Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment

    V. Rajkumar1,*, M. Prakash2, V. Vennila3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 779-793, 2022, DOI:10.32604/csse.2022.019622

    Abstract Cloud storage is an incipient technology in today’s world. Lack of security in cloud environment is one of the primary challenges faced these days. This scenario poses new security issues and it forms the crux of the current work. The current study proposes Secure Interactional Proof System (SIPS) to address this challenge. This methodology has a few key essential components listed herewith to strengthen the security such as authentication, confidentiality, access control, integrity and the group of components such as AVK Scheme (Access List, Verifier and Key Generator). It is challenging for every user to prove their identity to the… More >

  • Open Access

    ARTICLE

    Novel Compact UWB Band Notch Antenna Design for Body-Centric Communications

    Sk Raziul Ahasan1, Kaisarul Islam1, Mohammad Monirujjaman Khan1,*, Mehedi Masud2, Gurjot Singh Gaba3, Hesham A. Alhumyani4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 673-689, 2022, DOI:10.32604/csse.2022.019585

    Abstract In this paper, a novel and compact ultra-wideband (UWB) antenna with band-notched characteristics for body-centric communication is examined and implemented. The shape of the designed antenna looks like a ‘swan’ with a slotted patch. The performance parameters of this antenna for both the free space and on-body scenario for body-centric communication are analyzed and investigated through the simulation process using Computer Simulation Technology (CST). This antenna can avoid the interference caused by Wireless Local Area Network (WLAN) (5.15–5.825 GHz) and Worldwide Interoperability for Microwave Access (WiMAX) (5.25–5.85 GHz) systems with a band notch because of newly designed UWB antenna is… More >

  • Open Access

    ARTICLE

    ML-Fresh: Novel Routing Protocol in Opportunistic Networks Using Machine Learning

    Puneet Garg*, Ashutosh Dixit, Preeti Sethi

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 703-717, 2022, DOI:10.32604/csse.2022.019557

    Abstract Opportunistic Networks (OppNets) is gaining popularity day-by-day due to their various applications in the real-life world. The two major reasons for its popularity are its suitability to be established without any requirement of additional infrastructure and the ability to tolerate long delays during data communication. Opportunistic Network is also considered as a descendant of Mobile Ad hoc Networks (Manets) and Wireless Sensor Networks (WSNs), therefore, it inherits most of the traits from both mentioned networking techniques. Apart from its popularity, Opportunistic Networks are also starting to face challenges nowadays to comply with the emerging issues of the large size of… More >

  • Open Access

    ARTICLE

    Hardware Chip Performance of CORDIC Based OFDM Transceiver for Wireless Communication

    Amit Kumar1, Adesh Kumar2,*, Geetam Singh Tomar3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 645-659, 2022, DOI:10.32604/csse.2022.019449

    Abstract The fourth-generation (4G) and fifth-generation (5G) wireless communication systems use the orthogonal frequency division multiplexing (OFDM) modulation techniques and subcarrier allocations. The OFDM modulator and demodulator have inverse fast Fourier transform (IFFT) and fast Fourier transform (FFT) respectively. The biggest challenge in IFFT/FFT processor is the computation of imaginary and real values. CORDIC has been proved one of the best rotation algorithms for logarithmic, trigonometric, and complex calculations. The proposed work focuses on the OFDM transceiver hardware chip implementation, in which 8-point to 1024-point IFFT and FFT are used to compute the operations in transmitter and receiver respectively. The coordinate… More >

  • Open Access

    ARTICLE

    Classification and Diagnosis of Lymphoma’s Histopathological Images Using Transfer Learning

    Schahrazad Soltane*, Sameer Alsharif , Salwa M.Serag Eldin

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 629-644, 2022, DOI:10.32604/csse.2022.019333

    Abstract Current cancer diagnosis procedure requires expert knowledge and is time-consuming, which raises the need to build an accurate diagnosis support system for lymphoma identification and classification. Many studies have shown promising results using Machine Learning and, recently, Deep Learning to detect malignancy in cancer cells. However, the diversity and complexity of the morphological structure of lymphoma make it a challenging classification problem. In literature, many attempts were made to classify up to four simple types of lymphoma. This paper presents an approach using a reliable model capable of diagnosing seven different categories of rare and aggressive lymphoma. These Lymphoma types… More >

  • Open Access

    ARTICLE

    Understand Students Feedback Using Bi-Integrated CRF Model Based Target Extraction

    K. Sangeetha1,*, D. Prabha2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 735-747, 2022, DOI:10.32604/csse.2022.019310

    Abstract Educational institutions showing interest to find the opinion of the students about their course and the instructors to enhance the teaching-learning process. For this, most research uses sentiment analysis to track students’ behavior. Traditional sentence-level sentiment analysis focuses on the whole sentence sentiment. Previous studies show that the sentiments alone are not enough to observe the feeling of the students because different words express different sentiments in a sentence. There is a need to extract the targets in a given sentence which helps to find the sentiment towards those targets. Target extraction is the subtask of targeted sentiment analysis. In… More >

  • Open Access

    ARTICLE

    Design of Neural Network Based Wind Speed Prediction Model Using GWO

    R. Kingsy Grace1,*, R. Manimegalai2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 593-606, 2022, DOI:10.32604/csse.2022.019240

    Abstract The prediction of wind speed is imperative nowadays due to the increased and effective generation of wind power. Wind power is the clean, free and conservative renewable energy. It is necessary to predict the wind speed, to implement wind power generation. This paper proposes a new model, named WT-GWO-BPNN, by integrating Wavelet Transform (WT), Back Propagation Neural Network (BPNN) and Grey Wolf Optimization (GWO). The wavelet transform is adopted to decompose the original time series data (wind speed) into approximation and detailed band. GWO – BPNN is applied to predict the wind speed. GWO is used to optimize the parameters… More >

  • Open Access

    ARTICLE

    Fuzzy Based Ant Colony Optimization Scheduling in Cloud Computing

    K. Rajakumari1,*, M.Vinoth Kumar2, Garima Verma3, S. Balu4, Dilip Kumar Sharma5, Sudhakar Sengan6

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 581-592, 2022, DOI:10.32604/csse.2022.019175

    Abstract Cloud computing is an Information Technology deployment model established on virtualization. Task scheduling states the set of rules for task allocations to an exact virtual machine in the cloud computing environment. However, task scheduling challenges such as optimal task scheduling performance solutions, are addressed in cloud computing. First, the cloud computing performance due to task scheduling is improved by proposing a Dynamic Weighted Round-Robin algorithm. This recommended DWRR algorithm improves the task scheduling performance by considering resource competencies, task priorities, and length. Second, a heuristic algorithm called Hybrid Particle Swarm Parallel Ant Colony Optimization is proposed to solve the task… More >

  • Open Access

    ARTICLE

    Hybrid Renewable Energy Source Combined Dynamic Voltage Restorer for Power Quality Improvement

    N. Kanagaraj*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 517-538, 2022, DOI:10.32604/csse.2022.019149

    Abstract In this paper, the hybrid photovoltaic-thermoelectric generator (PV-TEG) combined dynamic voltage restorer (DVR) system is proposed for the power quality disturbances compensation in a single-phase distribution system. The stable and precise level of input voltage is essential for the smooth and trouble-free operation of the electrically sensitive loads which are connected at the utility side to avoid system malfunctions. In this context, the hybrid PV-TEG energy module combined DVR system is proposed in this paper. With the support of the hybrid energy module, the DVR will perform the power quality disturbances compensation effectively with needed voltage and /or power. In… More >

  • Open Access

    ARTICLE

    Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic

    Mohammed Baz1, Sabita Khatri2, Abdullah Baz3, Hosam Alhakami4, Alka Agrawal2, Raees Ahmad Khan2,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 691-702, 2022, DOI:10.32604/csse.2022.019079

    Abstract The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020, provide critical research criteria to assess the vulnerabilities of our current health system. The paper addresses our preparedness for the management of such acute health emergencies and the need to enhance awareness, about public health and healthcare mechanisms. In view of this unprecedented health crisis, distributed ledger and AI technology can be seen as one of the promising alternatives for fighting against such epidemics at the early stages, and with the higher efficacy. At the implementation level,… More >

Displaying 10861-10870 on page 1087 of 22225. Per Page