Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases

    Norwini Zaidi1, Iskandar Ishak2,*, Fatimah Sidi2, Lilly Suriani Affendey2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1175-1188, 2022, DOI:10.32604/csse.2022.021969 - 09 May 2022

    Abstract Data transformation is the core process in migrating database from relational database to NoSQL database such as column-oriented database. However, there is no standard guideline for data transformation from relational database to NoSQL database. A number of schema transformation techniques have been proposed to improve data transformation process and resulted better query processing time when compared to the relational database query processing time. However, these approaches produced redundant tables in the resulted schema that in turn consume large unnecessary storage size and produce high query processing time due to the generated schema with redundant column… More >

  • Open Access

    ARTICLE

    Secure Key Management Based Mobile Authentication in Cloud

    S. Shanmuga Priya1, D. Yuvaraj2,*, T. Satyanarayana Murthy3, Varghese S. Chooralil4, S. Navaneetha Krishnan5, P. Banumathy6, P. SundaraVadivel7

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 887-896, 2022, DOI:10.32604/csse.2022.021845 - 09 May 2022

    Abstract Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The… More >

  • Open Access

    ARTICLE

    A Novel Soft Clustering Approach for Gene Expression Data

    E. Kavitha1,*, R. Tamilarasan2, Arunadevi Baladhandapani3, M. K. Jayanthi Kannan4

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 871-886, 2022, DOI:10.32604/csse.2022.021215 - 09 May 2022

    Abstract Gene expression data represents a condition matrix where each row represents the gene and the column shows the condition. Micro array used to detect gene expression in lab for thousands of gene at a time. Genes encode proteins which in turn will dictate the cell function. The production of messenger RNA along with processing the same are the two main stages involved in the process of gene expression. The biological networks complexity added with the volume of data containing imprecision and outliers increases the challenges in dealing with them. Clustering methods are hence essential to… More >

  • Open Access

    ARTICLE

    Improving Throughput of Transmission Control Protocol Using Cross Layer Approach

    Jansi Rani Sella Veluswami*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1231-1239, 2022, DOI:10.32604/csse.2022.020230 - 09 May 2022

    Abstract Most of the internet users connect through wireless networks. Major part of internet traffic is carried by Transmission Control Protocol (TCP). It has some design constraints while operated across wireless networks. TCP is the traditional predominant protocol designed for wired networks. To control congestion in the network, TCP used acknowledgment to delivery of packets by the end host. In wired network, packet loss signals congestion in the network. But rather in wireless networks, loss is mainly because of the wireless characteristics such as fading, signal strength etc. When a packet travels across wired and wireless… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508 - 09 May 2022

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, More >

  • Open Access

    ARTICLE

    Spatio-Temporal Wind Speed Prediction Based on Variational Mode Decomposition

    Yingnan Zhao1,*, Guanlan Ji1, Fei Chen1, Peiyuan Ji1, Yi Cao2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 719-735, 2022, DOI:10.32604/csse.2022.027288 - 20 April 2022

    Abstract Improving short-term wind speed prediction accuracy and stability remains a challenge for wind forecasting researchers. This paper proposes a new variational mode decomposition (VMD)-attention-based spatio-temporal network (VASTN) method that takes advantage of both temporal and spatial correlations of wind speed. First, VASTN is a hybrid wind speed prediction model that combines VMD, squeeze-and-excitation network (SENet), and attention mechanism (AM)-based bidirectional long short-term memory (BiLSTM). VASTN initially employs VMD to decompose the wind speed matrix into a series of intrinsic mode functions (IMF). Then, to extract the spatial features at the bottom of the model, each More >

  • Open Access

    ARTICLE

    Vulnerability of Regional Aviation Networks Based on DBSCAN and Complex Networks

    Hang He1,*, Wanggen Liu1, Zhenhan Zhao1, Shan He1, Jinghui Zhang2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 643-655, 2022, DOI:10.32604/csse.2022.027211 - 20 April 2022

    Abstract To enhance the accuracy of performance analysis of regional airline network, this study applies complex network theory and Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm to investigate the topology of regional airline network, constructs node importance index system, and clusters 161 airport nodes of regional airline network. Besides, entropy power method and approximating ideal solution method (TOPSIS) is applied to comprehensively evaluate the importance of airport nodes and complete the classification of nodes and identification of key points; adopt network efficiency, maximum connectivity subgraph and network connectivity as vulnerability measurement indexes, and observe… More >

  • Open Access

    ARTICLE

    Evidence Mechanism of Power Dispatching Instruction Based on Blockchain

    Jian Geng1,*, Shaoyuan Yu1, Ailin Chen1, Hao Wang2, Bo Yan3, Liang Li3, Lei Song3, Qirun Wang4

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 559-571, 2022, DOI:10.32604/csse.2022.026948 - 20 April 2022

    Abstract With the development and application of energy Internet technology, the collaborative interaction of “source network, load and storage” has become the development trend of power grid dispatching. The large-scale access of renewable energy on the load side, the unified management of adjustable loads, and the participation of multiple parties in energy operations have put forward requirements for the safety, credibility, openness, and transparency of the load dispatching environment. Under the environment of carbon emission reduction, the paper proposed an architecture of the scheduling data blockchain, based on the in-depth study of blockchain. Moreover, smart contracts… More >

  • Open Access

    ARTICLE

    An FPGA Design for Real-Time Image Denoising

    Ahmed Ben Atitallah*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 803-816, 2022, DOI:10.32604/csse.2022.024393 - 20 April 2022

    Abstract The increasing use of images in miscellaneous applications such as medical image analysis and visual quality inspection has led to growing interest in image processing. However, images are often contaminated with noise which may corrupt any of the following image processing steps. Therefore, noise filtering is often a necessary preprocessing step for the most image processing applications. Thus, in this paper an optimized field-programmable gate array (FPGA) design is proposed to implement the adaptive vector directional distance filter (AVDDF) in hardware/software (HW/SW) codesign context for removing noise from the images in real-time. For that, the… More >

  • Open Access

    ARTICLE

    A Proposed Biometric Authentication Model to Improve Cloud Systems Security

    Hosam El- El-Sofany1,2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 573-589, 2022, DOI:10.32604/csse.2022.024302 - 20 April 2022

    Abstract Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the… More >

Displaying 931-940 on page 94 of 1494. Per Page