default search action
Computer Systems: Science & Engineering, Volume 40
Volume 40, Number 1, 2022
- Reham Alabduljabbar:
An IoT-Aware System for Managing Patients' Waiting Time Using Bluetooth Low-Energy Technology. 1-16 - Chia-Nan Wang, Hsien-Pin Hsu, Hsin-Pin Fu, Nguyen Ky Phuc Phan, Van Thanh Nguyen:
Scheduling Flexible Flow Shop in Labeling Companies to Minimize the Makespan. 17-36 - Shraddha R. Khonde, Venugopal Ulagamuthalvi:
Blockchain: Secured Solution for Signature Transfer in Distributed Intrusion Detection System. 37-51 - Abdalla Alameen:
Repeated Attribute Optimization for Big Data Encryption. 53-64 - Nagham A. Al-Madi, Adnan A. Hnaif:
Optimizing Traffic Signals in Smart Cities Based on Genetic Algorithm. 65-74 - Phan Nguyen Ky Phuc:
Stochastic Programming For Order Allocation And Production Planning. 75-85 - Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam, Iznan Husainy Hasbullah:
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges. 87-112 - Qusai Shambour, AbdelRahman H. Hussein, Qasem Kharma, Mosleh M. Abu-Alhaj:
Effective Hybrid Content-Based Collaborative Filtering Approach for Requirements Engineering. 113-125 - Sundus Naji Al-Aziz, Abd Al-Aziz Hosni El-Bagoury, W. Afifi:
A Coordinated Search Algorithm for a Lost Target on the Plane. 127-137 - Lei Ren, Jing Hu, Mei Li, Ling Zhang, Jinyue Xia:
Structured Graded Lung Rehabilitation for Children with Mechanical Ventilation. 139-150 - Khaled Marji Alresheedi, Suliman Aladhadh, Rehan Ullah Khan, Ali Mustafa Qamar:
Dates Fruit Recognition: From Classical Fusion to Deep Learning. 151-166 - Nidal M. Turab, Hamza Abu Owida, Jamal I. Al-Nabulsi, Mwaffaq Abu-Alhaija:
Recent Techniques for Harvesting Energy from the Human Body. 167-177 - B. Arunkumar, G. Kousalya:
Secure and Light Weight Elliptic Curve Cipher Suites in SSL/TLS. 179-190 - A. Thasil Mohamed, Sundar Santhoshkumar:
Deep Learning Based Process Analytics Model for Predicting Type 2 Diabetes Mellitus. 191-205 - Ziyan Yu, Cong Zhang, Naixue Xiong, Fang Chen:
A New Random Forest Applied to Heavy Metal Risk Assessment. 207-221 - Adi Alhudhaif, Ammar Saeed, Talha Imran, Muhammad Kamran, Ahmed S. Alghamdi, Ahmed O. Aseeri, Shtwai Alsubai:
A Particle Swarm Optimization Based Deep Learning Model for Vehicle Classification. 223-235 - Pham Hoang Vuong, Trinh Tan Dat, Tieu Khoi Mai, Pham Hoang Uyen, Pham The Bao:
Stock-Price Forecasting Based on XGBoost and LSTM. 237-246 - Muhammad Ibrahim, Sadia Husain, Nida Zahra, Ali Ahmad:
Vertex-Edge Degree Based Indices of Honey Comb Derived Network. 247-258 - Mohammad Al Mojamed:
Smart Mina: LoRaWAN Technology for Smart Fire Detection Application for Hajj Pilgrimage. 259-272 - Sheng Xiao, Jing He, Xi Yang, Heng Zhou, Yujie Yuan:
Timing Error Aware Register Allocation in TS. 273-286 - Saman Shahbaz, Muhammad Qaiser Shahbaz:
Efficient Process Monitoring Under General Weibull Distribution. 287-297 - R. Muthaiyan, M. Malleswaran:
An Automated Brain Image Analysis System for Brain Cancer using Shearlets. 299-312 - A. Sumathi, S. Meganathan:
Ensemble Classifier Technique to Predict Gestational Diabetes Mellitus (GDM). 313-325 - Muhammad Hasnain, Imran Ghani, Seung Ryul Jeong, Aitizaz Ali:
Ensemble Learning Models for Classification and Selection of Web Services: A Review. 327-339 - Suliman A. Alsuhibany:
Vibration-Based Pattern Password Approach for Visually Impaired People. 341-356 - Qiang Zhi, Zhengshu Zhou:
Empirically Modeling Enterprise Architecture Using ArchiMate. 357-374 - Anas Basalamah, Shadikur Rahman:
An Optimized CNN Model Architecture for Detecting Coronavirus (COVID-19) with X-Ray Images. 375-388 - Hosam F. El-Sofany, Samir ElSeoud:
Implementing Effective Learning with Ubiquitous Learning Technology During Coronavirus Pandemic. 389-404
Volume 40, Number 2, 2022
- I. Devi, G. R. Karpagam:
Energy-Aware Scheduling for Tasks with Target-Time in Blockchain based Data Centres. 405-419 - Suliman A. Alsuhibany, Meznah Alquraishi:
Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography. 421-440 - Maged Wafy, Samr Gamal Zanaty, Mahmoud Elkhouly:
Video Identification Based on Watermarking Schemes and Visual Cryptography. 441-453 - Manoj Sindhwani, Charanjeet Singh, Rajeshwar Singh:
Implementation of K-Means Algorithm and Dynamic Routing Protocol in VANET. 455-467 - Maysoon S. Aldekhail, Marwah Almasri:
Intelligent Identification and Resolution of Software Requirement Conflicts: Assessment and Evaluation. 469-489 - G. Jayandhi, J. S. Leena Jasmine, S. Mary Joans:
Mammogram Learning System for Breast Cancer Diagnosis Using Deep Learning SVM. 491-503 - Adlyn Adam Teoh, Norjihan Binti Abdul Ghani, Muneer Ahmad, N. Z. Jhanjhi, Mohammed A. Alzain, Mehedi Masud:
Organizational Data Breach: Building Conscious Care Behavior in Incident Response. 505-515 - N. Kanagaraj:
Hybrid Renewable Energy Source Combined Dynamic Voltage Restorer for Power Quality Improvement. 517-538 - Trinh Tan Dat, Le Tran Anh Dang, Nguyen Nhat Truong, Pham Cung Le Thien Vu, Vu Ngoc Thanh Sang, Pham Thi Vuong, Pham The Bao:
An improved CRNN for Vietnamese Identity Card Information Recognition. 539-555 - Mesfer Alrizq, Shauban Ali Solangi, Abdullah Alghamdi, Muhammad Ali Nizamani, Muhammad Ali Memon, Mohammed Hamdi:
An Architecture Supporting Intelligent Mobile Healthcare Using Human-Computer Interaction HCI Principles. 557-569 - M. Vanitha, J. Kirubakaran, K. Radhika:
Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad. 571-579 - K. Rajakumari, M. Vinoth Kumar, Garima Verma, S. Balu, Dilip Kumar Sharma, Sudhakar Sengan:
Fuzzy Based Ant Colony Optimization Scheduling in Cloud Computing. 581-592 - R. Kingsy Grace, R. Manimegalai:
Design of Neural Network Based Wind Speed Prediction Model Using GWO. 593-606 - Yahia F. Said, Mohammad Barr, Taoufik Saidani, Mohamed Atri:
Desertification Detection in Makkah Region based on Aerial Images Classification. 607-618 - Mustafa Youldash, Saleh A. Al-Dossary, Lama Abdulaziz Aldaej, Farah Salem Alotaibi, Asma Khaled Aldubaikil, Noora Albinali, Maha AlGhamdi:
Applying Non-Local Means Filter on Seismic Exploration. 619-628 - Schahrazad Soltane, Sameer Al-shreef, Salwa M. Serag Eldin:
Classification and Diagnosis of Lymphoma's Histopathological Images Using Transfer Learning. 629-644 - Amit Kumar, Adesh Kumar, Geetam Singh Tomar:
Hardware Chip Performance of CORDIC Based OFDM Transceiver for Wireless Communication. 645-659 - R. Karthikeyan, A. Celine Kavida, P. Suresh:
Deep Root Memory Optimized Indexing Methodology for Image Search Engines. 661-672 - Sk Raziul Ahasan, Kaisarul Islam, Mohammad Monirujjaman Khan, Mehedi Masud, Gurjot Singh Gaba, Hesham Alhumyani:
Novel Compact UWB Band Notch Antenna Design for Body-Centric Communications. 673-689 - Mohammed Baz, Sabita Khatri, Abdullah Baz, Hosam Alhakami, Alka Agrawal, Raees Ahmad Khan:
Blockchain and Artificial Intelligence Applications to Defeat COVID-19 Pandemic. 691-702 - Puneet Garg, Ashutosh Dixit, Preeti Sethi:
ML-Fresh: Novel Routing Protocol in Opportunistic Networks Using Machine Learning. 703-717 - K. Sangeetha, D. Prabha:
Understand Students Feedback Using Bi-Integrated CRF Model Based Target Extraction. 735-747 - Moustafa El-Shahed, Asmaa M. Al-Dububan:
Deterministic and Stochastic Fractional Order Model for Lesser Date Moth. 749-764 - Rehan Ullah Khan, Waleed Albattah, Suliman Aladhadh, Shabana Habib:
Learning Patterns from COVID-19 Instances. 765-777 - V. Rajkumar, M. Prakash, V. Vennila:
Secure Data Sharing with Confidentiality, Integrity and Access Control in Cloud Environment. 779-793 - Muhammet Nuri Seyman:
Symbol Detection Based on Back Tracking Search Algorithm in MIMO-NOMA Systems. 795-804 - Hanan A. Hosni Mahmoud, Doaa Sami Khafaga, Amal H. Alharbi:
Computerized Detection of Limbal Stem Cell Deficiency from Digital Cornea Images. 805-821
Volume 40, Number 3, 2022
- K. Yuvaraj, U. S. Ragupathy:
Hybrid Active Contour Mammographic Mass Segmentation and Classification. 823-834 - Sadia Husain, Fouad A. Abolaban, Ali Ahmad, Muhammad Ahsan Asim, Yasir Ahmad:
On Vertex-Edge-Degree Topological Descriptors for Certain Crystal Networks. 835-850 - M. Govindarajan, V. Chandrasekaran, S. Anitha:
Network Traffic Prediction Using Radial Kernelized-Tversky Indexes-Based Multilayer Classifier. 851-863 - Vasaki Ponnusamy, Aun Yichiet, N. Z. Jhanjhi, Mamoona Humayun, Maram Fahhad Almufareh:
IoT Wireless Intrusion Detection and Network Traffic Analysis. 865-879 - M. A. El Safty, Samirah Al Zahrani, Ansari Saleh Ahmar, M. El Sayed:
Decision Making on Fuzzy Soft Simply* Continuous of Fuzzy Soft Multi-Function. 881-894 - Tsung-Yin Ou, Chen-Yang Cheng, Chun Hsiung Lai, Hsin-Pin Fu:
A Coordination-Based Algorithm for Dedicated Destination Vehicle Routing in B2B E-Commerce. 895-911 - Norjihan Binti Abdul Ghani, Suraya Hamid, Muneer Ahmad, Younes Saadi, N. Z. Jhanjhi, Mohammed A. Alzain, Mehedi Masud:
Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume. 913-926 - Azza Abdullah Alnssayan, Mohammad Mahdi Hassan, Suliman A. Alsuhibany:
VacChain: A Blockchain-Based EMR System to Manage Child Vaccination Records. 927-945 - Mamoona Humayun, Ahmed Alsayat:
Prediction Model for Coronavirus Pandemic Using Deep Learning. 947-961 - G. Maria Jones, S. Godfrey Winster, P. Valarmathie:
Integrated Approach to Detect Cyberbullying Text: Mobile Device Forensics Data. 963-978 - Jialin Ma, Zhaojun Wang, Hai Guo, Qian Xie, Tao Wang, Bolun Chen:
Mining Syndrome Differentiating Principles from Traditional Chinese Medicine Clinical Data. 979-993 - Mansour Hammoud Alruwies, Shailendra Mishra, Mohammed Abdul Rahman AlShehri:
Identity Governance Framework for Privileged Users. 995-1005 - B. T. Shobana, G. A. Sathish Kumar:
I-Quiz: An Intelligent Assessment Tool for Non-Verbal Behaviour Detection. 1007-1021 - Ahad Alloqmani, Omimah Alsaedi, Nadia Bahatheg, Reem Alnanih, Lamiaa A. Elrefaei:
Design Principles-Based Interactive Learning Tool for Solving Nonlinear Equations. 1023-1042 - Yanzan Han, Huawen Zhang, Zengfang Shi, Shuang Liang:
An Adaptive Fuzzy Control Model for Multi-Joint Manipulators. 1043-1057 - Chia-Nan Wang, Chien-Chang Chou, Yu-Chi Chung, Nguyen Ky Phuc Phan, Van Thanh Nguyen, Viet Tinh Nguyen:
Heuristic Scheduling of Job Orders in a Build-to-Order Manufacturing System. 1059-1072 - Namit Gupta, Kunwar Singh Vaisla, Arpit Jain, Adesh Kumar, Rajeev Kumar:
Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware. 1073-1084 - Farzaneh Khorasani, Morteza Mohammadi Zanjireh, Mahdi Bahaghighat, Qin Xin:
A Tradeoff Between Accuracy and Speed for K-Means Seed Determination. 1085-1098 - Yanzan Han, Hang Zhou, Zengfang Shi, Shuang Liang:
Adaptive Sliding Mode Control Method for Onboard Supercapacitors System. 1099-1108 - M. J. Huntul, Taki-Eddine Oussaeif:
Solvability of the Nonlocal Inverse Parabolic Problem and Numerical Results. 1109-1126 - K. Abhirami, M. K. Kavitha Devi:
Student Behavior Modeling for an E-Learning System Offering Personalized Learning Experiences. 1127-1144 - Liang Jin, Qinghui Meng, Shuang Liang:
Model of a Composite Energy Storage System for Urban Rail Trains. 1145-1152 - Maher Alsharif, Shailendra Mishra, Mohammed Alshehri:
Impact of Human Vulnerabilities on Cybersecurity. 1153-1166 - Shengchun Wang, Peiqi Chen, Jingui Huang, Tsz Ho Wong:
FPD Net: Feature Pyramid DehazeNet. 1167-1181 - Mohammad Monirujjaman Khan, Arifa Sultana, Mehedi Masud, Gurjot Singh Gaba, Hesham Alhumyani:
Miniaturized Novel UWB Band-Notch Textile Antenna for Body Area Networks. 1183-1198 - Vasaki Ponnusamy, Mamoona Humayun, N. Z. Jhanjhi, Aun Yichiet, Maram Fahhad Almufareh:
Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks. 1199-1215 - Mingming Zhang, Jiaming Mao, Yuanyuan Ma, Liangjie Xu, Chuanjun Wang, Ran Zhao, Zhihao Li, Lu Chen, Wenbing Zhao:
A CPK-Based Identity Authentication Scheme for IoT. 1217-1231 - Abdulwahed Awad Almutairi, Shailendra Mishra, Mohammed Alshehri:
Web Security: Emerging Threats and Defense. 1233-1248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.