


default search action
Computer Systems: Science & Engineering, Volume 40
Volume 40, Number 1, 2022
- Reham Alabduljabbar:

An IoT-Aware System for Managing Patients' Waiting Time Using Bluetooth Low-Energy Technology. 1-16 - Chia-Nan Wang

, Hsien-Pin Hsu, Hsin-Pin Fu, Nguyen Ky Phuc Phan, Van Thanh Nguyen
:
Scheduling Flexible Flow Shop in Labeling Companies to Minimize the Makespan. 17-36 - Shraddha R. Khonde

, Venugopal Ulagamuthalvi:
Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System. 37-51 - Abdalla Alameen:

Repeated Attribute Optimization for Big Data Encryption. 53-64 - Nagham A. Al-Madi, Adnan A. Hnaif:

Optimizing Traffic Signals in Smart Cities Based on Genetic Algorithm. 65-74 - Phan Nguyen Ky Phuc:

Stochastic Programming For Order Allocation And Production Planning. 75-85 - Salam Al-E'mari

, Mohammed Anbar, Yousef K. Sanjalawe
, Selvakumar Manickam, Iznan Husainy Hasbullah:
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges. 87-112 - Qusai Shambour

, AbdelRahman H. Hussein, Qasem Kharma
, Mosleh M. Abu-Alhaj
:
Effective Hybrid Content-Based Collaborative Filtering Approach for Requirements Engineering. 113-125 - Sundus Naji Al-Aziz

, Abd Al-Aziz Hosni El-Bagoury
, W. Afifi:
A Coordinated Search Algorithm for a Lost Target on the Plane. 127-137 - Lei Ren, Jing Hu, Mei Li, Ling Zhang, Jinyue Xia:

Structured Graded Lung Rehabilitation for Children with Mechanical Ventilation. 139-150 - Khaled Marji Alresheedi, Suliman Aladhadh, Rehan Ullah Khan, Ali Mustafa Qamar:

Dates Fruit Recognition: From Classical Fusion to Deep Learning. 151-166 - Nidal M. Turab

, Hamza Abu Owida
, Jamal I. Al-Nabulsi, Mwaffaq Abu-Alhaija
:
Recent Techniques for Harvesting Energy from the Human Body. 167-177 - B. Arunkumar

, G. Kousalya
:
Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS. 179-190 - A. Thasil Mohamed, Sundar Santhoshkumar

:
Deep Learning Based Process Analytics Model for Predicting Type 2 Diabetes Mellitus. 191-205 - Ziyan Yu, Cong Zhang, Naixue Xiong, Fang Chen:

A New Random Forest Applied to Heavy Metal Risk Assessment. 207-221 - Adi Alhudhaif

, Ammar Saeed
, Talha Imran
, Muhammad Kamran
, Ahmed S. Alghamdi, Ahmed O. Aseeri
, Shtwai Alsubai
:
A Particle Swarm Optimization Based Deep Learning Model for Vehicle Classification. 223-235 - Pham Hoang Vuong, Trinh Tan Dat

, Tieu Khoi Mai, Pham Hoang Uyen, Pham The Bao
:
Stock-Price Forecasting Based on XGBoost and LSTM. 237-246 - Muhammad Ibrahim, Sadia Husain

, Nida Zahra, Ali Ahmad
:
Vertex-Edge Degree Based Indices of Honey Comb Derived Network. 247-258 - Mohammad Al Mojamed

:
Smart Mina: LoRaWAN Technology for Smart Fire Detection Application for Hajj Pilgrimage. 259-272 - Sheng Xiao, Jing He, Xi Yang, Heng Zhou, Yujie Yuan:

Timing Error Aware Register Allocation in TS. 273-286 - Saman Shahbaz, Muhammad Qaiser Shahbaz:

Efficient Process Monitoring Under General Weibull Distribution. 287-297 - R. Muthaiyan

, M. Malleswaran
:
An Automated Brain Image Analysis System for Brain Cancer using Shearlets. 299-312 - A. Sumathi, S. Meganathan:

Ensemble Classifier Technique to Predict Gestational Diabetes Mellitus (GDM). 313-325 - Muhammad Hasnain, Imran Ghani, Seung Ryul Jeong, Aitizaz Ali:

Ensemble Learning Models for Classification and Selection of Web Services: A Review. 327-339 - Suliman A. Alsuhibany:

Vibration-Based Pattern Password Approach for Visually Impaired People. 341-356 - Qiang Zhi

, Zhengshu Zhou:
Empirically Modeling Enterprise Architecture Using ArchiMate. 357-374 - Anas Basalamah, Shadikur Rahman

:
An Optimized CNN Model Architecture for Detecting Coronavirus (COVID-19) with X-Ray Images. 375-388 - Hosam F. El-Sofany, Samir ElSeoud:

Implementing Effective Learning with Ubiquitous Learning Technology During Coronavirus Pandemic. 389-404
Volume 40, Number 2, 2022
- I. Devi, G. R. Karpagam:

Energy-Aware Scheduling for Tasks with Target-Time in Blockchain based Data Centres. 405-419 - Suliman A. Alsuhibany, Meznah Alquraishi:

Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography. 421-440 - Maged H. Wafy

, Samr Gamal Zanaty, Mahmoud M. El-Khouly
:
Video Identification Based on Watermarking Schemes and Visual Cryptography. 441-453 - Manoj Sindhwani

, Charanjeet Singh
, Rajeshwar Singh:
Implementation of K-Means Algorithm and Dynamic Routing Protocol in VANET. 455-467 - Maysoon S. Aldekhail, Marwah Almasri:

Intelligent Identification and Resolution of Software Requirement Conflicts: Assessment and Evaluation. 469-489 - G. Jayandhi, J. S. Leena Jasmine, S. Mary Joans:

Mammogram Learning System for Breast Cancer Diagnosis Using Deep Learning SVM. 491-503 - Adlyn Adam Teoh, Norjihan Binti Abdul Ghani

, Muneer Ahmad
, N. Z. Jhanjhi
, Mohammed A. Alzain, Mehedi Masud:
Organizational Data Breach: Building Conscious Care Behavior in Incident Response. 505-515 - N. Kanagaraj

:
Hybrid Renewable Energy Source Combined Dynamic Voltage Restorer for Power Quality Improvement. 517-538 - Trinh Tan Dat, Le Tran Anh Dang, Nguyen Nhat Truong, Pham Cung Le Thien Vu, Vu Ngoc Thanh Sang, Pham Thi Vuong, Pham The Bao:

An improved CRNN for Vietnamese Identity Card Information Recognition. 539-555 - Mesfer Alrizq, Shauban Ali Solangi

, Abdullah Alghamdi
, Muhammad Ali Nizamani, Muhammad Ali Memon, Mohammed Hamdi:
An Architecture Supporting Intelligent Mobile Healthcare Using Human-Computer Interaction HCI Principles. 557-569 - M. Vanitha

, J. Kirubakaran, K. Radhika
:
Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad. 571-579 - K. Rajakumari, M. Vinoth Kumar

, Garima Verma
, S. Balu, Dilip Kumar Sharma
, Sudhakar Sengan:
Fuzzy Based Ant Colony Optimization Scheduling in Cloud Computing. 581-592 - R. Kingsy Grace, R. Manimegalai

:
Design of Neural Network Based Wind Speed Prediction Model Using GWO. 593-606 - Yahia F. Said

, Mohammad Barr
, Taoufik Saidani
, Mohamed Atri
:
Desertification Detection in Makkah Region based on Aerial Images Classification. 607-618 - Mustafa Youldash, Saleh A. Al-Dossary, Lama Abdulaziz Aldaej, Farah Salem Alotaibi, Asma Khaled Aldubaikil, Noora Albinali, Maha AlGhamdi:

Applying Non-Local Means Filter on Seismic Exploration. 619-628 - Schahrazad Soltane, Sameer Al-shreef, Salwa M. Serag Eldin

:
Classification and Diagnosis of Lymphoma's Histopathological Images Using Transfer Learning. 629-644 - Amit Kumar

, Adesh Kumar, Geetam Singh Tomar:
Hardware Chip Performance of CORDIC Based OFDM Transceiver for Wireless Communication. 645-659 - R. Karthikeyan, A. Celine Kavida

, P. Suresh:
Deep Root Memory Optimized Indexing Methodology for Image Search Engines. 661-672 - Sk Raziul Ahasan, Kaisarul Islam, Mohammad Monirujjaman Khan, Mehedi Masud, Gurjot Singh Gaba, Hesham Alhumyani:

Novel Compact UWB Band Notch Antenna Design for Body-Centric Communications. 673-689 - Mohammed Baz, Sabita Khatri, Abdullah Baz, Hosam Alhakami, Alka Agrawal, Raees Ahmad Khan:

Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic. 691-702 - Puneet Garg, Ashutosh Dixit

, Preeti Sethi:
ML-Fresh: Novel Routing Protocol in Opportunistic Networks Using Machine Learning. 703-717 - K. Sangeetha, D. Prabha:

Understand Students Feedback Using Bi-Integrated CRF Model Based Target Extraction. 735-747 - Moustafa El-Shahed

, Asmaa M. Al-Dububan:
Deterministic and Stochastic Fractional Order Model for Lesser Date Moth. 749-764 - Rehan Ullah Khan, Waleed Albattah, Suliman Aladhadh, Shabana Habib

:
Learning Patterns from COVID-19 Instances. 765-777 - V. Rajkumar, M. Prakash, V. Vennila:

Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment. 779-793 - Muhammet Nuri Seyman:

Symbol Detection Based on Back Tracking Search Algorithm in MIMO-NOMA Systems. 795-804 - Hanan A. Hosni Mahmoud, Doaa Sami Khafaga

, Amal H. Alharbi:
Computerized Detection of Limbal Stem Cell Deficiency from Digital Cornea Images. 805-821
Volume 40, Number 3, 2022
- K. Yuvaraj, U. S. Ragupathy:

Hybrid Active Contour Mammographic Mass Segmentation and Classification. 823-834 - Sadia Husain

, Fouad A. Abolaban, Ali Ahmad
, Muhammad Ahsan Asim, Yasir Ahmad
:
On Vertex-Edge-Degree Topological Descriptors for Certain Crystal Networks. 835-850 - M. Govindarajan, V. Chandrasekaran, S. Anitha:

Network Traffic Prediction Using Radial Kernelized-Tversky Indexes-Based Multilayer Classifier. 851-863 - Vasaki Ponnusamy, Aun Yichiet, N. Z. Jhanjhi

, Mamoona Humayun
, Maram Fahhad Almufareh:
IoT Wireless Intrusion Detection and Network Traffic Analysis. 865-879 - M. A. El Safty

, Samirah Al Zahrani, Ansari Saleh Ahmar
, M. El Sayed:
Decision Making on Fuzzy Soft Simply* Continuous of Fuzzy Soft Multi-Function. 881-894 - Tsung-Yin Ou, Chen-Yang Cheng, Chun Hsiung Lai, Hsin-Pin Fu:

A Coordination-Based Algorithm for Dedicated Destination Vehicle Routing in B2B E-Commerce. 895-911 - Norjihan Binti Abdul Ghani

, Suraya Hamid, Muneer Ahmad
, Younes Saadi, N. Z. Jhanjhi
, Mohammed A. Alzain, Mehedi Masud:
Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume. 913-926 - Azza Abdullah Alnssayan, Mohammad Mahdi Hassan, Suliman A. Alsuhibany:

VacChain: A Blockchain-Based EMR System to Manage Child Vaccination Records. 927-945 - Mamoona Humayun, Ahmed Alsayat:

Prediction Model for Coronavirus Pandemic Using Deep Learning. 947-961 - G. Maria Jones, S. Godfrey Winster, P. Valarmathie:

Integrated Approach to Detect Cyberbullying Text: Mobile Device Forensics Data. 963-978 - Jialin Ma, Zhaojun Wang, Hai Guo, Qian Xie, Tao Wang, Bolun Chen:

Mining Syndrome Differentiating Principles from Traditional Chinese Medicine Clinical Data. 979-993 - Mansour Hammoud Alruwies, Shailendra Mishra

, Mohammed Abdul Rahman AlShehri:
Identity Governance Framework for Privileged Users. 995-1005 - B. T. Shobana, G. A. Sathish Kumar:

I-Quiz: An Intelligent Assessment Tool for Non-Verbal Behaviour Detection. 1007-1021 - Ahad Alloqmani, Omimah Alsaedi, Nadia Bahatheg

, Reem Alnanih, Lamiaa A. Elrefaei
:
Design Principles-Based Interactive Learning Tool for Solving Nonlinear Equations. 1023-1042 - Yanzan Han, Huawen Zhang, Zengfang Shi, Shuang Liang:

An Adaptive Fuzzy Control Model for Multi-Joint Manipulators. 1043-1057 - Chia-Nan Wang

, Chien-Chang Chou, Yu-Chi Chung, Nguyen Ky Phuc Phan, Van Thanh Nguyen
, Viet Tinh Nguyen:
Heuristic Scheduling of Job Orders in a Build-to-Order Manufacturing System. 1059-1072 - Namit Gupta

, Kunwar Singh Vaisla
, Arpit Jain
, Adesh Kumar, Rajeev Kumar
:
Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware. 1073-1084 - Farzaneh Khorasani, Morteza Mohammadi Zanjireh, Mahdi Bahaghighat, Qin Xin:

A Tradeoff Between Accuracy and Speed for K-Means Seed Determination. 1085-1098 - Yanzan Han, Hang Zhou, Zengfang Shi, Shuang Liang:

Adaptive Sliding Mode Control Method for Onboard Supercapacitors System. 1099-1108 - M. J. Huntul

, Taki-Eddine Oussaeif:
Solvability of the Nonlocal Inverse Parabolic Problem and Numerical Results. 1109-1126 - K. Abhirami, M. K. Kavitha Devi

:
Student Behavior Modeling for an E-Learning System Offering Personalized Learning Experiences. 1127-1144 - Liang Jin, Qinghui Meng, Shuang Liang:

Model of a Composite Energy Storage System for Urban Rail Trains. 1145-1152 - Maher Alsharif, Shailendra Mishra

, Mohammed Alshehri
:
Impact of Human Vulnerabilities on Cybersecurity. 1153-1166 - Shengchun Wang, Peiqi Chen, Jingui Huang, Tsz Ho Wong:

FPD Net: Feature Pyramid DehazeNet. 1167-1181 - Mohammad Monirujjaman Khan, Arifa Sultana, Mehedi Masud, Gurjot Singh Gaba, Hesham Alhumyani:

Miniaturized Novel UWB Band-Notch Textile Antenna for Body Area Networks. 1183-1198 - Vasaki Ponnusamy, Mamoona Humayun

, N. Z. Jhanjhi
, Aun Yichiet, Maram Fahhad Almufareh:
Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks. 1199-1215 - Mingming Zhang, Jiaming Mao, Yuanyuan Ma, Liangjie Xu, Chuanjun Wang, Ran Zhao, Zhihao Li, Lu Chen, Wenbing Zhao:

A CPK-Based Identity Authentication Scheme for IoT. 1217-1231 - Abdulwahed Awad Almutairi, Shailendra Mishra

, Mohammed Alshehri
:
Web Security: Emerging Threats and Defense. 1233-1248

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














