K. N. Kumar, Husam Lahza, B. R. Sreenivasa, T. Shawly, A. Alsheikhy, H. Arunkumar, C. R. Nirmala
{"title":"A Novel Cluster Analysis-Based Crop Dataset Recommendation Method in Precision Farming","authors":"K. N. Kumar, Husam Lahza, B. R. Sreenivasa, T. Shawly, A. Alsheikhy, H. Arunkumar, C. R. Nirmala","doi":"10.32604/csse.2023.036629","DOIUrl":"https://doi.org/10.32604/csse.2023.036629","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"10 1","pages":"3239-3260"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81679453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hani Al-Mimi, Yousef Alrabanah, Mosleh M. Abu-Alhaj, Sumaya N. Al-Khatib
{"title":"Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks","authors":"Hani Al-Mimi, Yousef Alrabanah, Mosleh M. Abu-Alhaj, Sumaya N. Al-Khatib","doi":"10.32604/csse.2023.024338","DOIUrl":"https://doi.org/10.32604/csse.2023.024338","url":null,"abstract":"The demand for the telecommunication services, such as IP telephony, has increased dramatically during the COVID-19 pandemic lockdown. IP telephony should be enhanced to provide the expected quality. One of the issues that should be investigated in IP telephony is bandwidth utilization. IP telephony produces very small speech samples attached to a large packet header. The header of the IP telephony consumes a considerable share of the bandwidth allotted to the IP telephony. This wastes the network's bandwidth and influences the IP telephony quality. This paper proposes a mechanism (called Smallerize) that reduces the bandwidth consumed by both the speech sample and the header. This is achieved by assembling numerous IP telephony packets in one header and use the header's fields to carry the speech sample. Several metrics have been used to measure the achievement Smallerize mechanism. The number of calls has been increased by 245.1% compared to the typical mechanism. The bandwidth saving has also reached 68% with the G.28 codec. Therefore, Smallerize is a possible mechanism to enhance bandwidth utilization of the IP telephony.","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"49 1","pages":"1039-1049"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83352638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Duhayyim, Heba G. Mohamed, Fadwa M. Alrowais, F. Al-Wesabi, A. Hilal, Abdelwahed Motwakel
{"title":"Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment","authors":"M. Duhayyim, Heba G. Mohamed, Fadwa M. Alrowais, F. Al-Wesabi, A. Hilal, Abdelwahed Motwakel","doi":"10.32604/csse.2023.035589","DOIUrl":"https://doi.org/10.32604/csse.2023.035589","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"139 1","pages":"1293-1310"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86376698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sayyed Mudassar Shah, Tariq Hussain, B. Shah, Farman Ali, Khalid Zaman, K. Kwak
{"title":"CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters","authors":"Sayyed Mudassar Shah, Tariq Hussain, B. Shah, Farman Ali, Khalid Zaman, K. Kwak","doi":"10.32604/csse.2023.034489","DOIUrl":"https://doi.org/10.32604/csse.2023.034489","url":null,"abstract":"Underwater acoustic sensor networks (UWASNs) aim to find varied offshore ocean monitoring and exploration applications. In most of these applications, the network is composed of several sensor nodes deployed at different depths in the water. Sensor nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface level; these nodes need multihop communication facilitated by a suitable routing scheme. In this research work, a Cluster-based Cooperative Energy Efficient Routing (CEER) mechanism for UWSNs is proposed to overcome the shortcomings of the Co-UWSN and LEACH mechanisms. The optimal role of clustering and cooperation provides load balancing and improves the network profoundly. The simulation results using MATLAB show better performance of CEER routing protocol in terms of various parameters as compared to Co-UWSN routing protocol, i.e., the average end-to-end delay of CEER was 17.39, Co-UWSN was 55.819 and LEACH was 70.08. In addition, the average total energy consumption of CEER was 9.273, Co-UWSN was 12.198, and LEACH was 45.33. The packet delivery ratio of CEER was 53.955, CO-UWSN was 42.047, and LEACH was 30.31. The stability period CEER was 130.9, CO-UWSN was 129.3, and LEACH was 119.1. The obtained results maximized the lifetime and improved the overall performance of the CEER routing protocol.","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"15 1","pages":"2587-2602"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84722278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Duhayyim, Mrim M. Alnfiai, N. Almalki, F. Al-Wesabi, A. Hilal, M. A. Hamza
{"title":"IoT-Driven Optimal Lightweight RetinaNet-Based Object Detection for Visually Impaired People","authors":"M. Duhayyim, Mrim M. Alnfiai, N. Almalki, F. Al-Wesabi, A. Hilal, M. A. Hamza","doi":"10.32604/csse.2023.034067","DOIUrl":"https://doi.org/10.32604/csse.2023.034067","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"10 1","pages":"475-489"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82438493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Way to Parse Logs Automatically for Multiline Events","authors":"Mingguang Yu, Xia Zhang","doi":"10.32604/csse.2023.037505","DOIUrl":"https://doi.org/10.32604/csse.2023.037505","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"60 1","pages":"2975-2994"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79893399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vargheese, Surbhi Bhatia, Shakila Basheer, P. Dadheech
{"title":"Improved Multi-Path Routing for QoS on MANET","authors":"M. Vargheese, Surbhi Bhatia, Shakila Basheer, P. Dadheech","doi":"10.32604/csse.2023.031476","DOIUrl":"https://doi.org/10.32604/csse.2023.031476","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"848 1","pages":"2521-2536"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79939955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung
{"title":"The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android","authors":"Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung","doi":"10.32604/csse.2023.038664","DOIUrl":"https://doi.org/10.32604/csse.2023.038664","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"26 7 1","pages":"3059-3073"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77099096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ring Oscillator for 60 Meter Bandwidth","authors":"Rachana Arya, B. K. Singh","doi":"10.32604/csse.2023.029220","DOIUrl":"https://doi.org/10.32604/csse.2023.029220","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"22 1","pages":"93-105"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81574806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}