Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Cognitive Radio Networks Using Intelligent Reflecting Surfaces

    Raed Alhamad*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.021932

    Abstract In this article, we optimize harvesting and sensing duration for Cognitive Radio Networks (CRN) using Intelligent Reflecting Surfaces (IRS). The secondary source harvests energy using the received signal from node A. Then, it performs spectrum sensing to detect Primary Source PS activity. When PS activity is not detected, The Secondary Source SS transmits data to Secondary Destination SD where all reflected signals on IRS are in phase at SD. We show that IRS offers 14, 20, 26, 32, 38, 44, 50 dB enhancement in throughput using M = 8, 16, 32, 64, 128, 256, 512 reflectors with respect to CRN without IRS. We… More >

  • Open Access

    ARTICLE

    X-ray Image-Based COVID-19 Patient Detection Using Machine Learning-Based Techniques

    Shabana Habib1, Saleh Alyahya2, Aizaz Ahmed3, Muhammad Islam2,*, Sheroz Khan2, Ishrat Khan4, Muhammad Kamil5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 671-682, 2022, DOI:10.32604/csse.2022.021812

    Abstract In early December 2019, the city of Wuhan, China, reported an outbreak of coronavirus disease (COVID-19), caused by a novel severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2). On January 30, 2020, the World Health Organization (WHO) declared the outbreak a global pandemic crisis. In the face of the COVID-19 pandemic, the most important step has been the effective diagnosis and monitoring of infected patients. Identifying COVID-19 using Machine Learning (ML) technologies can help the health care unit through assistive diagnostic suggestions, which can reduce the health unit's burden to a certain extent. This paper investigates the possibilities of ML techniques in… More >

  • Open Access

    ARTICLE

    QoS Constrained Network Coding Technique to Data Transmission Using IoT

    A. Sathishkumar1,*, T. Rammohan2, S. Sathish Kumar3, J. Uma3, K. Srujan Raju4, Aarti Sangwan5, M. Sivachitra6, M. Prabu7

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 531-544, 2022, DOI:10.32604/csse.2022.021694

    Abstract The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino (MDND) technique. Both FSD and MDND technique need wide area compared to existing single node-keeper domino technique. The aim of this research is to minimize dissipation of power and to achieve less consumption of power. The proposed research, works by introducing… More >

  • Open Access

    ARTICLE

    Efficient Single-Stage Bridgeless AC to DC Converter Using Grey Wolf Optimization

    Prema Kandasamy1,*, K. Prem Kumar2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 487-499, 2022, DOI:10.32604/csse.2022.021693

    Abstract Bridgeless single-stage converters are used for efficient (alternative current) AC-(direct current) DC conversion. These converters control generators, like electromagnetic meso- and micro-scale generators with low voltage. Power factor correction helps increase the factor of the power supply. The main advantage of the power factor is it shapes the input current for increasing the real power of the AC supply. In this paper, a two-switch bridgeless rectifier topology is designed with a power factor correction capability. For the proposed converter topology to have good power quality parameters, the closed loop scheme, which uses the grey wolf optimization (GWO) algorithm, is implemented.… More >

  • Open Access

    ARTICLE

    An Efficient Deep Learning-based Content-based Image Retrieval Framework

    M. Sivakumar1,*, N. M. Saravana Kumar2, N. Karthikeyan1

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 683-700, 2022, DOI:10.32604/csse.2022.021459

    Abstract The use of massive image databases has increased drastically over the few years due to evolution of multimedia technology. Image retrieval has become one of the vital tools in image processing applications. Content-Based Image Retrieval (CBIR) has been widely used in varied applications. But, the results produced by the usage of a single image feature are not satisfactory. So, multiple image features are used very often for attaining better results. But, fast and effective searching for relevant images from a database becomes a challenging task. In the previous existing system, the CBIR has used the combined feature extraction technique using… More >

  • Open Access

    ARTICLE

    Incremental Linear Discriminant Analysis Dimensionality Reduction and 3D Dynamic Hierarchical Clustering WSNs

    G. Divya Mohana Priya1,*, M. Karthikeyan1, K. Murugan2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 471-486, 2022, DOI:10.32604/csse.2022.021023

    Abstract Optimizing the sensor energy is one of the most important concern in Three-Dimensional (3D) Wireless Sensor Networks (WSNs). An improved dynamic hierarchical clustering has been used in previous works that computes optimum clusters count and thus, the total consumption of energy is optimal. However, the computational complexity will be increased due to data dimension, and this leads to increase in delay in network data transmission and reception. For solving the above-mentioned issues, an efficient dimensionality reduction model based on Incremental Linear Discriminant Analysis (ILDA) is proposed for 3D hierarchical clustering WSNs. The major objective of the proposed work is to… More >

  • Open Access

    ARTICLE

    Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward

    Lanlan Ni1, Lanzheng Bian2, Rugang Lu1, Ting Chen1,*, Jinyue Xia3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 219-231, 2022, DOI:10.32604/csse.2022.026594

    Abstract Children's fractures are very common, and many children's fractures need internal fixation. When the children are treated and recovered, it needs to be internally fixed and then taken out. With the development of internal fixation materials, the research of surgical methods and the improvement of surgical skills, postoperative removal of orthopedic surgery patients has gradually been included in daytime surgery. While ensuring the safety of children's surgery, it is necessary to shorten the postoperative limb and joint function recovery time, promote the recovery of limb and joint function, the healing of wounds and bones, and reduce the occurrence of these… More >

  • Open Access

    ARTICLE

    Cooperative Detection Method for DDoS Attacks Based on Blockchain

    Jieren Cheng1,2, Xinzhi Yao1,2,*, Hui Li3, Hao Lu4, Naixue Xiong5, Ping Luo1,2, Le Liu1,2, Hao Guo1,2, Wen Feng1,2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 103-117, 2022, DOI:10.32604/csse.2022.025668

    Abstract Distributed Denial of Service (DDoS) attacks is always one of the major problems for service providers. Using blockchain to detect DDoS attacks is one of the current popular methods. However, the problems of high time overhead and cost exist in the most of the blockchain methods for detecting DDoS attacks. This paper proposes a blockchain-based collaborative detection method for DDoS attacks. First, the trained DDoS attack detection model is encrypted by the Intel Software Guard Extensions (SGX), which provides high security for uploading the DDoS attack detection model to the blockchain. Secondly, the service provider uploads the encrypted model to… More >

  • Open Access

    ARTICLE

    A Real-time Cutting Model Based on Finite Element and Order Reduction

    Xiaorui Zhang1,2,*, Wenzheng Zhang2, Wei Sun3, Hailun Wu2, Aiguo Song4, Sunil Kumar Jha5

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 1-15, 2022, DOI:10.32604/csse.2022.024950

    Abstract Telemedicine plays an important role in Corona Virus Disease 2019 (COVID-19). The virtual surgery simulation system, as a key component in telemedicine, requires to compute in real-time. Therefore, this paper proposes a real-time cutting model based on finite element and order reduction method, which improves the computational speed and ensure the real-time performance. The proposed model uses the finite element model to construct a deformation model of the virtual lung. Meanwhile, a model order reduction method combining proper orthogonal decomposition and Galerkin projection is employed to reduce the amount of deformation computation. In addition, the cutting path is formed according… More >

  • Open Access

    ARTICLE

    Design and Analysis of Novel Antenna for Millimeter-Wave Communication

    Omar A. Saraereh*

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 413-422, 2022, DOI:10.32604/csse.2022.024202

    Abstract At present, the microwave frequency band bandwidth used for mobile communication is only 600 MHz. In 2020, the 5G mobile Communication required about 1 GHz of bandwidth, so people need to tap new spectrum resources to meet the development needs of mobile Internet traffic that will increase by 1,000 times in the next 10 years. Utilize the potentially large bandwidth (30∼300 GHz) of the millimeter wave frequency band to provide higher data rates is regarded as the potential development trend of the future wireless communication technology. A microstrip patch implementation approach based on electromagnetic coupling feeding is presented to increase the… More >

Displaying 871-880 on page 88 of 1407. Per Page