Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (73)
  • Open Access

    ARTICLE

    High Efficient Reconfigurable and Self Testable Architecture for Sensor Node

    G. Venkatesan1,*, N. Ramadass2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.031627

    Abstract Sensor networks are regularly sent to monitor certain physical properties that run in length from divisions of a second to many months or indeed several years. Nodes must advance their energy use for expanding network lifetime. The fault detection of the network node is very significant for guaranteeing the correctness of monitoring results. Due to different network resource constraints and malicious attacks, security assurance in wireless sensor networks has been a difficult task. The implementation of these features requires larger space due to distributed module. This research work proposes new sensor node architecture integrated with a self-testing core and cryptoprocessor… More >

  • Open Access

    ARTICLE

    Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques

    Noura Alenezi, Ahamed Aljuhani*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.036657

    Abstract The rapid growth of the Internet of Things (IoT) in the industrial sector has given rise to a new term: the Industrial Internet of Things (IIoT). The IIoT is a collection of devices, apps, and services that connect physical and virtual worlds to create smart, cost-effective, and scalable systems. Although the IIoT has been implemented and incorporated into a wide range of industrial control systems, maintaining its security and privacy remains a significant concern. In the IIoT contexts, an intrusion detection system (IDS) can be an effective security solution for ensuring data confidentiality, integrity, and availability. In this paper, we… More >

  • Open Access

    ARTICLE

    Wind Speed Prediction Using Chicken Swarm Optimization with Deep Learning Model

    R. Surendran1,*, Youseef Alotaibi2, Ahmad F. Subahi3

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.034465

    Abstract High precision and reliable wind speed forecasting have become a challenge for meteorologists. Convective events, namely, strong winds, thunderstorms, and tornadoes, along with large hail, are natural calamities that disturb daily life. For accurate prediction of wind speed and overcoming its uncertainty of change, several prediction approaches have been presented over the last few decades. As wind speed series have higher volatility and nonlinearity, it is urgent to present cutting-edge artificial intelligence (AI) technology. In this aspect, this paper presents an intelligent wind speed prediction using chicken swarm optimization with the hybrid deep learning (IWSP-CSODL) method. The presented IWSP-CSODL model… More >

  • Open Access

    ARTICLE

    Feature Selection with Deep Reinforcement Learning for Intrusion Detection System

    S. Priya1,*, K. Pradeep Mohan Kumar2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.030630

    Abstract An intrusion detection system (IDS) becomes an important tool for ensuring security in the network. In recent times, machine learning (ML) and deep learning (DL) models can be applied for the identification of intrusions over the network effectively. To resolve the security issues, this paper presents a new Binary Butterfly Optimization algorithm based on Feature Selection with DRL technique, called BBOFS-DRL for intrusion detection. The proposed BBOFSDRL model mainly accomplishes the recognition of intrusions in the network. To attain this, the BBOFS-DRL model initially designs the BBOFS algorithm based on the traditional butterfly optimization algorithm (BOA) to elect feature subsets.… More >

  • Open Access

    ARTICLE

    Reinforcement Learning with an Ensemble of Binary Action Deep Q-Networks

    A. M. Hafiz1, M. Hassaballah2,3,*, Abdullah Alqahtani3, Shtwai Alsubai3, Mohamed Abdel Hameed4

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.031720

    Abstract With the advent of Reinforcement Learning (RL) and its continuous progress, state-of-the-art RL systems have come up for many challenging and real-world tasks. Given the scope of this area, various techniques are found in the literature. One such notable technique, Multiple Deep Q-Network (DQN) based RL systems use multiple DQN-based-entities, which learn together and communicate with each other. The learning has to be distributed wisely among all entities in such a scheme and the inter-entity communication protocol has to be carefully designed. As more complex DQNs come to the fore, the overall complexity of these multi-entity systems has increased many… More >

  • Open Access

    ARTICLE

    Adaptive Kernel Firefly Algorithm Based Feature Selection and Q-Learner Machine Learning Models in Cloud

    I. Mettildha Mary1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.031114

    Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques) train datasets which sometime are inadequate in terms of sample for inferring information. A dynamic strategy, DevMLOps (Development Machine Learning Operations) used in automatic selections and tunings of MLTs result in significant performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. RFEs (Recursive Feature Eliminations) are computationally very expensive in its operations as it traverses through each feature without considering correlations between them. This problem can… More >

  • Open Access

    ARTICLE

    A 3D Geometry Model of Vocal Tract Based on Smart Internet of Things

    Ming Li1, Kuntharrgyal Khysru2, Haiqiang Shi2,*, Qiang Fang3,*, Jinrong Hu4, Yun Chen5

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.034687

    Abstract The Internet of Things (IoT) plays an essential role in the current and future generations of information, network, and communication development and applications. This research focuses on vocal tract visualization and modeling, which are critical issues in realizing inner vocal tract animation. That is applied in many fields, such as speech training, speech therapy, speech analysis and other speech production-related applications. This work constructed a geometric model by observation of Magnetic Resonance Imaging data, providing a new method to annotate and construct 3D vocal tract organs. The proposed method has two advantages compared with previous methods. Firstly it has a… More >

  • Open Access

    ARTICLE

    Visualization Techniques via MLBS for Personnel Management in Major Events

    Yu Su1,2,3, Lingjuan Hou2,3,*, Sinan Li1, Zhaochang Jiang1, Haoran Peng4

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2022.028606

    Abstract Mobile location-based services (MLBS) refer to services around geographic location data. Mobile terminals use wireless communication networks (or satellite positioning systems) to obtain users’ geographic location coordinate information based on spatial databases and integrate with other information to provide users with required location-related services. The development of systems based on MLBS has significance and practical value. In this paper a visualization management information system for personnel in major events based on microservices, namely MEPMIS, is designed and implemented by using MLBS. The system consists of a server and a client app, and it has some functions including map search and… More >

  • Open Access

    ARTICLE

    Efficient Heuristic Replication Techniques for High Data Availability in Cloud

    H. L. Chandrakala1,*, R. Loganathan2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2022.027873

    Abstract Most social networks allow connections amongst many people based on shared interests. Social networks have to offer shared data like videos, photos with minimum latency to the group, which could be challenging as the storage cost has to be minimized and hence entire data replication is not a solution. The replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response time. Though simple and adaptive replication strategies exist, the solution is non-deterministic; the replicas of the data need to be optimized to the data usability, performance, and… More >

  • Open Access

    ARTICLE

    A Derivative Matrix-Based Covert Communication Method in Blockchain

    Xiang Zhang1, Xiaona Zhang2,4,*, Xiaorui Zhang3,5,6, Wei Sun6,7, Ruohan Meng8, Xingming Sun1

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.034915

    Abstract The data in the blockchain cannot be tampered with and the users are anonymous, which enables the blockchain to be a natural carrier for covert communication. However, the existing methods of covert communication in blockchain suffer from the predefined channel structure, the capacity of a single transaction is not high, and the fixed transaction behaviors will lower the concealment of the communication channel. Therefore, this paper proposes a derivation matrix-based covert communication method in blockchain. It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full… More >

Displaying 61-70 on page 7 of 73. Per Page