Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Comparative Study of Valency-Based Topological Descriptor for Hexagon Star Network

    Ali N. A. Koam1, Ali Ahmad2,*, M. F. Nadeem3

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 293-306, 2021, DOI:10.32604/csse.2021.014896 - 05 January 2021

    Abstract A class of graph invariants referred to today as topological indices are inefficient progressively acknowledged by scientific experts and others to be integral assets in the depiction of structural phenomena. The structure of an interconnection network can be represented by a graph. In the network, vertices represent the processor nodes and edges represent the links between the processor nodes. Graph invariants play a vital feature in graph theory and distinguish the structural properties of graphs and networks. A topological descriptor is a numerical total related to a structure that portray the topology of structure and… More >

  • Open Access

    ARTICLE

    Blockchain Consistency Check Protocol for Improved Reliability

    Mohammed Alwabel, Youngmi Kwon*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 281-292, 2021, DOI:10.32604/csse.2021.014630 - 05 January 2021

    Abstract Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies. Blockchain achieves security by saving the information of one block in the next block. Changing the information of one block will require changes to all the next block in order for that change to take effect. Which makes it unfeasible for such an attack to happen. However, the structure of how blockchain works makes the last block always vulnerable for attacks, given that its information is not saved yet in any block. This allows malicious node to change… More >

  • Open Access

    ARTICLE

    Cross-Modal Hashing Retrieval Based on Deep Residual Network

    Zhiyi Li1,2,*, Xiaomian Xu2, Du Zhang1, Peng Zhang2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 383-405, 2021, DOI:10.32604/csse.2021.014563 - 05 January 2021

    Abstract In the era of big data rich in We Media, the single mode retrieval system has been unable to meet people’s demand for information retrieval. This paper proposes a new solution to the problem of feature extraction and unified mapping of different modes: A Cross-Modal Hashing retrieval algorithm based on Deep Residual Network (CMHR-DRN). The model construction is divided into two stages: The first stage is the feature extraction of different modal data, including the use of Deep Residual Network (DRN) to extract the image features, using the method of combining TF-IDF with the full… More >

  • Open Access

    ARTICLE

    Clustering Collision Power Attack on RSA-CRT

    Wunan Wan1,*, Jun Chen1, Jinyue Xia2, Jinquan Zhang1, Shibin Zhang1, Hao Chen1

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 417-434, 2021, DOI:10.32604/csse.2021.014460 - 05 January 2021

    Abstract In this paper, we propose two new attack algorithms on RSA implementations with CRT (Chinese remainder theorem). To improve the attack efficiency considerably, a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs. This attack method is that the key parameters dp and dq are segmented by byte, and the modular multiplication collisions are identified by k-means clustering. The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs, and the exponent d was obtained. We also propose a second order clustering collision power analysis attack More >

  • Open Access

    ARTICLE

    Optimal Robust Control for Unstable Delay System

    Rihem Farkh1,2,*, Khaled A. Aljaloud1, Moufida Ksouri2, Faouzi Bouani2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 307-321, 2021, DOI:10.32604/csse.2021.014334 - 05 January 2021

    Abstract Proportional-Integral-Derivative control system has been widely used in industrial applications. For uncertain and unstable systems, tuning controller parameters to satisfy the process requirements is very challenging. In general, the whole system’s performance strongly depends on the controller’s efficiency and hence the tuning process plays a key role in the system’s response. This paper presents a robust optimal Proportional-Integral-Derivative controller design methodology for the control of unstable delay system with parametric uncertainty using a combination of Kharitonov theorem and genetic algorithm optimization based approaches. In this study, the Generalized Kharitonov Theorem (GKT) for quasi-polynomials is employed… More >

  • Open Access

    ARTICLE

    Aligning Education with Vision 2030 Using Augmented Reality

    Raniyah Wazirali*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 339-351, 2021, DOI:10.32604/csse.2021.014301 - 05 January 2021

    Abstract Vision 2030 requires a new generation of people with a wide variety of abilities, talents, and skills. The adoption of augmented reality (AR) and virtual reality is one possible way to align education with Vision 2030. Immersive technologies like AR are rapidly becoming powerful and versatile enough to be adopted in education to achieve this goal. Technologies such as AR could be beneficial tools to enhance maintainable growth in education. We reviewed the most recent studies in augmented reality to check its appropriateness in aligning with the educational goals of Vision 2030. First, the various… More >

  • Open Access

    ARTICLE

    A Quantum Spatial Graph Convolutional Network for Text Classification

    Syed Mustajar Ahmad Shah1, Hongwei Ge1,*, Sami Ahmed Haider2, Muhammad Irshad3, Sohail M. Noman4, Jehangir Arshad5, Asfandeyar Ahmad6, Talha Younas7

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 369-382, 2021, DOI:10.32604/csse.2021.014234 - 05 January 2021

    Abstract The data generated from non-Euclidean domains and its graphical representation (with complex-relationship object interdependence) applications has observed an exponential growth. The sophistication of graph data has posed consequential obstacles to the existing machine learning algorithms. In this study, we have considered a revamped version of a semi-supervised learning algorithm for graph-structured data to address the issue of expanding deep learning approaches to represent the graph data. Additionally, the quantum information theory has been applied through Graph Neural Networks (GNNs) to generate Riemannian metrics in closed-form of several graph layers. In further, to pre-process the adjacency… More >

  • Open Access

    ARTICLE

    Motion-Blurred Image Restoration Based on Joint Invertibility of PSFs

    Yuye Zhang1,*, Jingli Huang1, Jiandong Liu1, Hakeel Ahmed Chohan2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 407-416, 2021, DOI:10.32604/csse.2021.014154 - 05 January 2021

    Abstract To implement restoration in a single motion blurred image, the PSF (Point Spread Function) is difficult to estimate and the image deconvolution is ill-posed as a result that a good recovery effect cannot be obtained. Considering that several different PSFs can get joint invertibility to make restoration well-posed, we proposed a motion-blurred image restoration method based on joint invertibility of PSFs by means of computational photography. Firstly, we designed a set of observation device which composed by multiple cameras with the same parameters to shoot the moving target in the same field of view continuously… More >

  • Open Access

    ARTICLE

    An Adjustable Variant of Round Robin Algorithm Based on Clustering Technique

    Samih M. Mostafa1,*, Hirofumi Amano2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3253-3270, 2021, DOI:10.32604/cmc.2021.014675 - 28 December 2020

    Abstract CPU scheduling is the basic task within any time-shared operating system. One of the main goals of the researchers interested in CPU scheduling is minimizing time cost. Comparing between CPU scheduling algorithms is subject to some scheduling criteria (e.g., turnaround time, waiting time and number of context switches (NCS)). Scheduling policy is divided into preemptive and non-preemptive. Round Robin (RR) algorithm is the most common preemptive scheduling algorithm used in the time-shared operating systems. In this paper, the authors proposed a modified version of the RR algorithm, called dynamic time slice (DTS), to combine the… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594 - 28 December 2020

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to… More >

Displaying 19111-19120 on page 1912 of 31589. Per Page