Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Generalized Normalized Euclidean Distance Based Fuzzy Soft Set Similarity for Data Classification

    Rahmat Hidayat1,2,*, Iwan Tri Riyadi Yanto1,3, Azizul Azhar Ramli1, Mohd Farhan Md. Fudzee1, Ansari Saleh Ahmar4

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 119-130, 2021, DOI:10.32604/csse.2021.015628

    Abstract

    Classification is one of the data mining processes used to predict predetermined target classes with data learning accurately. This study discusses data classification using a fuzzy soft set method to predict target classes accurately. This study aims to form a data classification algorithm using the fuzzy soft set method. In this study, the fuzzy soft set was calculated based on the normalized Hamming distance. Each parameter in this method is mapped to a power set from a subset of the fuzzy set using a fuzzy approximation function. In the classification step, a generalized normalized Euclidean distance is used to determine… More >

  • Open Access

    ARTICLE

    Smart Contract: Security and Privacy

    Leena S. Alotaibi, Sultan S. Alshamrani*

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 93-101, 2021, DOI:10.32604/csse.2021.015547

    Abstract Smart contracts are simply self-activated contracts between two parties. The idea behind their implementation relies on the concept of blockchain, wherein the details and execution of the contract are turned into code and distributed among users of a network. This process controls counterfeiting and money laundering by its ability to trace who owes whom. It also boosts the general economy. This research paper shows how smart contracts in modern-day systems have changed the approach to money tracing. We present case studies about the uses of smart contracts with high levels of security and privacy. As a building block of smart… More >

  • Open Access

    ARTICLE

    Optimization of Bio-Implantable Power Transmission Efficiency Based on Input Impedance

    Bassm H. Abed1, Jaber H. Majeed1,*, Najma Abed Habeeb2

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 17-24, 2021, DOI:10.32604/csse.2021.015544

    Abstract Recently, the inductive coupling link is the most robust method for powering implanted biomedical devices, such as micro-system stimulators, cochlear implants, and retinal implants. This research provides a novel theoretical and mathematical analysis to optimize the inductive coupling link efficiency driven by efficient proposed class-E power amplifiers using high and optimum input impedance. The design of the coupling link is based on two pairs of aligned, single-layer, planar spiral circular coils with a proposed geometric dimension, operating at a resonant frequency of 13.56 MHz. Both transmitter and receiver coils are small in size. Implanted device resistance varies from 200 Ω… More >

  • Open Access

    ARTICLE

    A New Generalized Weibull Model: Classical and Bayesian Estimation

    Mi Zichuan1, Saddam Hussain1, Zubair Ahmad2,*, Omid Kharazmi3, Zahra Almaspoor2

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 79-92, 2021, DOI:10.32604/csse.2021.015146

    Abstract Statistical distributions play a prominent role in applied sciences, particularly in biomedical sciences. The medical data sets are generally skewed to the right, and skewed distributions can be used quite effectively to model such kind of data sets. In the present study, therefore, we propose a new family of distributions suitable for modeling right-skewed medical data sets. The proposed family may be called a new generalized-X family. A special sub-model of the proposed family called a new generalized-Weibull distribution is discussed in detail. The maximum likelihood estimators of the model parameters are obtained. A brief Monte Carlo simulation study is… More >

  • Open Access

    ARTICLE

    Human-Animal Affective Robot Touch Classification Using Deep Neural Network

    Mohammed Ibrahim Ahmed Al-mashhadani1, Theyazn H. H. Aldhyani2,*, Mosleh Hmoud Al-Adhaileh3, Alwi M. Bamhdi4, Mohammed Y. Alzahrani5, Fawaz Waselallah Alsaade6, Hasan Alkahtani1,6

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 25-37, 2021, DOI:10.32604/csse.2021.014992

    Abstract Touch gesture recognition is an important aspect in human–robot interaction, as it makes such interaction effective and realistic. The novelty of this study is the development of a system that recognizes human–animal affective robot touch (HAART) using a deep learning algorithm. The proposed system was used for touch gesture recognition based on a dataset provided by the Recognition of the Touch Gestures Challenge 2015. The dataset was tested with numerous subjects performing different HAART gestures; each touch was performed on a robotic animal covered by a pressure sensor skin. A convolutional neural network algorithm is proposed to implement the touch… More >

  • Open Access

    ARTICLE

    A Network Security Risk Assessment Method Based on a B_NAG Model

    Hui Wang1, Chuanhan Zhu1, Zihao Shen1,*, Dengwei Lin2, Kun Liu1, MengYao Zhao3

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 103-117, 2021, DOI:10.32604/csse.2021.014680

    Abstract Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph… More >

  • Open Access

    ARTICLE

    A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship

    Fahd N. Al-Wesabi1,2,*, Saleh Alzahrani3, Fuad Alyarimi3, Mohammed Abdul3, Nadhem Nemri3, Mohammed M. Almazah4

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 297-311, 2021, DOI:10.32604/csse.2021.015915

    Abstract In this paper, a combined approach CAZWNLP (a combined approach of zero-watermarking and natural language processing) has been developed for the tampering detection of English text exchanged through the Internet. The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study. The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given… More >

  • Open Access

    ARTICLE

    New Fuzzy Fractional Epidemic Model Involving Death Population

    Prasantha Bharathi Dhandapani1, Dumitru Baleanu2,3,4,*, Jayakumar Thippan1, Vinoth Sivakumar1

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 331-346, 2021, DOI:10.32604/csse.2021.015619

    Abstract In this research, we propose a new change in classical epidemic models by including the change in the rate of death in the overall population. The existing models like Susceptible-Infected-Recovered (SIR) and Susceptible-Infected-Recovered-Susceptible (SIRS) include the death rate as one of the parameters to estimate the change in susceptible, infected and recovered populations. Actually, because of the deficiencies in immunity, even the ordinary flu could cause death. If people’s disease resistance is strong, then serious diseases may not result in mortalities. The classical model always assumes a closed system where there is no new birth or death, no immigration or… More >

  • Open Access

    ARTICLE

    Average Convergence for Directed & Undirected Graphs in Distributed Systems

    Ali Mustafa1,2, M Najam ul Islam1, Salman Ahmed1,3,*

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 399-413, 2021, DOI:10.32604/csse.2021.015575

    Abstract Consensus control of multi-agent systems is an innovative paradigm for the development of intelligent distributed systems. This has fascinated numerous scientific groups for their promising applications as they have the freedom to achieve their local and global goals and make their own decisions. Network communication topologies based on graph and matrix theory are widely used in a various real-time applications ranging from software agents to robotics. Therefore, while sustaining the significance of both directed and undirected graphs, this research emphases on the demonstration of a distributed average consensus algorithm. It uses the harmonic mean in the domain of multi-agent systems… More >

  • Open Access

    ARTICLE

    Impact of Tools and Techniques for Securing Consultancy Services

    Wael Alosaimi1, Abdullah Alharbi1, Hashem Alyami2, Masood Ahmad3, Abhishek Kumar Pandey3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 347-360, 2021, DOI:10.32604/csse.2021.015284

    Abstract In a digital world moving at a breakneck speed, consultancy services have emerged as one of the prominent resources for seeking effective, sustainable and economically viable solutions to a given crisis. The present day consultancy services are aided by the use of multiple tools and techniques. However, ensuring the security of these tools and techniques is an important concern for the consultants because even a slight malfunction of any tool could alter the results drastically. Consultants usually tackle these functions after establishing the clients’ needs and developing the appropriate strategy. Nevertheless, most of the consultants tend to focus more on… More >

Displaying 1211-1220 on page 122 of 1407. Per Page