Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24,593)
  • Open Access

    ARTICLE

    An Improved Range Doppler Algorithm Based on Squint FMCW SAR Imaging

    Qi Chen, Wei Cui*, Jianqiu Sun, Xingguang Li, Xuyu Tian

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 115-126, 2021, DOI:10.32604/iasc.2021.011617 - 07 January 2021

    Abstract The existing range-Doppler algorithms for SAR imaging are affected by a fast-time Doppler effect so they cannot be directly applied to FMCW SAR. Moreover, range migration is more evident in squint mode. To reveal the influence of the continuous motion of FMCW SAR in the squint mode on the echo signal and optimize the imaging process, an improved range-Doppler algorithm is based on squint FMCW SAR imaging is proposed in this paper. Firstly, the imaging geometry model and echo signal model of FMCW SAR are analyzed and deduced. The problem of Doppler center offset under… More >

  • Open Access

    REVIEW

    A Review of Energy-Related Cost Issues and Prediction Models in Cloud Computing Environments

    Mohammad Aldossary*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 353-368, 2021, DOI:10.32604/csse.2021.014974 - 05 January 2021

    Abstract With the expansion of cloud computing, optimizing the energy efficiency and cost of the cloud paradigm is considered significantly important, since it directly affects providers’ revenue and customers’ payment. Thus, providing prediction information of the cloud services can be very beneficial for the service providers, as they need to carefully predict their business growths and efficiently manage their resources. To optimize the use of cloud services, predictive mechanisms can be applied to improve resource utilization and reduce energy-related costs. However, such mechanisms need to be provided with energy awareness not only at the level of More >

  • Open Access

    ARTICLE

    Atrocious Impinging of COVID-19 Pandemic on Software Development Industries

    Wajdi Alhakami1, Ahmed Binmahfoudh2, Abdullah Baz3, Hosam Alhakami4, Md Tarique Jamal Ansari5, Raees Ahmad Khan5,*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 323-338, 2021, DOI:10.32604/csse.2021.014929 - 05 January 2021

    Abstract COVID-19 is the contagious disease transmitted by Coronavirus. The majority of people diagnosed with COVID-19 may suffer from moderate-to- severe respiratory illnesses and stabilize without preferential treatment. Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medical issues including heart disease, diabetes, or chronic breathing problems. The novel Coronavirus has affected not only the physical and mental health of the people but also had adverse impact on their emotional well-being. For months on end now, due to constant monitoring and containment measures to… More >

  • Open Access

    ARTICLE

    Comparative Study of Valency-Based Topological Descriptor for Hexagon Star Network

    Ali N. A. Koam1, Ali Ahmad2,*, M. F. Nadeem3

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 293-306, 2021, DOI:10.32604/csse.2021.014896 - 05 January 2021

    Abstract A class of graph invariants referred to today as topological indices are inefficient progressively acknowledged by scientific experts and others to be integral assets in the depiction of structural phenomena. The structure of an interconnection network can be represented by a graph. In the network, vertices represent the processor nodes and edges represent the links between the processor nodes. Graph invariants play a vital feature in graph theory and distinguish the structural properties of graphs and networks. A topological descriptor is a numerical total related to a structure that portray the topology of structure and… More >

  • Open Access

    ARTICLE

    Blockchain Consistency Check Protocol for Improved Reliability

    Mohammed Alwabel, Youngmi Kwon*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 281-292, 2021, DOI:10.32604/csse.2021.014630 - 05 January 2021

    Abstract Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies. Blockchain achieves security by saving the information of one block in the next block. Changing the information of one block will require changes to all the next block in order for that change to take effect. Which makes it unfeasible for such an attack to happen. However, the structure of how blockchain works makes the last block always vulnerable for attacks, given that its information is not saved yet in any block. This allows malicious node to change… More >

  • Open Access

    ARTICLE

    Cross-Modal Hashing Retrieval Based on Deep Residual Network

    Zhiyi Li1,2,*, Xiaomian Xu2, Du Zhang1, Peng Zhang2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 383-405, 2021, DOI:10.32604/csse.2021.014563 - 05 January 2021

    Abstract In the era of big data rich in We Media, the single mode retrieval system has been unable to meet people’s demand for information retrieval. This paper proposes a new solution to the problem of feature extraction and unified mapping of different modes: A Cross-Modal Hashing retrieval algorithm based on Deep Residual Network (CMHR-DRN). The model construction is divided into two stages: The first stage is the feature extraction of different modal data, including the use of Deep Residual Network (DRN) to extract the image features, using the method of combining TF-IDF with the full… More >

  • Open Access

    ARTICLE

    Clustering Collision Power Attack on RSA-CRT

    Wunan Wan1,*, Jun Chen1, Jinyue Xia2, Jinquan Zhang1, Shibin Zhang1, Hao Chen1

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 417-434, 2021, DOI:10.32604/csse.2021.014460 - 05 January 2021

    Abstract In this paper, we propose two new attack algorithms on RSA implementations with CRT (Chinese remainder theorem). To improve the attack efficiency considerably, a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs. This attack method is that the key parameters dp and dq are segmented by byte, and the modular multiplication collisions are identified by k-means clustering. The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs, and the exponent d was obtained. We also propose a second order clustering collision power analysis attack More >

  • Open Access

    ARTICLE

    Optimal Robust Control for Unstable Delay System

    Rihem Farkh1,2,*, Khaled A. Aljaloud1, Moufida Ksouri2, Faouzi Bouani2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 307-321, 2021, DOI:10.32604/csse.2021.014334 - 05 January 2021

    Abstract Proportional-Integral-Derivative control system has been widely used in industrial applications. For uncertain and unstable systems, tuning controller parameters to satisfy the process requirements is very challenging. In general, the whole system’s performance strongly depends on the controller’s efficiency and hence the tuning process plays a key role in the system’s response. This paper presents a robust optimal Proportional-Integral-Derivative controller design methodology for the control of unstable delay system with parametric uncertainty using a combination of Kharitonov theorem and genetic algorithm optimization based approaches. In this study, the Generalized Kharitonov Theorem (GKT) for quasi-polynomials is employed… More >

  • Open Access

    ARTICLE

    Aligning Education with Vision 2030 Using Augmented Reality

    Raniyah Wazirali*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 339-351, 2021, DOI:10.32604/csse.2021.014301 - 05 January 2021

    Abstract Vision 2030 requires a new generation of people with a wide variety of abilities, talents, and skills. The adoption of augmented reality (AR) and virtual reality is one possible way to align education with Vision 2030. Immersive technologies like AR are rapidly becoming powerful and versatile enough to be adopted in education to achieve this goal. Technologies such as AR could be beneficial tools to enhance maintainable growth in education. We reviewed the most recent studies in augmented reality to check its appropriateness in aligning with the educational goals of Vision 2030. First, the various… More >

  • Open Access

    ARTICLE

    A Quantum Spatial Graph Convolutional Network for Text Classification

    Syed Mustajar Ahmad Shah1, Hongwei Ge1,*, Sami Ahmed Haider2, Muhammad Irshad3, Sohail M. Noman4, Jehangir Arshad5, Asfandeyar Ahmad6, Talha Younas7

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 369-382, 2021, DOI:10.32604/csse.2021.014234 - 05 January 2021

    Abstract The data generated from non-Euclidean domains and its graphical representation (with complex-relationship object interdependence) applications has observed an exponential growth. The sophistication of graph data has posed consequential obstacles to the existing machine learning algorithms. In this study, we have considered a revamped version of a semi-supervised learning algorithm for graph-structured data to address the issue of expanding deep learning approaches to represent the graph data. Additionally, the quantum information theory has been applied through Graph Neural Networks (GNNs) to generate Riemannian metrics in closed-form of several graph layers. In further, to pre-process the adjacency… More >

Displaying 14261-14270 on page 1427 of 24593. Per Page