Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,284)
  • Open Access


    Optimal Load Balancing in Cloud Environment of Virtual Machines

    Fuad A.M. Al-Yarimi1,*, Sami Althahabi1, Majdy Mohammed Eltayeb2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 919-932, 2022, DOI:10.32604/csse.2022.021272

    Abstract Cloud resource scheduling is gaining prominence with the increasing trends of reliance on cloud infrastructure solutions. Numerous sets of cloud resource scheduling models were evident in the literature. Cloud resource scheduling refers to the distinct set of algorithms or programs the service providers engage to maintain the service level allocation for various resources over a virtual environment. The model proposed in this manuscript schedules resources of virtual machines under potential volatility aspects, which can be applied for any priority metric chosen by the server administrators. Also, the model can be flexible for any time frame-based analysis of the load factor.… More >

  • Open Access


    System Dynamics Forecasting on Taiwan Power Supply Chain

    Zhiqiu Yu1,*, Shuo-Yan Chou1, Phan Nguyen Ky Phuc2, Tiffany Hui-Kuang Yu3

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1191-1205, 2022, DOI:10.32604/csse.2022.021239

    Abstract This research aims to study the sustainability of Taiwan power supply chain based on system dynamics forecasting. The paper tries to investigate electricity shortage effects not only on the industrial side, but also from the standpoint of society. In our model, different forecasting methods such as linear regression, time series analysis, and gray forecasting are also considered to predict the parameters. Further tests such as the structure, dimension, historical fit, and sensitivity of the model are also conducted in this paper. Through analysis forecasting result, we believe that the demand for electricity in Taiwan will continue to increase to a… More >

  • Open Access


    Design of Miniature UWB-Based Antenna by Employing a Tri-Sectional SIR Feeder

    Ehab Dh. Hussein1,*, Yaqeen S. Mezaal2, Oguz Bayat1

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1157-1172, 2022, DOI:10.32604/csse.2022.021205

    Abstract A novel ultra-wideband (UWB)-based microstrip antenna is presented in this work by using a slotted patch resonator, a tri-sectional stepped impedance resonator (SIR) feeder, as well as a reduced ground plane. The whole structure was realized on an FR4 substrate. The impact of incorporating several cases of ground planes on the input reflection has been thoroughly investigated under the same tri-sectional SIR feeder and by employing a slotted patch radiator. Since the complete ground plane presents an inadequate frequency response, by reducing the ground plane, the induced UWB responses are apparent while the antenna exhibits higher impedance bandwidth. The impact… More >

  • Open Access


    A Hybrid Heuristic Algorithm for Solving COVID-19’s Social Distancing at Universities Campus

    Hassan Al-Tarawneh1, Khalid Al-Kaabneh1, Aysh Alhroob2, Hazem Migdady3, Issam Alhadid4,*

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 933-944, 2022, DOI:10.32604/csse.2022.021078

    Abstract Social distancing during COVID-19 has become one of the most important measures in reducing the risks of the spread of the virus. Implementing these measures at universities is crucial and directly related to the physical attendance of the populations of students, professors, employees, and other members on campus. This research proposes an automated scheduling approach that can help universities and schools comply with the social distancing regulations by providing assistance in avoiding huge assemblages of people. Furthermore, this paper proposes a novel course timetable-scheduling scheme based on four main constraints. First, a distance of two meters must be maintained between… More >

  • Open Access


    Cost Effective Decentralized Key Management Framework for IoT

    Raja Lavanya*, K. Sundarakantham, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1057-1070, 2022, DOI:10.32604/csse.2022.021052

    Abstract Security is a primary concern in communication for reliable transfer of information between the authenticated members, which becomes more complex in a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique with Multicast and Unicast key management protocol (BMU-IOT) for decentralized networks has been proposed. The first part of the proposed work is to divide the network into clusters where sensors are connected to and is administered by cluster head. Each sensor securely shares its secret keys with the cluster head using unicast. Based on these decryption keys, the… More >

  • Open Access


    Fuzzy Based Reliable Load Balanced Routing Approach for Ad hoc Sensor Networks

    J. V. Anchitaalagammai1,*, Rajesh Verma2, M. Kavitha3, A. R. Revathi4, S. R. Preethi5, Kiranmai Bellam6

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 861-874, 2022, DOI:10.32604/csse.2022.021049

    Abstract Energy management and packet delivery rate are the important factors in ad hoc networks. It is the major network where nodes share the information without administration. Due to the mobility of nodes, maximum energy is spent on transmission of packets. Mostly energy is wasted on packet dropping and false route discovery. In this research work, Fuzzy Based Reliable Load Balanced Routing Approach (RLRA) is proposed to provide high energy efficiency and more network lifetime using optimal multicast route discovery mechanism. It contains three phases. In first phase, optimal multicast route discovery is initiated to resolve the link failures. In second… More >

  • Open Access


    Object Tracking-Based “Follow-Me” Unmanned Aerial Vehicle (UAV) System

    Olubukola D. Adekola1,*, Onyedikachi Kenny Udekwu2, Oluwatobi Tolulope Saliu2, Damilola Williams Dada2, Stephen O. Maitanmi1, Victor Odumuyiwa3, Olujimi Alao2, Monday Eze2, Funmilayo Abibat Kasali4, Ayokunle Omotunde2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 875-890, 2022, DOI:10.32604/csse.2022.021029

    Abstract The applications of information technology (IT) tools and techniques have, over the years, simplified complex problem solving procedures. But the power of automation is inhibited by the technicality in manning advanced equipment. To this end, tools deliberately combating this inhibition and advancing technological growth are the Unmanned Aerial Vehicles (UAVs). UAVs are rapidly taking over major industries such as logistics, security, and cinematography. Among others, this is a very efficient way of carrying out missions unconventional to humans. An application area of this technology is the local film industry which is not producing quality movies primarily due to the lack… More >

  • Open Access


    Automated Teller Machine Authentication Using Biometric

    Shumukh M. Aljuaid*, Arshiya S. Ansari

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1009-1025, 2022, DOI:10.32604/csse.2022.020785

    Abstract This paper presents a novel method of a secured card-less Automated Teller Machine (ATM) authentication based on the three bio-metrics measures. It would help in the identification and authorization of individuals and would provide robust security enhancement. Moreover, it would assist in providing identification in ways that cannot be impersonated. To the best of our knowledge, this method of Biometric_ fusion way is the first ATM security algorithm that utilizes a fusion of three biometric features of an individual such as Fingerprint, Face, and Retina simultaneously for recognition and authentication. These biometric images have been collected as input data for… More >

  • Open Access


    Profile and Rating Similarity Analysis for Recommendation Systems Using Deep Learning

    Lakshmi Palaniappan1,*, K. Selvaraj2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 903-917, 2022, DOI:10.32604/csse.2022.020670

    Abstract Recommendation systems are going to be an integral part of any E-Business in near future. As in any other E-business, recommendation systems also play a key role in the travel business where the user has to be recommended with a restaurant that best suits him. In general, the recommendations to a user are made based on similarity that exists between the intended user and the other users. This similarity can be calculated either based on the similarity between the user profiles or the similarity between the ratings made by the users. First phase of this work concentrates on experimentally analyzing… More >

  • Open Access


    Clustering Gene Expression Data Through Modified Agglomerative M-CURE Hierarchical Algorithm

    E. Kavitha1,*, R. Tamilarasan2, N. Poonguzhali3, M. K. Jayanthi Kannan4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1027-141, 2022, DOI:10.32604/csse.2022.020634

    Abstract Gene expression refers to the process in which the gene information is used in the functional gene product synthesis. They basically encode the proteins which in turn dictate the functionality of the cell. The first step in gene expression study involves the clustering usage. This is due to the reason that biological networks are very complex and the genes volume increases the comprehending challenges along with the data interpretation which itself inhibit vagueness, noise and imprecision. For a biological system to function, the essential cellular molecules must interact with its surrounding including RNA, DNA, metabolites and proteins. Clustering methods will… More >

Displaying 881-890 on page 89 of 1284. Per Page  

Share Link