Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,134)
  • Open Access


    Structural Interval Reliability Algorithm Based on Bernstein Polynomials and Evidence Theory

    Xu Zhang1, Jianchao Ni2, Juxi Hu3,*, Weisi Chen4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1947-1960, 2023, DOI:10.32604/csse.2023.035118

    Abstract Structural reliability is an important method to measure the safety performance of structures under the influence of uncertain factors. Traditional structural reliability analysis methods often convert the limit state function to the polynomial form to measure whether the structure is invalid. The uncertain parameters mainly exist in the form of intervals. This method requires a lot of calculation and is often difficult to achieve efficiently. In order to solve this problem, this paper proposes an interval variable multivariate polynomial algorithm based on Bernstein polynomials and evidence theory to solve the structural reliability problem with cognitive uncertainty. Based on the non-probabilistic… More >

  • Open Access


    Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly

    Seog Chung Seo1, HeeSeok Kim2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064

    Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >

  • Open Access


    Optimized Tuning of LOADng Routing Protocol Parameters for IoT

    Divya Sharma1,*, Sanjay Jain2, Vivek Maik3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1549-1561, 2023, DOI:10.32604/csse.2023.035031

    Abstract Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things (IoT), making it possible to accomplish tasks with less human interaction. However, it faces many problems, including lower capacity links, energy utilization, enhancement of resources and limited resources due to its openness, heterogeneity, limited resources and extensiveness. It is challenging to route packets in such a constrained environment. In an IoT network constrained by limited resources, minimal routing control overhead is required without packet loss. Such constrained environments can be improved through the optimal routing protocol. It is challenging to route packets in such a constrained… More >

  • Open Access


    ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN

    Ansar Munir Shah1, Mohammed Aljubayri2, Muhammad Faheem Khan1, Jarallah Alqahtani2,*, Mahmood ul Hassan3, Adel Sulaiman2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951

    Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the quality of service. But due… More >

  • Open Access


    BS-SC Model: A Novel Method for Predicting Child Abuse Using Borderline-SMOTE Enabled Stacking Classifier

    Saravanan Parthasarathy, Arun Raj Lakshminarayanan*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1311-1336, 2023, DOI:10.32604/csse.2023.034910

    Abstract For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events. The data set was balanced using the Borderline-SMOTE technique,… More >

  • Open Access


    ViT2CMH: Vision Transformer Cross-Modal Hashing for Fine-Grained Vision-Text Retrieval

    Mingyong Li, Qiqi Li, Zheng Jiang, Yan Ma*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1401-1414, 2023, DOI:10.32604/csse.2023.034757

    Abstract In recent years, the development of deep learning has further improved hash retrieval technology. Most of the existing hashing methods currently use Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) to process image and text information, respectively. This makes images or texts subject to local constraints, and inherent label matching cannot capture fine-grained information, often leading to suboptimal results. Driven by the development of the transformer model, we propose a framework called ViT2CMH mainly based on the Vision Transformer to handle deep Cross-modal Hashing tasks rather than CNNs or RNNs. Specifically, we use a BERT network to extract text… More >

  • Open Access


    Enhanced Adaptive Brain-Computer Interface Approach for Intelligent Assistance to Disabled Peoples

    Ali Usman1, Javed Ferzund1, Ahmad Shaf1, Muhammad Aamir1, Samar Alqhtani2,*, Khlood M. Mehdar3, Hanan Talal Halawani4, Hassan A. Alshamrani5, Abdullah A. Asiri5, Muhammad Irfan6

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1355-1369, 2023, DOI:10.32604/csse.2023.034682

    Abstract Assistive devices for disabled people with the help of Brain-Computer Interaction (BCI) technology are becoming vital bio-medical engineering. People with physical disabilities need some assistive devices to perform their daily tasks. In these devices, higher latency factors need to be addressed appropriately. Therefore, the main goal of this research is to implement a real-time BCI architecture with minimum latency for command actuation. The proposed architecture is capable to communicate between different modules of the system by adopting an automotive, intelligent data processing and classification approach. Neuro-sky mind wave device has been used to transfer the data to our implemented server… More >

  • Open Access


    Semiconducting SWCNT Photo Detector for High Speed Switching Through Single Halo Doping

    A. Arulmary1,*, V. Rajamani2, T. Kavitha2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1617-1630, 2023, DOI:10.32604/csse.2023.034681

    Abstract The method opted for accuracy, and no existing studies are based on this method. A design and characteristic survey of a new small band gap semiconducting Single Wall Carbon Nano Tube (SWCNT) Field Effect Transistor as a photodetector is carried out. In the proposed device, better performance is achieved by increasing the diameter and introducing a new single halo (SH) doping in the channel length of the CNTFET device. This paper is a study and analysis of the performance of a Carbon Nano Tube Field Effect Transistor (CNTFET) as a photodetector using the self-consistent Poisson and Green function method. The… More >

  • Open Access


    Histogram-Based Decision Support System for Extraction and Classification of Leukemia in Blood Smear Images

    Neenavath Veeraiah1,*, Youseef Alotaibi2, Ahmad F. Subahi3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1879-1900, 2023, DOI:10.32604/csse.2023.034658

    Abstract An abnormality that develops in white blood cells is called leukemia. The diagnosis of leukemia is made possible by microscopic investigation of the smear in the periphery. Prior training is necessary to complete the morphological examination of the blood smear for leukemia diagnosis. This paper proposes a Histogram Threshold Segmentation Classifier (HTsC) for a decision support system. The proposed HTsC is evaluated based on the color and brightness variation in the dataset of blood smear images. Arithmetic operations are used to crop the nucleus based on automated approximation. White Blood Cell (WBC) segmentation is calculated using the active contour model… More >

  • Open Access


    Design of Six Element MIMO Antenna with Enhanced Gain for 28/38 GHz mm-Wave 5G Wireless Application

    K. Jayanthi1,*, A. M. Kalpana2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1689-1705, 2023, DOI:10.32604/csse.2023.034613

    Abstract The fifth-generation (5G) wireless technology is the most recent standardization in communication services of interest across the globe. The concept of Multiple-Input-Multiple-Output antenna (MIMO) systems has recently been incorporated to operate at higher frequencies without limitations. This paper addresses, design of a high-gain MIMO antenna that offers a bandwidth of 400 MHz and 2.58 GHz by resonating at 28 and 38 GHz, respectively for 5G millimeter (mm)-wave applications. The proposed design is developed on a RT Duroid 5880 substrate with a single elemental dimension of 9.53 × 7.85 × 0.8 mm3. The patch antenna is fully grounded and is fed with a 50-ohm stepped impedance… More >

Displaying 41-50 on page 5 of 1134. Per Page  

Share Link

WeChat scan