Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    5G Data Offloading Using Fuzzification with Grasshopper Optimization Technique

    V. R. Balaji1,*, T. Kalavathi2, J. Vellingiri3, N. Rajkumar4, Venkat Prasad Padhy5

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 289-301, 2022, DOI:10.32604/csse.2022.020971

    Abstract Data offloading at the network with less time and reduced energy consumption are highly important for every technology. Smart applications process the data very quickly with less power consumption. As technology grows towards 5G communication architecture, identifying a solution for QoS in 5G through energy-efficient computing is important. In this proposed model, we perform data offloading at 5G using the fuzzification concept. Mobile IoT devices create tasks in the network and are offloaded in the cloud or mobile edge nodes based on energy consumption. Two base stations, small (SB) and macro (MB) stations, are initialized and the first tasks randomly… More >

  • Open Access

    ARTICLE

    Adaptive Server Load Balancing in SDN Using PID Neural Network Controller

    R. Malavika1,*, M. L. Valarmathi2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 229-243, 2022, DOI:10.32604/csse.2022.020947

    Abstract Web service applications are increasing tremendously in support of high-level businesses. There must be a need of better server load balancing mechanism for improving the performance of web services in business. Though many load balancing methods exist, there is still a need for sophisticated load balancing mechanism for not letting the clients to get frustrated. In this work, the server with minimum response time and the server having less traffic volume were selected for the aimed server to process the forthcoming requests. The Servers are probed with adaptive control of time with two thresholds L and U to indicate the… More >

  • Open Access

    ARTICLE

    Machine Learning Technique to Detect Radiations in the Brain

    E. Gothai1,*, A. Baseera2, P. Prabu3, K. Venkatachalam4, K. Saravanan5, S. SathishKumar6

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 149-163, 2022, DOI:10.32604/csse.2022.020619

    Abstract The brain of humans and other organisms is affected in various ways through the electromagnetic field (EMF) radiations generated by mobile phones and cell phone towers. Morphological variations in the brain are caused by the neurological changes due to the revelation of EMF. Cellular level analysis is used to measure and detect the effect of mobile radiations, but its utilization seems very expensive, and it is a tedious process, where its analysis requires the preparation of cell suspension. In this regard, this research article proposes optimal broadcasting learning to detect changes in brain morphology due to the revelation of EMF.… More >

  • Open Access

    ARTICLE

    Protecting Data Mobility in Cloud Networks Using Metadata Security

    R. Punithavathi1,*, M. Kowsigan2, R. Shanthakumari3, Miodrag Zivkovic4, Nebojsa Bacanin4, Marko Sarac4

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 105-120, 2022, DOI:10.32604/csse.2022.020486

    Abstract At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data. Sometimes, data may have highly sensitive information, leading users to consider using big data and cloud processing regardless of whether they are secured are not. Threats to sensitive data in cloud systems produce high risks, and existing security methods do not provide enough security to sensitive user data in cloud and big data environments. At present, several security solutions support cloud systems. Some of… More >

  • Open Access

    ARTICLE

    Performance Enhancement of PV Based Boost Cascaded Fifteen Level Inverter for AC Loads

    M. P. Viswanathan*, B. Anand

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 165-181, 2022, DOI:10.32604/csse.2022.020400

    Abstract In this research work, single-stage fifteen levels cascaded DC-interface converter (CDDCLC) is proposed for sun arranged photovoltaic technology (PV) applications. The proposed geography is joined with help DC chopper and H-associate inverter to upgrade the power converter to accomplish the diminished harmonic profile. In assessment with the customary inverter structures, the proposed system is used with diminished voltage stress, decreased switch count and DC source tally. The proposed research work with cascaded DC link converter design requires three DC sources for combining fifteen-level AC output. This investigation structure switching technique is phase opposition and disposition pulse width modulation technique (POPD)… More >

  • Open Access

    ARTICLE

    Vision Based Real Time Monitoring System for Elderly Fall Event Detection Using Deep Learning

    G. Anitha1,*, S. Baghavathi Priya2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 87-103, 2022, DOI:10.32604/csse.2022.020361

    Abstract Human fall detection plays a vital part in the design of sensor based alarming system, aid physical therapists not only to lessen after fall effect and also to save human life. Accurate and timely identification can offer quick medical services to the injured people and prevent from serious consequences. Several vision-based approaches have been developed by the placement of cameras in diverse everyday environments. At present times, deep learning (DL) models particularly convolutional neural networks (CNNs) have gained much importance in the fall detection tasks. With this motivation, this paper presents a new vision based elderly fall event detection using… More >

  • Open Access

    ARTICLE

    Application of ANFIS Model for Thailand’s Electric Vehicle Consumption

    Narongkorn Uthathip1,*, Pornrapeepat Bhasaputra1, Woraratana Pattaraprakorn2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 69-86, 2022, DOI:10.32604/csse.2022.020120

    Abstract Generally, road transport is a major energy-consuming sector. Fuel consumption of each vehicle is an important factor that affects the overall energy consumption, driving behavior and vehicle characteristic are the main factors affecting the change of vehicle fuel consumption. It is difficult to analyze the influence of fuel consumption with multiple and complex factors. The Adaptive Neuro-Fuzzy Inference System (ANFIS) approach was employed to develop a vehicle fuel consumption model based on multivariate input. The ANFIS network was constructed by various experiments based on the ANFIS Parameter setting. The performance of the ANFIS network was validated using Root Mean Square… More >

  • Open Access

    ARTICLE

    Operation Optimal Control of Urban Rail Train Based on Multi-Objective Particle Swarm Optimization

    Liang Jin1,*, Qinghui Meng1, Shuang Liang2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 387-395, 2022, DOI:10.32604/csse.2022.017745

    Abstract The energy consumption of train operation occupies a large proportion of the total consumption of railway transportation. In order to improve the operating energy utilization rate of trains, a multi-objective particle swarm optimization (MPSO) algorithm with energy consumption, punctuality and parking accuracy as the objective and safety as the constraint is built. To accelerate its the convergence process, the train operation progression is divided into several modes according to the train speed-distance curve. A human-computer interactive particle swarm optimization algorithm is proposed, which presents the optimized results after a certain number of iterations to the decision maker, and the satisfactory… More >

  • Open Access

    ARTICLE

    LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

    Jin Wang1, Changqing Zhao1, Shiming He1,*, Yu Gu2, Osama Alfarraj3, Ahed Abugabah4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1207-1222, 2022, DOI:10.32604/csse.2022.022365

    Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models. Therefore, to reduce the computational… More >

  • Open Access

    ARTICLE

    Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

    Hao Yan1,2, Yanan Liu1, Shuo Qiu1, Shengzhou Hu3, Weijian Zhang4,*, Jinyue Xia5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1129-1142, 2022, DOI:10.32604/csse.2022.022317

    Abstract With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third Party Auditor (TPA) which is… More >

Displaying 981-990 on page 99 of 1407. Per Page