Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Experimental Study on Heavy Oil Drag Reduction in Horizontal Pipelines by Water Annular Conveying

    Mingjun Du1,2, Jiaqiang Jing1,*, Xinqiang Xiong3, Bingbing Lang2, Xuan Wang2, Shiying Shi4,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.1, pp. 81-91, 2022, DOI:10.32604/fdmp.2022.016640

    Abstract Transportation of heavy oil by the so-called water-ring technique is a very promising method by which pressure drop and pollution can be significantly reduced. Dedicated experiments have been carried out by changing the phase’s density, viscosity, velocity and interfacial tension to systematically analyze the characteristics of the water ring. On the basis of such experimental data, a mathematical model for pressure drop prediction has been introduced. This research shows that as long as the density of oil and water remains the same, a concentric water ring can effectively be formed. In such conditions, the oil-water viscosity difference has little effect… More >

  • Open Access

    ARTICLE

    LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

    Jin Wang1, Changqing Zhao1, Shiming He1,*, Yu Gu2, Osama Alfarraj3, Ahed Abugabah4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1207-1222, 2022, DOI:10.32604/csse.2022.022365

    Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models. Therefore, to reduce the computational… More >

  • Open Access

    ARTICLE

    Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

    Hao Yan1,2, Yanan Liu1, Shuo Qiu1, Shengzhou Hu3, Weijian Zhang4,*, Jinyue Xia5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1129-1142, 2022, DOI:10.32604/csse.2022.022317

    Abstract With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third Party Auditor (TPA) which is… More >

  • Open Access

    ARTICLE

    A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

    Xiaorui Zhang1,3,*, Wenfang Zhang1, Wei Sun2, Xingming Sun1, Sunil Kumar Jha4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1043-1056, 2022, DOI:10.32604/csse.2022.022305

    Abstract In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging model based on particle swarm… More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of the blockchain, and threaten the… More >

  • Open Access

    ARTICLE

    Interactive Middleware Services for Heterogeneous Systems

    Vasanthi Raghupathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, Sudhakar Sengan4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1241-1253, 2022, DOI:10.32604/csse.2022.021997

    Abstract Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Systems. This resulted in the delivery of interactive services throughout Heterogeneous Environments (HE). Users are given free navigation between devices in a widespread environment and continuously interact with each other from any chosen device. Numerous interactive devices with recent interactive platforms (for example, Smart Phones, Mobile Phones, Personal Computer (PC) and… More >

  • Open Access

    ARTICLE

    X-Ray Covid-19 Detection Based on Scatter Wavelet Transform and Dense Deep Neural Network

    Ali Sami Al-Itbi*, Ahmed Bahaaulddin A. Alwahhab, Ali Mohammed Sahan

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1255-1271, 2022, DOI:10.32604/csse.2022.021980

    Abstract Notwithstanding the discovery of vaccines for Covid-19, the virus's rapid spread continues due to the limited availability of vaccines, especially in poor and emerging countries. Therefore, the key issues in the present COVID-19 pandemic are the early identification of COVID-19, the cautious separation of infected cases at the lowest cost and curing the disease in the early stages. For that reason, the methodology adopted for this study is imaging tools, particularly computed tomography, which have been critical in diagnosing and treating the disease. A new method for detecting Covid-19 in X-rays and CT images has been presented based on the… More >

  • Open Access

    ARTICLE

    Defect Prediction Using Akaike and Bayesian Information Criterion

    Saleh Albahli1,*, Ghulam Nabi Ahmad Hassan Yar2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1117-1127, 2022, DOI:10.32604/csse.2022.021750

    Abstract Data available in software engineering for many applications contains variability and it is not possible to say which variable helps in the process of the prediction. Most of the work present in software defect prediction is focused on the selection of best prediction techniques. For this purpose, deep learning and ensemble models have shown promising results. In contrast, there are very few researches that deals with cleaning the training data and selection of best parameter values from the data. Sometimes data available for training the models have high variability and this variability may cause a decrease in model accuracy. To… More >

  • Open Access

    ARTICLE

    Heart Disease Classification Using Multiple K-PCA and Hybrid Deep Learning Approach

    S. Kusuma*, Dr. Jothi K. R

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1273-1289, 2022, DOI:10.32604/csse.2022.021741

    Abstract One of the severe health problems and the most common types of heart disease (HD) is Coronary heart disease (CHD). Due to the lack of a healthy lifestyle, HD would cause frequent mortality worldwide. If the heart attack occurs without any symptoms, it cannot be cured by an intelligent detection system. An effective diagnosis and detection of CHD should prevent human casualties. Moreover, intelligent systems employ clinical-based decision support approaches to assist physicians in providing another option for diagnosing and detecting HD. This paper aims to introduce a heart disease prediction model including phases like (i) Feature extraction, (ii) Feature… More >

  • Open Access

    ARTICLE

    Emotion Recognition with Capsule Neural Network

    Loan Trinh Van1, Quang H. Nguyen1,*, Thuy Dao Thi Le2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1083-1098, 2022, DOI:10.32604/csse.2022.021635

    Abstract For human-machine communication to be as effective as human-to-human communication, research on speech emotion recognition is essential. Among the models and the classifiers used to recognize emotions, neural networks appear to be promising due to the network’s ability to learn and the diversity in configuration. Following the convolutional neural network, a capsule neural network (CapsNet) with inputs and outputs that are not scalar quantities but vectors allows the network to determine the part-whole relationships that are specific 6 for an object. This paper performs speech emotion recognition based on CapsNet. The corpora for speech emotion recognition have been augmented by… More >

Displaying 10061-10070 on page 1007 of 22233. Per Page