Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Implementation of K-Means Algorithm and Dynamic Routing Protocol in VANET

    Manoj Sindhwani1, Charanjeet Singh1,*, Rajeshwar Singh2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 455-467, 2022, DOI:10.32604/csse.2022.018498

    Abstract With the growth of Vehicular Ad-hoc Networks, many services delivery is gaining more attention from the intelligent transportation system. However, mobility characteristics of vehicular networks cause frequent disconnection of routes, especially during the delivery of data. In both developed and developing countries, a lot of time is consumed due to traffic congestion. This has significant negative consequences, including driver stress due to increased time demand, decreased productivity for various personalized and commercial vehicles, and increased emissions of hazardous gases especially air polluting gases are impacting public health in highly populated areas. Clustering is one of the most powerful strategies for… More >

  • Open Access

    ARTICLE

    Desertification Detection in Makkah Region based on Aerial Images Classification

    Yahia Said1,2,*, Mohammad Barr1, Taoufik Saidani2,3, Mohamed Atri2,4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 607-618, 2022, DOI:10.32604/csse.2022.018479

    Abstract Desertification has become a global threat and caused a crisis, especially in Middle Eastern countries, such as Saudi Arabia. Makkah is one of the most important cities in Saudi Arabia that needs to be protected from desertification. The vegetation area in Makkah has been damaged because of desertification through wind, floods, overgrazing, and global climate change. The damage caused by desertification can be recovered provided urgent action is taken to prevent further degradation of the vegetation area. In this paper, we propose an automatic desertification detection system based on Deep Learning techniques. Aerial images are classified using Convolutional Neural Networks… More >

  • Open Access

    ARTICLE

    Organizational Data Breach: Building Conscious Care Behavior in Incident Response

    Adlyn Adam Teoh1, Norjihan Binti Abdul Ghani1,*, Muneer Ahmad1, Nz Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 505-515, 2022, DOI:10.32604/csse.2022.018468

    Abstract Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy,… More >

  • Open Access

    ARTICLE

    Integrated Random Early Detection for Congestion Control at the Router Buffer

    Ahmad Adel Abu-Shareha*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 719-734, 2022, DOI:10.32604/csse.2022.018369

    Abstract This paper proposed an Integrated Random Early Detection (IRED) method that aims to resolve the problems of the queue-based AQM and load-based AQM and gain the benefits of both using indicators from both types. The arrival factor (e.g., arrival rate, queue and capacity) and the departure factors are used to estimate the congestion through two integrated indicators. The utilized indicators are mathematically calculated and integrated to gain unified and coherent congestion indicators. Besides, IRED is built based on a new dropping calculation approach that fits the utilized congestion indicators while maintaining the intended buffer management criteria, avoiding global synchronization and… More >

  • Open Access

    ARTICLE

    Intelligent Identification and Resolution of Software Requirement Conflicts: Assessment and Evaluation

    Maysoon Aldekhail1, Marwah Almasri2,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 469-489, 2022, DOI:10.32604/csse.2022.018269

    Abstract Considerable research has demonstrated how effective requirements engineering is critical for the success of software projects. Requirements engineering has been established and recognized as one of the most important aspects of software engineering as of late. It is noteworthy to mention that requirement consistency is a critical factor in project success, and conflicts in requirements lead to waste of cost, time, and effort. A considerable number of research studies have shown the risks and problems caused by working with requirements that are in conflict with other requirements. These risks include running overtime or over budget, which may lead to project… More >

  • Open Access

    ARTICLE

    Applying Non-Local Means Filter on Seismic Exploration

    Mustafa Youldash1, Saleh Al-Dossary2,*, Lama AlDaej1, Farah AlOtaibi1, Asma AlDubaikil1, Noora AlBinali1, Maha AlGhamdi1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 619-628, 2022, DOI:10.32604/csse.2022.017733

    Abstract The seismic reflection method is one of the most important methods in geophysical exploration. There are three stages in a seismic exploration survey: acquisition, processing, and interpretation. This paper focuses on a pre-processing tool, the Non-Local Means (NLM) filter algorithm, which is a powerful technique that can significantly suppress noise in seismic data. However, the domain of the NLM algorithm is the whole dataset and 3D seismic data being very large, often exceeding one terabyte (TB), it is impossible to store all the data in Random Access Memory (RAM). Furthermore, the NLM filter would require a considerably long runtime. These… More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad is a convention utilized for… More >

  • Open Access

    ARTICLE

    Mammogram Learning System for Breast Cancer Diagnosis Using Deep Learning SVM

    G. Jayandhi1,*, J.S. Leena Jasmine2, S. Mary Joans2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 491-503, 2022, DOI:10.32604/csse.2022.016376

    Abstract The most common form of cancer for women is breast cancer. Recent advances in medical imaging technologies increase the use of digital mammograms to diagnose breast cancer. Thus, an automated computerized system with high accuracy is needed. In this study, an efficient Deep Learning Architecture (DLA) with a Support Vector Machine (SVM) is designed for breast cancer diagnosis. It combines the ideas from DLA with SVM. The state-of-the-art Visual Geometric Group (VGG) architecture with 16 layers is employed in this study as it uses the small size of 3 × 3 convolution filters that reduces system complexity. The softmax layer… More >

  • Open Access

    ARTICLE

    Timing Error Aware Register Allocation in TS

    Sheng Xiao1,2,*, Jing He3, Xi Yang4, Heng Zhou1, Yujie Yuan1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 273-286, 2022, DOI:10.32604/csse.2022.019106

    Abstract Timing speculative (TS) architecture is promising for improving the energy efficiency of microprocessors. Error recovery units, designed for tolerating occasional timing errors, have been used to support a wider range of voltage scaling, therefore to achieve a better energy efficiency. More specifically, the timing error rate, influenced mainly by data forwarding, is the bottleneck for voltage down-scaling in TS processors. In this paper, a new Timing Error Aware Register Allocation method is proposed. First, we designed the Dependency aware Interference Graph (DIG) construction to get the information of Read after Write (RAW) in programs. To build the construction, we get… More >

  • Open Access

    ARTICLE

    Empirically Modeling Enterprise Architecture Using ArchiMate

    Qiang Zhi1,*, Zhengshu Zhou2,3

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 357-374, 2022, DOI:10.32604/csse.2022.018759

    Abstract Enterprise Architecture (EA) has evolved based on the practice of information systems architecture design and implementation. EA is a rigorous description of a structure, and the objectives of EA modeling not only include clarifying corporate strategies, visualizing business processes, and modeling information systems to manage resources but also include improving organizational structures, adjusting information strategies, and creating new business value. Therefore, EA models cover a wide scope that includes both IT and business architectures. Typically, EA modeling is the initial and most important analysis step for researchers, architects, and developers. ArchiMate is the dominant modeling language for EA and it… More >

Displaying 1121-1130 on page 113 of 1407. Per Page