filtering edges of contrast images. This filter decomposes input images into base layers in the DTID framework. With minimal filtering time, Rapid Bilateral Filtering handles high dynamic contrast images for smoothening edge preservation. In the DTID framework, Rapid Bilateral Filtering with Shift-Invariant Base Pass Domain Filter is insensitive to noise. This… More >

  • Open Access


    SOINN-Based Abnormal Trajectory Detection for Efficient Video Condensation

    Chin-Shyurng Fahn1, Chang-Yi Kao2,*, Meng-Luen Wu3, Hao-En Chueh4

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 451-463, 2022, DOI:10.32604/csse.2022.022368

    Abstract With the evolution of video surveillance systems, the requirement of video storage grows rapidly; in addition, safe guards and forensic officers spend a great deal of time observing surveillance videos to find abnormal events. As most of the scene in the surveillance video are redundant and contains no information needs attention, we propose a video condensation method to summarize the abnormal events in the video by rearranging the moving trajectory and sort them by the degree of anomaly. Our goal is to improve the condensation rate to reduce more storage size, and increase the accuracy in abnormal detection. As the… More >

  • Open Access


    The Double Edge Sword Based Distributed Executor Service

    Faisal Bahadur1,*, Arif Iqbal Umar1, Insaf Ullah2, Fahad Algarni3, Muhammad Asghar Khan2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 589-604, 2022, DOI:10.32604/csse.2022.022319

    Abstract Scalability is one of the most important quality attribute of software-intensive systems, because it maintains an effective performance parallel to the large fluctuating and sometimes unpredictable workload. In order to achieve scalability, thread pool system (TPS) (which is also known as executor service) has been used extensively as a middleware service in software-intensive systems. TPS optimization is a challenging problem that determines the optimal size of thread pool dynamically on runtime. In case of distributed-TPS (DTPS), another issue is the load balancing b/w available set of TPSs running at backend servers. Existing DTPSs are overloaded either due to an inappropriate… More >

Displaying 921-930 on page 93 of 1393. Per Page