Open Access
ARTICLE
J. V. Anchitaalagammai1,*, Rajesh Verma2, M. Kavitha3, A. R. Revathi4, S. R. Preethi5, Kiranmai Bellam6
Computer Systems Science and Engineering, Vol.41, No.3, pp. 861-874, 2022, DOI:10.32604/csse.2022.021049
Abstract Energy management and packet delivery rate are the important factors in ad hoc networks. It is the major network where nodes share the information without administration. Due to the mobility of nodes, maximum energy is spent on transmission of packets. Mostly energy is wasted on packet dropping and false route discovery. In this research work, Fuzzy Based Reliable Load Balanced Routing Approach (RLRA) is proposed to provide high energy efficiency and more network lifetime using optimal multicast route discovery mechanism. It contains three phases. In first phase, optimal multicast route discovery is initiated to resolve the link failures. In second… More >
Open Access
ARTICLE
Olubukola D. Adekola1,*, Onyedikachi Kenny Udekwu2, Oluwatobi Tolulope Saliu2, Damilola Williams Dada2, Stephen O. Maitanmi1, Victor Odumuyiwa3, Olujimi Alao2, Monday Eze2, Funmilayo Abibat Kasali4, Ayokunle Omotunde2
Computer Systems Science and Engineering, Vol.41, No.3, pp. 875-890, 2022, DOI:10.32604/csse.2022.021029
(This article belongs to this Special Issue: Advances in Computational Intelligence and its Applications)
Abstract The applications of information technology (IT) tools and techniques have, over the years, simplified complex problem solving procedures. But the power of automation is inhibited by the technicality in manning advanced equipment. To this end, tools deliberately combating this inhibition and advancing technological growth are the Unmanned Aerial Vehicles (UAVs). UAVs are rapidly taking over major industries such as logistics, security, and cinematography. Among others, this is a very efficient way of carrying out missions unconventional to humans. An application area of this technology is the local film industry which is not producing quality movies primarily due to the lack… More >
Open Access
ARTICLE
Parul Gandhi1, Mohammad Zubair Khan2, Ravi Kumar Sharma3, Omar H. Alhazmi2, Surbhi Bhatia4,*, Chinmay Chakraborty5
Computer Systems Science and Engineering, Vol.41, No.3, pp. 891-902, 2022, DOI:10.32604/csse.2022.019943
Abstract Software reliability is the primary concern of software development organizations, and the exponentially increasing demand for reliable software requires modeling techniques to be developed in the present era. Small unnoticeable drifts in the software can culminate into a disaster. Early removal of these errors helps the organization improve and enhance the software’s reliability and save money, time, and effort. Many soft computing techniques are available to get solutions for critical problems but selecting the appropriate technique is a big challenge. This paper proposed an efficient algorithm that can be used for the prediction of software reliability. The proposed algorithm is… More >
Open Access
ARTICLE
Lakshmi Palaniappan1,*, K. Selvaraj2
Computer Systems Science and Engineering, Vol.41, No.3, pp. 903-917, 2022, DOI:10.32604/csse.2022.020670
Abstract Recommendation systems are going to be an integral part of any E-Business in near future. As in any other E-business, recommendation systems also play a key role in the travel business where the user has to be recommended with a restaurant that best suits him. In general, the recommendations to a user are made based on similarity that exists between the intended user and the other users. This similarity can be calculated either based on the similarity between the user profiles or the similarity between the ratings made by the users. First phase of this work concentrates on experimentally analyzing… More >
Open Access
ARTICLE
Fuad A.M. Al-Yarimi1,*, Sami Althahabi1, Majdy Mohammed Eltayeb2
Computer Systems Science and Engineering, Vol.41, No.3, pp. 919-932, 2022, DOI:10.32604/csse.2022.021272
Abstract Cloud resource scheduling is gaining prominence with the increasing trends of reliance on cloud infrastructure solutions. Numerous sets of cloud resource scheduling models were evident in the literature. Cloud resource scheduling refers to the distinct set of algorithms or programs the service providers engage to maintain the service level allocation for various resources over a virtual environment. The model proposed in this manuscript schedules resources of virtual machines under potential volatility aspects, which can be applied for any priority metric chosen by the server administrators. Also, the model can be flexible for any time frame-based analysis of the load factor.… More >
Open Access
ARTICLE
Hassan Al-Tarawneh1, Khalid Al-Kaabneh1, Aysh Alhroob2, Hazem Migdady3, Issam Alhadid4,*
Computer Systems Science and Engineering, Vol.41, No.3, pp. 933-944, 2022, DOI:10.32604/csse.2022.021078
(This article belongs to this Special Issue: Advances in Computational Intelligence and its Applications)
Abstract Social distancing during COVID-19 has become one of the most important measures in reducing the risks of the spread of the virus. Implementing these measures at universities is crucial and directly related to the physical attendance of the populations of students, professors, employees, and other members on campus. This research proposes an automated scheduling approach that can help universities and schools comply with the social distancing regulations by providing assistance in avoiding huge assemblages of people. Furthermore, this paper proposes a novel course timetable-scheduling scheme based on four main constraints. First, a distance of two meters must be maintained between… More >
Open Access
ARTICLE
Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5
Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100
Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of the blockchain, and threaten the… More >
Open Access
ARTICLE
Abhishek Kumar Pandey1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Rajeev Kumar4,*, Raees Ahmad Khan1
Computer Systems Science and Engineering, Vol.41, No.3, pp. 959-974, 2022, DOI:10.32604/csse.2022.021443
Abstract The outbreak of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2 virus or COVID-19) disease was declared pandemic by the World Health Organization (WHO) on March 11, 2020. COVID-19 has already affected more than 211 nations. In such a bleak scenario, it becomes imperative to analyze and identify those regions in Saudi Arabia that are at high risk. A preemptive study done in the context of predicting the possible COVID-19 hotspots would facilitate in the implementation of prompt and targeted countermeasures against SARS-CoV-2, thus saving many lives. Working towards this intent, the present study adopts a decision making based methodology of… More >
Open Access
ARTICLE
Mohammad Alkhatib*
Computer Systems Science and Engineering, Vol.41, No.3, pp. 975-995, 2022, DOI:10.32604/csse.2022.021398
Abstract Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs) assessment and continuous quality improvement represent core components of the quality assurance system (QAS). Current assessment methods suffer deficiencies related to accuracy and reliability, and they lack well-organized processes for continuous improvement planning. Moreover, the absence of automation, and integration in QA processes forms a major obstacle towards developing efficient quality system. There is a pressing need to adopt security protocols that provide required security services to safeguard the valuable information processed by QAS as well. This research proposes an effective… More >
Open Access
ARTICLE
Ahed Abugabah1,*, Atif Mehmood2, Ahmad Ali AL Zubi3, Louis Sanzogni4
Computer Systems Science and Engineering, Vol.41, No.3, pp. 997-1008, 2022, DOI:10.32604/csse.2022.021438
Abstract The outbreak of the novel coronavirus has spread worldwide, and millions of people are being infected. Image or detection classification is one of the first application areas of deep learning, which has a significant contribution to medical image analysis. In classification detection, one or more images (detection) are usually used as input, and diagnostic variables (such as whether there is a disease) are used as output. The novel coronavirus has spread across the world, infecting millions of people. Early-stage detection of critical cases of COVID-19 is essential. X-ray scans are used in clinical studies to diagnose COVID-19 and Pneumonia early.… More >