Open Access
ARTICLE
David Corral-Plaza1, Juan Boubeta-Puig1, Guadalupe Ortiz1, Alfonso Garcia-de-Prado2,*
Computer Systems Science and Engineering, Vol.35, No.1, pp. 5-12, 2020, DOI:10.32604/csse.2020.35.005
Abstract Air pollution is currently receiving more attention by international governments and organizations. Nevertheless, current systems for air quality monitoring
lack essential requirements which are key in order to be effective concerning users’ access to the information and efficient regarding real-time monitoring
and notification. This paper presents an Internet of Things platform for air station remote sensing and smart monitoring that combines Big Data and Cloud
Computing paradigms to process and correlate air pollutant concentrations coming from multiple remote stations, as well as to trigger automatic and
personalized alerts when a health risk for their particular context is detected. This platform… More >
Open Access
ARTICLE
Ridvan Saraçoğlu*, Ahmet Fatih Kazankaya†
Computer Systems Science and Engineering, Vol.35, No.1, pp. 13-19, 2020, DOI:10.32604/csse.2020.35.013
Abstract The genetic algorithm (GA) is a metaheuristic method which simulates the life cycle and the survival of the fittest in the nature for solving optimization
problems. This study aimed to develop enhanced operation by modifying the current GA. This development process includes an adaptation method that
contains certain developments and adds a new process to the classic algorithm. Individuals of a population will be trialed to adapt to the current solution of
the problem by taking them separately for each generation. With this adaptation method, it is more likely to get better results in a shorter time. Experimental
results show… More >
Open Access
ARTICLE
Sa’ed Abed∗, Mohammed H. Ali†, Mohammad Al-Shayeji‡
Computer Systems Science and Engineering, Vol.35, No.1, pp. 21-37, 2020, DOI:10.32604/csse.2020.35.021
Abstract Today, there is a growing demand for computer vision and image processing in different areas and applications such as military surveillance, and biological
and medical imaging. Edge detection is a vital image processing technique used as a pre-processing step in many computer vision algorithms. However, the
presence of noise makes the edge detection task more challenging; therefore, an image restoration technique is needed to tackle this obstacle by presenting an
adaptive solution. As the complexity of processing is rising due to recent high-definition technologies, the expanse of data attained by the image is increasing
dramatically. Thus, increased processing power is… More >
Open Access
ARTICLE
Swathypriyadharsini P1,∗, K.Premalatha2,†
Computer Systems Science and Engineering, Vol.35, No.1, pp. 39-50, 2020, DOI:10.32604/csse.2020.35.039
Abstract Microarrays have reformed biotechnological research in the past decade. Deciphering the hidden patterns in gene expression data proffers a prodigious
preference to strengthen the understanding of functional genomics. The complexity of biological networks with larger volume of genes also increases the
challenges of comprehending and interpretation of the resulting mass of data. Clustering addresses these challenges, which is essential in the data mining
process to reveal natural structures and identify interesting patterns in the underlying data. The clustering of gene expression data has been proven to be
useful in making known the natural structure inherent in gene expression data, understanding… More >
Open Access
ARTICLE
Poomagal C T1,∗, Sathish kumar G A2, Deval Mehta3
Computer Systems Science and Engineering, Vol.35, No.1, pp. 51-63, 2020, DOI:10.32604/csse.2020.35.051
Abstract The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications
are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the
most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks
from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic
Curve Cryptography(ECC) for multi-level Public Key Exchange and Encryption Mechanism. It also… More >