Home / Journals / CSSE / Vol.35, No.1, 2020
Special Issues
  • Open AccessOpen Access

    ARTICLE

    An Internet of Things Platform for Air Station Remote Sensing and Smart Monitoring

    David Corral-Plaza1, Juan Boubeta-Puig1, Guadalupe Ortiz1, Alfonso Garcia-de-Prado2,*
    Computer Systems Science and Engineering, Vol.35, No.1, pp. 5-12, 2020, DOI:10.32604/csse.2020.35.005
    Abstract Air pollution is currently receiving more attention by international governments and organizations. Nevertheless, current systems for air quality monitoring lack essential requirements which are key in order to be effective concerning users’ access to the information and efficient regarding real-time monitoring and notification. This paper presents an Internet of Things platform for air station remote sensing and smart monitoring that combines Big Data and Cloud Computing paradigms to process and correlate air pollutant concentrations coming from multiple remote stations, as well as to trigger automatic and personalized alerts when a health risk for their particular More >

  • Open AccessOpen Access

    ARTICLE

    Developing an Adaptation Process for Real-Coded Genetic Algorithms

    Ridvan Saraçoğlu*, Ahmet Fatih Kazankaya
    Computer Systems Science and Engineering, Vol.35, No.1, pp. 13-19, 2020, DOI:10.32604/csse.2020.35.013
    Abstract The genetic algorithm (GA) is a metaheuristic method which simulates the life cycle and the survival of the fittest in the nature for solving optimization problems. This study aimed to develop enhanced operation by modifying the current GA. This development process includes an adaptation method that contains certain developments and adds a new process to the classic algorithm. Individuals of a population will be trialed to adapt to the current solution of the problem by taking them separately for each generation. With this adaptation method, it is more likely to get better results in a More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced GPU-Based Anti-Noise Hybrid Edge Detection Method

    Sa’ed Abed, Mohammed H. Ali, Mohammad Al-Shayeji
    Computer Systems Science and Engineering, Vol.35, No.1, pp. 21-37, 2020, DOI:10.32604/csse.2020.35.021
    Abstract Today, there is a growing demand for computer vision and image processing in different areas and applications such as military surveillance, and biological and medical imaging. Edge detection is a vital image processing technique used as a pre-processing step in many computer vision algorithms. However, the presence of noise makes the edge detection task more challenging; therefore, an image restoration technique is needed to tackle this obstacle by presenting an adaptive solution. As the complexity of processing is rising due to recent high-definition technologies, the expanse of data attained by the image is increasing dramatically.… More >

  • Open AccessOpen Access

    ARTICLE

    Impact of Fuzzy Normalization on Clustering Microarray Temporal Datasets Using Cuckoo Search

    Swathypriyadharsini P1,∗, K.Premalatha2,†
    Computer Systems Science and Engineering, Vol.35, No.1, pp. 39-50, 2020, DOI:10.32604/csse.2020.35.039
    Abstract Microarrays have reformed biotechnological research in the past decade. Deciphering the hidden patterns in gene expression data proffers a prodigious preference to strengthen the understanding of functional genomics. The complexity of biological networks with larger volume of genes also increases the challenges of comprehending and interpretation of the resulting mass of data. Clustering addresses these challenges, which is essential in the data mining process to reveal natural structures and identify interesting patterns in the underlying data. The clustering of gene expression data has been proven to be useful in making known the natural structure inherent… More >

  • Open AccessOpen Access

    ARTICLE

    Multi Level Key Exchange and Encryption Protocol for Internet of Things (IoT)

    Poomagal C T1,∗, Sathish kumar G A2, Deval Mehta3
    Computer Systems Science and Engineering, Vol.35, No.1, pp. 51-63, 2020, DOI:10.32604/csse.2020.35.051
    Abstract The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange More >

Per Page:

Share Link