Home / Journals / CSSE / Vol.47, No.2, 2023
Special lssues
  • Open AccessOpen Access

    ARTICLE

    A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption

    Nashat Salih Abdulkarim Alsandi1, Dilovan Asaad Zebari2,*, Adel Al-Zebari3, Falah Y. H. Ahmed4, Mazin Abed Mohammed5, Marwan Albahar6, Abdulaziz Ali Albahr7,8
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1321-1347, 2023, DOI:10.32604/csse.2023.038089
    Abstract Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks. Thus, the progress of image encryption techniques is becoming an increasingly serious issue and considerable problem. Small space of the key, encryption-based low confidentiality, low key sensitivity, and easily exploitable existing image encryption techniques integrating chaotic system and DNA computing are purposing the main problems to propose a new encryption technique in this study. In our proposed scheme, a three-dimensional Chen’s map and a one-dimensional Logistic map are employed to construct a double-layer image encryption scheme. In the confusion stage,… More >

  • Open AccessOpen Access

    REVIEW

    A Survey on Acute Leukemia Expression Data Classification Using Ensembles

    Abdel Nasser H. Zaied1, Ehab Rushdy2, Mona Gamal3,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1349-1364, 2023, DOI:10.32604/csse.2023.033596
    Abstract Acute leukemia is an aggressive disease that has high mortality rates worldwide. The error rate can be as high as 40% when classifying acute leukemia into its subtypes. So, there is an urgent need to support hematologists during the classification process. More than two decades ago, researchers used microarray gene expression data to classify cancer and adopted acute leukemia as a test case. The high classification accuracy they achieved confirmed that it is possible to classify cancer subtypes using microarray gene expression data. Ensemble machine learning is an effective method that combines individual classifiers to classify new samples. Ensemble classifiers… More >

  • Open AccessOpen Access

    ARTICLE

    A Robust Approach for Detection and Classification of KOA Based on BILSTM Network

    Abdul Qadir1, Rabbia Mahum1, Suliman Aladhadh2,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1365-1384, 2023, DOI:10.32604/csse.2023.037033
    Abstract A considerable portion of the population now experiences osteoarthritis of the knee, spine, and hip due to lifestyle changes. Therefore, early treatment, recognition and prevention are essential to reduce damage; nevertheless, this time-consuming activity necessitates a variety of tests and in-depth analysis by physicians. To overcome the existing challenges in the early detection of Knee Osteoarthritis (KOA), an effective automated technique, prompt recognition, and correct categorization are required. This work suggests a method based on an improved deep learning algorithm that makes use of data from the knee images after segmentation to detect KOA and its severity using the Kellgren-Lawrence… More >

  • Open AccessOpen Access

    ARTICLE

    Towards Intelligent Detection and Classification of Rice Plant Diseases Based on Leaf Image Dataset

    Fawad Ali Shah1, Habib Akbar1, Abid Ali2,3, Parveen Amna4, Maha Aljohani5, Eman A. Aldhahri6, Harun Jamil7,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1385-1413, 2023, DOI:10.32604/csse.2023.036144
    Abstract The detection of rice leaf disease is significant because, as an agricultural and rice exporter country, Pakistan needs to advance in production and lower the risk of diseases. In this rapid globalization era, information technology has increased. A sensing system is mandatory to detect rice diseases using Artificial Intelligence (AI). It is being adopted in all medical and plant sciences fields to access and measure the accuracy of results and detection while lowering the risk of diseases. Deep Neural Network (DNN) is a novel technique that will help detect disease present on a rice leave because DNN is also considered… More >

  • Open AccessOpen Access

    ARTICLE

    High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification

    Li Liu1, Jing Li1, Yingchun Wu1, Chin-Chen Chang2,*, Anhong Wang1
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1415-1432, 2023, DOI:10.32604/csse.2023.040039
    Abstract Data hiding (DH) is an important technology for securely transmitting secret data in networks, and has increasing become a research hotspot throughout the world. However, for Joint photographic experts group (JPEG) images, it is difficult to balance the contradiction among embedded capacity, visual quality and the file size increment in existing data hiding schemes. Thus, to deal with this problem, a high-imperceptibility data hiding for JPEG images is proposed based on direction modification. First, this proposed scheme sorts all of the quantized discrete cosine transform (DCT) block in ascending order according to the number of non-consecutive-zero alternating current (AC) coefficients.… More >

  • Open AccessOpen Access

    ARTICLE

    MSF-Net: A Multilevel Spatiotemporal Feature Fusion Network Combines Attention for Action Recognition

    Mengmeng Yan1, Chuang Zhang1,2,*, Jinqi Chu1, Haichao Zhang1, Tao Ge1, Suting Chen1
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1433-1449, 2023, DOI:10.32604/csse.2023.040132
    Abstract An action recognition network that combines multi-level spatiotemporal feature fusion with an attention mechanism is proposed as a solution to the issues of single spatiotemporal feature scale extraction, information redundancy, and insufficient extraction of frequency domain information in channels in 3D convolutional neural networks. Firstly, based on 3D CNN, this paper designs a new multilevel spatiotemporal feature fusion (MSF) structure, which is embedded in the network model, mainly through multilevel spatiotemporal feature separation, splicing and fusion, to achieve the fusion of spatial perceptual fields and short-medium-long time series information at different scales with reduced network parameters; In the second step,… More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms

    Nizheen A. Ali1, Ramadhan J. Mstafa2,3,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1451-1469, 2023, DOI:10.32604/csse.2023.039957
    Abstract With the widespread use of the internet, there is an increasing need to ensure the security and privacy of transmitted data. This has led to an intensified focus on the study of video steganography, which is a technique that hides data within a video cover to avoid detection. The effectiveness of any steganography method depends on its ability to embed data without altering the original video’s quality while maintaining high efficiency. This paper proposes a new method to video steganography, which involves utilizing a Genetic Algorithm (GA) for identifying the Region of Interest (ROI) in the cover video. The ROI… More >

  • Open AccessOpen Access

    ARTICLE

    Hybridized Intelligent Neural Network Optimization Model for Forecasting Prices of Rubber in Malaysia

    Shehab Abdulhabib Alzaeemi1, Saratha Sathasivam2,*, Majid Khan bin Majahar Ali2, K. G. Tay1, Muraly Velavan3
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1471-1491, 2023, DOI:10.32604/csse.2023.037366
    Abstract Rubber producers, consumers, traders, and those who are involved in the rubber industry face major risks of rubber price fluctuations. As a result, decision-makers are required to make an accurate estimation of the price of rubber. This paper aims to propose hybrid intelligent models, which can be utilized to forecast the price of rubber in Malaysia by employing monthly Malaysia’s rubber pricing data, spanning from January 2016 to March 2021. The projected hybrid model consists of different algorithms with the symbolic Radial Basis Functions Neural Network k-Satisfiability Logic Mining (RBFNN-kSAT). These algorithms, including Grey Wolf Optimization Algorithm, Artificial Bee Colony… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Approach for Spectrum Utilization in mmWave Massive MIMO 5G Wireless Networks

    Elsaid Md. Abdelrahim1,2, Mona Alduailij3, Mai Alduailij3, Romany F. Mansour4,*, Osama A. Ghoneim5
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1493-1505, 2023, DOI:10.32604/csse.2023.037976
    Abstract Massive multiple-input multiple-output (MIMO) systems that use the millimeter-wave (mm-wave) band have a higher frequency and more antennas, which leads to significant path loss, high power consumption, and server interference. Due to these issues, the spectrum efficiency is significantly reduced, making spectral efficiency improvement an important research topic for 5G communication. Together with communication in the terahertz (THz) bands, mmWave communication is currently a component of the 5G standards and is seen as a solution to the commercial bandwidth shortage. The quantity of continuous, mostly untapped bandwidth in the 30–300 GHz band has presented a rare opportunity to boost the capacity… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Deep Learning Model for Black Fungus Detection Based on Gabor Filter and Transfer Learning

    Esraa Hassan1, Fatma M. Talaat1, Samah Adel2, Samir Abdelrazek3, Ahsan Aziz4, Yunyoung Nam4,*, Nora El-Rashidy1
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1507-1525, 2023, DOI:10.32604/csse.2023.037493
    Abstract Black fungus is a rare and dangerous mycology that usually affects the brain and lungs and could be life-threatening in diabetic cases. Recently, some COVID-19 survivors, especially those with co-morbid diseases, have been susceptible to black fungus. Therefore, recovered COVID-19 patients should seek medical support when they notice mucormycosis symptoms. This paper proposes a novel ensemble deep-learning model that includes three pre-trained models: reset (50), VGG (19), and Inception. Our approach is medically intuitive and efficient compared to the traditional deep learning models. An image dataset was aggregated from various resources and divided into two classes: a black fungus class… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Hybrid Optimization Algorithm for Materialized View Selection from Data Warehouse Environments

    Popuri Srinivasarao, Aravapalli Rama Satish*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1527-1547, 2023, DOI:10.32604/csse.2023.038951
    Abstract Responding to complex analytical queries in the data warehouse (DW) is one of the most challenging tasks that require prompt attention. The problem of materialized view (MV) selection relies on selecting the most optimal views that can respond to more queries simultaneously. This work introduces a combined approach in which the constraint handling process is combined with metaheuristics to select the most optimal subset of DW views from DWs. The proposed work initially refines the solution to enable a feasible selection of views using the ensemble constraint handling technique (ECHT). The constraints such as self-adaptive penalty, epsilon (ε)-parameter and stochastic… More >

  • Open AccessOpen Access

    ARTICLE

    Faster RCNN Target Detection Algorithm Integrating CBAM and FPN

    Wenshun Sheng*, Xiongfeng Yu, Jiayan Lin, Xin Chen
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1549-1569, 2023, DOI:10.32604/csse.2023.039410
    Abstract Small targets and occluded targets will inevitably appear in the image during the shooting process due to the influence of angle, distance, complex scene, illumination intensity, and other factors. These targets have few effective pixels, few features, and no apparent features, which makes extracting their efficient features difficult and easily leads to false detection, missed detection, and repeated detection, affecting the performance of target detection models. An improved faster region convolutional neural network (RCNN) algorithm (CF-RCNN) integrating convolutional block attention module (CBAM) and feature pyramid networks (FPN) is proposed to improve the detection and recognition accuracy of small-size objects, occluded… More >

  • Open AccessOpen Access

    ARTICLE

    Fine-Grained Soft Ear Biometrics for Augmenting Human Recognition

    Ghoroub Talal Bostaji*, Emad Sami Jaha
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1571-1591, 2023, DOI:10.32604/csse.2023.039701
    Abstract Human recognition technology based on biometrics has become a fundamental requirement in all aspects of life due to increased concerns about security and privacy issues. Therefore, biometric systems have emerged as a technology with the capability to identify or authenticate individuals based on their physiological and behavioral characteristics. Among different viable biometric modalities, the human ear structure can offer unique and valuable discriminative characteristics for human recognition systems. In recent years, most existing traditional ear recognition systems have been designed based on computer vision models and have achieved successful results. Nevertheless, such traditional models can be sensitive to several unconstrained… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques

    Okba Taouali1,*, Sawcen Bacha2, Khaoula Ben Abdellafou1, Ahamed Aljuhani1, Kamel Zidi3, Rehab Alanazi1, Mohamed Faouzi Harkat4
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1593-1609, 2023, DOI:10.32604/csse.2023.039984
    Abstract Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’ information and provide a proper diagnosis as needed, resulting in the Internet of Medical Things (IoMT). However, obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge. However, due to the computational resources being limited, an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms. Therefore, designing and developing a lightweight detection mechanism is crucial. To address the aforementioned challenges, a new lightweight IDS approach is developed to effectively combat a diverse range… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Examination of Condition of Used Books with YOLO-Based Object Detection Framework

    Sumin Hong1, Jin-Woo Jeong2,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1611-1632, 2023, DOI:10.32604/csse.2023.038319
    Abstract As the demand for used books has grown in recent years, various online/offline market platforms have emerged to support the trade in used books. The price of used books can depend on various factors, such as the state of preservation (i.e., condition), the value of possession, and so on. Therefore, some online platforms provide a reference document to evaluate the condition of used books, but it is still not trivial for individual sellers to determine the price. The lack of a standard quantitative method to assess the condition of the used book would confuse both sellers and consumers, thereby decreasing… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Humming Bird Optimization with Siamese Convolutional Neural Network Based Fruit Classification Model

    T. Satyanarayana Murthy1, Kollati Vijaya Kumar2, Fayadh Alenezi3, E. Laxmi Lydia4, Gi-Cheon Park5, Hyoung-Kyu Song6, Gyanendra Prasad Joshi7, Hyeonjoon Moon7,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1633-1650, 2023, DOI:10.32604/csse.2023.034769
    Abstract Fruit classification utilizing a deep convolutional neural network (CNN) is the most promising application in personal computer vision (CV). Profound learning-related characterization made it possible to recognize fruits from pictures. But, due to the similarity and complexity, fruit recognition becomes an issue for the stacked fruits on a weighing scale. Recently, Machine Learning (ML) methods have been used in fruit farming and agriculture and brought great convenience to human life. An automated system related to ML could perform the fruit classifier and sorting tasks previously managed by human experts. CNN’s (convolutional neural networks) have attained incredible outcomes in image classifiers… More >

  • Open AccessOpen Access

    ARTICLE

    Billiards Optimization with Modified Deep Learning for Fault Detection in Wireless Sensor Network

    Yousif Sufyan Jghef1, Mohammed Jasim Mohammed Jasim2, Subhi R. M. Zeebaree3,*, Rizgar R. Zebari4
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1651-1664, 2023, DOI:10.32604/csse.2023.037449
    Abstract Wireless Sensor Networks (WSNs) gather data in physical environments, which is some type. These ubiquitous sensors face several challenges responsible for corrupting them (mostly sensor failure and intrusions in external agents). WSNs were disposed to error, and effectual fault detection techniques are utilized for detecting faults from WSNs in a timely approach. Machine learning (ML) was extremely utilized for detecting faults in WSNs. Therefore, this study proposes a billiards optimization algorithm with modified deep learning for fault detection (BIOMDL-FD) in WSN. The BIOMDLFD technique mainly concentrates on identifying sensor faults to enhance network efficiency. To do so, the presented BIOMDL-FD… More >

  • Open AccessOpen Access

    ARTICLE

    Business Blockchain Suitability Determinants: Decision-Making through an Intuitionistic Fuzzy Method

    Tomader Almeshal1,*, Jawad Berri1, Tarifa Almulhim2, Areej Alhogail1, Emam Ahmed3
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1665-1690, 2023, DOI:10.32604/csse.2023.038871
    Abstract Blockchain is one of the innovative and disruptive technologies that has a wide range of applications in multiple industries beyond cryptocurrency. The widespread adoption of blockchain technology in various industries has shown its potential to solve challenging business problems, as well as the possibility to create new business models which can increase a firm’s competitiveness. Due to the novelty of the technology, whereby many companies are still exploring potential use cases, and considering the complexity of blockchain technology, which may require huge changes to a company’s existing systems and processes, it is important for companies to carefully evaluate suitable use… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Attentive Recurrent Network for Applied Linguistics-Based Offensive Speech Detection

    Manar Ahmed Hamza1,*, Hala J. Alshahrani2, Khaled Tarmissi3, Ayman Yafoz4, Amira Sayed A. Aziz5, Mohammad Mahzari6, Abu Sarwar Zamani1, Ishfaq Yaseen1
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1691-1707, 2023, DOI:10.32604/csse.2023.034798
    Abstract Applied linguistics is one of the fields in the linguistics domain and deals with the practical applications of the language studies such as speech processing, language teaching, translation and speech therapy. The ever-growing Online Social Networks (OSNs) experience a vital issue to confront, i.e., hate speech. Amongst the OSN-oriented security problems, the usage of offensive language is the most important threat that is prevalently found across the Internet. Based on the group targeted, the offensive language varies in terms of adult content, hate speech, racism, cyberbullying, abuse, trolling and profanity. Amongst these, hate speech is the most intimidating form of… More >

  • Open AccessOpen Access

    ARTICLE

    A Method of Multimodal Emotion Recognition in Video Learning Based on Knowledge Enhancement

    Hanmin Ye1,2, Yinghui Zhou1, Xiaomei Tao3,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1709-1732, 2023, DOI:10.32604/csse.2023.039186
    Abstract With the popularity of online learning and due to the significant influence of emotion on the learning effect, more and more researches focus on emotion recognition in online learning. Most of the current research uses the comments of the learning platform or the learner’s expression for emotion recognition. The research data on other modalities are scarce. Most of the studies also ignore the impact of instructional videos on learners and the guidance of knowledge on data. Because of the need for other modal research data, we construct a synchronous multimodal data set for analyzing learners’ emotional states in online learning… More >

  • Open AccessOpen Access

    ARTICLE

    CD-FL: Cataract Images Based Disease Detection Using Federated Learning

    Arfat Ahmad Khan1, Shtwai Alsubai2, Chitapong Wechtaisong3,*, Ahmad Almadhor4, Natalia Kryvinska5,*, Abdullah Al Hejaili6, Uzma Ghulam Mohammad7
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1733-1750, 2023, DOI:10.32604/csse.2023.039296
    Abstract A cataract is one of the most significant eye problems worldwide that does not immediately impair vision and progressively worsens over time. Automatic cataract prediction based on various imaging technologies has been addressed recently, such as smartphone apps used for remote health monitoring and eye treatment. In recent years, advances in diagnosis, prediction, and clinical decision support using Artificial Intelligence (AI) in medicine and ophthalmology have been exponential. Due to privacy concerns, a lack of data makes applying artificial intelligence models in the medical field challenging. To address this issue, a federated learning framework named CD-FL based on a VGG16… More >

  • Open AccessOpen Access

    ARTICLE

    CT-NET: A Novel Convolutional Transformer-Based Network for Short-Term Solar Energy Forecasting Using Climatic Information

    Muhammad Munsif1,2, Fath U Min Ullah1,2, Samee Ullah Khan1,2, Noman Khan1,2, Sung Wook Baik1,2,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1751-1773, 2023, DOI:10.32604/csse.2023.038514
    Abstract Photovoltaic (PV) systems are environmentally friendly, generate green energy, and receive support from policies and organizations. However, weather fluctuations make large-scale PV power integration and management challenging despite the economic benefits. Existing PV forecasting techniques (sequential and convolutional neural networks (CNN)) are sensitive to environmental conditions, reducing energy distribution system performance. To handle these issues, this article proposes an efficient, weather-resilient convolutional-transformer-based network (CT-NET) for accurate and efficient PV power forecasting. The network consists of three main modules. First, the acquired PV generation data are forwarded to the pre-processing module for data refinement. Next, to carry out data encoding, a… More >

  • Open AccessOpen Access

    ARTICLE

    Chest Radiographs Based Pneumothorax Detection Using Federated Learning

    Ahmad Almadhor1,*, Arfat Ahmad Khan2, Chitapong Wechtaisong3,*, Iqra Yousaf4, Natalia Kryvinska5, Usman Tariq6, Haithem Ben Chikha1
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1775-1791, 2023, DOI:10.32604/csse.2023.039007
    Abstract Pneumothorax is a thoracic condition that occurs when a person’s lungs collapse, causing air to enter the pleural cavity, the area close to the lungs and chest wall. The most persistent disease, as well as one that necessitates particular patient care and the privacy of their health records. The radiologists find it challenging to diagnose pneumothorax due to the variations in images. Deep learning-based techniques are commonly employed to solve image categorization and segmentation problems. However, it is challenging to employ it in the medical field due to privacy issues and a lack of data. To address this issue, a… More >

  • Open AccessOpen Access

    ARTICLE

    Systematic Survey on Big Data Analytics and Artificial Intelligence for COVID-19 Containment

    Saeed M. Alshahrani1, Jameel Almalki2, Waleed Alshehri2, Rashid Mehmood3, Marwan Albahar2, Najlaa Jannah2, Nayyar Ahmed Khan1,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1793-1817, 2023, DOI:10.32604/csse.2023.039648
    Abstract Artificial Intelligence (AI) has gained popularity for the containment of COVID-19 pandemic applications. Several AI techniques provide efficient mechanisms for handling pandemic situations. AI methods, protocols, data sets, and various validation mechanisms empower the users towards proper decision-making and procedures to handle the situation. Despite so many tools, there still exist conditions in which AI must go a long way. To increase the adaptability and potential of these techniques, a combination of AI and Bigdata is currently gaining popularity. This paper surveys and analyzes the methods within the various computational paradigms used by different researchers and national governments, such as… More >

  • Open AccessOpen Access

    ARTICLE

    3D Model Encryption Algorithm by Parallel Bidirectional Diffusion and 1D Map with Sin and Logistic Coupling

    Yongsheng Hu*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1819-1838, 2023, DOI:10.32604/csse.2023.040729
    Abstract 3D models are essential in virtual reality, game development, architecture design, engineering drawing, medicine, and more. Compared to digital images, 3D models can provide more realistic visual effects. In recent years, significant progress has been made in the field of digital image encryption, and researchers have developed new algorithms that are more secure and efficient. However, there needs to be more research on 3D model encryption. This paper proposes a new 3D model encryption algorithm, called the 1D map with sin and logistic coupling (1D-MWSLC), because existing digital image encryption algorithms cannot be directly applied to 3D models. Firstly, this… More >

  • Open AccessOpen Access

    REVIEW

    Managing Smart Technologies with Software-Defined Networks for Routing and Security Challenges: A Survey

    Babangida Isyaku1,2, Kamalrulnizam Bin Abu Bakar2,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1839-1879, 2023, DOI:10.32604/csse.2023.040456
    Abstract Smart environments offer various services, including smart cities, e-healthcare, transportation, and wearable devices, generating multiple traffic flows with different Quality of Service (QoS) demands. Achieving the desired QoS with security in this heterogeneous environment can be challenging due to traffic flows and device management, unoptimized routing with resource awareness, and security threats. Software Defined Networks (SDN) can help manage these devices through centralized SDN controllers and address these challenges. Various schemes have been proposed to integrate SDN with emerging technologies for better resource utilization and security. Software Defined Wireless Body Area Networks (SDWBAN) and Software Defined Internet of Things (SDIoT)… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Chinese Filtering Model Using Value Scale Extended Text Vector

    Siyu Lu1, Ligao Cai1, Zhixin Liu2, Shan Liu1, Bo Yang1, Lirong Yin3, Mingzhe Liu4, Wenfeng Zheng1,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1881-1899, 2023, DOI:10.32604/csse.2023.034853
    Abstract With the development of Internet technology, the explosive growth of Internet information presentation has led to difficulty in filtering effective information. Finding a model with high accuracy for text classification has become a critical problem to be solved by text filtering, especially for Chinese texts. This paper selected the manually calibrated Douban movie website comment data for research. First, a text filtering model based on the BP neural network has been built; Second, based on the Term Frequency-Inverse Document Frequency (TF-IDF) vector space model and the doc2vec method, the text word frequency vector and the text semantic vector were obtained… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Objective Optimization of Traffic Signal Timing at Typical Junctions Based on Genetic Algorithms

    Zeyu Zhang1, Han Zhu1, Wei Zhang1, Zhiming Cai2,*, Linkai Zhu2, Zefeng Li2
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1901-1917, 2023, DOI:10.32604/csse.2023.039395
    Abstract With the rapid development of urban road traffic and the increasing number of vehicles, how to alleviate traffic congestion is one of the hot issues that need to be urgently addressed in building smart cities. Therefore, in this paper, a nonlinear multi-objective optimization model of urban intersection signal timing based on a Genetic Algorithm was constructed. Specifically, a typical urban intersection was selected as the research object, and drivers’ acceleration habits were taken into account. What’s more, the shortest average delay time, the least average number of stops, and the maximum capacity of the intersection were regarded as the optimization… More >

  • Open AccessOpen Access

    ARTICLE

    Adversarial Attack-Based Robustness Evaluation for Trustworthy AI

    Eungyu Lee, Yongsoo Lee, Taejin Lee*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1919-1935, 2023, DOI:10.32604/csse.2023.039599
    Abstract Artificial Intelligence (AI) technology has been extensively researched in various fields, including the field of malware detection. AI models must be trustworthy to introduce AI systems into critical decision-making and resource protection roles. The problem of robustness to adversarial attacks is a significant barrier to trustworthy AI. Although various adversarial attack and defense methods are actively being studied, there is a lack of research on robustness evaluation metrics that serve as standards for determining whether AI models are safe and reliable against adversarial attacks. An AI model’s robustness level cannot be evaluated by traditional evaluation indicators such as accuracy and… More >

  • Open AccessOpen Access

    ARTICLE

    Enhanced Multi-Objective Grey Wolf Optimizer with Lévy Flight and Mutation Operators for Feature Selection

    Qasem Al-Tashi1,*, Tareq M Shami2, Said Jadid Abdulkadir3, Emelia Akashah Patah Akhir3, Ayed Alwadain4, Hitham Alhussain3, Alawi Alqushaibi3, Helmi MD Rais3, Amgad Muneer1, Maliazurina B. Saad1, Jia Wu1, Seyedali Mirjalili5,6,7,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1937-1966, 2023, DOI:10.32604/csse.2023.039788
    Abstract The process of selecting features or reducing dimensionality can be viewed as a multi-objective minimization problem in which both the number of features and error rate must be minimized. While it is a multi-objective problem, current methods tend to treat feature selection as a single-objective optimization task. This paper presents enhanced multi-objective grey wolf optimizer with Lévy flight and mutation phase (LMuMOGWO) for tackling feature selection problems. The proposed approach integrates two effective operators into the existing Multi-objective Grey Wolf optimizer (MOGWO): a Lévy flight and a mutation operator. The Lévy flight, a type of random walk with jump size… More >

  • Open AccessOpen Access

    ARTICLE

    Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi

    Doaa Sami Khafaga1, Sarah M. Alhammad1,*, Amal Magdi2, Osama ElKomy2, Nabil A. Lashin2, Khalid M. Hosny2
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1967-1986, 2023, DOI:10.32604/csse.2023.040345
    Abstract Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access. Due to the wide use of the Internet nowadays, the need to ensure data integrity and authentication increases. Many techniques, such as watermarking and encryption, are used for securing images transmitted via the Internet. The majority of watermarking systems are PC-based, but they are not very portable. Hardware-based watermarking methods need to be developed to accommodate real-time applications and provide portability. This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel… More >

  • Open AccessOpen Access

    ARTICLE

    Rockburst Intensity Grade Prediction Model Based on Batch Gradient Descent and Multi-Scale Residual Deep Neural Network

    Yu Zhang1,2,3, Mingkui Zhang1,2,*, Jitao Li1,2, Guangshu Chen1,2
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1987-2006, 2023, DOI:10.32604/csse.2023.040381
    Abstract Rockburst is a phenomenon in which free surfaces are formed during excavation, which subsequently causes the sudden release of energy in the construction of mines and tunnels. Light rockburst only peels off rock slices without ejection, while severe rockburst causes casualties and property loss. The frequency and degree of rockburst damage increases with the excavation depth. Moreover, rockburst is the leading engineering geological hazard in the excavation process, and thus the prediction of its intensity grade is of great significance to the development of geotechnical engineering. Therefore, the prediction of rockburst intensity grade is one problem that needs to be… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Crop Expert System Using Improved LSTM with Attention Block

    Shahbaz Sikandar1, Rabbia Mahum1, Suliman Aladhadh2,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2007-2025, 2023, DOI:10.32604/csse.2023.037723
    Abstract Agriculture plays an important role in the economy of any country. Approximately half of the population of developing countries is directly or indirectly connected to the agriculture field. Many farmers do not choose the right crop for cultivation depending on their soil type, crop type, and climatic requirements like rainfall. This wrong decision of crop selection directly affects the production of the crops which leads to yield and economic loss in the country. Many parameters should be observed such as soil characteristics, type of crop, and environmental factors for the cultivation of the right crop. Manual decision-making is time-taking and… More >

  • Open AccessOpen Access

    ARTICLE

    A Triplet-Branch Convolutional Neural Network for Part-Based Gait Recognition

    Sang-Soo Yeo1, Seungmin Rho2,*, Hyungjoon Kim3, Jibran Safdar4, Umar Zia5, Mehr Yahya Durrani5
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2027-2047, 2023, DOI:10.32604/csse.2023.040327
    Abstract Intelligent vision-based surveillance systems are designed to deal with the gigantic volume of videos captured in a particular environment to perform the interpretation of scenes in form of detection, tracking, monitoring, behavioral analysis, and retrievals. In addition to that, another evolving way of surveillance systems in a particular environment is human gait-based surveillance. In the existing research, several methodological frameworks are designed to use deep learning and traditional methods, nevertheless, the accuracies of these methods drop substantially when they are subjected to covariate conditions. These covariate variables disrupt the gait features and hence the recognition of subjects becomes difficult. To… More >

  • Open AccessOpen Access

    ARTICLE

    Edge Cloud Selection in Mobile Edge Computing (MEC)-Aided Applications for Industrial Internet of Things (IIoT) Services

    Dae-Young Kim1, SoYeon Lee2, MinSeung Kim2, Seokhoon Kim1,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2049-2060, 2023, DOI:10.32604/csse.2023.040473
    Abstract In many IIoT architectures, various devices connect to the edge cloud via gateway systems. For data processing, numerous data are delivered to the edge cloud. Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency. There are two types of costs for this kind of IoT network: a communication cost and a computing cost. For service efficiency, the communication cost of data transmission should be minimized, and the computing cost in the edge cloud should be also minimized. Therefore, in this paper, the communication cost for data transmission is defined as the delay factor, and the… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks

    Qingqing Ning, Chunhua Jin*, Zhiwei Chen, Yongliang Xu, Huaqi Lu
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2061-2078, 2023, DOI:10.32604/csse.2023.040483
    Abstract Wireless body area networks (WBANs) are an emerging technology for the real-time monitoring of physiological signals. WBANs provide a mechanism for collecting, storing, and transmitting physiological data to healthcare providers. However, the open wireless channel and limited resources of sensors bring security challenges. To ensure physiological data security, this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption (CP-HRSC) scheme, in which sensors are in a certificateless cryptosystem (CLC) environment, and the server is in a public key infrastructure (PKI) environment. CLC could solve the limitations of key escrow in identity-based cryptography (IBC) and certificate management for public… More >

  • Open AccessOpen Access

    ARTICLE

    Sand Cat Swarm Optimization with Deep Transfer Learning for Skin Cancer Classification

    C. S. S. Anupama1, Saud Yonbawi2, G. Jose Moses3, E. Laxmi Lydia4, Seifedine Kadry5,6,7, Jungeun Kim8,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2079-2095, 2023, DOI:10.32604/csse.2023.038322
    Abstract Skin cancer is one of the most dangerous cancer. Because of the high melanoma death rate, skin cancer is divided into non-melanoma and melanoma. The dermatologist finds it difficult to identify skin cancer from dermoscopy images of skin lesions. Sometimes, pathology and biopsy examinations are required for cancer diagnosis. Earlier studies have formulated computer-based systems for detecting skin cancer from skin lesion images. With recent advancements in hardware and software technologies, deep learning (DL) has developed as a potential technique for feature learning. Therefore, this study develops a new sand cat swarm optimization with a deep transfer learning method for… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient 3D CNN Framework with Attention Mechanisms for Alzheimer’s Disease Classification

    Athena George1, Bejoy Abraham2, Neetha George3, Linu Shine3, Sivakumar Ramachandran4,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2097-2118, 2023, DOI:10.32604/csse.2023.039262
    Abstract Neurodegeneration is the gradual deterioration and eventual death of brain cells, leading to progressive loss of structure and function of neurons in the brain and nervous system. Neurodegenerative disorders, such as Alzheimer’s, Huntington’s, Parkinson’s, amyotrophic lateral sclerosis, multiple system atrophy, and multiple sclerosis, are characterized by progressive deterioration of brain function, resulting in symptoms such as memory impairment, movement difficulties, and cognitive decline. Early diagnosis of these conditions is crucial to slowing down cell degeneration and reducing the severity of the diseases. Magnetic resonance imaging (MRI) is widely used by neurologists for diagnosing brain abnormalities. The majority of the research… More >

  • Open AccessOpen Access

    ARTICLE

    Applying Customized Convolutional Neural Network to Kidney Image Volumes for Kidney Disease Detection

    Ali Altalbe1,2,*, Abdul Rehman Javed3
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2119-2134, 2023, DOI:10.32604/csse.2023.040620
    Abstract Kidney infection is a severe medical issue affecting individuals worldwide and increasing mortality rates. Chronic Kidney Disease (CKD) is treatable during its initial phases but can become irreversible and cause renal failure. Among the various diseases, the most prevalent kidney conditions affecting kidney function are cyst growth, kidney tumors, and nephrolithiasis. The significant challenge for the medical community is the immediate diagnosis and treatment of kidney disease. Kidney failure could result from kidney disorders like tumors, stones, and cysts if not often identified and addressed. Computer-assisted diagnostics are necessary to support clinicians’ and specialists’ medical assessments due to the rising… More >

  • Open AccessOpen Access

    ARTICLE

    SlowFast Based Real-Time Human Motion Recognition with Action Localization

    Gyu-Il Kim1, Hyun Yoo2, Kyungyong Chung3,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2135-2152, 2023, DOI:10.32604/csse.2023.041030
    Abstract Artificial intelligence is increasingly being applied in the field of video analysis, particularly in the area of public safety where video surveillance equipment such as closed-circuit television (CCTV) is used and automated analysis of video information is required. However, various issues such as data size limitations and low processing speeds make real-time extraction of video data challenging. Video analysis technology applies object classification, detection, and relationship analysis to continuous 2D frame data, and the various meanings within the video are thus analyzed based on the extracted basic data. Motion recognition is key in this analysis. Motion recognition is a challenging… More >

  • Open AccessOpen Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917
    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open AccessOpen Access

    ARTICLE

    Archimedes Optimization with Deep Learning Based Aerial Image Classification for Cybersecurity Enabled UAV Networks

    Faris Kateb, Mahmoud Ragab*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2171-2185, 2023, DOI:10.32604/csse.2023.039931
    Abstract The recent adoption of satellite technologies, unmanned aerial vehicles (UAVs) and 5G has encouraged telecom networking to evolve into more stable service to remote areas and render higher quality. But, security concerns with drones were increasing as drone nodes have been striking targets for cyberattacks because of immensely weak inbuilt and growing poor security volumes. This study presents an Archimedes Optimization with Deep Learning based Aerial Image Classification and Intrusion Detection (AODL-AICID) technique in secure UAV networks. The presented AODL-AICID technique concentrates on two major processes: image classification and intrusion detection. For aerial image classification, the AODL-AICID technique encompasses MobileNetv2… More >

  • Open AccessOpen Access

    ARTICLE

    Privacy Preserved Brain Disorder Diagnosis Using Federated Learning

    Ali Altalbe1,2,*, Abdul Rehman Javed3
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2187-2200, 2023, DOI:10.32604/csse.2023.040624
    Abstract Federated learning has recently attracted significant attention as a cutting-edge technology that enables Artificial Intelligence (AI) algorithms to utilize global learning across the data of numerous individuals while safeguarding user data privacy. Recent advanced healthcare technologies have enabled the early diagnosis of various cognitive ailments like Parkinson’s. Adequate user data is frequently used to train machine learning models for healthcare systems to track the health status of patients. The healthcare industry faces two significant challenges: security and privacy issues and the personalization of cloud-trained AI models. This paper proposes a Deep Neural Network (DNN) based approach embedded in a federated… More >

  • Open AccessOpen Access

    ARTICLE

    Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions

    Muhammad Waqas Nadeem1,*, Hock Guan Goh1, Yichiet Aun1, Vasaki Ponnusamy2
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2201-2217, 2023, DOI:10.32604/csse.2023.039893
    Abstract Over the past few years, rapid advancements in the internet and communication technologies have led to increasingly intricate and diverse networking systems. As a result, greater intelligence is necessary to effectively manage, optimize, and maintain these systems. Due to their distributed nature, machine learning models are challenging to deploy in traditional networks. However, Software-Defined Networking (SDN) presents an opportunity to integrate intelligence into networks by offering a programmable architecture that separates data and control planes. SDN provides a centralized network view and allows for dynamic updates of flow rules and software-based traffic analysis. While the programmable nature of SDN makes… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Analysis of Intelligent Neural-Based Deep Learning System on Rank Images Classification

    Muhammad Hameed Siddiqi1,*, Asfandyar Khan2, Muhammad Bilal Khan2, Abdullah Khan2, Madallah Alruwaili1, Saad Alanazi1
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2219-2239, 2023, DOI:10.32604/csse.2023.040212
    Abstract The use of the internet is increasing all over the world on a daily basis in the last two decades. The increase in the internet causes many sexual crimes, such as sexual misuse, domestic violence, and child pornography. Various research has been done for pornographic image detection and classification. Most of the used models used machine learning techniques and deep learning models which show less accuracy, while the deep learning model ware used for classification and detection performed better as compared to machine learning. Therefore, this research evaluates the performance analysis of intelligent neural-based deep learning models which are based… More >

  • Open AccessOpen Access

    ARTICLE

    Muti-Fusion Swarm Intelligence Optimization Algorithm in Base Station Coverage Optimization Problems

    Zhenyu Yan1,*, Haotian Bian2
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2241-2257, 2023, DOI:10.32604/csse.2023.040603
    Abstract As millimeter waves will be widely used in the Internet of Things (IoT) and Telematics to provide high bandwidth communication and mass connectivity, the coverage optimization of base stations can effectively improve the quality of communication services. How to optimize the convergence speed of the base station coverage solution is crucial for IoT service providers. This paper proposes the Muti-Fusion Sparrow Search Algorithm (MFSSA) optimize the situation to address the problem of discrete coverage maximization and rapid convergence. Firstly, the initial swarm diversity is enriched using a sine chaotic map, and dynamic adaptive weighting is added to the discoverer location… More >

  • Open AccessOpen Access

    ARTICLE

    A PSO Improved with Imbalanced Mutation and Task Rescheduling for Task Offloading in End-Edge-Cloud Computing

    Kaili Shao1, Hui Fu1, Ying Song2, Bo Wang3,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2259-2274, 2023, DOI:10.32604/csse.2023.041454
    Abstract To serve various tasks requested by various end devices with different requirements, end-edge-cloud (E2C) has attracted more and more attention from specialists in both academia and industry, by combining both benefits of edge and cloud computing. But nowadays, E2C still suffers from low service quality and resource efficiency, due to the geographical distribution of edge resources and the high dynamic of network topology and user mobility. To address these issues, this paper focuses on task offloading, which makes decisions that which resources are allocated to tasks for their processing. This paper first formulates the problem into binary non-linear programming and… More >

  • Open AccessOpen Access

    ARTICLE

    RO-SLAM: A Robust SLAM for Unmanned Aerial Vehicles in a Dynamic Environment

    Jingtong Peng*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2275-2291, 2023, DOI:10.32604/csse.2023.039272
    Abstract When applied to Unmanned Aerial Vehicles (UAVs), existing Simultaneous Localization and Mapping (SLAM) algorithms are constrained by several factors, notably the interference of dynamic outdoor objects, the limited computing performance of UAVs, and the holes caused by dynamic objects removal in the map. We proposed a new SLAM system for UAVs in dynamic environments to solve these problems based on ORB-SLAM2. We have improved the Pyramid Scene Parsing Network (PSPNet) using Depthwise Separable Convolution to reduce the model parameters. We also incorporated an auxiliary loss function to supervise the hidden layer to enhance accuracy. Then we used the improved PSPNet… More >

  • Open AccessOpen Access

    ARTICLE

    A Health Monitoring System Using IoT-Based Android Mobile Application

    Madallah Alruwaili1,*, Muhammad Hameed Siddiqi1, Kamran Farid2, Mohammad Azad1, Saad Alanazi1, Asfandyar Khan2, Abdullah Khan2
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2293-2311, 2023, DOI:10.32604/csse.2023.040312
    Abstract Numerous types of research on healthcare monitoring systems have been conducted for calculating heart rate, ECG, nasal/oral airflow, temperature, light sensor, and fall detection sensor. Different researchers have done different work in the field of health monitoring with sensor networks. Different researchers used built-in apps, such as some used a small number of parameters, while some other studies used more than one microcontroller and used senders and receivers among the microcontrollers to communicate, and outdated tools for study development. While no efficient, cheap, and updated work is proposed in the field of sensor-based health monitoring systems. Therefore, this study developed… More >

  • Open AccessOpen Access

    ARTICLE

    How Do V2V and V2I Messages Affect the Performance of Driving Smart Vehicles?

    Abdullah Alsaleh1,2,*
    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2313-2336, 2023, DOI:10.32604/csse.2023.039682
    Abstract Intelligent transportation systems (ITSs) are becoming increasingly popular as they support efficient coordinated transport. ITSs aim to improve the safety, efficiency and reliability of road transportation through integrated approaches to the exchange of relevant information. Mobile ad-hoc networks (MANETs) and vehicle ad-hoc networks (VANETs) are integral components of ITS. The VANET is composed of interconnected vehicles with sensitivity capabilities to exchange traffic, positioning, weather and emergency information. One of the main challenges in VANET is the reliable and timely dissemination of information between vehicular nodes to improve decision-making processes. This paper illustrates challenges in VANET and reviews possible solutions to… More >

Per Page:

Share Link