default search action
Computer Systems: Science & Engineering, Volume 37
Volume 37, Number 1, 2021
- Shakeel Ahmed, Abdulaziz Alhumam:
Unified Computational Modelling for Healthcare Device Security Assessment. 1-18 - Kaisarul Islam, Tabia Hossain, Mohammad Monirujjaman Khan, Mehedi Masud, Roobaea Alroobaea:
Comparative Design and Study of A 60 GHz Antenna for Body-Centric Wireless Communications. 19-32 - Sinil Mubarak, Mohamed Hadi Habaebi, Md. Rafiqul Islam, Abdul Rahman Farah Diyana, Mohammad Tahir:
Anomaly Detection in ICS Datasets with Machine Learning Algorithms. 33-46 - Mustafa M. M. Al Qudah, Ahmad Sufril Azlan Mohamed, Syaheerah L. Lutfi:
Affective State Recognition Using Thermal-Based Imaging: A Survey. 47-62 - Ahmed Naif M. Alahmadi, Hegazy Rezk:
A Robust Single-Sensor MPPT Strategy for Shaded Photovoltaic-Battery System. 63-71 - Shahrul Nizam Ismail, Suraya Hamid, Muneer Ahmad, Abdulellah Alaboudi, N. Z. Jhanjhi:
Exploring Students Engagement Towards the Learning Management System (LMS) Using Learning Analytics. 73-87 - Hua-Rui Wu, Huaji Zhu, Xiao Han, Wei Xu:
Layout Optimization for Greenhouse WSN Based on Path Loss Analysis. 89-104 - Zhengqiu Weng, Timing Chen, Tiantian Zhu, Hang Dong, Dan Zhou, Osama Alfarraj:
TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators. 105-119 - Zihao Shen, Hui Wang, Kun Liu, Peiqian Liu, Menglong Ba, Mengyao Zhao:
RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning. 121-133 - Xiaoyu Duan, Shi Ying, Wanli Yuan, Hailong Cheng, Xiang Yin:
A Generative Adversarial Networks for Log Anomaly Detection. 135-148
Volume 37, Number 2, 2021
- Mohammed Hayder Kadhim, Farhad Mardukhi:
A Novel IoT Application Recommendation System Using Metaheuristic Multi-Criteria Analysis. 149-158 - Mamdouh Alenezi:
Safeguarding Cloud Computing Infrastructure: A Security Analysis. 159-167 - Muhammad Asim Mubarik, Zhijian Wang, Yunyoung Nam, Seifedine Kadry, Muhammad Azam Waqar:
Instagram Mobile Application Digital Forensics. 169-186 - Malik Khlaif Gharaibeh, Natheer Khlaif Gharaibeh, Mohammad Ayoub Khan, Waleed Abdel Karim Abu-Ain, Musab Kasim AlQudah:
Intention to Use Mobile Augmented Reality in the Tourism Sector. 187-202 - Luis Eduardo Bautista Villalpando, Alain Abran:
A Data Security Framework for Cloud Computing Services. 203-218 - Hegazy Rezk, Mohamed A. Mohamed, Ahmed A. Zaki Diab, N. Kanagaraj:
Load Frequency Control of Multi-interconnected Renewable Energy Plants Using Multi-Verse Optimizer. 219-231 - V. Vidya Lakshmi, J. S. Leena Jasmine:
A Hybrid Artificial Intelligence Model for Skin Cancer Diagnosis. 233-245 - Zhuorong Li, Huawei Tian, Yanhui Xiao, Yunqi Tang, Anhong Wang:
An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files. 247-263 - Xizi Peng, Jinquan Zhang, Shibin Zhang, Wunan Wan, Hao Chen, Jinyue Xia:
A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain. 265-281 - Qiyuan Liu, Shuhua Lu, Lingqiang Lan:
YOLOv3 Attention Face Detector with High Accuracy and Efficiency. 283-295
Volume 37, Number 3, 2021
- Fahd N. Al-Wesabi, Saleh Alzahrani, Fuad Ali Mohammed Al-Yarimi, Mohammed Abdul, Nadhem Nemri, Mohammed M. Almazah:
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship. 297-311 - Abdulaziz Attaallah, Sabita Khatri, Mohd Nadeem, Syed Anas Ansar, Abhishek Kumar Pandey, Alka Agrawal:
Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia. 313-329 - Prasantha Bharathi Dhandapani, Dumitru Baleanu, Jayakumar Thippan, Vinoth Sivakumar:
New Fuzzy Fractional Epidemic Model Involving Death Population. 331-346 - Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, Masood Ahmad, Abhishek Kumar Pandey, Rajeev Kumar, Raees Ahmad Khan:
Impact of Tools and Techniques for Securing Consultancy Services. 347-360 - N. Z. Jhanjhi, Mamoona Humayun, Saleh Naif Almuayqil:
Cyber Security and Privacy Issues in Industrial Internet of Things. 361-380 - Jiayi Wang, Xinhui Liu, Jinshi Chen, Tongjian Wang, Xin Wang:
Mechanical-Hydraulic Co-Simulation of Full Hydraulic Articulated Steering System. 381-398 - Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed:
Average Convergence for Directed & Undirected Graphs in Distributed Systems. 399-413 - D. Gurukumaresan, C. Duraisamy, R. Srinivasan:
Optimal Solution of Fuzzy Transportation Problem Using Octagonal Fuzzy Numbers. 415-421 - Qi Yue, Xiang Li, Dan Li:
Chinese Relation Extraction on Forestry Knowledge Graph Construction. 423-442 - Qiang Zhi, Shuji Morisaki:
An Evaluation of Value-Oriented Review for Software Requirements Specification. 443-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.