Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Design of Miniature UWB-Based Antenna by Employing a Tri-Sectional SIR Feeder

    Ehab Dh. Hussein1,*, Yaqeen S. Mezaal2, Oguz Bayat1

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1157-1172, 2022, DOI:10.32604/csse.2022.021205

    Abstract A novel ultra-wideband (UWB)-based microstrip antenna is presented in this work by using a slotted patch resonator, a tri-sectional stepped impedance resonator (SIR) feeder, as well as a reduced ground plane. The whole structure was realized on an FR4 substrate. The impact of incorporating several cases of ground planes on the input reflection has been thoroughly investigated under the same tri-sectional SIR feeder and by employing a slotted patch radiator. Since the complete ground plane presents an inadequate frequency response, by reducing the ground plane, the induced UWB responses are apparent while the antenna exhibits higher impedance bandwidth. The impact… More >

  • Open Access

    ARTICLE

    A Hybrid Heuristic Algorithm for Solving COVID-19’s Social Distancing at Universities Campus

    Hassan Al-Tarawneh1, Khalid Al-Kaabneh1, Aysh Alhroob2, Hazem Migdady3, Issam Alhadid4,*

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 933-944, 2022, DOI:10.32604/csse.2022.021078

    Abstract Social distancing during COVID-19 has become one of the most important measures in reducing the risks of the spread of the virus. Implementing these measures at universities is crucial and directly related to the physical attendance of the populations of students, professors, employees, and other members on campus. This research proposes an automated scheduling approach that can help universities and schools comply with the social distancing regulations by providing assistance in avoiding huge assemblages of people. Furthermore, this paper proposes a novel course timetable-scheduling scheme based on four main constraints. First, a distance of two meters must be maintained between… More >

  • Open Access

    ARTICLE

    Cost Effective Decentralized Key Management Framework for IoT

    Raja Lavanya*, K. Sundarakantham, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1057-1070, 2022, DOI:10.32604/csse.2022.021052

    Abstract Security is a primary concern in communication for reliable transfer of information between the authenticated members, which becomes more complex in a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique with Multicast and Unicast key management protocol (BMU-IOT) for decentralized networks has been proposed. The first part of the proposed work is to divide the network into clusters where sensors are connected to and is administered by cluster head. Each sensor securely shares its secret keys with the cluster head using unicast. Based on these decryption keys, the… More >

  • Open Access

    ARTICLE

    Fuzzy Based Reliable Load Balanced Routing Approach for Ad hoc Sensor Networks

    J. V. Anchitaalagammai1,*, Rajesh Verma2, M. Kavitha3, A. R. Revathi4, S. R. Preethi5, Kiranmai Bellam6

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 861-874, 2022, DOI:10.32604/csse.2022.021049

    Abstract Energy management and packet delivery rate are the important factors in ad hoc networks. It is the major network where nodes share the information without administration. Due to the mobility of nodes, maximum energy is spent on transmission of packets. Mostly energy is wasted on packet dropping and false route discovery. In this research work, Fuzzy Based Reliable Load Balanced Routing Approach (RLRA) is proposed to provide high energy efficiency and more network lifetime using optimal multicast route discovery mechanism. It contains three phases. In first phase, optimal multicast route discovery is initiated to resolve the link failures. In second… More >

  • Open Access

    ARTICLE

    Object Tracking-Based “Follow-Me” Unmanned Aerial Vehicle (UAV) System

    Olubukola D. Adekola1,*, Onyedikachi Kenny Udekwu2, Oluwatobi Tolulope Saliu2, Damilola Williams Dada2, Stephen O. Maitanmi1, Victor Odumuyiwa3, Olujimi Alao2, Monday Eze2, Funmilayo Abibat Kasali4, Ayokunle Omotunde2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 875-890, 2022, DOI:10.32604/csse.2022.021029

    Abstract The applications of information technology (IT) tools and techniques have, over the years, simplified complex problem solving procedures. But the power of automation is inhibited by the technicality in manning advanced equipment. To this end, tools deliberately combating this inhibition and advancing technological growth are the Unmanned Aerial Vehicles (UAVs). UAVs are rapidly taking over major industries such as logistics, security, and cinematography. Among others, this is a very efficient way of carrying out missions unconventional to humans. An application area of this technology is the local film industry which is not producing quality movies primarily due to the lack… More >

  • Open Access

    ARTICLE

    Automated Teller Machine Authentication Using Biometric

    Shumukh M. Aljuaid*, Arshiya S. Ansari

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.020785

    Abstract This paper presents a novel method of a secured card-less Automated Teller Machine (ATM) authentication based on the three bio-metrics measures. It would help in the identification and authorization of individuals and would provide robust security enhancement. Moreover, it would assist in providing identification in ways that cannot be impersonated. To the best of our knowledge, this method of Biometric_ fusion way is the first ATM security algorithm that utilizes a fusion of three biometric features of an individual such as Fingerprint, Face, and Retina simultaneously for recognition and authentication. These biometric images have been collected as input data for… More >

  • Open Access

    ARTICLE

    Profile and Rating Similarity Analysis for Recommendation Systems Using Deep Learning

    Lakshmi Palaniappan1,*, K. Selvaraj2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 903-917, 2022, DOI:10.32604/csse.2022.020670

    Abstract Recommendation systems are going to be an integral part of any E-Business in near future. As in any other E-business, recommendation systems also play a key role in the travel business where the user has to be recommended with a restaurant that best suits him. In general, the recommendations to a user are made based on similarity that exists between the intended user and the other users. This similarity can be calculated either based on the similarity between the user profiles or the similarity between the ratings made by the users. First phase of this work concentrates on experimentally analyzing… More >

  • Open Access

    ARTICLE

    Clustering Gene Expression Data Through Modified Agglomerative M-CURE Hierarchical Algorithm

    E. Kavitha1,*, R. Tamilarasan2, N. Poonguzhali3, M. K. Jayanthi Kannan4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1027-141, 2022, DOI:10.32604/csse.2022.020634

    Abstract Gene expression refers to the process in which the gene information is used in the functional gene product synthesis. They basically encode the proteins which in turn dictate the functionality of the cell. The first step in gene expression study involves the clustering usage. This is due to the reason that biological networks are very complex and the genes volume increases the comprehending challenges along with the data interpretation which itself inhibit vagueness, noise and imprecision. For a biological system to function, the essential cellular molecules must interact with its surrounding including RNA, DNA, metabolites and proteins. Clustering methods will… More >

  • Open Access

    ARTICLE

    Digital Mammogram Inferencing System Using Intuitionistic Fuzzy Theory

    Susmita Mishra1,*, M. Prakash2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1099-1115, 2022, DOI:10.32604/csse.2022.020439

    Abstract In the medical field, the detection of breast cancer may be a mysterious task. Physicians must deduce a conclusion from a significantly vague knowledge base. A mammogram can offer early diagnosis at a low cost if the breasts' satisfactory mammogram images are analyzed. A multi-decision Intuitionistic Fuzzy Evidential Reasoning (IFER) approach is introduced in this paper to deal with imprecise mammogram classification efficiently. The proposed IFER approach combines intuitionistic trapezoidal fuzzy numbers and inclusion measures to improve representation and reasoning accuracy. The results of the proposed technique are approved through simulation. The simulation is created utilizing MATLAB software. The screening… More >

  • Open Access

    ARTICLE

    Energy Efficient QoS Aware Cluster Based Multihop Routing Protocol for WSN

    M.S. Maharajan1,*, T. Abirami2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1173-1189, 2022, DOI:10.32604/csse.2022.020312

    Abstract Wireless sensor networks (WSN) have become a hot research area owing to the unique characteristics and applicability in diverse application areas. Clustering and routing techniques can be considered as an NP hard optimization problem, which can be addressed by metaheuristic optimization algorithms. With this motivation, this study presents a chaotic sandpiper optimization algorithm based clustering with groundwater flow optimization based routing technique (CSPOC-GFLR). The goal of the CSOC-GFLR technique is to cluster the sensor nodes in WSN and elect an optimal set of routes with an intention of achieving energy efficiency and maximizing network lifetime. The CSPOC algorithm is derived… More >

Displaying 10071-10080 on page 1008 of 22225. Per Page