Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Binary Representation of Polar Bear Algorithm for Feature Selection

    Amer Mirkhan1, Numan Çelebi2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 767-783, 2022, DOI:10.32604/csse.2022.023249

    Abstract In most of the scientific research feature selection is a challenge for researcher. Selecting all available features is not an option as it usually complicates the research and leads to performance drop when dealing with large datasets. On the other hand, ignoring some features can compromise the data accuracy. Here the rough set theory presents a good technique to identify the redundant features which can be dismissed without losing any valuable information, however, exploring all possible combinations of features will end with NP-hard problem. In this research we propose adopting a heuristic algorithm to solve this problem, Polar Bear Optimization… More >

  • Open Access

    ARTICLE

    An Efficient Video Inpainting Approach Using Deep Belief Network

    M. Nuthal Srinivasan1,*, M. Chinnadurai2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 515-529, 2022, DOI:10.32604/csse.2022.023109

    Abstract The video inpainting process helps in several video editing and restoration processes like unwanted object removal, scratch or damage rebuilding, and retargeting. It intends to fill spatio-temporal holes with reasonable content in the video. Inspite of the recent advancements of deep learning for image inpainting, it is challenging to outspread the techniques into the videos owing to the extra time dimensions. In this view, this paper presents an efficient video inpainting approach using beetle antenna search with deep belief network (VIA-BASDBN). The proposed VIA-BASDBN technique initially converts the videos into a set of frames and they are again split into… More >

  • Open Access

    ARTICLE

    Capacitive Coupled Wide-Notch Stepped Impedance Narrow-Band Bandpass Filter for WiMax Application

    A. Kayalvizhi*, G. Sankara Malliga

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 501-514, 2022, DOI:10.32604/csse.2022.022855

    Abstract The development of wireless communication standards necessitates optimal filter design for the selection of appropriate bands of frequencies. In this work, a compact in size pair of parallel coupled symmetric stepped impedance-based resonator is designed with supporting to the WiMAX communication standards. The coupled resonator is tuned to allow the frequency band between 3.4 GHz and 3.8 GHz, which is centered at 3.6 GHz. A parasitic effect of capacitively coupled feed structure is used for exciting the two symmetrical stepped impedance resonators. The bandwidth and selectivity of the filter are enhanced with the change of characteristic impedances and controlling the coupling gap between… More >

  • Open Access

    ARTICLE

    Grid Search for Predicting Coronary Heart Disease by Tuning Hyper-Parameters

    S. Prabu1,*, B. Thiyaneswaran2, M. Sujatha3, C. Nalini4, Sujatha Rajkumar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 737-749, 2022, DOI:10.32604/csse.2022.022739

    Abstract Diagnosing the cardiovascular disease is one of the biggest medical difficulties in recent years. Coronary cardiovascular (CHD) is a kind of heart and blood vascular disease. Predicting this sort of cardiac illness leads to more precise decisions for cardiac disorders. Implementing Grid Search Optimization (GSO) machine training models is therefore a useful way to forecast the sickness as soon as possible. The state-of-the-art work is the tuning of the hyperparameter together with the selection of the feature by utilizing the model search to minimize the false-negative rate. Three models with a cross-validation approach do the required task. Feature Selection based… More >

  • Open Access

    ARTICLE

    Transfer Learning on Deep Neural Networks to Detect Pornography

    Saleh Albahli*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 701-717, 2022, DOI:10.32604/csse.2022.022723

    Abstract While the internet has a lot of positive impact on society, there are negative components. Accessible to everyone through online platforms, pornography is, inducing psychological and health related issues among people of all ages. While a difficult task, detecting pornography can be the important step in determining the porn and adult content in a video. In this paper, an architecture is proposed which yielded high scores for both training and testing. This dataset was produced from 190 videos, yielding more than 19 h of videos. The main sources for the content were from YouTube, movies, torrent, and websites that hosts… More >

  • Open Access

    ARTICLE

    Provisioning Intelligent Water Wave Optimization Approach for Underwater Acoustic Wireless Sensor Networks

    M. Manikandan1,*, A. Rajiv Kannan

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 625-641, 2022, DOI:10.32604/csse.2022.022662

    Abstract In the Acoustics channel, it is incredibly challenging to offer data transfer for time-sourced applications in an energy-efficient manner due to higher error rate and propagation delay. Subsequently, conventional re-transmission over any failure generally initiates significantly larger end-to-end delay, and therefore it is not probable for time-based services. Moreover, standard techniques without any re-transmission consume enormous energy. This investigation proposes a novel multi-hop energy-aware transmission-based intelligent water wave optimization strategy. It ensures reduced end-to-end while attaining potential amongst overall energy efficiency end-to-end packet delay. It merges a naturally inspired meta-heuristic approach with multi-hop routing for data packets to reach the… More >

  • Open Access

    ARTICLE

    Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments

    Saraswathi Shunmuganathan1,*, Sridharan Kannan2, T. V. Madhusudhana Rao3, K. Ambika4, T. Jayasankar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 785-801, 2022, DOI:10.32604/csse.2022.022424

    Abstract The Cloud Computing Environment (CCE) developed for using the dynamic cloud is the ability of software and services likely to grow with any business. It has transformed the methodology for storing the enterprise data, accessing the data, and Data Sharing (DS). Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data. With the requirement of vast volumes of storage area in the CCEs, capturing a secured data access framework is an important issue. This paper proposes an Improved Secure Identification-based Multilevel Structure of… More >

  • Open Access

    ARTICLE

    Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

    A. S. Anakath1,*, S. Ambika2, S. Rajakumar3, R. Kannadasan4, K. S. Sendhil Kumar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 833-847, 2022, DOI:10.32604/csse.2022.022329

    Abstract Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive data, such as bank balance,… More >

  • Open Access

    ARTICLE

    Design of Hybrid True Random Number Generator for Cryptographic Applications

    S. Nithya Devi1,*, S. Sasipriya2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 423-437, 2022, DOI:10.32604/csse.2022.022280

    Abstract In real-time applications, unpredictable random numbers play a major role in providing cryptographic and encryption processes. Most of the existing random number generators are embedded with the complex nature of an amplifier, ring oscillators, or comparators. Hence, this research focused more on implementing a Hybrid Nature of a New Random Number Generator. The key objective of the proposed methodology relies on the utilization of True random number generators. The randomness is unpredictable. The additions of programmable delay lines will reduce the processing time and maintain the quality of randomizing. The performance comparisons are carried out with power, delay, and lookup… More >

  • Open Access

    ARTICLE

    Efficient Energy-Aware Resource Management Model (EEARMM) Based Dynamic VM Migration

    V. Roopa1,*, K. Malarvizhi2, S. Karthik3

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 657-669, 2022, DOI:10.32604/csse.2022.022173

    Abstract In cloud environment, an efficient resource management establishes the allocation of computational resources of cloud service providers to the requests of users for meeting the user’s demands. The proficient resource management and work allocation determines the accomplishment of the cloud infrastructure. However, it is very difficult to persuade the objectives of the Cloud Service Providers (CSPs) and end users in an impulsive cloud domain with random changes of workloads, huge resource availability and complicated service policies to handle them, With that note, this paper attempts to present an Efficient Energy-Aware Resource Management Model (EEARMM) that works in a decentralized manner.… More >

Displaying 861-870 on page 87 of 1407. Per Page