Home / Journals / CSSE / Vol.37, No.2, 2021
Special lssues
  • Open AccessOpen Access

    ARTICLE

    A Novel IoT Application Recommendation System Using Metaheuristic Multi-Criteria Analysis

    Mohammed Hayder Kadhim, Farhad Mardukhi*
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 149-158, 2021, DOI:10.32604/csse.2021.014608
    (This article belongs to this Special Issue: Sensors and Nano-sensors Technologies for Health-Care Applications)
    Abstract There are a variety of Internet of Things (IoT) applications that cover different aspects of daily life. Each of these applications has different criteria and sub-criteria, making it difficult for the user to choose. This requires an automated approach to select IoT applications by considering criteria. This paper presents a novel recommendation system for presenting applications on the IoT. First, using the analytic hierarchy process (AHP), a multi-layer architecture of the criteria and sub-criteria in IoT applications is presented. This architecture is used to evaluate and rank IoT applications. As a result, finding the weight of the criteria and sub-criteria… More >

  • Open AccessOpen Access

    ARTICLE

    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282
    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of policies, regulations, systematic processes that… More >

  • Open AccessOpen Access

    ARTICLE

    Instagram Mobile Application Digital Forensics

    Muhammad Asim Mubarik1, Zhijian Wang1, Yunyoung Nam2,*, Seifedine Kadry3, Muhammad Azam waqar4
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 169-186, 2021, DOI:10.32604/csse.2021.014472
    Abstract In this research, we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application, Instagram. This plugin extracts personal details from Instagram users, e.g., name, user name, mobile number, ID, direct text or audio, video, and picture messages exchanged between different Instagram users. While developing the plugin, we identified resources available in both Android and IOS-based devices holding key forensics artifacts. We highlighted the poor privacy scheme employed by Instagram. This work, has shown how the sensitive data posted in the Instagram mobile application can easily… More >

  • Open AccessOpen Access

    ARTICLE

    Intention to Use Mobile Augmented Reality in the Tourism Sector

    Malik Khlaif Gharaibeh1, Natheer Khlaif Gharaibeh2,*, Mohammad Ayoub Khan3, Waleed Abdel karim Abu-ain4, Musab Kasim Alqudah2
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 187-202, 2021, DOI:10.32604/csse.2021.014902
    Abstract This article examines the main variables that influence the intention to use Augmented Reality (AR) applications in the tourism sector in Jordan. The study model has been constructed based on the unified theory of acceptance and the use of technology2 (UTAUT2), by incorporating a new construct (aesthetics) to explore the usage intention of Mobile Augmented Reality in Tourism (MART). A questionnaire was used and distributed to a sample of 450 participants. Data were analyzed using the Smart PLS version 3.0. for testing 12 hypotheses. 29 measurement items were carefully reviewed based on previous studies that were selected to assess the… More >

  • Open AccessOpen Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437
    (This article belongs to this Special Issue: Cloud, SDN, and NFV architectures for next generation IoT infrastructures)
    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework… More >

  • Open AccessOpen Access

    ARTICLE

    Load Frequency Control of Multi-interconnected Renewable Energy Plants Using Multi-Verse Optimizer

    Hegazy Rezk1,*, Mohamed A. Mohamed2, Ahmed A. Zaki Diab2, N. Kanagaraj1
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 219-231, 2021, DOI:10.32604/csse.2021.015543
    Abstract A reliable approach based on a multi-verse optimization algorithm (MVO) for designing load frequency control incorporated in multi-interconnected power system comprising wind power and photovoltaic (PV) plants is presented in this paper. It has been applied for optimizing the control parameters of the load frequency controller (LFC) of the multi-source power system (MSPS). The MSPS includes thermal, gas, and hydro power plants for energy generation. Moreover, the MSPS is integrated with renewable energy sources (RES). The MVO algorithm is applied to acquire the ideal parameters of the controller for controlling a single area and a multi-area MSPS integrated with RES.… More >

  • Open AccessOpen Access

    ARTICLE

    A Hybrid Artificial Intelligence Model for Skin Cancer Diagnosis

    V. Vidya Lakshmi1,*, J. S. Leena Jasmine2
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 233-245, 2021, DOI:10.32604/csse.2021.015700
    Abstract Melanoma or skin cancer is the most dangerous and deadliest disease. As the incidence and mortality rate of skin cancer increases worldwide, an automated skin cancer detection/classification system is required for early detection and prevention of skin cancer. In this study, a Hybrid Artificial Intelligence Model (HAIM) is designed for skin cancer classification. It uses diverse multi-directional representation systems for feature extraction and an efficient Exponentially Weighted and Heaped Multi-Layer Perceptron (EWHMLP) for the classification. Though the wavelet transform is a powerful tool for signal and image processing, it is unable to detect the intermediate dimensional structures of a medical… More >

  • Open AccessOpen Access

    ARTICLE

    An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files

    Zhuorong Li1, Huawei Tian2,*, Yanhui Xiao2, Yunqi Tang1, Anhong Wang3
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 247-263, 2021, DOI:10.32604/csse.2021.013898
    Abstract Stereolithographic (STL) files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from theft. However, to the best of our knowledge, few studies have looked at how watermarking can resist attacks that involve vertex-reordering. Here, we present a lossless and robust watermarking scheme for STL files to protect against vertex-reordering attacks. Specifically, we designed a novel error-correcting code (ECC) that can correct the error of any one-bit in a bitstream by inserting several check digits. In addition, ECC is designed to make use of… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain

    Xizi Peng1, Jinquan Zhang1,*, Shibin Zhang1, Wunan Wan1, Hao Chen1, Jinyue Xia2
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 265-281, 2021, DOI:10.32604/csse.2021.014557
    Abstract In the existing Electronic Health Records (EHRs), the medical information of patients is completely controlled by various medical institutions. As such, patients have no dominant power over their own EHRs. These personal data are not only inconvenient to access and share, but are also prone to cause privacy disclosure. The blockchain technology provides a new development direction in the medical field. Blockchain-based EHRs are characterized by decentralization, openness and non-tampering of records, which enable patients to better manage their own EHRs. In order to better protect the privacy of patients, only designated receivers can access EHRs, and receivers can authenticate… More >

  • Open AccessOpen Access

    ARTICLE

    YOLOv3 Attention Face Detector with High Accuracy and Efficiency

    Qiyuan Liu, Shuhua Lu*, Lingqiang Lan
    Computer Systems Science and Engineering, Vol.37, No.2, pp. 283-295, 2021, DOI:10.32604/csse.2021.014086
    Abstract In recent years, face detection has attracted much attention and achieved great progress due to its extensively practical applications in the field of face based computer vision. However, the tradeoff between accuracy and efficiency of the face detectors still needs to be further studied. In this paper, using Darknet-53 as backbone, we propose an improved YOLOv3-attention model by introducing attention mechanism and data augmentation to obtain the robust face detector with high accuracy and efficiency. The attention mechanism is introduced to enhance much higher discrimination of the deep features, and the trick of data augmentation is used in the training… More >

Per Page:

Share Link