Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Efficient Crack Severity Level Classification Using Bilayer Detection for Building Structures

    M. J. Anitha1,*, R. Hemalatha2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1183-1200, 2023, DOI:10.32604/csse.2023.031888 - 20 January 2023

    Abstract Detection of cracks at the early stage is considered as very constructive since precautionary steps need to be taken to avoid the damage to the civil structures. Moreover, identifying and classifying the severity level of cracks is inevitable in order to find the stability of buildings. Hence, this paper proposes an efficient strategy to classify the cracks into fine, medium, and thick using a novel bilayer crack detection algorithm. The bilayer crack detection algorithm helps in extracting the requisite features from the crack for efficient classification. The proposed algorithm works well in the dark background… More >

  • Open Access

    ARTICLE

    A Deep Learning Model to Analyse Social-Cyber Psychological Problems in Youth

    Ali Alqazzaz1, Mohammad Tabrez Quasim1,*, Mohammed Mujib Alshahrani1, Ibrahim Alrashdi2, Mohammad Ayoub Khan1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 551-562, 2023, DOI:10.32604/csse.2023.031048 - 20 January 2023

    Abstract Facebook, Twitter, Instagram, and other social media have emerged as excellent platforms for interacting with friends and expressing thoughts, posts, comments, images, and videos that express moods, sentiments, and feelings. With this, it has become possible to examine user thoughts and feelings in social network data to better understand their perspectives and attitudes. However, the analysis of depression based on social media has gained widespread acceptance worldwide, other verticals still have yet to be discovered. The depression analysis uses Twitter data from a publicly available web source in this work. To assess the accuracy of More >

  • Open Access

    ARTICLE

    Efficient Energy and Delay Reduction Model for Wireless Sensor Networks

    Arslan Iftikhar1, M. A. Elmagzoub2, Ansar Munir1,*, Hamad Abosaq Al Salem2, Mahmood ul Hassan3, Jarallah Alqahtani2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1153-1168, 2023, DOI:10.32604/csse.2023.030802 - 20 January 2023

    Abstract In every network, delay and energy are crucial for communication and network life. In wireless sensor networks, many tiny nodes create networks with high energy consumption and compute routes for better communication. Wireless Sensor Networks (WSN) is a very complex scenario to compute minimal delay with data aggregation and energy efficiency. In this research, we compute minimal delay and energy efficiency for improving the quality of service of any WSN. The proposed work is based on energy and distance parameters as taken dependent variables with data aggregation. Data aggregation performs on different models, namely Hybrid-Low… More >

  • Open Access

    ARTICLE

    Automated White Blood Cell Disease Recognition Using Lightweight Deep Learning

    Abdullah Alqahtani1, Shtwai Alsubai1, Mohemmed Sha1,*, Muhammad Attique Khan2, Majed Alhaisoni3, Syed Rameez Naqvi2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 107-123, 2023, DOI:10.32604/csse.2023.030727 - 20 January 2023

    Abstract White blood cells (WBC) are immune system cells, which is why they are also known as immune cells. They protect the human body from a variety of dangerous diseases and outside invaders. The majority of WBCs come from red bone marrow, although some come from other important organs in the body. Because manual diagnosis of blood disorders is difficult, it is necessary to design a computerized technique. Researchers have introduced various automated strategies in recent years, but they still face several obstacles, such as imbalanced datasets, incorrect feature selection, and incorrect deep model selection. We… More >

  • Open Access

    ARTICLE

    Hash-Indexing Block-Based Deduplication Algorithm for Reducing Storage in the Cloud

    D. Viji*, S. Revathy

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 27-42, 2023, DOI:10.32604/csse.2023.030259 - 20 January 2023

    Abstract Cloud storage is essential for managing user data to store and retrieve from the distributed data centre. The storage service is distributed as pay a service for accessing the size to collect the data. Due to the massive amount of data stored in the data centre containing similar information and file structures remaining in multi-copy, duplication leads to increase storage space. The potential deduplication system doesn’t make efficient data reduction because of inaccuracy in finding similar data analysis. It creates a complex nature to increase the storage consumption under cost. To resolve this problem, this… More >

  • Open Access

    ARTICLE

    Implementation of ID-based Audit Protocols to Enhance Security and Productivity

    R. Hariharan1,*, G. Komarasamy2, S. Daniel Madan Raja3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 873-882, 2023, DOI:10.32604/csse.2023.029899 - 20 January 2023

    Abstract Cloud storage has gained increasing popularity, as it helps cloud users arbitrarily store and access the related outsourced data. Numerous public audit buildings have been presented to ensure data transparency. However, modern developments have mostly been constructed on the public key infrastructure. To achieve data integrity, the auditor must first authenticate the legality of the public key certificate, which adds to an immense workload for the auditor, in order to ensure that data integrity is accomplished. The data facilities anticipate that the storage data quality should be regularly tracked to minimize disruption to the saved… More >

  • Open Access

    ARTICLE

    Alpha Fusion Adversarial Attack Analysis Using Deep Learning

    Mohibullah Khan1, Ata Ullah1, Isra Naz2, Sajjad Haider1, Nz Jhanji3,*, Mohammad Shorfuzzaman4, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 461-473, 2023, DOI:10.32604/csse.2023.029642 - 20 January 2023

    Abstract The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN More >

  • Open Access

    ARTICLE

    Nonlinear Dynamic System Identification of ARX Model for Speech Signal Identification

    Rakesh Kumar Pattanaik1, Mihir N. Mohanty1,*, Srikanta Ku. Mohapatra2, Binod Ku. Pattanayak3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 195-208, 2023, DOI:10.32604/csse.2023.029591 - 20 January 2023

    Abstract System Identification becomes very crucial in the field of nonlinear and dynamic systems or practical systems. As most practical systems don’t have prior information about the system behaviour thus, mathematical modelling is required. The authors have proposed a stacked Bidirectional Long-Short Term Memory (Bi-LSTM) model to handle the problem of nonlinear dynamic system identification in this paper. The proposed model has the ability of faster learning and accurate modelling as it can be trained in both forward and backward directions. The main advantage of Bi-LSTM over other algorithms is that it processes inputs in two ways:… More >

  • Open Access

    ARTICLE

    Ring Oscillator for 60 Meter Bandwidth

    Rachana Arya1,*, B. K. Singh2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 93-105, 2023, DOI:10.32604/csse.2023.029220 - 20 January 2023

    Abstract The 60-meter band range is tremendously useful in telecommunication, military and governmental applications. The I. T. U. (International Telecommunication Union) required isolationism to former radio frequency services because the various frequency bands are extremely overloaded. The allocation of new frequency bands are a lengthy procedure as well as time taking. As a result, the researchers use bidirectional, amateur radio frequency communication for 60-meter band, usually the frequency slot of 5250–5450 KHz, although the entire band is not essentially obtainable for all countries. For transmission and reception of these frequencies, a local oscillator is used in… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050 - 20 January 2023

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses More >

Displaying 10621-10630 on page 1063 of 31589. Per Page