Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN

    P. Saravanakumar1, T. V. P. Sundararajan2, Rajesh Kumar Dhanaraj3, Kashif Nisar4,*, Fida Hussain Memon5,6, Ag. Asri Bin Ag. Ibrahim4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1835-1847, 2022, DOI:10.32604/iasc.2022.018953

    Abstract Confidentiality and data integrity are essential paradigms in data aggregation owing to the various cyberattacks in wireless sensor networks (WSNs). This study proposes a novel technique named Lamport certificateless signcryption-based shift-invariant connectionist artificial deep neural networks (LCS-SICADNN) by using artificial deep neural networks to develop the data aggregation security model. This model utilises the input layer with several sensor nodes, four hidden layers to overcome different attacks (data injection, compromised node, Sybil and black hole attacks) and the output layer to analyse the given input. The Lamport one-time certificateless signcryption technique involving three different processes (key generation, signcryption and unsigncryption)… More >

  • Open Access

    ARTICLE

    Sensor Location Optimisation Design Based on IoT and Geostatistics in Greenhouse

    Yang Liu1,3, Xiaoyu Liu2,3, Xiu Dai1, Guanglian Xun1, Ni Ren1,*, Rui Kang1,4, Xiaojuan Mao1

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1653-1663, 2022, DOI:10.32604/iasc.2022.017049

    Abstract Environmental parameters such as air temperature (T) and air relative humidity (RH) should be intensively monitored in a greenhouse in real time. In most cases, one set of sensors is installed in the centre of a greenhouse. However, as the microclimate of a greenhouse is always heterogeneous, the sensor installation location is crucial for practical cultivation. In this study, the T and RH monitoring performance of different sensors were compared. Two types of real-time environmental sensors (Air Temperature and Humidity sensor and Activity Monitoring sensor, referred as ATH and AM) were selected and calibrated by reliable non-real-time sensors (Honest Observer… More >

  • Open Access

    ARTICLE

    Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward

    Lanlan Ni1, Lanzheng Bian2, Rugang Lu1, Ting Chen1,*, Jinyue Xia3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 219-231, 2022, DOI:10.32604/csse.2022.026594

    Abstract Children's fractures are very common, and many children's fractures need internal fixation. When the children are treated and recovered, it needs to be internally fixed and then taken out. With the development of internal fixation materials, the research of surgical methods and the improvement of surgical skills, postoperative removal of orthopedic surgery patients has gradually been included in daytime surgery. While ensuring the safety of children's surgery, it is necessary to shorten the postoperative limb and joint function recovery time, promote the recovery of limb and joint function, the healing of wounds and bones, and reduce the occurrence of these… More >

  • Open Access

    ARTICLE

    Cooperative Detection Method for DDoS Attacks Based on Blockchain

    Jieren Cheng1,2, Xinzhi Yao1,2,*, Hui Li3, Hao Lu4, Naixue Xiong5, Ping Luo1,2, Le Liu1,2, Hao Guo1,2, Wen Feng1,2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 103-117, 2022, DOI:10.32604/csse.2022.025668

    Abstract Distributed Denial of Service (DDoS) attacks is always one of the major problems for service providers. Using blockchain to detect DDoS attacks is one of the current popular methods. However, the problems of high time overhead and cost exist in the most of the blockchain methods for detecting DDoS attacks. This paper proposes a blockchain-based collaborative detection method for DDoS attacks. First, the trained DDoS attack detection model is encrypted by the Intel Software Guard Extensions (SGX), which provides high security for uploading the DDoS attack detection model to the blockchain. Secondly, the service provider uploads the encrypted model to… More >

  • Open Access

    ARTICLE

    A Real-time Cutting Model Based on Finite Element and Order Reduction

    Xiaorui Zhang1,2,*, Wenzheng Zhang2, Wei Sun3, Hailun Wu2, Aiguo Song4, Sunil Kumar Jha5

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 1-15, 2022, DOI:10.32604/csse.2022.024950

    Abstract Telemedicine plays an important role in Corona Virus Disease 2019 (COVID-19). The virtual surgery simulation system, as a key component in telemedicine, requires to compute in real-time. Therefore, this paper proposes a real-time cutting model based on finite element and order reduction method, which improves the computational speed and ensure the real-time performance. The proposed model uses the finite element model to construct a deformation model of the virtual lung. Meanwhile, a model order reduction method combining proper orthogonal decomposition and Galerkin projection is employed to reduce the amount of deformation computation. In addition, the cutting path is formed according… More >

  • Open Access

    ARTICLE

    Design and Analysis of Novel Antenna for Millimeter-Wave Communication

    Omar A. Saraereh*

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 413-422, 2022, DOI:10.32604/csse.2022.024202

    Abstract At present, the microwave frequency band bandwidth used for mobile communication is only 600 MHz. In 2020, the 5G mobile Communication required about 1 GHz of bandwidth, so people need to tap new spectrum resources to meet the development needs of mobile Internet traffic that will increase by 1,000 times in the next 10 years. Utilize the potentially large bandwidth (30∼300 GHz) of the millimeter wave frequency band to provide higher data rates is regarded as the potential development trend of the future wireless communication technology. A microstrip patch implementation approach based on electromagnetic coupling feeding is presented to increase the… More >

  • Open Access

    ARTICLE

    Support Vector Machine Based Handwritten Hindi Character Recognition and Summarization

    Sunil Dhankhar1,*, Mukesh Kumar Gupta1, Fida Hussain Memon2,3, Surbhi Bhatia4, Pankaj Dadheech1, Arwa Mashat5

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 397-412, 2022, DOI:10.32604/csse.2022.024059

    Abstract In today’s digital era, the text may be in form of images. This research aims to deal with the problem by recognizing such text and utilizing the support vector machine (SVM). A lot of work has been done on the English language for handwritten character recognition but very less work on the under-resourced Hindi language. A method is developed for identifying Hindi language characters that use morphology, edge detection, histograms of oriented gradients (HOG), and SVM classes for summary creation. SVM rank employs the summary to extract essential phrases based on paragraph position, phrase position, numerical data, inverted comma, sentence… More >

  • Open Access

    ARTICLE

    PAPR Reduction of NOMA Using Vandermonde Matrix-Particle Transmission Sequence

    Arun Kumar1,*, Sandeep Gupta2, Himanshu Sharma3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 193-201, 2022, DOI:10.32604/csse.2022.023991

    Abstract Non-Orthogonal Multiple Access (NOMA) is an ideal choice for 5G waveforms due to their characteristics such as high data rate, massive device connectivity, high spectral access, and effective frequency selective fading. Thus, it permits gigantic connectivity. The spectrum overlaps with NOMA, which consents several operators to segment the spectrum at the same frequency. These features make NOMA more suitable for use beyond 5G. Peak to Average Power (PAPR) is a major problem in Multi-Carrier Techniques (MCT) like NOMA and it also degrades the performance of the amplifier. The Partial Transmission Sequence (PTS) is a superior algorithm for moderating the PAPR.… More >

  • Open Access

    ARTICLE

    Breast Mammogram Analysis and Classification Using Deep Convolution Neural Network

    V. Ulagamuthalvi1, G. Kulanthaivel2,*, A. Balasundaram3, Arun Kumar Sivaraman4

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 275-289, 2022, DOI:10.32604/csse.2022.023737

    Abstract One of the fast-growing disease affecting women’s health seriously is breast cancer. It is highly essential to identify and detect breast cancer in the earlier stage. This paper used a novel advanced methodology than machine learning algorithms such as Deep learning algorithms to classify breast cancer accurately. Deep learning algorithms are fully automatic in learning, extracting, and classifying the features and are highly suitable for any image, from natural to medical images. Existing methods focused on using various conventional and machine learning methods for processing natural and medical images. It is inadequate for the image where the coarse structure matters… More >

  • Open Access

    ARTICLE

    Bayes Theorem Based Virtual Machine Scheduling for Optimal Energy Consumption

    R. Swathy*, B. Vinayagasundaram

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 159-174, 2022, DOI:10.32604/csse.2022.023706

    Abstract This paper proposes an algorithm for scheduling Virtual Machines (VM) with energy saving strategies in the physical servers of cloud data centers. Energy saving strategy along with a solution for productive resource utilization for VM deployment in cloud data centers is modeled by a combination of “Virtual Machine Scheduling using Bayes Theorem” algorithm (VMSBT) and Virtual Machine Migration (VMMIG) algorithm. It is shown that the overall data center’s consumption of energy is minimized with a combination of VMSBT algorithm and Virtual Machine Migration (VMMIG) algorithm. Virtual machine migration between the active physical servers in the data center is carried out… More >

Displaying 8761-8770 on page 877 of 22212. Per Page