Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,115)
  • Open Access

    ARTICLE

    Comparative Study of Valency-Based Topological Descriptor for Hexagon Star Network

    Ali N. A. Koam1, Ali Ahmad2,*, M. F. Nadeem3

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 293-306, 2021, DOI:10.32604/csse.2021.014896

    Abstract A class of graph invariants referred to today as topological indices are inefficient progressively acknowledged by scientific experts and others to be integral assets in the depiction of structural phenomena. The structure of an interconnection network can be represented by a graph. In the network, vertices represent the processor nodes and edges represent the links between the processor nodes. Graph invariants play a vital feature in graph theory and distinguish the structural properties of graphs and networks. A topological descriptor is a numerical total related to a structure that portray the topology of structure and is invariant under structure automorphism.… More >

  • Open Access

    ARTICLE

    Blockchain Consistency Check Protocol for Improved Reliability

    Mohammed Alwabel, Youngmi Kwon*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 281-292, 2021, DOI:10.32604/csse.2021.014630

    Abstract Blockchain is a technology that provides security features that can be used for more than just cryptocurrencies. Blockchain achieves security by saving the information of one block in the next block. Changing the information of one block will require changes to all the next block in order for that change to take effect. Which makes it unfeasible for such an attack to happen. However, the structure of how blockchain works makes the last block always vulnerable for attacks, given that its information is not saved yet in any block. This allows malicious node to change the information of the last… More >

  • Open Access

    ARTICLE

    Cross-Modal Hashing Retrieval Based on Deep Residual Network

    Zhiyi Li1,2,*, Xiaomian Xu2, Du Zhang1, Peng Zhang2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 383-405, 2021, DOI:10.32604/csse.2021.014563

    Abstract In the era of big data rich in We Media, the single mode retrieval system has been unable to meet people’s demand for information retrieval. This paper proposes a new solution to the problem of feature extraction and unified mapping of different modes: A Cross-Modal Hashing retrieval algorithm based on Deep Residual Network (CMHR-DRN). The model construction is divided into two stages: The first stage is the feature extraction of different modal data, including the use of Deep Residual Network (DRN) to extract the image features, using the method of combining TF-IDF with the full connection network to extract the… More >

  • Open Access

    ARTICLE

    Clustering Collision Power Attack on RSA-CRT

    Wunan Wan1,*, Jun Chen1, Jinyue Xia2, Jinquan Zhang1, Shibin Zhang1, Hao Chen1

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 417-434, 2021, DOI:10.32604/csse.2021.014460

    Abstract In this paper, we propose two new attack algorithms on RSA implementations with CRT (Chinese remainder theorem). To improve the attack efficiency considerably, a clustering collision power attack on RSA with CRT is introduced via chosen-message pairs. This attack method is that the key parameters dp and dq are segmented by byte, and the modular multiplication collisions are identified by k-means clustering. The exponents dp and dq were recovered by 12 power traces of six groups of the specific message pairs, and the exponent d was obtained. We also propose a second order clustering collision power analysis attack against RSA… More >

  • Open Access

    ARTICLE

    Optimal Robust Control for Unstable Delay System

    Rihem Farkh1,2,*, Khaled A. Aljaloud1, Moufida Ksouri2, Faouzi Bouani2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 307-321, 2021, DOI:10.32604/csse.2021.014334

    Abstract Proportional-Integral-Derivative control system has been widely used in industrial applications. For uncertain and unstable systems, tuning controller parameters to satisfy the process requirements is very challenging. In general, the whole system’s performance strongly depends on the controller’s efficiency and hence the tuning process plays a key role in the system’s response. This paper presents a robust optimal Proportional-Integral-Derivative controller design methodology for the control of unstable delay system with parametric uncertainty using a combination of Kharitonov theorem and genetic algorithm optimization based approaches. In this study, the Generalized Kharitonov Theorem (GKT) for quasi-polynomials is employed for the purpose of designing… More >

  • Open Access

    ARTICLE

    Aligning Education with Vision 2030 Using Augmented Reality

    Raniyah Wazirali*

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 339-351, 2021, DOI:10.32604/csse.2021.014301

    Abstract Vision 2030 requires a new generation of people with a wide variety of abilities, talents, and skills. The adoption of augmented reality (AR) and virtual reality is one possible way to align education with Vision 2030. Immersive technologies like AR are rapidly becoming powerful and versatile enough to be adopted in education to achieve this goal. Technologies such as AR could be beneficial tools to enhance maintainable growth in education. We reviewed the most recent studies in augmented reality to check its appropriateness in aligning with the educational goals of Vision 2030. First, the various definitions, terminologies, and technologies of… More >

  • Open Access

    ARTICLE

    A Quantum Spatial Graph Convolutional Network for Text Classification

    Syed Mustajar Ahmad Shah1, Hongwei Ge1,*, Sami Ahmed Haider2, Muhammad Irshad3, Sohail M. Noman4, Jehangir Arshad5, Asfandeyar Ahmad6, Talha Younas7

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 369-382, 2021, DOI:10.32604/csse.2021.014234

    Abstract The data generated from non-Euclidean domains and its graphical representation (with complex-relationship object interdependence) applications has observed an exponential growth. The sophistication of graph data has posed consequential obstacles to the existing machine learning algorithms. In this study, we have considered a revamped version of a semi-supervised learning algorithm for graph-structured data to address the issue of expanding deep learning approaches to represent the graph data. Additionally, the quantum information theory has been applied through Graph Neural Networks (GNNs) to generate Riemannian metrics in closed-form of several graph layers. In further, to pre-process the adjacency matrix of graphs, a new… More >

  • Open Access

    ARTICLE

    Motion-Blurred Image Restoration Based on Joint Invertibility of PSFs

    Yuye Zhang1,*, Jingli Huang1, Jiandong Liu1, Hakeel Ahmed Chohan2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 407-416, 2021, DOI:10.32604/csse.2021.014154

    Abstract To implement restoration in a single motion blurred image, the PSF (Point Spread Function) is difficult to estimate and the image deconvolution is ill-posed as a result that a good recovery effect cannot be obtained. Considering that several different PSFs can get joint invertibility to make restoration well-posed, we proposed a motion-blurred image restoration method based on joint invertibility of PSFs by means of computational photography. Firstly, we designed a set of observation device which composed by multiple cameras with the same parameters to shoot the moving target in the same field of view continuously to obtain the target images… More >

  • Open Access

    ARTICLE

    The Development and Application of Quantum Masking

    Tao Chen1,2, Zhiguo Qu1,2,*, Yi Chen1,2

    Journal of Quantum Computing, Vol.2, No.3, pp. 151-156, 2020, DOI:10.32604/jqc.2020.015855

    Abstract To solve the problem of hiding quantum information in simplified subsystems, Modi et al. [1] introduced the concept of quantum masking. Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems. The concept of quantum masking was developed along with a new quantum impossibility theorem, the quantum no-masking theorem. The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states, the number… More >

  • Open Access

    ARTICLE

    Interpretation of the Entangled States

    D. L. Khokhlov*

    Journal of Quantum Computing, Vol.2, No.3, pp. 147-150, 2020, DOI:10.32604/jqc.2020.014734

    Abstract An interpretation of the entangled states is considered. Two-photon states of photon A on path a and photon B on path b with polarizations H, V are constructed. Two synchronized photons, 1 and 2, can take the paths a and b, with equal probability 50%. In the bases a, b and H, V, the states of the photons form the product states. In the basis 1, 2, the states of the photons form the entangled state. The states of the photons in the bases 1, 2; a, b; H, V are inseparable. The correlation of the photons due to the… More >

Displaying 13061-13070 on page 1307 of 22115. Per Page