Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Network Traffic Prediction Using Radial Kernelized-Tversky Indexes-Based Multilayer Classifier

    M. Govindarajan1,*, V. Chandrasekaran2, S. Anitha3

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 851-863, 2022, DOI:10.32604/csse.2022.019298 - 24 September 2021

    Abstract Accurate cellular network traffic prediction is a crucial task to access Internet services for various devices at any time. With the use of mobile devices, communication services generate numerous data for every moment. Given the increasing dense population of data, traffic learning and prediction are the main components to substantially enhance the effectiveness of demand-aware resource allocation. A novel deep learning technique called radial kernelized LSTM-based connectionist Tversky multilayer deep structure learning (RKLSTM-CTMDSL) model is introduced for traffic prediction with superior accuracy and minimal time consumption. The RKLSTM-CTMDSL model performs attribute selection and classification processes… More >

  • Open Access

    ARTICLE

    Prediction Model for Coronavirus Pandemic Using Deep Learning

    Mamoona Humayun1,*, Ahmed Alsayat2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 947-961, 2022, DOI:10.32604/csse.2022.019288 - 24 September 2021

    Abstract The recent global outbreak of COVID-19 damaged the world health systems, human health, economy, and daily life badly. None of the countries was ready to face this emerging health challenge. Health professionals were not able to predict its rise and next move, as well as the future curve and impact on lives in case of a similar pandemic situation happened. This created huge chaos globally, for longer and the world is still struggling to come up with any suitable solution. Here the better use of advanced technologies, such as artificial intelligence and deep learning, may… More >

  • Open Access

    ARTICLE

    FPD Net: Feature Pyramid DehazeNet

    Shengchun Wang1, Peiqi Chen1, Jingui Huang1,*, Tsz Ho Wong2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1167-1181, 2022, DOI:10.32604/csse.2022.018911 - 24 September 2021

    Abstract We propose an end-to-end dehazing model based on deep learning (CNN network) and uses the dehazing model re-proposed by AOD-Net based on the atmospheric scattering model for dehazing. Compare to the previously proposed dehazing network, the dehazing model proposed in this paper make use of the FPN network structure in the field of target detection, and uses five feature maps of different sizes to better obtain features of different proportions and different sub-regions. A large amount of experimental data proves that the dehazing model proposed in this paper is superior to previous dehazing technologies in… More >

  • Open Access

    ARTICLE

    Hybrid Active Contour Mammographic Mass Segmentation and Classification

    K. Yuvaraj*, U. S. Ragupathy

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 823-834, 2022, DOI:10.32604/csse.2022.018837 - 24 September 2021

    Abstract This research implements a novel segmentation of mammographic mass. Three methods are proposed, namely, segmentation of mass based on iterative active contour, automatic region growing, and fully automatic mask selection-based active contour techniques. In the first method, iterative threshold is performed for manual cropped preprocessed image, and active contour is applied thereafter. To overcome manual cropping in the second method, an automatic seed selection followed by region growing is performed. Given that the result is only a few images owing to over segmentation, the third method uses a fully automatic active contour. Results of the… More >

  • Open Access

    ARTICLE

    IoT Wireless Intrusion Detection and Network Traffic Analysis

    Vasaki Ponnusamy1, Aun Yichiet1, NZ Jhanjhi2,*, Mamoona humayun3, Maram Fahhad Almufareh3

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 865-879, 2022, DOI:10.32604/csse.2022.018801 - 24 September 2021

    Abstract Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router. Almost every Internet of Things (IoT) devices such as smartphones, drones, and cameras use wireless technology (Infrared, Bluetooth, IrDA, IEEE 802.11, etc.) to establish multiple inter-device connections simultaneously. With the flexibility of the wireless network, one can set up numerous ad-hoc networks on-demand, connecting hundreds to thousands of users, increasing productivity and profitability significantly. However, the number of network attacks in wireless networks that exploit such flexibilities in setting and tearing down networks has become… More >

  • Open Access

    ARTICLE

    On Vertex-Edge-Degree Topological Descriptors for Certain Crystal Networks

    Sadia Husain1, Fouad A. Abolaban2, Ali Ahmad1, Muhammad Ahsan Asim1, Yasir Ahmad1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 835-850, 2022, DOI:10.32604/csse.2022.018534 - 24 September 2021

    Abstract Due to the combinatorial nature of graphs they are used easily in pure sciences and social sciences. The dynamical arrangement of vertices and their associated edges make them flexible (like liquid) to attain the shape of any physical structure or phenomenon easily. In the field of ICT they are used to reflect distributed component and communication among them. Mathematical chemistry is another interesting domain of applied mathematics that endeavors to display the structure of compounds that are formed in result of chemical reactions. This area attracts the researchers due to its applications in theoretical and… More >

  • Open Access

    ARTICLE

    Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

    Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1199-1215, 2022, DOI:10.32604/csse.2022.018518 - 24 September 2021

    Abstract Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT… More >

  • Open Access

    ARTICLE

    Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume

    Norjihan Binti Abdul Ghani1,*, Suraya Hamid1, Muneer Ahmad1, Younes Saadi1, N.Z. Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 913-926, 2022, DOI:10.32604/csse.2022.018467 - 24 September 2021

    Abstract The world health organization (WHO) terms dengue as a serious illness that impacts almost half of the world’s population and carries no specific treatment. Early and accurate detection of spread in affected regions can save precious lives. Despite the severity of the disease, a few noticeable works can be found that involve sentiment analysis to mine accurate intuitions from the social media text streams. However, the massive data explosion in recent years has led to difficulties in terms of storing and processing large amounts of data, as reliable mechanisms to gather the data and suitable… More >

  • Open Access

    ARTICLE

    A Coordination-Based Algorithm for Dedicated Destination Vehicle Routing in B2B E-Commerce

    Tsung-Yin Ou1, Chen-Yang Cheng2, Chun Hsiung Lai3, Hsin-Pin Fu1,*

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 895-911, 2022, DOI:10.32604/csse.2022.018432 - 24 September 2021

    Abstract This paper proposes a solution to the open vehicle routing problem with time windows (OVRPTW) considering third-party logistics (3PL). For the typical OVRPTW problem, most researchers consider time windows, capacity, routing limitations, vehicle destination, etc. Most researchers who previously investigated this problem assumed the vehicle would not return to the depot, but did not consider its final destination. However, by considering 3PL in the B2B e-commerce, the vehicle is required back to the nearest 3PL location with available space. This paper formulates the problem as a mixed integer linear programming (MILP) model with the objective More >

  • Open Access

    ARTICLE

    Heuristic Scheduling of Job Orders in a Build-to-Order Manufacturing System

    Chia-Nan Wang1, Chien-Chang Chou2, Yu-Chi Chung1,*, Nguyen Ky Phuc Phan3, Van Thanh Nguyen4, Viet Tinh Nguyen4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1059-1072, 2022, DOI:10.32604/csse.2022.018259 - 24 September 2021

    Abstract With the continuous development of technology, traditional manual work has been becoming more and more automated. Most large or medium-sized companies have applied Enterprise Resource Planning (ERP) software into their business and production activities. However, since many small firms cannot afford ERP because of its expensive cost, they often still employ manual work for the same tasks this software resolves, especially for scheduling. This paper aims to provide a possible solution for small businesses to try automated scheduling and discover whether it can help much. There are two main ways to make this determination: a… More >

Displaying 16381-16390 on page 1639 of 31589. Per Page