Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    A Novel Hybrid Clustering Based Transmission Protocol for Wireless Body Area Networks

    Neelam Sharma1,*, Harshita Chadha2, Karan Singh3, B. M. Singh4, Nitish Pathak5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2459-2473, 2021, DOI:10.32604/cmc.2021.014305

    Abstract Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves. In recent years, this field of research has become increasingly popular due to the host of useful applications it can potentially serve. A deep analysis of the concepts associated with this domain reveals that the two main problems that are to be tackled here are throughput enhancement and network security improvement. The present article takes on one of these two issues namely the throughput enhancement. For the purpose of improving network productivity, a hybrid… More >

  • Open Access

    ARTICLE

    Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks

    Merna Gamal1, Hala M. Abbas2, Nour Moustafa3,*, Elena Sitnikova3, Rowayda A. Sadek1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1823-1837, 2021, DOI:10.32604/cmc.2021.012877

    Abstract Intrusion Detection Systems (IDSs) have a great interest these days to discover complex attack events and protect the critical infrastructures of the Internet of Things (IoT) networks. Existing IDSs based on shallow and deep network architectures demand high computational resources and high volumes of data to establish an adaptive detection engine that discovers new families of attacks from the edge of IoT networks. However, attackers exploit network gateways at the edge using new attacking scenarios (i.e., zero-day attacks), such as ransomware and Distributed Denial of Service (DDoS) attacks. This paper proposes new IDS based on Few-Shot Deep Learning, named CNN-IDS,… More >

  • Open Access

    ARTICLE

    Using Blockchain Technology in Mobile Network to create decentralized Home Location Registry (HLR)

    Behnam Kiani Kalejahi1,2,*, Ruslan Eminov1, Aga Guliyev1

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 287-296, 2021, DOI:10.32604/csse.2021.05480

    Abstract Blockchain can mean many things to many people. It is a set of protocols and encryption technologies for securely storing data on a distributed network for the developers. It is a distributed ledger for business and finance and the technology underlying the explosion of new digital currencies. For technologists, it is the driving force behind the next generation of the internet. On the other hand, it is a transformational technology facilitating large-scale human progress in previously unimagined ways for the rest of the people, a tool for radically reshaping society and economy. Some view it as a disruptive technology that… More >

  • Open Access

    ARTICLE

    Task Allocation Approach for Minimizing Make-Span in Wireless Sensor Actor Networks

    Mohammad Reza Okhovvat1, Mohammad Taghi Kheirabadi1,*, Ali Nodehi1, Morteza Okhovvat2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 165-178, 2021, DOI:10.32604/csse.2021.05468

    Abstract Wireless Sensor Actor Networks (WSANs) have contributed to the development of pervasive computing wherein time consideration to perform the tasks of pervasive applications is necessary. Hence, time constraint is one of the major challenges of WSANs. In this paper, we propose an analytical approach based on queuing theory to minimize the total time taken for completion of tasks, i.e., make-span, in WSANs with hybrid architecture. The best allocation rates of tasks to actor nodes are figured out through solving inequities and qualities resulting from a steady state analysis of the proposed model. Applying the calculated tasks arrival rates at each… More >

  • Open Access

    A Novel PoW Scheme Implemented by Probabilistic Signature for Blockchain

    Bo Mi1, Yuan Weng1, Darong Huang1,*, Yang Liu1, Yuqing Gan2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 265-274, 2021, DOI:10.32604/csse.2021.017507

    Abstract PoW (Proof of Work) plays a significant role in most blockchain systems to grant an accounting right over decentralized participants and ensure tamper resistance. Though hash functions are generally exploited for PoW due to their merits on summering, anti-collision, and irreversibility, they cannot certify that the bookkeeper is exactly the worker. Thereafter, such insistence may lead to abuse or even embezzlement of computing power for the benefit of malicious miners. To preserve the functionality of PoW but also bind the miners’ signing keys with their works, we build a post-quantum PoW scheme by changing the approximate closest vector norm for… More >

  • Open Access

    ARTICLE

    Community Detection in Aviation Network Based on K-means and Complex Network

    Hang He1,*, Zhenhan Zhao1, Weiwei Luo1, Jinghui Zhang2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 251-264, 2021, DOI:10.32604/csse.2021.017296

    Abstract With the increasing number of airports and the expansion of their scale, the aviation network has become complex and hierarchical. In order to investigate the complex network characteristics of aviation networks, this paper constructs a Chinese aviation network model and carries out related research based on complex network theory and K-means algorithm. Initially, the P-space model is employed to construct the Chinese aviation network model. Then, complex network indicators such as degree, clustering coefficient, average path length, betweenness and coreness are selected to investigate the complex characteristics and hierarchical features of aviation networks and explore their causes. Secondly, using K-means… More >

  • Open Access

    ARTICLE

    Short-term Wind Speed Prediction with a Two-layer Attention-based LSTM

    Jingcheng Qian1, Mingfang Zhu1, Yingnan Zhao2,*, Xiangjian He3

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 197-209, 2021, DOI:10.32604/csse.2021.016911

    Abstract Wind speed prediction is of great importance because it affects the efficiency and stability of power systems with a high proportion of wind power. Temporal-spatial wind speed features contain rich information; however, their use to predict wind speed remains one of the most challenging and less studied areas. This paper investigates the problem of predicting wind speeds for multiple sites using temporal and spatial features and proposes a novel two-layer attention-based long short-term memory (LSTM), termed 2Attn-LSTM, a unified framework of encoder and decoder mechanisms to handle temporal-spatial wind speed data. To eliminate the unevenness of the original wind speed,… More >

  • Open Access

    ARTICLE

    Brain Storm Optimization Based Clustering for Learning Behavior Analysis

    Yu Xue1,2,*, Jiafeng Qin1, Shoubao Su2, Adam Slowik3

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 211-219, 2021, DOI:10.32604/csse.2021.016693

    Abstract Recently, online learning platforms have proven to help people gain knowledge more conveniently. Since the outbreak of COVID-19 in 2020, online learning has become a mainstream mode, as many schools have adopted its format. The platforms are able to capture substantial data relating to the students’ learning activities, which could be analyzed to determine relationships between learning behaviors and study habits. As such, an intelligent analysis method is needed to process efficiently this high volume of information. Clustering is an effect data mining method which discover data distribution and hidden characteristic from uncharacterized online learning data. This study proposes a… More >

  • Open Access

    ARTICLE

    Crowdsourced Requirements Engineering Challenges and Solutions: A Software Industry Perspective

    Huma Hayat Khan1,*, Muhammad Noman Malik2, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 221-236, 2021, DOI:10.32604/csse.2021.016510

    Abstract Software crowdsourcing (SW CS) is an evolving software development paradigm, in which crowds of people are asked to solve various problems through an open call (with the encouragement of prizes for the top solutions). Because of its dynamic nature, SW CS has been progressively accepted and adopted in the software industry. However, issues pertinent to the understanding of requirements among crowds of people and requirements engineers are yet to be clarified and explained. If the requirements are not clear to the development team, it has a significant effect on the quality of the software product. This study aims to identify… More >

  • Open Access

    ARTICLE

    A Markov Model for Subway Composite Energy Prediction

    Xiaokan Wang1,2,*, Qiong Wang1, Liang Shuang3, Chao Chen4

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 237-250, 2021, DOI:10.32604/csse.2021.015945

    Abstract Electric vehicles such as trains must match their electric power supply and demand, such as by using a composite energy storage system composed of lithium batteries and supercapacitors. In this paper, a predictive control strategy based on a Markov model is proposed for a composite energy storage system in an urban rail train. The model predicts the state of the train and a dynamic programming algorithm is employed to solve the optimization problem in a forecast time domain. Real-time online control of power allocation in the composite energy storage system can be achieved. Using standard train operating conditions for simulation,… More >

Displaying 11371-11380 on page 1138 of 22098. Per Page