Expertini Research Research

Browse Research Papers

15,600+ open-access research outputs.

✕ Clear
📂 Computer Science 📄 Peer-Reviewed
Showing 15600 results in Computer Science · Peer-Reviewed
Computer Science Peer-Reviewed PDF DOI

Towards InAs/InP Quantum-Dash Laser-Based Ultra-High Capacity Heterogeneous Optical Networks: A Review

Mohammed Zahed Mustafa Khan · 2022

nan…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Automated Software Test Data Generation With Generative Adversarial Networks

Xiujing Guo, Hiroyuki Okamura, Tadashi Dohi · 2022

With the rapid increase of software scale and complexity, the cost of traditional software testing methods will increase faster than the scale of software. In order to improve test efficiency, it is p…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Configurable Mixed-Radix Number Theoretic Transform Architecture for Lattice-Based Cryptography

Phap Duong-Ngoc, Hanho Lee · 2022

Lattice-based cryptography continues to dominate in the second-round finalists of the National Institute of Standards and Technology post-quantum cryptography standardization process. Computational ef…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Robust Network Intrusion Detection System Based on Machine-Learning With Early Classification

Taehoon Kim, Wooguil Pak · 2022

Network Intrusion Detection Systems (NIDSs) using pattern matching have a fatal weakness in that they cannot detect new attacks because they only learn existing patterns and use them to detect those a…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Complex Network–Based Change Propagation Path Optimization in Mechanical Product Development

Yong Yin, Shuxin Wang, Jian Zhou · 2022

Change propagation is a process in which a change to one part or element of a developed mechanical product tends to induce additional changes to other elements of the product, and the changes can prop…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

A New Algorithm for Displaying Images With High Resolution Using a Directional Volumetric Display With Threads and a Projector

Tomoya Imamura, Mitsuru Baba, Naoto Hoshikawa, Hirotaka Nakayama, Tomoyoshi Ito, Atsushi Shiraki · 2022

Using threads and a projector, a directional volumetric display capable of moving images and full-color representation was developed in our previous work. However, the horizontal resolution of the dir…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Smart Optical Sensors for Internet of Things: Integration of Temperature Monitoring and Customized Security Physical Unclonable Functions

Lilia M. S. Dias, Joao F. C. B. Ramalho, Tiago Silverio, Lianshe Fu, Rute A. S. Ferreira, Paulo S. Andre · 2022

Nowadays, the Internet of Things (IoT) has an astonishingly societal impact in which healthcare services stand out. Amplified by the COVID-19 pandemic scenario, challenges include the development of a…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Seismic Random Noise Removal Based on a Multiscale Convolution and Densely Connected Network for Noise Level Evaluation

Liang Guo, Renze Luo, Xingyu Li, Yang Zhou, Tuo Juanjuan, Canru Lei · 2022

Traditional denoising methods for seismic exploration data design a corresponding mathematical denoising model batch according to the different properties of different random noises, which is a tediou…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Joint Power and Gain Allocation in MDM-WDM Optical Communication Networks Based on Enhanced Gaussian Noise Model

Mohammad Ali Amirabadi, Mohammad Hossein Kahaei, S. Alireza Nezamalhosseini, Lawrence R. Chen · 2022

Achieving reliable communication over different wavelength channels and modes is one of the main goals of Mode Division Multiplexing-Wavelength Division Multiplexing (MDM-WDM) transmission. The reliab…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map

Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Dhafer G. Honi, Ayad I. Abdulsada, Xianlong Jiao · 2022

The World Wide Web is experiencing a daily increase in data transmission because of developments in multimedia technologies. Consequently, each user should prioritize preventing illegal access of this…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

A Genetic Algorithm-Based Approach for Fluctuating QoS Aware Selection of IoT Services

Karima Khadir, Nawal Guermouche, Amal Guittoum, Thierry Monteil · 2022

In recent years, the Internet of Things (IoT) has evolved at an exceptional speed, which enables to interconnect a very large number of heterogeneous, distributed, and mobile devices. This number will…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

LIANet: Layer Interactive Attention Network for RGB-D Salient Object Detection

Yibo Han, Liejun Wang, Anyu Du, Shaochen Jiang · 2022

RGB-D salient object detection (SOD) usually describes two modes’ classification or regression problem, namely RGB and depth. The existing RGB-D SOD methods use depth hints to increase the detection p…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Least Squares Generative Adversarial Networks-Based Anomaly Detection

Chang-Ki Lee, Yu-Jeong Cheon, Wook-Yeon Hwang · 2022

Multivariate statistical process control (MSPC) is a technique for detecting anomalies by monitoring several quality characteristics simultaneously. For the MSPC problem, the Hotelling’s T2 contro…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

FlexDRAN: Flexible Centralization in Disaggregated Radio Access Networks

Chia-Yu Chang, Navid Nikaein, Thrasyvoulos Spyropoulos, Koen De Schepper · 2022

Radio Access Network (RAN) disaggregation allows operators to mix-and-match multivendor components and bring RAN services from one end to the other. Despite this goal, issues of resource misuse or per…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

A Novel Hybrid Optimization-Based Algorithm for the Single and Multi-Objective Achievement With Optimal DG Allocations in Distribution Networks

Muhammad Imran Akbar, Syed Ali Abbas Kazmi, Omar Alrumayh, Zafar A. Khan, Abdullah Altamimi, M. Mahad Malik · 2022

nan…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Reviewer Recommendations Using Document Vector Embeddings and a Publisher Database: Implementation and Evaluation

Yue Zhao, Ajay Anand, Gaurav Sharma · 2022

We develop and evaluate an automated data-driven framework for providing reviewer recommendations for submitted manuscripts. Given inputs comprising a set of manuscripts for review and a listing of a …

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Ebola Optimization Search Algorithm: A New Nature-Inspired Metaheuristic Optimization Algorithm

Olaide Nathaniel Oyelade, Absalom El-Shamir Ezugwu, Tehnan I. A. Mohamed, Laith Abualigah · 2022

Nature computing has evolved with exciting performance to solve complex real-world combinatorial optimization problems. These problems span across engineering, medical sciences, and sciences generally…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Critical Challenges to Adopt DevOps Culture in Software Organizations: A Systematic Review

Muhammad Shoaib Khan, Abudul Wahid Khan, Faheem Khan, Muhammad Adnan Khan, Taeg Keun Whangbo · 2022

DevOps is a set of practices and a cultural movement that aims to break down barriers between development and operation teams to improve collaboration and communication. Different organizations have e…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Audio Watermarking for Security and Non-Security Applications

Maha Charfeddine, Eya Mezghani, Salma Masmoudi, Chokri Ben Amar, Hesham Alhumyani · 2022

The digitization of audiovisual data is significantly increasing. Thus, to guarantee the protection of the intellectual properties of this digital content, watermarking has appeared as a solution. Wat…

Read Paper →
Computer Science Peer-Reviewed PDF DOI

Integrated Network and Security Operation Center: A Systematic Analysis

Deepesh Shahjee, Nilesh Ware · 2022

Traditionally, network and security operation center teams have worked in silos despite commonalities. The network operating center (NOC) team is to provide operationality and availability of informat…

Read Paper →
Page 1 of 780 Next →