Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Desertification Detection in Makkah Region based on Aerial Images Classification

    Yahia Said1,2,*, Mohammad Barr1, Taoufik Saidani2,3, Mohamed Atri2,4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 607-618, 2022, DOI:10.32604/csse.2022.018479 - 09 September 2021

    Abstract Desertification has become a global threat and caused a crisis, especially in Middle Eastern countries, such as Saudi Arabia. Makkah is one of the most important cities in Saudi Arabia that needs to be protected from desertification. The vegetation area in Makkah has been damaged because of desertification through wind, floods, overgrazing, and global climate change. The damage caused by desertification can be recovered provided urgent action is taken to prevent further degradation of the vegetation area. In this paper, we propose an automatic desertification detection system based on Deep Learning techniques. Aerial images are More >

  • Open Access

    ARTICLE

    Organizational Data Breach: Building Conscious Care Behavior in Incident Response

    Adlyn Adam Teoh1, Norjihan Binti Abdul Ghani1,*, Muneer Ahmad1, Nz Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 505-515, 2022, DOI:10.32604/csse.2022.018468 - 09 September 2021

    Abstract Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study More >

  • Open Access

    ARTICLE

    Integrated Random Early Detection for Congestion Control at the Router Buffer

    Ahmad Adel Abu-Shareha*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 719-734, 2022, DOI:10.32604/csse.2022.018369 - 09 September 2021

    Abstract This paper proposed an Integrated Random Early Detection (IRED) method that aims to resolve the problems of the queue-based AQM and load-based AQM and gain the benefits of both using indicators from both types. The arrival factor (e.g., arrival rate, queue and capacity) and the departure factors are used to estimate the congestion through two integrated indicators. The utilized indicators are mathematically calculated and integrated to gain unified and coherent congestion indicators. Besides, IRED is built based on a new dropping calculation approach that fits the utilized congestion indicators while maintaining the intended buffer management More >

  • Open Access

    ARTICLE

    Intelligent Identification and Resolution of Software Requirement Conflicts: Assessment and Evaluation

    Maysoon Aldekhail1, Marwah Almasri2,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 469-489, 2022, DOI:10.32604/csse.2022.018269 - 09 September 2021

    Abstract Considerable research has demonstrated how effective requirements engineering is critical for the success of software projects. Requirements engineering has been established and recognized as one of the most important aspects of software engineering as of late. It is noteworthy to mention that requirement consistency is a critical factor in project success, and conflicts in requirements lead to waste of cost, time, and effort. A considerable number of research studies have shown the risks and problems caused by working with requirements that are in conflict with other requirements. These risks include running overtime or over budget,… More >

  • Open Access

    ARTICLE

    Applying Non-Local Means Filter on Seismic Exploration

    Mustafa Youldash1, Saleh Al-Dossary2,*, Lama AlDaej1, Farah AlOtaibi1, Asma AlDubaikil1, Noora AlBinali1, Maha AlGhamdi1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 619-628, 2022, DOI:10.32604/csse.2022.017733 - 09 September 2021

    Abstract The seismic reflection method is one of the most important methods in geophysical exploration. There are three stages in a seismic exploration survey: acquisition, processing, and interpretation. This paper focuses on a pre-processing tool, the Non-Local Means (NLM) filter algorithm, which is a powerful technique that can significantly suppress noise in seismic data. However, the domain of the NLM algorithm is the whole dataset and 3D seismic data being very large, often exceeding one terabyte (TB), it is impossible to store all the data in Random Access Memory (RAM). Furthermore, the NLM filter would require More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663 - 09 September 2021

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad… More >

  • Open Access

    ARTICLE

    Mammogram Learning System for Breast Cancer Diagnosis Using Deep Learning SVM

    G. Jayandhi1,*, J.S. Leena Jasmine2, S. Mary Joans2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 491-503, 2022, DOI:10.32604/csse.2022.016376 - 09 September 2021

    Abstract The most common form of cancer for women is breast cancer. Recent advances in medical imaging technologies increase the use of digital mammograms to diagnose breast cancer. Thus, an automated computerized system with high accuracy is needed. In this study, an efficient Deep Learning Architecture (DLA) with a Support Vector Machine (SVM) is designed for breast cancer diagnosis. It combines the ideas from DLA with SVM. The state-of-the-art Visual Geometric Group (VGG) architecture with 16 layers is employed in this study as it uses the small size of 3 × 3 convolution filters that reduces… More >

  • Open Access

    ARTICLE

    Deep Learning Based License Plate Number Recognition for Smart Cities

    T. Vetriselvi1, E. Laxmi Lydia2, Sachi Nandan Mohanty3,4, Eatedal Alabdulkreem5, Shaha Al-Otaibi6, Amal Al-Rasheed6, Romany F. Mansour7,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 2049-2064, 2022, DOI:10.32604/cmc.2022.020110 - 07 September 2021

    Abstract Smart city-aspiring urban areas should have a number of necessary elements in place to achieve the intended objective. Precise controlling and management of traffic conditions, increased safety and surveillance, and enhanced incident avoidance and management should be top priorities in smart city management. At the same time, Vehicle License Plate Number Recognition (VLPNR) has become a hot research topic, owing to several real-time applications like automated toll fee processing, traffic law enforcement, private space access control, and road traffic surveillance. Automated VLPNR is a computer vision-based technique which is employed in the recognition of automobiles… More >

  • Open Access

    ARTICLE

    Secure Rotation Invariant Face Detection System for Authentication

    Amit Verma1, Mohammed Baljon2, Shailendra Mishra2,*, Iqbaldeep Kaur1, Ritika Saini1, Sharad Saxena3, Sanjay Kumar Sharma4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1955-1974, 2022, DOI:10.32604/cmc.2022.020084 - 07 September 2021

    Abstract Biometric applications widely use the face as a component for recognition and automatic detection. Face rotation is a variable component and makes face detection a complex and challenging task with varied angles and rotation. This problem has been investigated, and a novice algorithm, namely RIFDS (Rotation Invariant Face Detection System), has been devised. The objective of the paper is to implement a robust method for face detection taken at various angle. Further to achieve better results than known algorithms for face detection. In RIFDS Polar Harmonic Transforms (PHT) technique is combined with Multi-Block Local Binary… More >

  • Open Access

    ARTICLE

    Data Traffic Reduction with Compressed Sensing in an AIoT System

    Hye-Min Kwon1, Seng-Phil Hong2, Mingoo Kang1, Jeongwook Seo1,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1769-1780, 2022, DOI:10.32604/cmc.2022.020027 - 07 September 2021

    Abstract To provide Artificial Intelligence (AI) services such as object detection, Internet of Things (IoT) sensor devices should be able to send a large amount of data such as images and videos. However, this inevitably causes IoT networks to be severely overloaded. In this paper, therefore, we propose a novel oneM2M-compliant Artificial Intelligence of Things (AIoT) system for reducing overall data traffic and offering object detection. It consists of some IoT sensor devices with random sampling functions controlled by a compressed sensing (CS) rate, an IoT edge gateway with CS recovery and domain transform functions related… More >

Displaying 16461-16470 on page 1647 of 31561. Per Page