default search action
Computer Systems: Science & Engineering, Volume 43
Volume 43, Number 1, 2022
- Xiaorui Zhang, Wenzheng Zhang, Wei Sun, Hailun Wu, Aiguo Song, Sunil Kumar Jha:
A Real-time Cutting Model Based on Finite Element and Order Reduction. 1-15 - S. Navaneetha Krishnan, P. Sundara Vadivel, D. Yuvaraj, T. Satyanarayana Murthy, Sree Jagadeesh Malla, S. Nachiyappan, S. Shanmuga Priya:
Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering. 17-26 - Abdul Majid, Sumaira Kausar, Samabia Tehsin, Amina Jameel:
A Fast Panoptic Segmentation Network for Self-Driving Scene Understanding. 27-43 - L. Arulmozhiselvan, E. Uma:
QKD in Cloud-Fog Computing for Personal Health Record. 45-57 - Wen-Tsai Sung, Sung-Jung Hsiao:
Home Monitoring of Pets Based on AIoT. 59-75 - V. Kumar, N. Jayapandian, P. Balasubramanie:
Energy-Efficient Cluster in Wireless Sensor Network Using Life Time Delay Clustering Algorithms. 77-86 - Safaa El-Gazar, Walid El Shafai, Ghada M. El Banby, Hesham F. A. Hamed, Gerges M. Salama, Mohammed Abd-Elnaby, Fathi E. Abd El-Samie:
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms. 87-102 - Jieren Cheng, Xinzhi Yao, Hui Li, Hao Lu, Naixue Xiong, Ping Luo, Le Liu, Hao Guo, Wen Feng:
Cooperative Detection Method for DDoS Attacks Based on Blockchain. 103-117 - B. Padmavathi, B. Muthukumar:
Pattern Analysis and Regressive Linear Measure for Botnet Detection. 119-139 - A. Arivazhagi, S. Raja Kumar:
An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks. 141-157 - R. Swathy, B. Vinayagasundaram:
Bayes Theorem Based Virtual Machine Scheduling for Optimal Energy Consumption. 159-174 - R. Sasikala, R. Seyezhai:
Efficient Supply Current Control Strategies for Bridgeless Interleaved AC-DC Converter. 175-191 - Arun Kumar, Sandeep Gupta, Himanshu Sharma, Mehedi Masud:
PAPR Reduction of NOMA Using Vandermonde Matrix-Particle Transmission Sequence. 193-201 - P. Peruma:
Document Clustering Using Graph Based Fuzzy Association Rule Generation. 203-218 - Lanlan Ni, Lanzheng Bian, Rugang Lu, Ting Chen, Jinyue Xia:
Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward. 219-231 - R. Padmavathy, M. Newlin Rajkumar:
Secured Cloud Communication Using Lightweight Hash Authentication with PUF. 233-243 - M. Kavitha, M. Sujaritha:
A Sensitive Wavebands Identification System for Smart Farming. 245-257 - C. Ram Kumar, K. Murali Krishna, Mohammad ShabbirAlam, K. Vigneshwaran, Sridharan Kannan, C. Bharatiraja:
A Novel Approach Based on Hybrid Algorithm for Energy Efficient Cluster Head Identification in Wireless Sensor Networks. 259-273 - Venugopal Ulagamuthalvi, Govindarajan Kulanthaivel, Ananthakrishnan Balasundaram, Arun Kumar Sivaraman:
Breast Mammogram Analysis and Classification Using Deep Convolution Neural Network. 275-289 - T. S. Balaji, S. Srinivasan, S. Prasanna Bharathi, B. Ramesh:
Fuzzy-Based Secure Clustering with Routing Technique for VANETs. 291-304 - Atif Mehmood, Ahed Abugabah, Ahmed Ali AlZubi, Louis Sanzogni:
Early Diagnosis of Alzheimer's Disease Based on Convolutional Neural Networks. 305-315 - R. S. Latha, Saravana Balaji B., Nebojsa Bacanin, Ivana Strumberger, Miodrag Zivkovic, Milos Kabiljo:
Feature Selection Using Grey Wolf Optimization with Random Differential Grouping. 317-332 - G. Prema Arokia Mary, N. Suganthi:
Detection of Parkinson's Disease with Multiple Feature Extraction Models and Darknet CNN Classification. 333-345 - Chia-Nan Wang, Ngoc-Ai-Thy Nguyen, Thanh-Tuan Dang, Jing-Wein Wang:
Assessing Asian Economies Renewable Energy Consumption Efficiency Using DEA with Undesirable Output. 347-362 - J. Anitha, M. Kalaiarasu:
MRI Brain Tumor Segmentation with Intuitionist Possibilistic Fuzzy Clustering and Morphological Operations. 363-379 - M. Anuradha, G. Mani, T. Shanthi, N. R. Nagarajan, P. Suresh, C. Bharatiraja:
Intrusion Detection System for Big Data Analytics in IoT Environment. 381-396 - Sunil Dhankhar, Mukesh Kumar Gupta, Fida Hussain Memon, Surbhi Bhatia, Pankaj Dadheech, Arwa A. Mashat:
Support Vector Machine Based Handwritten Hindi Character Recognition and Summarization. 397-412 - Omar A. Saraereh:
Design and Analysis of Novel Antenna for Millimeter-Wave Communication. 413-422
Volume 43, Number 2, 2022
- S. Nithya Devi, S. Sasipriya:
Design of Hybrid True Random Number Generator for Cryptographic Applications. 423-437 - Ravindra Parshuram Bachate, Ashok Sharma, Amar Singh, Ayman A. Aly, Abdulaziz H. Alghtani, Dac-Nhuong Le:
Enhanced Marathi Speech Recognition Facilitated by Grasshopper Optimisation-Based Recurrent Neural Network. 439-454 - Ramasamy Madhumathi, Arumuganathan T, Shruthi R:
Soil Nutrient Detection and Recommendation Using IoT and Fuzzy Logic. 455-469 - G. Divya Mohana Priya, M. Karthikeyan, K. Murugan:
Incremental Linear Discriminant Analysis Dimensionality Reduction and 3D Dynamic Hierarchical Clustering WSNs. 471-486 - Prema Kandasamy, K. Prem Kumar:
Efficient Single-Stage Bridgeless AC to DC Converter Using Grey Wolf Optimization. 487-499 - A. Kayalvizhi, G. Sankara Malliga:
Capacitive Coupled Wide-Notch Stepped Impedance Narrow-Band Bandpass Filter for WiMax Application. 501-514 - M. Nuthal Srinivasan, M. Chinnadurai:
An Efficient Video Inpainting Approach Using Deep Belief Network. 515-529 - A. Sathishkumar, T. Rammohan, S. Sathish Kumar, J. Uma, K. Srujan Raju, Aarti Sangwan, M. Sivachitra, M. Prabu:
QoS Constrained Network Coding Technique to Data Transmission Using IoT. 531-544 - D. Venugopal, V. Mohan, S. Ramesh, S. Janupriya, Sangsoon Lim, Seifedine Nimer Kadry:
Pattern Recognition of Modulation Signal Classification Using Deep Neural Networks. 545-558 - Jian Geng, Shaoyuan Yu, Ailin Chen, Hao Wang, Bo Yan, Liang Li, Lei Song, Qirun Wang:
Evidence Mechanism of Power Dispatching Instruction Based on Blockchain. 559-571 - Hosam El-El-Sofany:
A Proposed Biometric Authentication Model to Improve Cloud Systems Security. 573-589 - Ba-Lam Do, Van-Thanh Nguyen, Hoang-Nam Dinh, Thanh-Chung Dao, Binhminh Nguyen:
Blockchain for Education: Verification and Management of Lifelong Learning Data. 591-604 - Arulmozhi Nagarajan, T. Aruldoss Albert Victoire:
Kalman Filter and H∞ Filter Based Linear Quadratic Regulator for Furuta Pendulum. 605-623 - M. Manikandan, A. Rajiv Kannan:
Provisioning Intelligent Water Wave Optimization Approach for Underwater Acoustic Wireless Sensor Networks. 625-641 - Hang He, Wanggen Liu, Zhenhan Zhao, Shan He, Jinghui Zhang:
Vulnerability of Regional Aviation Networks Based on DBSCAN and Complex Networks. 643-655 - V. Roopa, K. Malarvizhi, S. Karthik:
Efficient Energy-Aware Resource Management Model (EEARMM) Based Dynamic VM Migration. 657-669 - Shabana Habib, Saleh Alyahya, Aizaz Ahmed, Muhammad Islam, Sheroz Khan, Ishrat Khan, Muhammad Kamil:
X-ray Image-Based COVID-19 Patient Detection Using Machine Learning-Based Techniques. 671-682 - M. Sivakumar, N. M. Saravana Kumar, N. Karthikeyan:
An Efficient Deep Learning-based Content-based Image Retrieval Framework. 683-700 - Saleh Albahli:
Transfer Learning on Deep Neural Networks to Detect Pornography. 701-717 - Yingnan Zhao, Guanlan Ji, Fei Chen, Peiyuan Ji, Yi Cao:
Spatio-Temporal Wind Speed Prediction Based on Variational Mode Decomposition. 719-735 - Prabu Subramani, B. Thiyaneswaran, M. Sujatha, C. Nalini, Sujatha Rajkumar:
Grid Search for Predicting Coronary Heart Disease by Tuning Hyper-Parameters. 737-749 - Raed Alhamad:
Cognitive Radio Networks Using Intelligent Reflecting Surfaces. 751-765 - Amer Mirkhan, Numan lebi:
Binary Representation of Polar Bear Algorithm for Feature Selection. 767-783 - Saraswathi Shunmuganathan, Sridharan Kannan, Madhusudhana Rao T. V., K. Ambika, T. Jayasankar:
Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments. 785-801 - Ahmed Ben Atitallah:
An FPGA Design for Real-Time Image Denoising. 803-816 - Rashed Iqbal, Hazlie Mokhlis, Anis Salwa Mohd Khairuddin, Syafiqah Ismail, Munir Azam Muhammad:
Optimized Gated Recurrent Unit for Mid-Term Electricity Price Forecasting. 817-832 - A. S. Anakath, S. Ambika, S. Rajakumar, R. Kannadasan, K. S. Sendhil Kumar:
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health. 833-847 - Ramasamy Madhumathi, A. Meena Kowshalya, R. Shruthi:
Assessment of Sentiment Analysis Using Information Gain Based Feature Selection Approach. 849-860
Volume 43, Number 3, 2022
- Huiyu Sun, Ralph Grishman:
Lexicalized Dependency Paths Based Supervised Learning for Relation Extraction. 861-870 - E. Kavitha, R. Tamilarasan, Arunadevi Baladhandapani, M. K. Jayanthi Kannan:
A Novel Soft Clustering Approach for Gene Expression Data. 871-886 - S. Shanmuga Priya, D. Yuvaraj, T. Satyanarayana Murthy, Varghese S. Chooralil, S. Navaneetha Krishnan, P. Banumathy, P. Sundara Vadivel:
Secure Key Management Based Mobile Authentication in Cloud. 887-896 - Maram Abdullah M. Alyahya, Arshiya S. Ansari, Mohammad Sajid Mohammadi:
An Animated GIF Steganography Using Variable Block Partition Scheme. 897-914 - Attia Qammar, Ahmad Karim, Yasser Obaid Alharbi, Mohammad Salih Alsaffar, Abdullah Alharbi:
A Learning Model to Detect Android C&C Applications Using Hybrid Analysis. 915-930 - S. Lakshminarayanan:
Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing. 931-946 - R. Haripriya, G. Kousalya:
Primary Contacts Identification for COVID-19 Carriers from Surveillance Videos. 947-965 - Amjad Alsirhani, Mohamed M. Ezz, Ayman Mohamed Mostafa:
Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing. 967-984 - S. Saravanakumar, S. Chitra:
Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption. 985-996 - Jiaming Wang, Xiaolan Xie, Xiaochun Cheng, Yuhan Wang:
Improved Density Peaking Algorithm for Community Detection Based on Graph Representation Learning. 997-1008 - Essam Hendawi, Sattam Al Otaibi, Sherif Zaid, Ayman Hoballah, Salah K. Elsayed, Nagy I. Elkalashy, Yasser Ahmed:
Modeling and Experimental Verification of Electric Vehicles Off-Grid Photovoltaic Powered Charging Station. 1009-1025 - S. Kalpana, Chinnamuthu Annadurai:
Optimized Cognitive Learning Model for Energy Efficient Fog-BAN-IoT Networks. 1027-1040 - A. Geetha, N. B. Prakash:
Classification of Glaucoma in Retinal Images Using EfficientnetB4 Deep Learning Model. 1041-1055 - S. Priyadarsini, Carlos Andrés Tavera Romero, Abolfazl Mehbodniya, P. Vidya Sagar, Sudhakar Sengan:
Automatic Liver Tumor Segmentation in CT Modalities Using MAT-ACM. 1057-1068 - Minghu Tang, Wei Yu, Xiaoming Li, Xue Chen, Wenjun Wang, Zhen Liu:
Cold-Start Link Prediction via Weighted Symmetric Nonnegative Matrix Factorization with Graph Regularization. 1069-1084 - Somia Belaidouni, Moeiz Miraoui, Chakib Tadj:
QL-CBR Hybrid Approach for Adapting Context-Aware Services. 1085-1098 - Pranamita Nanda, Duraipandian N:
A Novel Optimizer in Deep Neural Network for Diabetic Retinopathy Classification. 1099-1110 - Shital Joshi, S. Manimurugan, Ahamed Aljuhani, Umar Albalawi, Amer Aljaedi:
Energy-efficient and Secure Wireless Communication for Telemedicine in IoT. 1111-1130 - D. Jeyakumar, C. Rajabhushanam:
Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm. 1131-1144 - Can Xiao, Feng Li, Dengyong Zhang, Pu Huang, Xiangling Ding, Victor S. Sheng:
Image Inpainting Detection Based on High-Pass Filter Attention Network. 1145-1154 - Kamal Mansur Jambi, Hassanin M. Al-Barhamtoshy, Wajdi Al Jedaibi, Mohsen A. Rashwan, Sherif M. Abdou:
Speak-Correct: A Computerized Interface for the Analysis of Mispronounced Errors. 1155-1173 - Norwini Zaidi, Iskandar Ishak, Fatimah Sidi, Lilly Suriani Affendey:
An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases. 1175-1188 - Mohammad O. Wedyan, Omar Ghaleb Elshaweesh, Enas Ramadan, Ryan Alturki:
Vibrating Particles System Algorithm for Solving Classification Problems. 1189-1206 - Ramesh Ramamoorthy, Himanshu Sharma, A. Akilandeswari, Nidhi Gour, Arun Kumar, Mehedi Masud:
Analysis of Cognitive Radio for LTE and 5G Waveforms. 1207-1217 - Yanman Li, Jun Zhang, Yang Hu, Yingnan Zhao, Yi Cao:
Real-time Safety Helmet-wearing Detection Based on Improved YOLOv5. 1219-1230 - Jansi Rani Sella Veluswami:
Improving Throughput of Transmission Control Protocol Using Cross Layer Approach. 1231-1239 - Tran Manh Tuan, Tran Thi Ngan, Nguyen Tu Trung:
Object Detection in Remote Sensing Images Using Picture Fuzzy Clustering and MapReduce. 1241-1253 - Naseebah Almufadi, Ali Mustafa Qamar:
Deep Convolutional Neural Network Based Churn Prediction for Telecommunication Industry. 1255-1270 - S. Gunasekar, G. Joselin Retna Kumar, G. Pius Agbulu:
Air Quality Predictions in Urban Areas Using Hybrid ARIMA and Metaheuristic LSTM. 1271-1284 - Xiaona Hu, Shan Ji, Hao Hua, Baiqing Zhou, Gang Hu:
An Improved Genetic Algorithm for Berth Scheduling at Bulk Terminal. 1285-1296 - Waseem Ullah Khan, Safdar Nawaz Khan Marwat, Salman Ahmed:
Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol. 1297-1313 - Omar Ben Bahri, Abdullah Alhumaidi Alotaibi:
Low-Cost IMU Sensors for Satellite Maturity Improvement. 1315-1326 - T. Shanmuigapriya, S. Swamynathan, Thiruvaazhi Uloli:
Customized Share Level Monitoring System for Users in OSN-Third Party Applications. 1327-1339 - Chitra Paulpandi, Murukesh Chinnasamy, Shanker Nagalingam Rajendiran:
Multi-Site Air Pollutant Prediction Using Long Short Term Memory. 1341-1355 - Zubair Nabi, Ramzan Talib, Muhammad Kashif Hanif, Muhammad Awais:
Contextual Text Mining Framework for Unstructured Textual Judicial Corpora through Ontologies. 1357-1374
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.