


default search action
Computer Systems: Science & Engineering, Volume 43
Volume 43, Number 1, 2022
- Xiaorui Zhang, Wenzheng Zhang, Wei Sun, Hailun Wu, Aiguo Song, Sunil Kumar Jha

:
A Real-time Cutting Model Based on Finite Element and Order Reduction. 1-15 - S. Navaneetha Krishnan, P. Sundara Vadivel

, D. Yuvaraj, T. Satyanarayana Murthy
, Sree Jagadeesh Malla
, S. Nachiyappan, S. Shanmuga Priya:
Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering. 17-26 - Abdul Majid, Sumaira Kausar, Samabia Tehsin

, Amina Jameel:
A Fast Panoptic Segmentation Network for Self-Driving Scene Understanding. 27-43 - L. Arulmozhiselvan, Elangovan Uma

:
QKD in Cloud-Fog Computing for Personal Health Record. 45-57 - Wen-Tsai Sung

, Sung-Jung Hsiao:
Home Monitoring of Pets Based on AIoT. 59-75 - V. Kumar, N. Jayapandian

, P. Balasubramanie:
Energy-Efficient Cluster in Wireless Sensor Network Using Life Time Delay Clustering Algorithms. 77-86 - Safaa El-Gazar, Walid El Shafai, Ghada M. El Banby, Hesham F. A. Hamed, Gerges M. Salama

, Mohammed Abd-Elnaby, Fathi E. Abd El-Samie:
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms. 87-102 - Jieren Cheng, Xinzhi Yao, Hui Li, Hao Lu, Naixue Xiong, Ping Luo, Le Liu, Hao Guo, Wen Feng:

Cooperative Detection Method for DDoS Attacks Based on Blockchain. 103-117 - B. Padmavathi

, B. Muthukumar:
Pattern Analysis and Regressive Linear Measure for Botnet Detection. 119-139 - A. Arivazhagi, S. Raja Kumar:

An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks. 141-157 - R. Swathy, B. Vinayagasundaram:

Bayes Theorem Based Virtual Machine Scheduling for Optimal Energy Consumption. 159-174 - R. Sasikala, R. Seyezhai:

Efficient Supply Current Control Strategies for Bridgeless Interleaved AC-DC Converter. 175-191 - Arun Kumar

, Sandeep Gupta, Himanshu Sharma, Mehedi Masud:
PAPR Reduction of NOMA Using Vandermonde Matrix-Particle Transmission Sequence. 193-201 - P. Peruma:

Document Clustering Using Graph Based Fuzzy Association Rule Generation. 203-218 - Lanlan Ni, Lanzheng Bian, Rugang Lu, Ting Chen, Jinyue Xia:

Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward. 219-231 - R. Padmavathy, M. Newlin Rajkumar:

Secured Cloud Communication Using Lightweight Hash Authentication with PUF. 233-243 - M. Kavitha, M. Sujaritha:

A Sensitive Wavebands Identification System for Smart Farming. 245-257 - C. Ram Kumar, K. Murali Krishna, Mohammad ShabbirAlam, K. Vigneshwaran, Sridharan Kannan, C. Bharatiraja

:
A Novel Approach Based on Hybrid Algorithm for Energy Efficient Cluster Head Identification in Wireless Sensor Networks. 259-273 - Venugopal Ulagamuthalvi, Govindarajan Kulanthaivel, Ananthakrishnan Balasundaram

, Arun Kumar Sivaraman:
Breast Mammogram Analysis and Classification Using Deep Convolution Neural Network. 275-289 - T. S. Balaji, S. Srinivasan, S. Prasanna Bharathi, B. Ramesh:

Fuzzy-Based Secure Clustering with Routing Technique for VANETs. 291-304 - Atif Mehmood

, Ahed Abugabah, Ahmed Ali AlZubi, Louis Sanzogni:
Early Diagnosis of Alzheimer's Disease Based on Convolutional Neural Networks. 305-315 - R. S. Latha, Saravana Balaji B.

, Nebojsa Bacanin
, Ivana Strumberger, Miodrag Zivkovic
, Milos Kabiljo:
Feature Selection Using Grey Wolf Optimization with Random Differential Grouping. 317-332 - G. Prema Arokia Mary, N. Suganthi:

Detection of Parkinson's Disease with Multiple Feature Extraction Models and Darknet CNN Classification. 333-345 - Chia-Nan Wang

, Ngoc-Ai-Thy Nguyen
, Thanh-Tuan Dang
, Jing-Wein Wang:
Assessing Asian Economies Renewable Energy Consumption Efficiency Using DEA with Undesirable Output. 347-362 - J. Anitha, M. Kalaiarasu:

MRI Brain Tumor Segmentation with Intuitionist Possibilistic Fuzzy Clustering and Morphological Operations. 363-379 - M. Anuradha, G. Mani, T. Shanthi, N. R. Nagarajan, P. Suresh

, C. Bharatiraja
:
Intrusion Detection System for Big Data Analytics in IoT Environment. 381-396 - Sunil Dhankhar

, Mukesh Kumar Gupta, Fida Hussain Memon, Surbhi Bhatia
, Pankaj Dadheech
, Arwa A. Mashat:
Support Vector Machine Based Handwritten Hindi Character Recognition and Summarization. 397-412 - Omar A. Saraereh

:
Design and Analysis of Novel Antenna for Millimeter-Wave Communication. 413-422
Volume 43, Number 2, 2022
- S. Nithya Devi

, S. Sasipriya:
Design of Hybrid True Random Number Generator for Cryptographic Applications. 423-437 - Ravindra Parshuram Bachate, Ashok Sharma, Amar Singh

, Ayman A. Aly, Abdulaziz H. Alghtani, Dac-Nhuong Le
:
Enhanced Marathi Speech Recognition Facilitated by Grasshopper Optimisation-Based Recurrent Neural Network. 439-454 - Ramasamy Madhumathi, Arumuganathan T, Shruthi R:

Soil Nutrient Detection and Recommendation Using IoT and Fuzzy Logic. 455-469 - G. Divya Mohana Priya, M. Karthikeyan, K. Murugan:

Incremental Linear Discriminant Analysis Dimensionality Reduction and 3D Dynamic Hierarchical Clustering WSNs. 471-486 - Prema Kandasamy, K. Prem Kumar:

Efficient Single-Stage Bridgeless AC to DC Converter Using Grey Wolf Optimization. 487-499 - A. Kayalvizhi, G. Sankara Malliga:

Capacitive Coupled Wide-Notch Stepped Impedance Narrow-Band Bandpass Filter for WiMax Application. 501-514 - M. Nuthal Srinivasan

, M. Chinnadurai:
An Efficient Video Inpainting Approach Using Deep Belief Network. 515-529 - A. Sathishkumar, T. Rammohan, S. Sathish Kumar, J. Uma, K. Srujan Raju

, Aarti Sangwan
, M. Sivachitra, M. Prabu:
QoS Constrained Network Coding Technique to Data Transmission Using IoT. 531-544 - D. Venugopal

, V. Mohan
, S. Ramesh, S. Janupriya, Sangsoon Lim, Seifedine Nimer Kadry:
Pattern Recognition of Modulation Signal Classification Using Deep Neural Networks. 545-558 - Jian Geng

, Shaoyuan Yu, Ailin Chen, Hao Wang, Bo Yan, Liang Li, Lei Song, Qirun Wang:
Evidence Mechanism of Power Dispatching Instruction Based on Blockchain. 559-571 - Hosam El-El-Sofany:

A Proposed Biometric Authentication Model to Improve Cloud Systems Security. 573-589 - Ba-Lam Do, Van-Thanh Nguyen, Hoang-Nam Dinh, Thanh-Chung Dao, Binhminh Nguyen:

Blockchain for Education: Verification and Management of Lifelong Learning Data. 591-604 - Arulmozhi Nagarajan, T. Aruldoss Albert Victoire

:
Kalman Filter and H∞ Filter Based Linear Quadratic Regulator for Furuta Pendulum. 605-623 - M. Manikandan, A. Rajiv Kannan:

Provisioning Intelligent Water Wave Optimization Approach for Underwater Acoustic Wireless Sensor Networks. 625-641 - Hang He, Wanggen Liu, Zhenhan Zhao, Shan He, Jinghui Zhang:

Vulnerability of Regional Aviation Networks Based on DBSCAN and Complex Networks. 643-655 - V. Roopa, K. Malarvizhi, S. Karthik:

Efficient Energy-Aware Resource Management Model (EEARMM) Based Dynamic VM Migration. 657-669 - Shabana Habib

, Saleh Alyahya
, Aizaz Ahmed, Muhammad Islam, Sheroz Khan
, Ishrat Khan
, Muhammad Kamil:
X-ray Image-Based COVID-19 Patient Detection Using Machine Learning-Based Techniques. 671-682 - M. Sivakumar

, N. M. Saravana Kumar, N. Karthikeyan
:
An Efficient Deep Learning-based Content-based Image Retrieval Framework. 683-700 - Saleh Albahli:

Transfer Learning on Deep Neural Networks to Detect Pornography. 701-717 - Yingnan Zhao, Guanlan Ji, Fei Chen, Peiyuan Ji, Yi Cao:

Spatio-Temporal Wind Speed Prediction Based on Variational Mode Decomposition. 719-735 - Prabu Subramani

, B. Thiyaneswaran
, M. Sujatha, C. Nalini, Sujatha Rajkumar:
Grid Search for Predicting Coronary Heart Disease by Tuning Hyper-Parameters. 737-749 - Raed Alhamad

:
Cognitive Radio Networks Using Intelligent Reflecting Surfaces. 751-765 - Amer Mirkhan

, Numan Çelebi
:
Binary Representation of Polar Bear Algorithm for Feature Selection. 767-783 - Saraswathi Shunmuganathan

, Sridharan Kannan
, Madhusudhana Rao T. V.
, K. Ambika, T. Jayasankar
:
Improved Secure Identification-Based Multilevel Structure of Data Sharing in Cloud Environments. 785-801 - Ahmed Ben Atitallah

:
An FPGA Design for Real-Time Image Denoising. 803-816 - Rashed Iqbal

, Hazlie Mokhlis, Anis Salwa Mohd Khairuddin
, Syafiqah Ismail, Munir Azam Muhammad:
Optimized Gated Recurrent Unit for Mid-Term Electricity Price Forecasting. 817-832 - A. S. Anakath, S. Ambika, S. Rajakumar, R. Kannadasan, K. S. Sendhil Kumar

:
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health. 833-847 - Ramasamy Madhumathi, A. Meena Kowshalya

, R. Shruthi:
Assessment of Sentiment Analysis Using Information Gain Based Feature Selection Approach. 849-860
Volume 43, Number 3, 2022
- Huiyu Sun, Ralph Grishman:

Lexicalized Dependency Paths Based Supervised Learning for Relation Extraction. 861-870 - E. Kavitha

, Rengasamy Tamilarasan
, Arunadevi Baladhandapani
, M. K. Jayanthi Kannan
:
A Novel Soft Clustering Approach for Gene Expression Data. 871-886 - S. Shanmuga Priya, D. Yuvaraj, T. Satyanarayana Murthy

, Varghese S. Chooralil, S. Navaneetha Krishnan, P. Banumathy, P. Sundara Vadivel
:
Secure Key Management Based Mobile Authentication in Cloud. 887-896 - Maram Abdullah M. Alyahya, Arshiya S. Ansari, Mohammad Sajid Mohammadi:

An Animated GIF Steganography Using Variable Block Partition Scheme. 897-914 - Attia Qammar, Ahmad Karim, Yasser Obaid Alharbi, Mohammad Salih Alsaffar

, Abdullah Alharbi:
A Learning Model to Detect Android C&C Applications Using Hybrid Analysis. 915-930 - S. Lakshminarayanan:

Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing. 931-946 - R. Haripriya

, G. Kousalya
:
Primary Contacts Identification for COVID-19 Carriers from Surveillance Videos. 947-965 - Amjad Alsirhani

, Mohamed M. Ezz
, Ayman Mohamed Mostafa
:
Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing. 967-984 - S. Saravanakumar, S. Chitra:

Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption. 985-996 - Jiaming Wang, Xiaolan Xie, Xiaochun Cheng, Yuhan Wang:

Improved Density Peaking Algorithm for Community Detection Based on Graph Representation Learning. 997-1008 - Essam Hendawi

, Sattam Al Otaibi, Sherif Zaid, Ayman Hoballah
, Salah K. Elsayed, Nagy I. Elkalashy, Yasser Ahmed:
Modeling and Experimental Verification of Electric Vehicles Off-Grid Photovoltaic Powered Charging Station. 1009-1025 - S. Kalpana, Chinnamuthu Annadurai

:
Optimized Cognitive Learning Model for Energy Efficient Fog-BAN-IoT Networks. 1027-1040 - A. Geetha, N. B. Prakash:

Classification of Glaucoma in Retinal Images Using EfficientnetB4 Deep Learning Model. 1041-1055 - S. Priyadarsini

, Carlos Andrés Tavera Romero, Abolfazl Mehbodniya, P. Vidya Sagar
, Sudhakar Sengan:
Automatic Liver Tumor Segmentation in CT Modalities Using MAT-ACM. 1057-1068 - Minghu Tang, Wei Yu, Xiaoming Li, Xue Chen, Wenjun Wang, Zhen Liu:

Cold-Start Link Prediction via Weighted Symmetric Nonnegative Matrix Factorization with Graph Regularization. 1069-1084 - Somia Belaidouni, Moeiz Miraoui

, Chakib Tadj:
QL-CBR Hybrid Approach for Adapting Context-Aware Services. 1085-1098 - Pranamita Nanda

, Duraipandian N
:
A Novel Optimizer in Deep Neural Network for Diabetic Retinopathy Classification. 1099-1110 - Shital Joshi, S. Manimurugan, Ahamed Aljuhani, Umar Albalawi, Amer Aljaedi

:
Energy-efficient and Secure Wireless Communication for Telemedicine in IoT. 1111-1130 - D. Jeyakumar, C. Rajabhushanam:

Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm. 1131-1144 - Can Xiao, Feng Li, Dengyong Zhang, Pu Huang, Xiangling Ding

, Victor S. Sheng:
Image Inpainting Detection Based on High-Pass Filter Attention Network. 1145-1154 - Kamal Mansur Jambi, Hassanin M. Al-Barhamtoshy

, Wajdi Al Jedaibi, Mohsen A. Rashwan, Sherif M. Abdou:
Speak-Correct: A Computerized Interface for the Analysis of Mispronounced Errors. 1155-1173 - Norwini Zaidi, Iskandar Ishak, Fatimah Sidi, Lilly Suriani Affendey:

An Efficient Schema Transformation Technique for Data Migration from Relational to Column-Oriented Databases. 1175-1188 - Mohammad O. Wedyan

, Omar Ghaleb Elshaweesh, Enas Ramadan, Ryan Alturki:
Vibrating Particles System Algorithm for Solving Classification Problems. 1189-1206 - Ramesh Ramamoorthy, Himanshu Sharma, A. Akilandeswari, Nidhi Gour, Arun Kumar

, Mehedi Masud:
Analysis of Cognitive Radio for LTE and 5G Waveforms. 1207-1217 - Yanman Li, Jun Zhang, Yang Hu, Yingnan Zhao, Yi Cao:

Real-time Safety Helmet-wearing Detection Based on Improved YOLOv5. 1219-1230 - Jansi Rani Sella Veluswami:

Improving Throughput of Transmission Control Protocol Using Cross Layer Approach. 1231-1239 - Tran Manh Tuan, Tran Thi Ngan, Nguyen Tu Trung:

Object Detection in Remote Sensing Images Using Picture Fuzzy Clustering and MapReduce. 1241-1253 - Naseebah Almufadi

, Ali Mustafa Qamar:
Deep Convolutional Neural Network Based Churn Prediction for Telecommunication Industry. 1255-1270 - S. Gunasekar, G. Joselin Retna Kumar, G. Pius Agbulu:

Air Quality Predictions in Urban Areas Using Hybrid ARIMA and Metaheuristic LSTM. 1271-1284 - Xiaona Hu, Shan Ji, Hao Hua, Baiqing Zhou, Gang Hu:

An Improved Genetic Algorithm for Berth Scheduling at Bulk Terminal. 1285-1296 - Waseem Ullah Khan

, Safdar Nawaz Khan Marwat
, Salman Ahmed
:
Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol. 1297-1313 - Omar Ben Bahri, Abdullah Alhumaidi Alotaibi:

Low-Cost IMU Sensors for Satellite Maturity Improvement. 1315-1326 - T. Shanmuigapriya, S. Swamynathan, Thiruvaazhi Uloli

:
Customized Share Level Monitoring System for Users in OSN-Third Party Applications. 1327-1339 - Chitra Paulpandi

, Murukesh Chinnasamy, Shanker Nagalingam Rajendiran:
Multi-Site Air Pollutant Prediction Using Long Short Term Memory. 1341-1355 - Zubair Nabi, Ramzan Talib

, Muhammad Kashif Hanif
, Muhammad Awais:
Contextual Text Mining Framework for Unstructured Textual Judicial Corpora through Ontologies. 1357-1374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














