Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Non Sub-Sampled Contourlet with Joint Sparse Representation Based Medical Image Fusion

    Kandasamy Kittusamy*, Latha Shanmuga Vadivu Sampath Kumar

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1989-2005, 2023, DOI:10.32604/csse.2023.026501

    Abstract Medical Image Fusion is the synthesizing technology for fusing multimodal medical information using mathematical procedures to generate better visual on the image content and high-quality image output. Medical image fusion represents an indispensible role in fixing major solutions for the complicated medical predicaments, while the recent research results have an enhanced affinity towards the preservation of medical image details, leaving color distortion and halo artifacts to remain unaddressed. This paper proposes a novel method of fusing Computer Tomography (CT) and Magnetic Resonance Imaging (MRI) using a hybrid model of Non Sub-sampled Contourlet Transform (NSCT) and Joint Sparse Representation (JSR). This… More >

  • Open Access

    ARTICLE

    An Optimized Novel Trust-Based Security Mechanism Using Elephant Herd Optimization

    Saranya Veerapaulraj1,*, M. Karthikeyan1, S. Sasipriya2, A. S. Shanthi1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2489-2500, 2023, DOI:10.32604/csse.2023.026463

    Abstract Routing strategies and security issues are the greatest challenges in Wireless Sensor Network (WSN). Cluster-based routing Low Energy adaptive Clustering Hierarchy (LEACH) decreases power consumption and increases network lifetime considerably. Securing WSN is a challenging issue faced by researchers. Trust systems are very helpful in detecting interfering nodes in WSN. Researchers have successfully applied Nature-inspired Metaheuristics Optimization Algorithms as a decision-making factor to derive an improved and effective solution for a real-time optimization problem. The metaheuristic Elephant Herding Optimizations (EHO) algorithm is formulated based on elephant herding in their clans. EHO considers two herding behaviors to solve and enhance optimization… More >

  • Open Access

    ARTICLE

    Colliding Bodies Optimization with Machine Learning Based Parkinson’s Disease Diagnosis

    Ashit Kumar Dutta1,*, Nazik M. A. Zakari2, Yasser Albagory3, Abdul Rahaman Wahab Sait4

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2195-2207, 2023, DOI:10.32604/csse.2023.026461

    Abstract Parkinson’s disease (PD) is one of the primary vital degenerative diseases that affect the Central Nervous System among elderly patients. It affect their quality of life drastically and millions of seniors are diagnosed with PD every year worldwide. Several models have been presented earlier to detect the PD using various types of measurement data like speech, gait patterns, etc. Early identification of PD is important owing to the fact that the patient can offer important details which helps in slowing down the progress of PD. The recently-emerging Deep Learning (DL) models can leverage the past data to detect and classify… More >

  • Open Access

    ARTICLE

    Early Skin Disease Identification Using eep Neural Network

    Vinay Gautam1, Naresh Kumar Trivedi1, Abhineet Anand1, Rajeev Tiwari2,*, Atef Zaguia3, Deepika Koundal4, Sachin Jain5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2259-2275, 2023, DOI:10.32604/csse.2023.026358

    Abstract Skin lesions detection and classification is a prominent issue and difficult even for extremely skilled dermatologists and pathologists. Skin disease is the most common disorder triggered by fungus, viruses, bacteria, allergies, etc. Skin diseases are most dangerous and may be the cause of serious damage. Therefore, it requires to diagnose it at an earlier stage, but the diagnosis therapy itself is complex and needs advanced laser and photonic therapy. This advance therapy involves financial burden and some other ill effects. Therefore, it must use artificial intelligence techniques to detect and diagnose it accurately at an earlier stage. Several techniques have… More >

  • Open Access

    ARTICLE

    Multi-attribute Group Decision-making Based on Hesitant Bipolar-valued Fuzzy Information and Social Network

    Dhanalakshmi R1, Sovan Samanta2, Arun Kumar Sivaraman3, Jeong Gon Lee4,*, Balasundaram A5, Sanamdikar Sanjay Tanaji6, Priya Ravindran7

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1939-1950, 2023, DOI:10.32604/csse.2023.026254

    Abstract Fuzzy sets have undergone several expansions and generalisations in the literature, including Atanasov’s intuitionistic fuzzy sets, type 2 fuzzy sets, and fuzzy multisets, to name a few. They can be regarded as fuzzy multisets from a formal standpoint; nevertheless, their interpretation differs from the two other approaches to fuzzy multisets that are currently available. Hesitating fuzzy sets (HFS) are very useful if consultants have hesitation in dealing with group decision-making problems between several possible memberships. However, these possible memberships can be not only crisp values in [0,1], but also interval values during a practical evaluation process. Hesitant bipolar valued fuzzy… More >

  • Open Access

    ARTICLE

    Algorithms for Pre-Compiling Programs by Parallel Compilers

    Fayez AlFayez*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2165-2176, 2023, DOI:10.32604/csse.2023.026238

    Abstract The paper addresses the challenge of transmitting a big number of files stored in a data center (DC), encrypting them by compilers, and sending them through a network at an acceptable time. Face to the big number of files, only one compiler may not be sufficient to encrypt data in an acceptable time. In this paper, we consider the problem of several compilers and the objective is to find an algorithm that can give an efficient schedule for the given files to be compiled by the compilers. The main objective of the work is to minimize the gap in the… More >

  • Open Access

    ARTICLE

    Proof-of-Improved-Participation: A New Consensus Protocol for Blockchain Technology

    N. Anita*, M. Vijayalakshmi, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2007-2018, 2023, DOI:10.32604/csse.2023.025516

    Abstract The Internet of Things (IoT) is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale. The existing malicious node detection mechanism in traditional approaches lacks in transparency, availability, or traceability of the detection phase. To overcome these concerns, we provide a decentralized technique using blockchain technology. Despite the fact that blockchain technology is applicable to create that type of models, existing harmony set of instructions are susceptible to do violence to such as DoS and Sybil, making blockchain systems unfeasible. Here, a new Proof-of-Improved-Participation (PoIP) harmony instruction was suggested that benefits the… More >

  • Open Access

    ARTICLE

    Paillier Cryptography Based Message Authentication Code for IoMT Security

    S. Siamala Devi1, Chandrakala Kuruba2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2209-2223, 2023, DOI:10.32604/csse.2023.025514

    Abstract Health care visualization through Internet of Things (IoT) over wireless sensor network (WSN) becomes a current research attention due to medical sensor evolution of devices. The digital technology-based communication system is widely used in all application. Internet of medical thing (IoMT) assisted healthcare application ensures the continuous health monitoring of a patient and provides the early awareness of the one who is suffered without human participation. These smart medical devices may consume with limited resources and also the data generated by these devices are large in size. These IoMT based applications suffer from the issues such as security, anonymity, privacy,… More >

  • Open Access

    ARTICLE

    Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT

    S. Siamala Devi1, K. Venkatachalam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1869-1880, 2023, DOI:10.32604/csse.2023.025505

    Abstract The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message… More >

  • Open Access

    ARTICLE

    Joint Energy Predication and Gathering Data in Wireless Rechargeable Sensor Network

    I. Vallirathi1,*, S. Ebenezer Juliet2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2349-2360, 2023, DOI:10.32604/csse.2023.024864

    Abstract Wireless Sensor Network (WSNs) is an infrastructure-less wireless network deployed in an increasing number of wireless sensors in an ad-hoc manner. As the sensor nodes could be powered using batteries, the development of WSN energy constraints is considered to be a key issue. In wireless sensor networks (WSNs), wireless mobile chargers (MCs) conquer such issues mainly, energy shortages. The proposed work is to produce an energy-efficient recharge method for Wireless Rechargeable Sensor Network (WRSN), which results in a longer lifespan of the network by reducing charging delay and maintaining the residual energy of the sensor. In this algorithm, each node… More >

Displaying 6751-6760 on page 676 of 22248. Per Page