Home / Journals / CSSE / Vol.41, No.2, 2022
Special Issues
  • Open AccessOpen Access

    ARTICLE

    Parallel Cloth Simulation Using OpenGL Shading Language

    Hongly Va1, Min-Hyung Choi2, Min Hong3,*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 427-443, 2022, DOI:10.32604/csse.2022.020685 - 25 October 2021
    Abstract The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic. In general, the mass–spring system is applied to real-time cloth simulation with three types of springs. However, hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient. Furthermore, to obtain stable behavior, constraint enforcement is used instead of maintenance of the force of each spring. Constraint force computation involves a large sparse linear solving operation. Due to the… More >

  • Open AccessOpen Access

    ARTICLE

    Evaluation of NFC-Guidable System to Manage Polypharmacy in Elderly Patients

    Khalid Alzahrani1,*, Mrim Alnfiai2
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 445-460, 2022, DOI:10.32604/csse.2022.020620 - 25 October 2021
    Abstract A complete and thorough understanding by patients of their prescriptions is one of the most critical components of a successful treatment journey. Being unfamiliar with the intricacies of prescribed medication can cause serious health risks due to not adhering to prescription instructions or noting potential drug interactions, which can lead to life-threatening injuries. Pharmacists face communication barriers (including non-English speaking patients), lack of time, lack of knowledge, workload, and frequent interruption when dispensing medicines often preventing them from providing the necessary guidance to their patients. To minimize this risk, an NFC-Guidable polypharmacy system was developed… More >

  • Open AccessOpen Access

    ARTICLE

    Relative Time Quantum-based Enhancements in Round Robin Scheduling

    Sardar Zafar Iqbal, Hina Gull*, Saqib Saeed, Madeeha Saqib, Mohammed Alqahtani, Yasser A. Bamarouf, Gomathi Krishna, May Issa Aldossary
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 461-477, 2022, DOI:10.32604/csse.2022.017003 - 25 October 2021
    Abstract Modern human life is heavily dependent on computing systems and one of the core components affecting the performance of these systems is underlying operating system. Operating systems need to be upgraded to match the needs of modern-day systems relying on Internet of Things, Fog computing and Mobile based applications. The scheduling algorithm of the operating system dictates that how the resources will be allocated to the processes and the Round Robin algorithm (RR) has been widely used for it. The intent of this study is to ameliorate RR scheduling algorithm to optimize task scheduling. We More >

  • Open AccessOpen Access

    ARTICLE

    Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing

    A. S. Anakath1,*, R. Kannadasan2, Niju P. Joseph3, P. Boominathan4, G. R. Sreekanth5
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 479-492, 2022, DOI:10.32604/csse.2022.019940 - 25 October 2021
    Abstract Cloud computing is a high network infrastructure where users, owners, third users, authorized users, and customers can access and store their information quickly. The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently. This cloud is nowadays highly affected by internal threats of the user. Sensitive applications such as banking, hospital, and business are more likely affected by real user threats. An intruder is presented as a user and set as a member of the network. After becoming an insider… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Placement and Sizing of Distributed Generation Using Metaheuristic Algorithm

    D. Nageswari1,*, N. Kalaiarasi2, G. Geethamahalakshmi1
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 493-509, 2022, DOI:10.32604/csse.2022.020539 - 25 October 2021
    Abstract Power loss and voltage uncertainty are the major issues prevalently faced in the design of distribution systems. But such issues can be resolved through effective usage of networking reconfiguration that has a combination of Distributed Generation (DG) units from distribution networks. In this point of view, optimal placement and sizing of DGs are effective ways to boost the performance of power systems. The optimum allocation of DGs resolves various problems namely, power loss, voltage profile improvement, enhanced reliability, system stability, and performance. Several research works have been conducted to address the distribution system problems in… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Metaheuristics Web Service Composition Model for QoS Aware Services

    P. Rajeswari*, K. Jayashree
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 511-524, 2022, DOI:10.32604/csse.2022.020352 - 25 October 2021
    Abstract Recent advancements in cloud computing (CC) technologies signified that several distinct web services are presently developed and exist at the cloud data centre. Currently, web service composition gains maximum attention among researchers due to its significance in real-time applications. Quality of Service (QoS) aware service composition concerned regarding the election of candidate services with the maximization of the whole QoS. But these models have failed to handle the uncertainties of QoS. The resulting QoS of composite service identified by the clients become unstable and subject to risks of failing composition by end-users. On the other… More >

  • Open AccessOpen Access

    ARTICLE

    Semantic Based Greedy Levy Gradient Boosting Algorithm for Phishing Detection

    R. Sakunthala Jenni*, S. Shankar
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 525-538, 2022, DOI:10.32604/csse.2022.019300 - 25 October 2021
    Abstract The detection of phishing and legitimate websites is considered a great challenge for web service providers because the users of such websites are indistinguishable. Phishing websites also create traffic in the entire network. Another phishing issue is the broadening malware of the entire network, thus highlighting the demand for their detection while massive datasets (i.e., big data) are processed. Despite the application of boosting mechanisms in phishing detection, these methods are prone to significant errors in their output, specifically due to the combination of all website features in the training state. The upcoming big data… More >

  • Open AccessOpen Access

    ARTICLE

    FACT: An Air-Ground Communication Framework for Seeding Quality Control of Aircraft

    Dequan Li1,2, Jiming Li1,2, Xu Zhou1,2, JinRong Hu3, Xin Wang4, Jing Duan1,2,*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 539-555, 2022, DOI:10.32604/csse.2022.019551 - 25 October 2021
    Abstract A new type of air-ground communication application framework named FACT (framework for air-ground communication technology with weather-modification aircraft) is presented to track and command weather-modification aircraft to perform ideal cloud seeding. FACT provides a set of solutions from three perspectives, namely, onboard, onground and air-to-ground, with the core purpose of solving the problems of the rapid exchange of information, contract analysis and identifying potential seeding areas when flight plans and meteorological conditions change. On board, the observed data are processed centrally and transmitted downward through air-to-ground communication. The real-time application and sharing of aircraft detection More >

  • Open AccessOpen Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843 - 25 October 2021
    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Neuro-Fuzzy-Based Crop Ontology for Effective Information Retrieval

    K. Ezhilarasi1,*, G. Maria Kalavathy2
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 569-582, 2022, DOI:10.32604/csse.2022.020280 - 25 October 2021
    Abstract Ontology is the progression of interpreting the conceptions of the information domain for an assembly of handlers. Familiarizing ontology as information retrieval (IR) aids in augmenting the searching effects of user-required relevant information. The crux of conventional keyword matching-related IR utilizes advanced algorithms for recovering facts from the Internet, mapping the connection between keywords and information, and categorizing the retrieval outcomes. The prevailing procedures for IR consume considerable time, and they could not recover information proficiently. In this study, through applying a modified neuro-fuzzy algorithm (MNFA), the IR time is mitigated, and the retrieval accuracy… More >

  • Open AccessOpen Access

    ARTICLE

    A Smart Deep Convolutional Neural Network for Real-Time Surface Inspection

    Adriano G. Passos, Tiago Cousseau, Marco A. Luersen*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 583-593, 2022, DOI:10.32604/csse.2022.020020 - 25 October 2021
    Abstract A proper detection and classification of defects in steel sheets in real time have become a requirement for manufacturing these products, largely used in many industrial sectors. However, computers used in the production line of small to medium size companies, in general, lack performance to attend real-time inspection with high processing demands. In this paper, a smart deep convolutional neural network for using in real-time surface inspection of steel rolling sheets is proposed. The architecture is based on the state-of-the-art SqueezeNet approach, which was originally developed for usage with autonomous vehicles. The main features of More >

  • Open AccessOpen Access

    ARTICLE

    Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves

    Monday Eze1,*, Charles Okunbor2, Deborah Aleburu3, Olubukola Adekola1, Ibrahim Ramon4, Nneka Richard-Nnabu5, Oghenetega Avwokuruaye6, Abisola Olayiwola3, Rume Yoro7, Esomu Solomon8
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 595-609, 2022, DOI:10.32604/csse.2022.020835 - 25 October 2021
    Abstract This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand More >

  • Open AccessOpen Access

    ARTICLE

    Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments

    Jaber Almutairi1, Mohammad Aldossary2,*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 611-624, 2022, DOI:10.32604/csse.2022.018112 - 25 October 2021
    Abstract The Internet of Things (IoT) has recently become a popular technology that can play increasingly important roles in every aspect of our daily life. For collaboration between IoT devices and edge cloud servers, edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests. However, the quantitative impact of different offloading architectures and policies on IoT applications’ performance remains far from clear, especially with a dynamic and unpredictable range of connected physical and virtual devices. To this end, this work models the More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of the Desynchronization Attack Impact on the E2EA Scheme

    Shadi Nashwan*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 625-644, 2022, DOI:10.32604/csse.2022.020799 - 25 October 2021
    Abstract The healthcare IoT system is considered to be a significant and modern medical system. There is broad consensus that these systems will play a vital role in the achievement of economic growth in numerous growth countries. Among the major challenges preventing the fast and widespread adoption of such systems is the failure to maintain the data privacy of patients and the integrity of remote clinical diagnostics. Recently, the author proposed an end-to-end authentication scheme for healthcare IoT systems (E2EA), to provide a mutual authentication with a high data rate between the communication nodes of the… More >

  • Open AccessOpen Access

    ARTICLE

    Brain Image Classification Using Time Frequency Extraction with Histogram Intensity Similarity

    Thangavel Renukadevi1,*, Kuppusamy Saraswathi1, P. Prabu2, K. Venkatachalam3
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 645-460, 2022, DOI:10.32604/csse.2022.020810 - 25 October 2021
    Abstract Brain medical image classification is an essential procedure in Computer-Aided Diagnosis (CAD) systems. Conventional methods depend specifically on the local or global features. Several fusion methods have also been developed, most of which are problem-distinct and have shown to be highly favorable in medical images. However, intensity-specific images are not extracted. The recent deep learning methods ensure an efficient means to design an end-to-end model that produces final classification accuracy with brain medical images, compromising normalization. To solve these classification problems, in this paper, Histogram and Time-frequency Differential Deep (HTF-DD) method for medical image classification… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Data Placement and Replication Approach for SIoT with Edge

    B. Prabhu Shankar1,*, S. Chitra2
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 661-676, 2022, DOI:10.32604/csse.2022.019507 - 25 October 2021
    Abstract Social networks (SNs) are sources with extreme number of users around the world who are all sharing data like images, audio, and video to their friends using IoT devices. This concept is the so-called Social Internet of Things (SIot). The evolving nature of edge-cloud computing has enabled storage of a large volume of data from various sources, and this task demands an efficient storage procedure. For this kind of large volume of data storage, the usage of data replication using edge with geo-distributed cloud service area is suited to fulfill the user’s expectations with low… More >

  • Open AccessOpen Access

    ARTICLE

    Early Detection of Pancreatic Cancer Using Jaundiced Eye Images

    R. Reena Roy*, G. S. Anandha Mala
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 677-688, 2022, DOI:10.32604/csse.2022.016620 - 25 October 2021
    Abstract Pancreatic cancer is one of the deadliest cancers, with less than 9% survival rates. Pancreatic Ductal Adeno Carcinoma (PDAC) is common with the general public affecting most people older than 45. Early detection of PDAC is often challenging because cancer symptoms will progress only at later stages (advanced stage). One of the earlier symptoms of PDAC is Jaundice. Patients with diabetes, obesity, and alcohol consumption are also at higher risk of having pancreatic cancer. A decision support system is developed to detect pancreatic cancer at an earlier stage to address this challenge. Features such as More >

  • Open AccessOpen Access

    ARTICLE

    A New Method of Image Restoration Technology Based on WGAN

    Wei Fang1,2,*, Enming Gu1, Weinan Yi1, Weiqing Wang1, Victor S. Sheng3
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 689-698, 2022, DOI:10.32604/csse.2022.020176 - 25 October 2021
    Abstract With the development of image restoration technology based on deep learning, more complex problems are being solved, especially in image semantic inpainting based on context. Nowadays, image semantic inpainting techniques are becoming more mature. However, due to the limitations of memory, the instability of training, and the lack of sample diversity, the results of image restoration are still encountering difficult problems, such as repairing the content of glitches which cannot be well integrated with the original image. Therefore, we propose an image inpainting network based on Wasserstein generative adversarial network (WGAN) distance. With the corresponding More >

  • Open AccessOpen Access

    ARTICLE

    Algorithms to Calculate the Most Reliable Maximum Flow in Content Delivery Network

    Baili Zhang1, Keke Ling1,*, Pei Zhang2,3, Zhao Zhang2,3, Mingjun Zhong4
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 699-715, 2022, DOI:10.32604/csse.2022.020193 - 25 October 2021
    Abstract Calculating the most reliable maximum flow (MRMF) from the edge cache node to the requesting node can provide an important reference for selecting the best edge cache node in a content delivery network (CDN). However, SDBA, as the current state-of-the-art MRMF algorithm, is too complex to meet real-time computing needs. This paper proposes a set of MRMF algorithms: NWCD (Negative Weight Community Deletion), SCPDAT (Single-Cycle Preference Deletion Approximation algorithm with Time constraint) and SCPDAP (Single-Cycle Preference Deletion Approximation algorithm with Probability constraint). NWCD draws on the “flow-shifting” algorithm of minimum cost and maximum flow, and… More >

  • Open AccessOpen Access

    ARTICLE

    A Generalized State Space Average Model for Parallel DC-to-DC Converters

    Hasan Alrajhi*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 717-734, 2022, DOI:10.32604/csse.2022.021279 - 25 October 2021
    Abstract The high potentiality of integrating renewable energies, such as photovoltaic, into a modern electrical microgrid system, using DC-to-DC converters, raises some issues associated with controller loop design and system stability. The generalized state space average model (GSSAM) concept was consequently introduced to design a DC-to-DC converter controller in order to evaluate DC-to-DC converter performance and to conduct stability studies. This paper presents a GSSAM for parallel DC-to-DC converters, namely: buck, boost, and buck-boost converters. The rationale of this study is that modern electrical systems, such as DC networks, hybrid microgrids, and electric ships, are formed More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid GLFIL Enhancement and Encoder Animal Migration Classification for Breast Cancer Detection

    S. Prakash1,*, M. Vinoth Kumar2, R. Saravana Ram3, Miodrag Zivkovic4, Nebojsa Bacanin4, Milos Antonijevic4
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 735-749, 2022, DOI:10.32604/csse.2022.020533 - 25 October 2021
    Abstract Breast cancer has become the second leading cause of death among women worldwide. In India, a woman is diagnosed with breast cancer every four minutes. There has been no known basis behind it, and detection is extremely challenging among medical scientists and researchers due to unknown reasons. In India, the ratio of women being identified with breast cancer in urban areas is 22:1. Symptoms for this disease are micro calcification, lumps, and masses in mammogram images. These sources are mostly used for early detection. Digital mammography is used for breast cancer detection. In this study,… More >

  • Open AccessOpen Access

    ARTICLE

    Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes

    G. R. Sreekanth1,*, S. Ahmed Najat Ahmed2, Marko Sarac3, Ivana Strumberger3, Nebojsa Bacanin3, Miodrag Zivkovic3
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.020534 - 25 October 2021
    Abstract Fog computing provides quality of service for cloud infrastructure. As the data computation intensifies, edge computing becomes difficult. Therefore, mobile fog computing is used for reducing traffic and the time for data computation in the network. In previous studies, software-defined networking (SDN) and network functions virtualization (NFV) were used separately in edge computing. Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance, reliability, and scalability. SDN/NFV is still in development. The traditional Internet of things (IoT) data analysis system is only based on… More >

  • Open AccessOpen Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888 - 25 October 2021
    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol… More >

  • Open AccessOpen Access

    ARTICLE

    Measuring Mental Workload Using ERPs Based on FIR, ICA, and MARA

    Yu Sun1, Yi Ding2,*, Junyi Jiang3, Vincent G. Duffy4
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 781-794, 2022, DOI:10.32604/csse.2022.016387 - 25 October 2021
    Abstract Mental workload is considered to be strongly linked to human performance, and the ability to measure it accurately is key for balancing human health and work. In this study, brain signals were elicited by mental arithmetic tasks of varying difficulty to stimulate different levels of mental workload. In addition, a finite impulse response (FIR) filter, independent component analysis (ICA), and multiple artifact rejection algorithms (MARAs) were used to filter event-related potentials (ERPs). Then, the data consisting of ERPs, subjective ratings of mental workload, and task performance, were analyzed through the use of variance and Spearman’s… More >

  • Open AccessOpen Access

    ARTICLE

    On Mixed Model for Improvement in Stock Price Forecasting

    Qunhui Zhang1, Mengzhe Lu3,4, Liang Dai2,*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 795-809, 2022, DOI:10.32604/csse.2022.019987 - 25 October 2021
    Abstract Stock market trading is an activity in which investors need fast and accurate information to make effective decisions. But the fact is that forecasting stock prices by using various models has been suffering from low accuracy, slow convergence, and complex parameters. This study aims to employ a mixed model to improve the accuracy of stock price prediction. We present how to use a random walk based on jump-diffusion, to obtain stock predictions with a good-fitting degree by adjusting different parameters. Aimed at getting better parameters and then using the time series model to predict the… More >

  • Open AccessOpen Access

    ARTICLE

    Healthcare Device Security Assessment through Computational Methodology

    Masood Ahmad1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Sabita Khatri2, Adil Hussain Seh1, Mohd Nadeem1, Alka Agrawal1,*
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 811-828, 2022, DOI:10.32604/csse.2022.020097 - 25 October 2021
    Abstract The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to classify the best alternatives to security techniques for healthcare devices to securing the devices. The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights. The ranks of the alternatives consequently decide the order of priority for the techniques. A1… More >

  • Open AccessOpen Access

    ARTICLE

    Modified Mackenzie Equation and CVOA Algorithm Reduces Delay in UASN

    R. Amirthavalli1,*, S. Thanga Ramya2, N. R. Shanker3
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 829-847, 2022, DOI:10.32604/csse.2022.020307 - 25 October 2021
    Abstract In Underwater Acoustic Sensor Network (UASN), routing and propagation delay is affected in each node by various water column environmental factors such as temperature, salinity, depth, gases, divergent and rotational wind. High sound velocity increases the transmission rate of the packets and the high dissolved gases in the water increases the sound velocity. High dissolved gases and sound velocity environment in the water column provides high transmission rates among UASN nodes. In this paper, the Modified Mackenzie Sound equation calculates the sound velocity in each node for energy-efficient routing. Golden Ratio Optimization Method (GROM) and… More >

  • Open AccessOpen Access

    ARTICLE

    Stochastic Gradient Boosting Model for Twitter Spam Detection

    K. Kiruthika Devi1,*, G. A. Sathish Kumar2
    Computer Systems Science and Engineering, Vol.41, No.2, pp. 849-859, 2022, DOI:10.32604/csse.2022.020836 - 25 October 2021
    Abstract

    In today’s world of connectivity there is a huge amount of data than we could imagine. The number of network users are increasing day by day and there are large number of social networks which keeps the users connected all the time. These social networks give the complete independence to the user to post the data either political, commercial or entertainment value. Some data may be sensitive and have a greater impact on the society as a result. The trustworthiness of data is important when it comes to public social networking sites like facebook and

    More >

Per Page:

Share Link