Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access


    Diabetic Retinopathy Diagnosis Using ResNet with Fuzzy Rough C-Means Clustering

    R. S. Rajkumar*, A. Grace Selvarani

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 509-521, 2022, DOI:10.32604/csse.2022.021909


    Diabetic Retinopathy (DR) is a vision disease due to the long-term prevalence of Diabetes Mellitus. It affects the retina of the eye and causes severe damage to the vision. If not treated on time it may lead to permanent vision loss in diabetic patients. Today’s development in science has no medication to cure Diabetic Retinopathy. However, if diagnosed at an early stage it can be controlled and permanent vision loss can be avoided. Compared to the diabetic population, experts to diagnose Diabetic Retinopathy are very less in particular to local areas. Hence an automatic computer-aided diagnosis for DR detection is… More >

  • Open Access


    Efficient User Pairing for Performance Enhancement of Downlink NOMA Systems

    Fahad Alraddady*

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 535-544, 2022, DOI:10.32604/csse.2022.021746

    Abstract In this paper, the resource allocation problem for user pairing (UP) in downlink non-orthogonal multiple access (NOMA) systems is investigated. NOMA allows the use of one subcarrier for more than one user at the same time, thus increases the total capacity of the wireless communication system. However, users pairing is a challenging task in the NOMA systems, because a good channel quality subcarrier should be selected and allocated for the user to enhance the performance of NOMA systems. The proposed UP algorithm aims to enhance the sum rate of the paired users per subcarrier and consequently enhance the total sum… More >

  • Open Access


    Solving the Task Starvation and Resources Problem Using Optimized SMPIA in Cloud

    Mehran Mokhtari1, Homayun Motameni1,*, Peyman Bayat2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 659-675, 2022, DOI:10.32604/csse.2022.021729

    Abstract In this study, a new feature is added to the smart message passing interface (SMPI) approach (SMPIA) based on the prioritization method, which can completely eliminate the task starvation and lack of sufficient resources problems through prioritizing the tasks. The proposed approach is based on prioritizing the tasks and the urgency of implementation. Tasks are prioritized based on execution time, workload, the task with a more sensitive priority is executed earlier by the free source. The idea of demand-bound functions (DBFs) was extended to the SMPIA setting based on partitions and caps. For each task, two DBFs are constructed, DBFLO and… More >

  • Open Access


    Improved Key Agreement Based Kerberos Protocol for M-Health Security

    P. Thirumoorthy1,*, K. S. Bhuvaneshwari2, C. Kamalanathan3, P. Sunita3, E. Prabhu4, S. Maheswaran5

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 577-587, 2022, DOI:10.32604/csse.2022.021717

    Abstract The development of wireless sensor network with Internet of Things (IoT) predicts various applications in the field of healthcare and cloud computing. This can give promising results on mobile health care (M-health) and Telecare medicine information systems. M-health system on cloud Internet of Things (IoT) through wireless sensor network (WSN) becomes the rising research for the need of modern society. Sensor devices attached to the patients’ body which is connected to the mobile device can ease the medical services. Security is the key connect for optimal performance of the m-health system that share the data of patients in wireless networks… More >

  • Open Access


    Industrial Centric Node Localization and Pollution Prediction Using Hybrid Swarm Techniques

    R. Saravana Ram1,*, M. Vinoth Kumar2, N. Krishnamoorthy3, A. Baseera4, D. Mansoor Hussain5, N. Susila6

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 545-460, 2022, DOI:10.32604/csse.2022.021681

    Abstract Major fields such as military applications, medical fields, weather forecasting, and environmental applications use wireless sensor networks for major computing processes. Sensors play a vital role in emerging technologies of the 20th century. Localization of sensors in needed locations is a very serious problem. The environment is home to every living being in the world. The growth of industries after the industrial revolution increased pollution across the environment. Owing to recent uncontrolled growth and development, sensors to measure pollution levels across industries and surroundings are needed. An interesting and challenging task is choosing the place to fit the sensors. Many… More >

  • Open Access


    Covid-19’s Pandemic Relationship to Saudi Arabia’s Weather Using Statistical Analysis and GIS

    Ranya Fadlalla Elsheikh1,2,*

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 813-823, 2022, DOI:10.32604/csse.2022.021645

    Abstract The eruption of the novel Covid-19 has changed the socio-economic conditions of the world. The escalating number of infections and deaths seriously threatened human health when it became a pandemic from an epidemic. It developed into an alarming situation when the World Health Organization (WHO) declared a health emergency in MARCH 2020. The geographic settings and weather conditions are systematically linked to the spread of the epidemic. The concentration of population and weather attributes remains vital to study a pandemic such as Covid-19. The current work aims to explore the relationship of the population, weather conditions (humidity and temperature) with… More >

  • Open Access


    Securing Privacy Using Optimization and Statistical Models in Cognitive Radio Networks

    R. Neelaveni1,*, B. Sridevi2, J. Sivasankari3

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 523-533, 2022, DOI:10.32604/csse.2022.021433

    Abstract Cognitive Radio Networks (CRN) are the possible and ideal solution for meeting the spectrum needs of next-generation communication systems. CRN is a promising alternative approach that allows spectrum sharing in many applications. The licensed users considered Primary Users (PU) and unlicensed users as Secondary Users (SU). Time and power consumption on security issues are considered degrading factors in performance for improving the Quality of Service (QoS). Irrespective of using different optimization techniques, the same methodology is to be updated for the task. So that, learning and optimization go hand in hand. It ensures the security in CRN, risk factors in… More >

  • Open Access


    Design of Precise Multiplier Using Inexact Compressor for Digital Signal Processing

    Nagarajan Shanmugam*, Vijeyakumar Krishnasamy Natarajan, Kalaiselvi Sundaram, Saravanakumar Natarajan

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 619-638, 2022, DOI:10.32604/csse.2022.021008

    Abstract In the recent years, error recovery circuits in optimized data path units are adopted with approximate computing methodology. In this paper the novel multipliers have effective utilization in the newly proposed two different 4:2 approximate compressors that generate Error free Sum (ES) and Error free Carry (EC). Proposed ES and Proposed EC in 4:2 compressors are used for performing Partial Product (PP) compression. The structural arrangement utilizes Dadda structure based PP. Due to the regularity of PP arrangement Dadda multiplier is chosen for compressor implementation that favors easy standard cell ASIC design. In this, the proposed compression idealogy are more… More >

  • Open Access


    Decision Tree Based Key Management for Secure Group Communication

    P. Parthasarathi1,*, S. Shankar2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 561-575, 2022, DOI:10.32604/csse.2022.019561

    Abstract Group communication is widely used by most of the emerging network applications like telecommunication, video conferencing, simulation applications, distributed and other interactive systems. Secured group communication plays a vital role in case of providing the integrity, authenticity, confidentiality, and availability of the message delivered among the group members with respect to communicate securely between the inter group or else within the group. In secure group communications, the time cost associated with the key updating in the proceedings of the member join and departure is an important aspect of the quality of service, particularly in the large groups with highly active… More >

  • Open Access


    Optimal Algorithms for Load Balancing in Optical Burst Switching Networks

    K. Arun Kumar1,*, V. R. Venkatasubramani2, S. Rajaram2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 739-749, 2022, DOI:10.32604/csse.2022.017577

    Abstract Data packet drop can happen in Optical Burst-Switched (OBS) when two data bursts are competing on the same wavelength. Recently, many techniques have been developed to solve this problem but they do not consider the congestion. Also, it is necessary to balance the load system in the OBS network. The Ant Colony Optimization (ACO) technique can be applied to determine the straight and the safest route. However, the ACO technique raises both power utilization as well as the execution time. In this study, Cuckoo Search (CS) and ACO methods based approach is proposed to avoid the congestion and load balancing… More >

Displaying 951-960 on page 96 of 1407. Per Page