Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms

    Safaa El-Gazar1, Walid El-Shafai2,3,*, Ghada El-Banby4, Hesham F. A. Hamed1, Gerges M. Salama1, Mohammed Abd-Elnaby5, Fathi E. Abd El-Samie2,6

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 87-102, 2022, DOI:10.32604/csse.2022.022722

    Abstract Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades. It achieves safe access to systems using biometrics instead of the traditional passwords. The utilization of a biometric in its original format makes it usable only once. Therefore, a cancelable biometric template should be used, so that it can be replaced when it is attacked. Cancelable biometrics aims to enhance the security and privacy of biometric authentication. Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates. In this paper, a highly-secure encryption algorithm is proposed to ensure… More >

  • Open Access

    ARTICLE

    A Fast Panoptic Segmentation Network for Self-Driving Scene Understanding

    Abdul Majid1, Sumaira Kausar1,*, Samabia Tehsin1, Amina Jameel2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 27-43, 2022, DOI:10.32604/csse.2022.022590

    Abstract In recent years, a gain in popularity and significance of science understanding has been observed due to the high paced progress in computer vision techniques and technologies. The primary focus of computer vision based scene understanding is to label each and every pixel in an image as the category of the object it belongs to. So it is required to combine segmentation and detection in a single framework. Recently many successful computer vision methods has been developed to aid scene understanding for a variety of real world application. Scene understanding systems typically involves detection and segmentation of different natural and… More >

  • Open Access

    ARTICLE

    MRI Brain Tumor Segmentation with Intuitionist Possibilistic Fuzzy Clustering and Morphological Operations

    J. Anitha*, M. Kalaiarasu

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 363-379, 2022, DOI:10.32604/csse.2022.022402

    Abstract Digital Image Processing (DIP) is a well-developed field in the biological sciences which involves classification and detection of tumour. In medical science, automatic brain tumor diagnosis is an important phase. Brain tumor detection is performed by Computer-Aided Diagnosis (CAD) systems. The human image creation is greatly achieved by an approach namely medical imaging which is exploited for medical and research purposes. Recently Automatic brain tumor detection from MRI images has become the emerging research area of medical research. Brain tumor diagnosis mainly performed for obtaining exact location, orientation and area of abnormal tissues. Cancer and edema regions inference from brain… More >

  • Open Access

    ARTICLE

    Efficient Supply Current Control Strategies for Bridgeless Interleaved AC-DC Converter

    R. Sasikala1,*, R. Seyezhai2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 175-191, 2022, DOI:10.32604/csse.2022.022386

    Abstract This paper presents an efficient supply current wave shaping technique for bridgeless interleaved Single Ended Primary Inductor Converter (SEPIC). The SEPIC converter converts an Alternating Current (AC) to Direct Current (DC) with the boost converter. Power Factor Correction (PFC) is progressively significant to achieve high energy efficiency. The overall system efficiency can be increased as the bridgeless topology has less conduction losses from rectifying bridges. Also, the bridgeless and interleaved techniques are incorporated in this study to achieve better performance. The performance of the system is analyzed on both current control and sensor-less techniques. Different controllers such as Proportional Integral… More >

  • Open Access

    ARTICLE

    QKD in Cloud-Fog Computing for Personal Health Record

    L. Arulmozhiselvan*, E. Uma

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 45-57, 2022, DOI:10.32604/csse.2022.022024

    Abstract Cloud computing is a rapid growing technology which delivers computing services such as servers, storage, database, networking, software and analytics. It has brought a new way to securely store and share information and data with multiple users. When authorized person access these clouds, the released data should not compromise any individual’s privacy and identity should not be revealed. Fog Computing is the extension of cloud with decentralized structure which stores the data in locations somewhere between the data source and cloud. The goal of fog computing is to provide high security, improve performance and network efficiency. We use quantum key… More >

  • Open Access

    ARTICLE

    An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks

    A. Arivazhagi1,*, S. Raja Kumar2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 141-157, 2022, DOI:10.32604/csse.2022.021851

    Abstract Intelligent Intrusion Detection System (IIDS) for networks provide a resourceful solution to network security than conventional intrusion defence mechanisms like a firewall. The efficiency of IIDS highly relies on the algorithm performance. The enhancements towards these methods are utilized to enhance the classification accuracy and diminish the testing and training time of these algorithms. Here, a novel and intelligent learning approach are known as the stabbing of intrusion with learning framework (SILF), is proposed to learn the attack features and reduce the dimensionality. It also reduces the testing and training time effectively and enhances Linear Support Vector Machine (l-SVM). It… More >

  • Open Access

    ARTICLE

    Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering

    S. Navaneetha Krishnan1, P. Sundara Vadivel2,*, D. Yuvaraj3, T. Satyanarayana Murthy4, Sree Jagadeesh Malla5, S. Nachiyappan6, S. Shanmuga Priya7

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 17-26, 2022, DOI:10.32604/csse.2022.021590

    Abstract Wireless Sensor Networks (WSN) are commonly used to observe and monitor precise environments. WSNs consist of a large number of inexpensive sensor nodes that have been separated and distributed in different environments. The base station received the amount of data collected by the numerous sensors. The current developments designate that the attentFgion in applications of WSNs has been increased and extended to a very large scale. The Trust-Based Adaptive Acknowledgement (TRAACK) Intrusion-Detection System for Wireless Sensor Networks (WSN) is described based on the number of active positive deliveries and The Kalman filter used in Modified Particle Swarm Optimization (MPSO) has… More >

  • Open Access

    ARTICLE

    Pattern Analysis and Regressive Linear Measure for Botnet Detection

    B. Padmavathi1,2,*, B. Muthukumar3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 119-139, 2022, DOI:10.32604/csse.2022.021431

    Abstract Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various researchers. However, certain limitations need to be addressed efficiently. The provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective constraints. The bots’ patterns or features over the network have to be analyzed in both linear and non-linear manner. The linear and non-linear features are composed of high-level and low-level features. The collected features are maintained over the Bag of Features (BoF) where the most influencing features are collected and provided into the classifier model. Here, the linearity… More >

  • Open Access

    ARTICLE

    Detection of Parkinson’s Disease with Multiple Feature Extraction Models and Darknet CNN Classification

    G. Prema Arokia Mary1,*, N. Suganthi2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 333-345, 2022, DOI:10.32604/csse.2022.021164

    Abstract Parkinson’s disease (PD) is a neurodegenerative disease in the central nervous system. Recently, more researches have been conducted in the determination of PD prediction which is really a challenging task. Due to the disorders in the central nervous system, the syndromes like off sleep, speech disorders, olfactory and autonomic dysfunction, sensory disorder symptoms will occur. The earliest diagnosing of PD is very challenging among the doctors community. There are techniques that are available in order to predict PD using symptoms and disorder measurement. It helps to save a million lives of future by early prediction. In this article, the early… More >

  • Open Access

    ARTICLE

    Secured Cloud Communication Using Lightweight Hash Authentication with PUF

    R. Padmavathy*, M. Newlin Rajkumar

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 233-243, 2022, DOI:10.32604/csse.2022.021129

    Abstract Internet-of-Things (IoT) is an awaited technology in real-world applications to process daily tasks using intelligent techniques. The main process of data in IoT involves communication, integration, and coordination with other real-world applications. The security of transferred, stored, and processed data in IoT is not ensured in many constraints. Internet-enabled smart devices are widely used among populations for all types of applications, thus increasing the popularity of IoT among widely used server technologies. Smart grid is used in this article with IoT to manage large data. A smart grid is a collection of numerous users in the network with the fastest… More >

Displaying 891-900 on page 90 of 1407. Per Page