Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Development of Efficient Classification Systems for the Diagnosis of Melanoma

    S. Palpandi1,*, T. Meeradevi2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 361-371, 2022, DOI:10.32604/csse.2022.021412

    Abstract Skin cancer is usually classified as melanoma and non-melanoma. Melanoma now represents 75% of humans passing away worldwide and is one of the most brutal types of cancer. Previously, studies were not mainly focused on feature extraction of Melanoma, which caused the classification accuracy. However, in this work, Histograms of orientation gradients and local binary patterns feature extraction procedures are used to extract the important features such as asymmetry, symmetry, boundary irregularity, color, diameter, etc., and are removed from both melanoma and non-melanoma images. This proposed Efficient Classification Systems for the Diagnosis of Melanoma (ECSDM) framework consists of different schemes… More >

  • Open Access

    ARTICLE

    Enhancement of E-commerce Service by Designing Last Mile Delivery Platform

    Ali Alkhalifah*, Fadwa Alorini, Reef Alturki

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 49-67, 2022, DOI:10.32604/csse.2022.021326

    Abstract The revolution of technology and the rapid evolution of the digital world had a significant effect on the development and expansion of e-commerce. Last mile delivery, for which different app-based delivery services have recently emerged, is a new area of research that is not thoroughly addressed. Delivery service is one of the supporting platforms of e-commerce. One of the delivery issues is that many customers experience difficulties in communicating and coordinating with the logistics companies responsible for the delivery service. This challenge is emphasized in this study which introduces a new system to facilitate communication and coordination between customers and… More >

  • Open Access

    ARTICLE

    Hybridized Wrapper Filter Using Deep Neural Network for Intrusion Detection

    N. Venkateswaran1,*, K. Umadevi2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 1-14, 2022, DOI:10.32604/csse.2022.021217

    Abstract Huge data over the cloud computing and big data are processed over the network. The data may be stored, send, altered and communicated over the network between the source and destination. Once data send by source to destination, before reaching the destination data may be attacked by any intruders over the network. The network has numerous routers and devices to connect to internet. Intruders may attack any were in the network and breaks the original data, secrets. Detection of attack in the network became interesting task for many researchers. There are many intrusion detection feature selection algorithm has been suggested… More >

  • Open Access

    ARTICLE

    Aero-Engine Surge Fault Diagnosis Using Deep Neural Network

    Kexin Zhang1, Bin Lin2,*, Jixin Chen1, Xinlong Wu1, Chao Lu3, Desheng Zheng1, Lulu Tian4

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 351-360, 2022, DOI:10.32604/csse.2022.021132

    Abstract Deep learning techniques have outstanding performance in feature extraction and model fitting. In the field of aero-engine fault diagnosis, the introduction of deep learning technology is of great significance. The aero-engine is the heart of the aircraft, and its stable operation is the primary guarantee of the aircraft. In order to ensure the normal operation of the aircraft, it is necessary to study and diagnose the faults of the aero-engine. Among the many engine failures, the one that occurs more frequently and is more hazardous is the wheeze, which often poses a great threat to flight safety. On the basis… More >

  • Open Access

    ARTICLE

    Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

    Gowdham Chinnaraju*, S. Nithyanandam

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 373-386, 2022, DOI:10.32604/csse.2022.020993

    Abstract Wireless Sensor Networks (WSNs) gained wide attention in the past decade, thanks to its attractive features like flexibility, monitoring capability, and scalability. It overcomes the crucial problems experienced in network management and facilitates the development of diverse network architectures. The existence of dynamic and adaptive routing features facilitate the quick formation of such networks. But flexible architecture also makes it highly vulnerable to different sorts of attacks, for instance, Denial of Service (DoS). Grey Hole Attack (GHA) is the most crucial attack types since it creates a heavy impact upon the components of WSN and eventually degrades the performance of… More >

  • Open Access

    ARTICLE

    5G Data Offloading Using Fuzzification with Grasshopper Optimization Technique

    V. R. Balaji1,*, T. Kalavathi2, J. Vellingiri3, N. Rajkumar4, Venkat Prasad Padhy5

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 289-301, 2022, DOI:10.32604/csse.2022.020971

    Abstract Data offloading at the network with less time and reduced energy consumption are highly important for every technology. Smart applications process the data very quickly with less power consumption. As technology grows towards 5G communication architecture, identifying a solution for QoS in 5G through energy-efficient computing is important. In this proposed model, we perform data offloading at 5G using the fuzzification concept. Mobile IoT devices create tasks in the network and are offloaded in the cloud or mobile edge nodes based on energy consumption. Two base stations, small (SB) and macro (MB) stations, are initialized and the first tasks randomly… More >

  • Open Access

    ARTICLE

    Adaptive Server Load Balancing in SDN Using PID Neural Network Controller

    R. Malavika1,*, M. L. Valarmathi2

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 229-243, 2022, DOI:10.32604/csse.2022.020947

    Abstract Web service applications are increasing tremendously in support of high-level businesses. There must be a need of better server load balancing mechanism for improving the performance of web services in business. Though many load balancing methods exist, there is still a need for sophisticated load balancing mechanism for not letting the clients to get frustrated. In this work, the server with minimum response time and the server having less traffic volume were selected for the aimed server to process the forthcoming requests. The Servers are probed with adaptive control of time with two thresholds L and U to indicate the… More >

  • Open Access

    ARTICLE

    Machine Learning Technique to Detect Radiations in the Brain

    E. Gothai1,*, A. Baseera2, P. Prabu3, K. Venkatachalam4, K. Saravanan5, S. SathishKumar6

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 149-163, 2022, DOI:10.32604/csse.2022.020619

    Abstract The brain of humans and other organisms is affected in various ways through the electromagnetic field (EMF) radiations generated by mobile phones and cell phone towers. Morphological variations in the brain are caused by the neurological changes due to the revelation of EMF. Cellular level analysis is used to measure and detect the effect of mobile radiations, but its utilization seems very expensive, and it is a tedious process, where its analysis requires the preparation of cell suspension. In this regard, this research article proposes optimal broadcasting learning to detect changes in brain morphology due to the revelation of EMF.… More >

  • Open Access

    ARTICLE

    Protecting Data Mobility in Cloud Networks Using Metadata Security

    R. Punithavathi1,*, M. Kowsigan2, R. Shanthakumari3, Miodrag Zivkovic4, Nebojsa Bacanin4, Marko Sarac4

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 105-120, 2022, DOI:10.32604/csse.2022.020486

    Abstract At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data. Sometimes, data may have highly sensitive information, leading users to consider using big data and cloud processing regardless of whether they are secured are not. Threats to sensitive data in cloud systems produce high risks, and existing security methods do not provide enough security to sensitive user data in cloud and big data environments. At present, several security solutions support cloud systems. Some of… More >

  • Open Access

    ARTICLE

    Performance Enhancement of PV Based Boost Cascaded Fifteen Level Inverter for AC Loads

    M. P. Viswanathan*, B. Anand

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 165-181, 2022, DOI:10.32604/csse.2022.020400

    Abstract In this research work, single-stage fifteen levels cascaded DC-interface converter (CDDCLC) is proposed for sun arranged photovoltaic technology (PV) applications. The proposed geography is joined with help DC chopper and H-associate inverter to upgrade the power converter to accomplish the diminished harmonic profile. In assessment with the customary inverter structures, the proposed system is used with diminished voltage stress, decreased switch count and DC source tally. The proposed research work with cascaded DC link converter design requires three DC sources for combining fifteen-level AC output. This investigation structure switching technique is phase opposition and disposition pulse width modulation technique (POPD)… More >

Displaying 9741-9750 on page 975 of 22098. Per Page