Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

    A. S. Anakath1,*, S. Ambika2, S. Rajakumar3, R. Kannadasan4, K. S. Sendhil Kumar5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 833-847, 2022, DOI:10.32604/csse.2022.022329

    Abstract Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive data, such as bank balance,… More >

  • Open Access

    ARTICLE

    Design of Hybrid True Random Number Generator for Cryptographic Applications

    S. Nithya Devi1,*, S. Sasipriya2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 423-437, 2022, DOI:10.32604/csse.2022.022280

    Abstract In real-time applications, unpredictable random numbers play a major role in providing cryptographic and encryption processes. Most of the existing random number generators are embedded with the complex nature of an amplifier, ring oscillators, or comparators. Hence, this research focused more on implementing a Hybrid Nature of a New Random Number Generator. The key objective of the proposed methodology relies on the utilization of True random number generators. The randomness is unpredictable. The additions of programmable delay lines will reduce the processing time and maintain the quality of randomizing. The performance comparisons are carried out with power, delay, and lookup… More >

  • Open Access

    ARTICLE

    Efficient Energy-Aware Resource Management Model (EEARMM) Based Dynamic VM Migration

    V. Roopa1,*, K. Malarvizhi2, S. Karthik3

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 657-669, 2022, DOI:10.32604/csse.2022.022173

    Abstract In cloud environment, an efficient resource management establishes the allocation of computational resources of cloud service providers to the requests of users for meeting the user’s demands. The proficient resource management and work allocation determines the accomplishment of the cloud infrastructure. However, it is very difficult to persuade the objectives of the Cloud Service Providers (CSPs) and end users in an impulsive cloud domain with random changes of workloads, huge resource availability and complicated service policies to handle them, With that note, this paper attempts to present an Efficient Energy-Aware Resource Management Model (EEARMM) that works in a decentralized manner.… More >

  • Open Access

    ARTICLE

    Cognitive Radio Networks Using Intelligent Reflecting Surfaces

    Raed Alhamad*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.021932

    Abstract In this article, we optimize harvesting and sensing duration for Cognitive Radio Networks (CRN) using Intelligent Reflecting Surfaces (IRS). The secondary source harvests energy using the received signal from node A. Then, it performs spectrum sensing to detect Primary Source PS activity. When PS activity is not detected, The Secondary Source SS transmits data to Secondary Destination SD where all reflected signals on IRS are in phase at SD. We show that IRS offers 14, 20, 26, 32, 38, 44, 50 dB enhancement in throughput using M = 8, 16, 32, 64, 128, 256, 512 reflectors with respect to CRN without IRS. We… More >

  • Open Access

    ARTICLE

    X-ray Image-Based COVID-19 Patient Detection Using Machine Learning-Based Techniques

    Shabana Habib1, Saleh Alyahya2, Aizaz Ahmed3, Muhammad Islam2,*, Sheroz Khan2, Ishrat Khan4, Muhammad Kamil5

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 671-682, 2022, DOI:10.32604/csse.2022.021812

    Abstract In early December 2019, the city of Wuhan, China, reported an outbreak of coronavirus disease (COVID-19), caused by a novel severe acute respiratory syndrome coronavirus-2 (SARS-CoV-2). On January 30, 2020, the World Health Organization (WHO) declared the outbreak a global pandemic crisis. In the face of the COVID-19 pandemic, the most important step has been the effective diagnosis and monitoring of infected patients. Identifying COVID-19 using Machine Learning (ML) technologies can help the health care unit through assistive diagnostic suggestions, which can reduce the health unit's burden to a certain extent. This paper investigates the possibilities of ML techniques in… More >

  • Open Access

    ARTICLE

    QoS Constrained Network Coding Technique to Data Transmission Using IoT

    A. Sathishkumar1,*, T. Rammohan2, S. Sathish Kumar3, J. Uma3, K. Srujan Raju4, Aarti Sangwan5, M. Sivachitra6, M. Prabu7

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 531-544, 2022, DOI:10.32604/csse.2022.021694

    Abstract The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using generator called conditional pulse generator which is employed in Multi Dynamic Node Domino (MDND) technique. Both FSD and MDND technique need wide area compared to existing single node-keeper domino technique. The aim of this research is to minimize dissipation of power and to achieve less consumption of power. The proposed research, works by introducing… More >

  • Open Access

    ARTICLE

    Efficient Single-Stage Bridgeless AC to DC Converter Using Grey Wolf Optimization

    Prema Kandasamy1,*, K. Prem Kumar2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 487-499, 2022, DOI:10.32604/csse.2022.021693

    Abstract Bridgeless single-stage converters are used for efficient (alternative current) AC-(direct current) DC conversion. These converters control generators, like electromagnetic meso- and micro-scale generators with low voltage. Power factor correction helps increase the factor of the power supply. The main advantage of the power factor is it shapes the input current for increasing the real power of the AC supply. In this paper, a two-switch bridgeless rectifier topology is designed with a power factor correction capability. For the proposed converter topology to have good power quality parameters, the closed loop scheme, which uses the grey wolf optimization (GWO) algorithm, is implemented.… More >

  • Open Access

    ARTICLE

    An Efficient Deep Learning-based Content-based Image Retrieval Framework

    M. Sivakumar1,*, N. M. Saravana Kumar2, N. Karthikeyan1

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 683-700, 2022, DOI:10.32604/csse.2022.021459

    Abstract The use of massive image databases has increased drastically over the few years due to evolution of multimedia technology. Image retrieval has become one of the vital tools in image processing applications. Content-Based Image Retrieval (CBIR) has been widely used in varied applications. But, the results produced by the usage of a single image feature are not satisfactory. So, multiple image features are used very often for attaining better results. But, fast and effective searching for relevant images from a database becomes a challenging task. In the previous existing system, the CBIR has used the combined feature extraction technique using… More >

  • Open Access

    ARTICLE

    Incremental Linear Discriminant Analysis Dimensionality Reduction and 3D Dynamic Hierarchical Clustering WSNs

    G. Divya Mohana Priya1,*, M. Karthikeyan1, K. Murugan2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 471-486, 2022, DOI:10.32604/csse.2022.021023

    Abstract Optimizing the sensor energy is one of the most important concern in Three-Dimensional (3D) Wireless Sensor Networks (WSNs). An improved dynamic hierarchical clustering has been used in previous works that computes optimum clusters count and thus, the total consumption of energy is optimal. However, the computational complexity will be increased due to data dimension, and this leads to increase in delay in network data transmission and reception. For solving the above-mentioned issues, an efficient dimensionality reduction model based on Incremental Linear Discriminant Analysis (ILDA) is proposed for 3D hierarchical clustering WSNs. The major objective of the proposed work is to… More >

  • Open Access

    ARTICLE

    Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System

    Yanan Chen1,2,3,4, Ting Yao1,4,*, Haiping Ren2, Zehao Gan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1497-1513, 2022, DOI:10.32604/cmes.2022.019589

    Abstract The introduction of the electronic medical record (EHR) sharing system has made a great contribution to the management and sharing of healthcare data. Considering referral treatment for patients, the original signature needs to be converted into a re-signature that can be verified by the new organization. Proxy re-signature (PRS) can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data. Unfortunately, the existing PRS schemes cannot realize forward and backward security. Therefore, this paper proposes the first PRS scheme that can provide key-insulated property, which can guarantee both the forward and backward security of… More >

Displaying 8331-8340 on page 834 of 22113. Per Page