


default search action
Computer Systems: Science & Engineering, Volume 37
Volume 37, Number 1, 2021
- Shakeel Ahmed

, Abdulaziz Alhumam
:
Unified Computational Modelling for Healthcare Device Security Assessment. 1-18 - Kaisarul Islam, Tabia Hossain, Mohammad Monirujjaman Khan

, Mehedi Masud
, Roobaea Alroobaea
:
Comparative Design and Study of A 60 GHz Antenna for Body-Centric Wireless Communications. 19-32 - Sinil Mubarak, Mohamed Hadi Habaebi, Md. Rafiqul Islam, Abdul Rahman Farah Diyana, Mohammad Tahir

:
Anomaly Detection in ICS Datasets with Machine Learning Algorithms. 33-46 - Mustafa M. M. Al Qudah, Ahmad Sufril Azlan Mohamed

, Syaheerah L. Lutfi:
Affective State Recognition Using Thermal-Based Imaging: A Survey. 47-62 - Ahmed Naif M. Alahmadi

, Hegazy Rezk:
A Robust Single-Sensor MPPT Strategy for Shaded Photovoltaic-Battery System. 63-71 - Shahrul Nizam Ismail, Suraya Hamid, Muneer Ahmad

, Abdulellah Alaboudi
, N. Z. Jhanjhi
:
Exploring Students Engagement Towards the Learning Management System (LMS) Using Learning Analytics. 73-87 - Hua-Rui Wu, Huaji Zhu, Xiao Han, Wei Xu:

Layout Optimization for Greenhouse WSN Based on Path Loss Analysis. 89-104 - Zhengqiu Weng, Timing Chen

, Tiantian Zhu, Hang Dong, Dan Zhou, Osama Alfarraj:
TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators. 105-119 - Zihao Shen

, Hui Wang
, Kun Liu, Peiqian Liu, Menglong Ba, Mengyao Zhao:
RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning. 121-133 - Xiaoyu Duan, Shi Ying, Wanli Yuan, Hailong Cheng, Xiang Yin:

A Generative Adversarial Networks for Log Anomaly Detection. 135-148
Volume 37, Number 2, 2021
- Mohammed Hayder Kadhim, Farhad Mardukhi:

A Novel IoT Application Recommendation System Using Metaheuristic Multi-Criteria Analysis. 149-158 - Mamdouh Alenezi

:
Safeguarding Cloud Computing Infrastructure: A Security Analysis. 159-167 - Muhammad Asim Mubarik, Zhijian Wang, Yunyoung Nam, Seifedine Kadry, Muhammad Azam Waqar:

Instagram Mobile Application Digital Forensics. 169-186 - Malik Khlaif Gharaibeh, Natheer Khlaif Gharaibeh, Mohammad Ayoub Khan, Waleed Abdel Karim Abu-Ain, Musab Kasim AlQudah:

Intention to Use Mobile Augmented Reality in the Tourism Sector. 187-202 - Luis Eduardo Bautista Villalpando, Alain Abran:

A Data Security Framework for Cloud Computing Services. 203-218 - Hegazy Rezk, Mohamed A. Mohamed, Ahmed A. Zaki Diab, N. Kanagaraj:

Load Frequency Control of Multi-interconnected Renewable Energy Plants Using Multi-Verse Optimizer. 219-231 - V. Vidya Lakshmi

, J. S. Leena Jasmine:
A Hybrid Artificial Intelligence Model for Skin Cancer Diagnosis. 233-245 - Zhuorong Li, Huawei Tian, Yanhui Xiao, Yunqi Tang, Anhong Wang:

An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files. 247-263 - Xizi Peng, Jinquan Zhang, Shibin Zhang, Wunan Wan, Hao Chen, Jinyue Xia:

A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain. 265-281 - Qiyuan Liu, Shuhua Lu, Lingqiang Lan:

YOLOv3 Attention Face Detector with High Accuracy and Efficiency. 283-295
Volume 37, Number 3, 2021
- Fahd N. Al-Wesabi, Saleh Alzahrani

, Fuad Ali Mohammed Al-Yarimi, Mohammed Abdul, Nadhem Nemri
, Mohammed M. Almazah:
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship. 297-311 - Abdulaziz Attaallah

, Sabita Khatri, Mohd Nadeem
, Syed Anas Ansar
, Abhishek Kumar Pandey, Alka Agrawal:
Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia. 313-329 - Prasantha Bharathi Dhandapani

, Dumitru Baleanu, Jayakumar Thippan
, Vinoth Sivakumar:
New Fuzzy Fractional Epidemic Model Involving Death Population. 331-346 - Wael Alosaimi

, Abdullah Alharbi, Hashem Alyami, Masood Ahmad
, Abhishek Kumar Pandey
, Rajeev Kumar
, Raees Ahmad Khan:
Impact of Tools and Techniques for Securing Consultancy Services. 347-360 - N. Z. Jhanjhi

, Mamoona Humayun
, Saleh Naif Almuayqil:
Cyber Security and Privacy Issues in Industrial Internet of Things. 361-380 - Jiayi Wang, Xinhui Liu, Jinshi Chen, Tongjian Wang, Xin Wang:

Mechanical-Hydraulic Co-Simulation of Full Hydraulic Articulated Steering System. 381-398 - Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed

:
Average Convergence for Directed & Undirected Graphs in Distributed Systems. 399-413 - D. Gurukumaresan

, C. Duraisamy
, R. Srinivasan:
Optimal Solution of Fuzzy Transportation Problem Using Octagonal Fuzzy Numbers. 415-421 - Qi Yue, Xiang Li, Dan Li:

Chinese Relation Extraction on Forestry Knowledge Graph Construction. 423-442 - Qiang Zhi

, Shuji Morisaki:
An Evaluation of Value-Oriented Review for Software Requirements Specification. 443-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














