Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Design of Neural Network Based Wind Speed Prediction Model Using GWO

    R. Kingsy Grace1,*, R. Manimegalai2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 593-606, 2022, DOI:10.32604/csse.2022.019240

    Abstract The prediction of wind speed is imperative nowadays due to the increased and effective generation of wind power. Wind power is the clean, free and conservative renewable energy. It is necessary to predict the wind speed, to implement wind power generation. This paper proposes a new model, named WT-GWO-BPNN, by integrating Wavelet Transform (WT), Back Propagation Neural Network (BPNN) and Grey Wolf Optimization (GWO). The wavelet transform is adopted to decompose the original time series data (wind speed) into approximation and detailed band. GWO – BPNN is applied to predict the wind speed. GWO is used to optimize the parameters… More >

  • Open Access

    ARTICLE

    Fuzzy Based Ant Colony Optimization Scheduling in Cloud Computing

    K. Rajakumari1,*, M.Vinoth Kumar2, Garima Verma3, S. Balu4, Dilip Kumar Sharma5, Sudhakar Sengan6

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 581-592, 2022, DOI:10.32604/csse.2022.019175

    Abstract Cloud computing is an Information Technology deployment model established on virtualization. Task scheduling states the set of rules for task allocations to an exact virtual machine in the cloud computing environment. However, task scheduling challenges such as optimal task scheduling performance solutions, are addressed in cloud computing. First, the cloud computing performance due to task scheduling is improved by proposing a Dynamic Weighted Round-Robin algorithm. This recommended DWRR algorithm improves the task scheduling performance by considering resource competencies, task priorities, and length. Second, a heuristic algorithm called Hybrid Particle Swarm Parallel Ant Colony Optimization is proposed to solve the task… More >

  • Open Access

    ARTICLE

    Hybrid Renewable Energy Source Combined Dynamic Voltage Restorer for Power Quality Improvement

    N. Kanagaraj*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 517-538, 2022, DOI:10.32604/csse.2022.019149

    Abstract In this paper, the hybrid photovoltaic-thermoelectric generator (PV-TEG) combined dynamic voltage restorer (DVR) system is proposed for the power quality disturbances compensation in a single-phase distribution system. The stable and precise level of input voltage is essential for the smooth and trouble-free operation of the electrically sensitive loads which are connected at the utility side to avoid system malfunctions. In this context, the hybrid PV-TEG energy module combined DVR system is proposed in this paper. With the support of the hybrid energy module, the DVR will perform the power quality disturbances compensation effectively with needed voltage and /or power. In… More >

  • Open Access

    ARTICLE

    Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic

    Mohammed Baz1, Sabita Khatri2, Abdullah Baz3, Hosam Alhakami4, Alka Agrawal2, Raees Ahmad Khan2,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 691-702, 2022, DOI:10.32604/csse.2022.019079

    Abstract The rapid emergence of novel virus named SARS-CoV2 and unchecked dissemination of this virus around the world ever since its outbreak in 2020, provide critical research criteria to assess the vulnerabilities of our current health system. The paper addresses our preparedness for the management of such acute health emergencies and the need to enhance awareness, about public health and healthcare mechanisms. In view of this unprecedented health crisis, distributed ledger and AI technology can be seen as one of the promising alternatives for fighting against such epidemics at the early stages, and with the higher efficacy. At the implementation level,… More >

  • Open Access

    ARTICLE

    An improved CRNN for Vietnamese Identity Card Information Recognition

    Trinh Tan Dat1, Le Tran Anh Dang1,2, Nguyen Nhat Truong1,2, Pham Cung Le Thien Vu1, Vu Ngoc Thanh Sang1, Pham Thi Vuong1, Pham The Bao1,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019064

    Abstract This paper proposes an enhancement of an automatic text recognition system for extracting information from the front side of the Vietnamese citizen identity (CID) card. First, we apply Mask-RCNN to segment and align the CID card from the background. Next, we present two approaches to detect the CID card’s text lines using traditional image processing techniques compared to the EAST detector. Finally, we introduce a new end-to-end Convolutional Recurrent Neural Network (CRNN) model based on a combination of Connectionist Temporal Classification (CTC) and attention mechanism for Vietnamese text recognition by jointly train the CTC and attention objective functions together. The… More >

  • Open Access

    ARTICLE

    Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography

    Suliman A. Alsuhibany*, Meznah Alquraishi

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 421-440, 2022, DOI:10.32604/csse.2022.018929

    Abstract Recently, with the spread of online services involving websites, attackers have the opportunity to expose these services to malicious actions. To protect these services, A Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) is a proposed technique. Since many Arabic countries have developed their online services in Arabic, Arabic text-based CAPTCHA has been introduced to improve the usability for their users. Moreover, there exist a visual cryptography (VC) technique which can be exploited in order to enhance the security of text-based CAPTCHA by encrypting a CAPTCHA image into two shares and decrypting it by asking the… More >

  • Open Access

    ARTICLE

    An Architecture Supporting Intelligent Mobile Healthcare Using Human-Computer Interaction HCI Principles

    Mesfer Alrizq1, Shauban Ali Solangi2, Abdullah Alghamdi1,*, Muhammad Ali Nizamani2, Muhammad Ali Memon2, Mohammed Hamdi1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 557-569, 2022, DOI:10.32604/csse.2022.018800

    Abstract Recent advancements in the Internet of Things IoT and cloud computing have paved the way for mobile Healthcare (mHealthcare) services. A patient within the hospital is monitored by several devices. Moreover, upon leaving the hospital, the patient can be remotely monitored whether directly using body wearable sensors or using a smartphone equipped with sensors to monitor different user-health parameters. This raises potential challenges for intelligent monitoring of patient’s health. In this paper, an improved architecture for smart mHealthcare is proposed that is supported by HCI design principles. The HCI also provides the support for the User-Centric Design (UCD) for smart… More >

  • Open Access

    ARTICLE

    Deep Root Memory Optimized Indexing Methodology for Image Search Engines

    R. Karthikeyan1,*, A. Celine Kavida2, P. Suresh3

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 661-672, 2022, DOI:10.32604/csse.2022.018744

    Abstract Digitization has created an abundance of new information sources by altering how pictures are captured. Accessing large image databases from a web portal requires an opted indexing structure instead of reducing the contents of different kinds of databases for quick processing. This approach paves a path toward the increase of efficient image retrieval techniques and numerous research in image indexing involving large image datasets. Image retrieval usually encounters difficulties like a) merging the diverse representations of images and their Indexing, b) the low-level visual characters and semantic characters associated with an image are indirectly proportional, and c) noisy and less… More >

  • Open Access

    ARTICLE

    Video Identification Based on Watermarking Schemes and Visual Cryptography

    Maged Wafy1,2,*, Samr Gamal Zanaty1,3, Mahmoud Elkhouly1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 441-453, 2022, DOI:10.32604/csse.2022.018597

    Abstract Related to the growth of data sharing on the Internet and the wide - spread use of digital media, multimedia security and copyright protection have become of broad interest. Visual cryptography () is a method of sharing a secret image between a group of participants, where certain groups of participants are defined as qualified and may combine their share of the image to obtain the original, and certain other groups are defined as prohibited, and even if they combine knowledge of their parts, they can’t obtain any information on the secret image. The visual cryptography is one of the techniques… More >

  • Open Access

    ARTICLE

    Energy-Aware Scheduling for Tasks with Target-Time in Blockchain based Data Centres

    I. Devi*, G.R. Karpagam

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 405-419, 2022, DOI:10.32604/csse.2022.018573

    Abstract

    Cloud computing infrastructures have intended to provide computing services to end-users through the internet in a pay-per-use model. The extensive deployment of the Cloud and continuous increment in the capacity and utilization of data centers (DC) leads to massive power consumption. This intensifying scale of DCs has made energy consumption a critical concern. This paper emphasizes the task scheduling algorithm by formulating the system model to minimize the makespan and energy consumption incurred in a data center. Also, an energy-aware task scheduling in the Blockchain-based data center was proposed to offer an optimal solution that minimizes makespan and energy consumption.… More >

Displaying 1111-1120 on page 112 of 1407. Per Page