Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,249)
  • Open Access

    ARTICLE

    A Smart Room to Promote Autonomy of Disabled People due to Stroke

    Moeiz Miraoui1,2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 677-692, 2023, DOI:10.32604/csse.2023.025799

    Abstract A cerebral vascular accident, known as common language stroke, is one of the main causes of mortality and remains the primary cause of acquired disabilities in adults. Those disabled people spend most of their time at home in their living rooms. In most cases, appliances of a living room (TV, light, cooler/heater, window blinds, etc.) are generally controlled by direct manipulation of a set of remote controls. Handling many remote controls can be disturbing and inappropriate for these people. In addition, in many cases these people could be alone at home and must open the door for visitors after their… More >

  • Open Access

    ARTICLE

    Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Kanika Sharma3, Masood Ahmad4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 859-872, 2023, DOI:10.32604/csse.2023.025796

    Abstract In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key… More >

  • Open Access

    ARTICLE

    Novel Sensing Hole Recovery with Expanded Relay Node Capability

    Moonseong Kim1, Woochan Lee2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 663-675, 2023, DOI:10.32604/csse.2023.025615

    Abstract The occurrence of ‘sensing holes’ not only hinders seamless data collection but also leads to misinterpretation of information in certain areas under extensive data analysis. In order to overcome this, various sensor relocation strategies have been proposed, but the existing relocation strategies revealed problems such as the ping-pong, shaded area, network disconnection, etc. This paper conducted research on relocation protocols in a distributed environment that is very suitable for real-world situations and efficiently recovering the problem of sensing holes. First, a simulation was performed on the distribution of the shaded area for data collection, which is a problem with the… More >

  • Open Access

    ARTICLE

    Breast Calcifications and Histopathological Analysis on Tumour Detection by CNN

    D. Banumathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, P. Vishnu Raja4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 595-612, 2023, DOI:10.32604/csse.2023.025611

    Abstract The most salient argument that needs to be addressed universally is Early Breast Cancer Detection (EBCD), which helps people live longer lives. The Computer-Aided Detection (CADs)/Computer-Aided Diagnosis (CADx) system is indeed a software automation tool developed to assist the health professions in Breast Cancer Detection and Diagnosis (BCDD) and minimise mortality by the use of medical histopathological image classification in much less time. This paper purposes of examining the accuracy of the Convolutional Neural Network (CNN), which can be used to perceive breast malignancies for initial breast cancer detection to determine which strategy is efficient for the early identification of… More >

  • Open Access

    ARTICLE

    Computerised Gate Firing Control for 17-Level MLI using Staircase PWM

    M. Geetha1,*, R. Vijayabhasker2, Suresh Seetharaman1

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 813-832, 2023, DOI:10.32604/csse.2023.025575

    Abstract A basic 7-level MLI topology is developed and the same is extended to the 9-level then further increased to 17-levels. The developed structure minimizes the component’s count and size to draw out the system economy. Despite the various advantages of MLIs, efficiency and reliability play a major role since the usage of components is higher for getting a low Total Harmonics Distortion (THD) value. This becomes a major challenge incorporated in boosting the efficiency without affecting the THD value. Various parametric observations are done and realized for the designed 9-level and 17-level MLI, being the Total Standing Voltage (TSV), efficiency,… More >

  • Open Access

    ARTICLE

    Improved-Equalized Cluster Head Election Routing Protocol for Wireless Sensor Networks

    Muhammad Shahzeb Ali1, Ali Alqahtani2,*, Ansar Munir Shah1, Adel Rajab2, Mahmood Ul Hassan3, Asadullah Shaikh2, Khairan Rajab2, Basit Shahzad4

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 845-858, 2023, DOI:10.32604/csse.2023.025449

    Abstract Throughout the use of the small battery-operated sensor nodes encourage us to develop an energy-efficient routing protocol for wireless sensor networks (WSNs). The development of an energy-efficient routing protocol is a mainly adopted technique to enhance the lifetime of WSN. Many routing protocols are available, but the issue is still alive. Clustering is one of the most important techniques in the existing routing protocols. In the clustering-based model, the important thing is the selection of the cluster heads. In this paper, we have proposed a scheme that uses the bubble sort algorithm for cluster head selection by considering the remaining… More >

  • Open Access

    ARTICLE

    Weed Classification Using Particle Swarm Optimization and Deep Learning Models

    M. Manikandakumar1,*, P. Karthikeyan2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 913-927, 2023, DOI:10.32604/csse.2023.025434

    Abstract Weed is a plant that grows along with nearly all field crops, including rice, wheat, cotton, millets and sugar cane, affecting crop yield and quality. Classification and accurate identification of all types of weeds is a challenging task for farmers in earlier stage of crop growth because of similarity. To address this issue, an efficient weed classification model is proposed with the Deep Convolutional Neural Network (CNN) that implements automatic feature extraction and performs complex feature learning for image classification. Throughout this work, weed images were trained using the proposed CNN model with evolutionary computing approach to classify the weeds… More >

  • Open Access

    ARTICLE

    Model Predictive Control Coupled with Artificial Intelligence for Eddy Current Dynamometers

    İhsan Uluocak1,*, Hakan Yavuz2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 221-234, 2023, DOI:10.32604/csse.2023.025426

    Abstract The recent studies on Artificial Intelligence (AI) accompanied by enhanced computing capabilities supports increasing attention into traditional control methods coupled with AI learning methods in an attempt to bringing adaptiveness and fast responding features. The Model Predictive Control (MPC) technique is a widely used, safe and reliable control method based on constraints. On the other hand, the Eddy Current dynamometers are highly nonlinear braking systems whose performance parameters are related to many processes related variables. This study is based on an adaptive model predictive control that utilizes selected AI methods. The presented approach presents an updated the mathematical model of… More >

  • Open Access

    ARTICLE

    Twitter Data Analysis Using Hadoop and ‘R’ and Emotional Analysis Using Optimized SVNN

    K. Sailaja Kumar*, H. K. Manoj, D. Evangelin Geetha

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 485-499, 2023, DOI:10.32604/csse.2023.025390

    Abstract Standalone systems cannot handle the giant traffic loads generated by Twitter due to memory constraints. A parallel computational environment provided by Apache Hadoop can distribute and process the data over different destination systems. In this paper, the Hadoop cluster with four nodes integrated with RHadoop, Flume, and Hive is created to analyze the tweets gathered from the Twitter stream. Twitter stream data is collected relevant to an event/topic like IPL- 2015, cricket, Royal Challengers Bangalore, Kohli, Modi, from May 24 to 30, 2016 using Flume. Hive is used as a data warehouse to store the streamed tweets. Twitter analytics like… More >

  • Open Access

    ARTICLE

    Energy Aware Clustering with Medical Data Classification Model in IoT Environment

    R. Bharathi1,*, T. Abirami2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 797-811, 2023, DOI:10.32604/csse.2023.025336

    Abstract With the exponential developments of wireless networking and inexpensive Internet of Things (IoT), a wide range of applications has been designed to attain enhanced services. Due to the limited energy capacity of IoT devices, energy-aware clustering techniques can be highly preferable. At the same time, artificial intelligence (AI) techniques can be applied to perform appropriate disease diagnostic processes. With this motivation, this study designs a novel squirrel search algorithm-based energy-aware clustering with a medical data classification (SSAC-MDC) model in an IoT environment. The goal of the SSAC-MDC technique is to attain maximum energy efficiency and disease diagnosis in the IoT… More >

Displaying 7811-7820 on page 782 of 22249. Per Page