default search action
Computer Systems: Science & Engineering, Volume 42
Volume 42, Number 1, 2022
- N. Venkateswaran, K. Umadevi:
Hybridized Wrapper Filter Using Deep Neural Network for Intrusion Detection. 1-14 - Monday Eze, Charles Okunbor, Esomu Solomon, Nneka Richard-Nnabu, Kayode Oladapo, Oghenetega Avwokuruaye, Abisola Olayiwola, Akpovi Ominike, Godwin Odulaja, Oluwatobi Akinmerese:
Autonomous Unbiased Study Group Formation Algorithm for Rapid Knowledge Propagation. 15-31 - K. Sathya, M. Rajalakshmi:
RDA- CNN: Enhanced Super Resolution Method for Rice Plant Disease Classification. 33-47 - Ali Alkhalifah, Fadwa Alorini, Reef Alturki:
Enhancement of E-commerce Service by Designing Last Mile Delivery Platform. 49-67 - Narongkorn Uthathip, Pornrapeepat Bhasaputra, Woraratana Pattaraprakorn:
Application of ANFIS Model for Thailand's Electric Vehicle Consumption. 69-86 - G. Anitha, S. Baghavathi Priya:
Vision Based Real Time Monitoring System for Elderly Fall Event Detection Using Deep Learning. 87-103 - R. Punithavathi, M. Kowsigan, R. Shanthakumari, Miodrag Zivkovic, Nebojsa Bacanin, Marko Sarac:
Protecting Data Mobility in Cloud Networks Using Metadata Security. 105-120 - Yabin Xu, Lulu Cui, Xiaowei Xu:
A Prediction Method of Fracture Toughness of Nickel-Based Superalloys. 121-132 - Bayan Al-Amri, Gofran Sami, Wajdi Alhakami:
An Effective Secure MAC Protocol for Cognitive Radio Networks. 133-148 - Gothai Ekambaram, A. Baseera, P. Prabu, K. Venkatachalam, K. Saravanan, S. Sathishkumar:
Machine Learning Technique to Detect Radiations in the Brain. 149-163 - Viswanathan MP, B. Anand:
Performance Enhancement of PV Based Boost Cascaded Fifteen Level Inverter for AC Loads. 165-181 - S. Karthik, M. Santhosh, Muthu Subash Kavitha, Christopher A. Paul:
Automated Deep Learning Based Cardiovascular Disease Diagnosis Using ECG Signals. 183-199 - Yu Xue, Bernard-Marie Onzo, Romany Fouad Mansour, Shoubao Su:
Deep Convolutional Neural Network Approach for COVID-19 Detection. 201-211 - Hsin-Pin Fu, Tsung-Sheng Chang, Chien-Hung Liu, Li-Chun Liu:
Analysis of Critical Factors in Manufacturing by Adopting a Cloud Computing Service. 213-227 - Rajadurai Malavika, Muniappan Lakshapalam Valarmathi:
Adaptive Server Load Balancing in SDN Using PID Neural Network Controller. 229-243 - C. Saravanakumar, R. Priscilla, B. Prabha, A. Kavitha, M. Prakash, C. Arun:
An Efficient On-Demand Virtual Machine Migration in Cloud Using Common Deployment Model. 245-256 - Kanthavel Radhakrishnan, R. Dhaya:
Prediction Model Using Reinforcement Deep Learning Technique for Osteoarthritis Disease Diagnosis. 257-269 - Xin Liu, Siya Xu, Chao Yang, Zhili Wang, Hao Zhang, Jingye Chi, Qinghan Li:
Deep Reinforcement Learning Empowered Edge Collaborative Caching Scheme for Internet of Vehicles. 271-287 - V. R. Balaji, T. Kalavathi, J. Vellingiri, N. Rajkumar, Venkat Prasad Padhy:
5G Data Offloading Using Fuzzification with Grasshopper Optimization Technique. 289-301 - Ali Algarni, Mahmoud Ragab, Wardah Alamri, Samih Mohemmed Mostafa:
Towards Improving Predictive Statistical Learning Model Accuracy by Enhancing Learning Technique. 303-318 - Jing Peng, Jingfu Yang, Chaoyang Xia, Xiaojie Li, Yanfen Guo, Ying Fu, Xinlai Chen, Zhe Cui:
Make U-Net Greater: An Easy-to-Embed Approach to Improve Segmentation Performance Using Hypergraph. 319-333 - Suraya Hamid, Shahrul Nizam Ismail, Muzaffar Hamzah, Asad W. Malik:
Developing Engagement in the Learning Management System Supported by Learning Analytics. 335-350 - Kexin Zhang, Bin Lin, Jixin Chen, Xinlong Wu, Chao Lu, Desheng Zheng, Lulu Tian:
Aero-Engine Surge Fault Diagnosis Using Deep Neural Network. 351-360 - S. Palpandi, T. Meera Devi:
Development of Efficient Classification Systems for the Diagnosis of Melanoma. 361-371 - Gowdham Chinnaraju, S. Nithyanandam:
Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks. 373-386 - Liang Jin, Qinghui Meng, Shuang Liang:
Operation Optimal Control of Urban Rail Train Based on Multi-Objective Particle Swarm Optimization. 387-395 - B. Sakthivel, K. Jayaram, N. Manikanda Devarajan, S. Mahaboob Basha, S. Rajapriya:
Machine Learning-Based Pruning Technique for Low Power Approximate Computing. 397-406 - Ibrahim El Rube, Sameer Alsharif:
Keypoint Description Using Statistical Descriptor with Similarity-Invariant Regions. 407-421
Volume 42, Number 2, 2022
- Balakrishnan Natarajan, Pushpalatha Krishnan:
Contrast Enhancement Based Image Detection Using Edge Preserved Key Pixel Point Filtering. 423-438 - Nehmdoh A. Sabiha, Hend I. Alkhammash:
Modeling Rogowski Coils for Monitoring Surge Arrester Discharge Currents. 439-449 - Chin-Shyurng Fahn, Chang-Yi Kao, Meng-Luen Wu, Hao-En Chueh:
SOINN-Based Abnormal Trajectory Detection for Efficient Video Condensation. 451-463 - Asrar Bajaber, Mai Ahmed Fadel, Lamiaa A. Elrefaei:
Evaluation of Deep Learning Models for Person Authentication Based on Touch Gesture. 465-481 - Arun Kumar, Sumit Chakravarty, S. Suganya, Mehedi Masud, Sultan Aljahdali:
PAPR Reduction Using Advanced Partial Transmission Scheme for 5G Waveforms. 483-492 - Ling-Jing Kao, Chih-Chou Chiu, Yu-Fan Lin, Heong Kam Weng:
Inter-Purchase Time Prediction Based on Deep Learning. 493-508 - R. S. Rajkumar, A. Grace Selvarani:
Diabetic Retinopathy Diagnosis Using ResNet with Fuzzy Rough C-Means Clustering. 509-521 - Neelaveni Rangaraj, Sridevi Balu, Sivasankari Jothiraj:
Securing Privacy Using Optimization and Statistical Models in Cognitive Radio Networks. 523-533 - Fahad Alraddady:
Efficient User Pairing for Performance Enhancement of Downlink NOMA Systems. 535-544 - R. Saravana Ram, M. Vinoth Kumar, N. Krishnamoorthy, A. Baseera, D. Mansoor Hussain, N. Susila:
Industrial Centric Node Localization and Pollution Prediction Using Hybrid Swarm Techniques. 545-460 - P. Parthasarathi, S. Shankar:
Decision Tree Based Key Management for Secure Group Communication. 561-575 - P. Thirumoorthy, K. S. Bhuvaneshwari, C. Kamalanathan, Sunita Panda, E. Prabhu, S. Maheswaran:
Improved Key Agreement Based Kerberos Protocol for M-Health Security. 577-587 - Faisal Bahadur, Arif Iqbal Umar, Insaf Ullah, Fahad Algarni, Muhammad Asghar Khan:
The Double Edge Sword Based Distributed Executor Service. 589-604 - S. Godfrey Winster, A. Siva Kumar, R. Ramesh:
User Centric Block-Level Attribute Based Encryption in Cloud Using Blockchains. 605-618 - Nagarajan Shanmugam, Vijeyakumar Krishnasamy Natarajan, Kalaiselvi Sundaram, Natarajan Saravanakumar:
Design of Precise Multiplier Using Inexact Compressor for Digital Signal Processing. 619-638 - Ali Alkhalifah:
Predicting Mobile Cross-Platform Adaptation Using a Hybrid Sem-ANN Approach. 639-658 - Mehran Mokhtari, Homayun Motameni, Peyman Bayat:
Solving the Task Starvation and Resources Problem Using Optimized SMPIA in Cloud. 659-675 - Xiaona Zhang, Jie Feng, Zhen Hong, Xiaona Rui:
Modelling of the Slope Solute Loss Based on Fuzzy Neural Network Model. 677-688 - Mudassir Shams, Naila Rafiq, Nasreen Kausar, Nazir Ahmad Mir, Ahmad Alalyani:
Computer Oriented Numerical Scheme for Solving Engineering Problems. 689-701 - Munayfah Alanazi, Shadi Nashwan:
Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems. 703-725 - Mashar Cenk Gencal, Mustafa Oral:
Roosters Algorithm: A Novel Nature-Inspired Optimization Algorithm. 727-737 - K. Arun Kumar, V. R. Venkatasubramani, S. Rajaram:
Optimal Algorithms for Load Balancing in Optical Burst Switching Networks. 739-749 - Komal Bashir, Mariam Rehman, Afnan Bashir, Faria Kanwal:
Designing and Evaluating a Collaborative Knowledge Management Framework for Leaf Disease Detection. 751-777 - Surbhi Bhatia, Mohammed Alojail:
An Improved Method for Extractive Based Opinion Summarization Using Opinion Mining. 779-794 - P. Anandraj, S. Ramabalan:
Metaheuristic Based Resource Scheduling Technique for Distributed Robotic Control Systems. 795-811 - Ranya Fadlalla Elsheikh:
Covid-19's Pandemic Relationship to Saudi Arabia's Weather Using Statistical Analysis and GIS. 813-823 - N. Veni, J. Manjula:
Modified Visual Geometric Group Architecture for MRI Brain Image Classification. 825-835 - Mohd Anul Haq:
CNN Based Automated Weed Detection System Using UAV Imagery. 837-849
Volume 42, Number 3, 2022
- S. Karthiga, Ariyur Mahadevan Abirami:
Deep Learning Convolutional Neural Network for ECG Signal Classification Aggregated Using IoT. 851-866 - Anisha Rebinth, S. Mohan Kumar:
Soft Computing Based Discriminator Model for Glaucoma Diagnosis. 867-880 - Tsung-Yin Ou, Guan-Yu Lin, Hsin-Pin Fu, Shih-Chia Wei, Wen-Lung Tsai:
An Intelligent Recommendation System for Real Estate Commodity. 881-897 - U. Geetha, Sharmila Sankar:
Multi-Objective Modified Particle Swarm Optimization for Test Suite Reduction (MOMPSO). 899-917 - Muhannad Y. Muhsin, Ali J. Salim, Jawad K. Ali:
A Compact Self-Isolated MIMO Antenna System for 5G Mobile Terminals. 919-934 - M. Manikandan, R. Subramanian, Muthu Subash Kavitha, S. Karthik:
Cost Effective Optimal Task Scheduling Model in Hybrid Cloud Environment. 935-948 - C. Pabitha, B. Vanathi:
FASTER-RCNN for Skin Burn Analysis and Tissue Regeneration. 949-961 - Zhiqiu Yu, Shuo-Yan Chou:
Research on Ratio of New Energy Vehicles to Charging Piles in China. 963-984 - S. Rajasekaran, G. Kousalya:
Virtual Nursing Using Deep Belief Networks for Elderly People (DBN-EP). 985-1000 - Nouh Sabri Elmitwally, Maria Tariq, Muhammad Adnan Khan, Munir Ahmad, Sagheer Abbas, Fahad Mazaed Alotaibi:
Rice Leaves Disease Diagnose Empowered with Transfer Learning. 1001-1014 - Hosam Alhakami, Abdullah Baz, Wajdi Alhakami, Abhishek Kumar Pandey, Alka Agrawal, Raees Ahmad Khan:
A Usability Management Framework for Securing Healthcare Information System. 1015-1030 - Mohd Anul Haq:
Planetscope Nanosatellites Image Classification Using Machine Learning. 1031-1046 - Haixu Xi, Wei Gao, Gyun Yeol Park:
Situation Awareness Data Fusion Method Based on Library Events. 1047-1061 - K. Saravanan, G. M. Tamilselvan, A. Rajendran:
Cross Layer QoS Aware Scheduling based on Loss-Based Proportional Fairness with Multihop CRN. 1063-1077 - Mohammad Monirujjaman Khan, Bright Yeboah-Akowuah, Kaisarul Islam, Eric Tutu Tchao, Sumanta Bhattacharyya, Rajesh Dey, Mehedi Masud, Fahad Alraddady:
Novel Design of UWB Jeans Based Textile Antenna for Body-Centric Communications. 1079-1093 - Ayman Altameem, Jaideep Singh Sachdev, Vijander Singh, Ramesh Chandra Poonia, Sandeep Kumar, Abdul Khader Jilani Saudagar:
Performance Analysis of Machine Learning Algorithms for Classifying Hand Motion-Based EEG Brain Signals. 1095-1107 - Nagy I. Elkalashy, Ibrahim B. M. Taha:
Conditional Probability Approach for Fault Detection in Photovoltaic Energy Farms. 1109-1120 - D. Jerusha, T. Jaya:
Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. 1121-1132 - Donglei Lu, Dongjie Zhu, Haiwen Du, Yundong Sun, Yansong Wang, Xiaofang Li, Rongning Qu, Ning Cao, Russell Higgs:
Fusion Recommendation System Based on Collaborative Filtering and Knowledge Graph. 1133-1146 - Hammad Alotaibi, Khaled A. Gepreel, Mohamed S. Mohamed, Amr M. S. Mahdy:
An Approximate Numerical Methods for Mathematical and Physical Studies for Covid-19 Models. 1147-1163 - T. Mithila, R. Arunprakash, A. Ramachandran:
CNN and Fuzzy Rules Based Text Detection and Recognition from Natural Scenes. 1165-1179 - Mohammad Khalid Imam Rahmani, Fahmina Taranum, Reshma Nikhat, Md. Rashid Farooqi, Mohammed Arshad Khan:
Automatic Real-Time Medical Mask Detection Using Deep Learning to Fight COVID-19. 1181-1198 - N. Ansgar Mary, T. Latha:
Binary Multifold Encryption Technique for Complex Cloud Systems. 1199-1213 - Muhammet Yasin Pak, Serkan Günal:
A Model for Cross-Domain Opinion Target Extraction in Sentiment Analysis. 1215-1239 - Suzhen Wang, Wenli Wang, Zhiting Jia, Chaoyi Pang:
Flexible Task Scheduling Based on Edge Computing and Cloud Collaboration. 1241-1255 - Majdy Mohamed Eltayeb Eltahir, Tarig Mohammed Ahmed:
Diagnosing Breast Cancer Accurately Based on Weighting of Heterogeneous Classification Sub-Models. 1257-1272 - S. Prakash, P. Vishnu Raja, A. Baseera, D. Mansoor Hussain, V. R. Balaji, K. Venkatachalam:
Ensemble Nonlinear Support Vector Machine Approach for Predicting Chronic Kidney Diseases. 1273-1287 - V. Balaji, P. Selvaraj:
Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks. 1289-1303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.