Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,115)
  • Open Access

    ARTICLE

    Secured ECG Signal Transmission Using Optimized EGC with Chaotic Neural Network in WBSN

    Ishani Mishra1,*, Sanjay Jain2, Vivek Maik3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.025999

    Abstract In wireless body sensor network (WBSN), the set of electrocardiogram (ECG) data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient. While transmitting these collected data some adversaries may capture and misuse it due to the compromise of security. So, the major aim of this work is to enhance secure transmission of ECG signal in WBSN. To attain this goal, we present Pity Beetle Swarm Optimization Algorithm (PBOA) based Elliptic Galois Cryptography (EGC) with Chaotic Neural Network. To optimize the key generation process in Elliptic Curve Cryptography… More >

  • Open Access

    ARTICLE

    Speech Separation Methodology for Hearing Aid

    Joseph Sathiadhas Esra1,*, Y. Sukhi2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1659-1678, 2023, DOI:10.32604/csse.2023.025969

    Abstract In the design of hearing aids (HA), the real-time speech-enhancement is done. The digital hearing aids should provide high signal-to-noise ratio, gain improvement and should eliminate feedback. In generic hearing aids the performance towards different frequencies varies and non uniform. Existing noise cancellation and speech separation methods drops the voice magnitude under the noise environment. The performance of the HA for frequency response is non uniform. Existing noise suppression methods reduce the required signal strength also. So, the performance of uniform sub band analysis is poor when hearing aid is concern. In this paper, a speech separation method using Non-negative… More >

  • Open Access

    ARTICLE

    A Virtual Cloud Storage Architecture for Enhanced Data Security

    M. Antony Joans Kumar1,*, C. Christopher Columbus2, E. Ben George3, T. Ajith Bosco Raj4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1735-1747, 2023, DOI:10.32604/csse.2023.025906

    Abstract The sensitive data stored in the public cloud by privileged users, such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and hackers. The proposed Virtual Cloud Storage Architecture is primarily concerned with data integrity and confidentiality, as well as availability. To provide confidentiality and availability, the file to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct chunks. Hashing the encoded chunks ensured the file integrity, and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk storage. The… More >

  • Open Access

    ARTICLE

    Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network

    S. Sivanantham1,*, V. Mohanraj2, Y. Suresh2, J. Senthilkumar2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1617-1631, 2023, DOI:10.32604/csse.2023.025893

    Abstract In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a… More >

  • Open Access

    ARTICLE

    Single Band EBG Antenna for Wireless Power Transfer Applications

    A. M. Almohaimeed1, El Amjed Hajlaoui1,2,*, Ziyad M. Almohaimeed1

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1409-1417, 2023, DOI:10.32604/csse.2023.025738

    Abstract This work demonstrates the design of a single band Electromagnetic Band Gap (EBG) antenna by employing an open stub EBG microstrip of a patch antenna for better achievements in terms of its performance to be utilized in a reconfigurable harvester to operate over a wide input power range. The EBG antenna has been used to gather RF energy and a FET-transistor has been obtainable to determine and control the power flow with the intention to operate at the same time for a different level of input power. The measured data of the EBG antenna shows a directivity of 8.52 dBi,… More >

  • Open Access

    ARTICLE

    Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

    Christy James Jose1,*, M. S. Rajasree2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1357-1372, 2023, DOI:10.32604/csse.2023.025672

    Abstract The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’ identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s (GWCK-CC). First, a Gaussian Weighted… More >

  • Open Access

    ARTICLE

    Big Data Analytics with Optimal Deep Learning Model for Medical Image Classification

    Tariq Mohammed Alqahtani*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1433-1449, 2023, DOI:10.32604/csse.2023.025594

    Abstract In recent years, huge volumes of healthcare data are getting generated in various forms. The advancements made in medical imaging are tremendous owing to which biomedical image acquisition has become easier and quicker. Due to such massive generation of big data, the utilization of new methods based on Big Data Analytics (BDA), Machine Learning (ML), and Artificial Intelligence (AI) have become essential. In this aspect, the current research work develops a new Big Data Analytics with Cat Swarm Optimization based deep Learning (BDA-CSODL) technique for medical image classification on Apache Spark environment. The aim of the proposed BDA-CSODL technique is… More >

  • Open Access

    ARTICLE

    Genetic-Chicken Swarm Algorithm for Minimizing Energy in Wireless Sensor Network

    A. Jameer Basha1, S. Aswini1, S. Aarthini1, Yunyoung Nam2,*, Mohamed Abouhawwash3,4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1451-1466, 2023, DOI:10.32604/csse.2023.025503

    Abstract Wireless Sensor Network (WSN) technology is the real-time application that is growing rapidly as the result of smart environments. Battery power is one of the most significant resources in WSN. For enhancing a power factor, the clustering techniques are used. During the forward of data in WSN, more power is consumed. In the existing system, it works with Load Balanced Clustering Method (LBCM) and provides the lifespan of the network with scalability and reliability. In the existing system, it does not deal with end-to-end delay and delivery of packets. For overcoming these issues in WSN, the proposed Genetic Algorithm based… More >

  • Open Access

    ARTICLE

    Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks

    R.M. Bhavadharini1,*, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1233-1250, 2023, DOI:10.32604/csse.2023.025461

    Abstract With recent advancements made in wireless communication techniques, wireless sensors have become an essential component in both data collection as well as tracking applications. Wireless Sensor Network (WSN) is an integral part of Internet of Things (IoT) and it encounters different kinds of security issues. Blockchain is designed as a game changer for highly secure and effective digital society. So, the current research paper focuses on the design of Metaheuristic-based Clustering with Routing Protocol for Blockchain-enabled WSN abbreviated as MCRP-BWSN. The proposed MCRP-BWSN technique aims at deriving a shared memory scheme using blockchain technology and determine the optimal paths to… More >

  • Open Access

    ARTICLE

    Rice Bacterial Infection Detection Using Ensemble Technique on Unmanned Aerial Vehicles Images

    Sathit Prasomphan*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 991-1007, 2023, DOI:10.32604/csse.2023.025452

    Abstract Establishing a system for measuring plant health and bacterial infection is critical in agriculture. Previously, the farmers themselves, who observed them with their eyes and relied on their experience in analysis, which could have been incorrect. Plant inspection can determine which plants reflect the quantity of green light and near-infrared using infrared light, both visible and eye using a drone. The goal of this study was to create algorithms for assessing bacterial infections in rice using images from unmanned aerial vehicles (UAVs) with an ensemble classification technique. Convolution neural networks in unmanned aerial vehicles image were used. To convey this… More >

Displaying 7491-7500 on page 750 of 22115. Per Page