CSSEOpen Access

Computer Systems Science and Engineering

ISSN:0267-6192(print)
Publication Frequency:Monthly

  • Online
    Articles

    2149

  • on board
    editors

    61



About the Journal

The Computer Systems Science and Engineering journal is devoted to the publication of high quality papers on theoretical developments in computer systems science, and their applications in computer systems engineering. Original research papers, state-of-the-art reviews and technical notes are invited for publication. Computer Systems Science and Engineering is published monthly by Tech Science Press.

Indexing and Abstracting

Science Citation Index (Web of Science): 2021 Impact Factor 4.397; Scopus Cite Score (Impact per Publication 2021): 1.9; SNIP (Source Normalized Impact per Paper 2021): 0.827; ACM Digital Library.

  • Open Access

    ARTICLE

    Sensor Network Structure Recognition Based on P-law

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1277-1292, 2023, DOI:10.32604/csse.2023.026150
    Abstract A sensor graph network is a sensor network model organized according to graph network structure. Structural unit and signal propagation of core nodes are the basic characteristics of sensor graph networks. In sensor networks, network structure recognition is the basis for accurate identification and effective prediction and control of node states. Aiming at the problems of difficult global structure identification and poor interpretability in complex sensor graph networks, based on the characteristics of sensor networks, a method is proposed to firstly unitize the graph network structure and then expand the unit based on the signal transmission path of the core… More >

  • Open Access

    ARTICLE

    Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1293-1310, 2023, DOI:10.32604/csse.2023.035589
    Abstract The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.… More >

  • Open Access

    ARTICLE

    BS-SC Model: A Novel Method for Predicting Child Abuse Using Borderline-SMOTE Enabled Stacking Classifier

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1311-1336, 2023, DOI:10.32604/csse.2023.034910
    Abstract For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events. The data set was balanced using the Borderline-SMOTE technique,… More >

  • Open Access

    ARTICLE

    Computer-Aided Diagnosis for Tuberculosis Classification with Water Strider Optimization Algorithm

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1337-1353, 2023, DOI:10.32604/csse.2023.035253
    Abstract Computer-aided diagnosis (CAD) models exploit artificial intelligence (AI) for chest X-ray (CXR) examination to identify the presence of tuberculosis (TB) and can improve the feasibility and performance of CXR for TB screening and triage. At the same time, CXR interpretation is a time-consuming and subjective process. Furthermore, high resemblance among the radiological patterns of TB and other lung diseases can result in misdiagnosis. Therefore, computer-aided diagnosis (CAD) models using machine learning (ML) and deep learning (DL) can be designed for screening TB accurately. With this motivation, this article develops a Water Strider Optimization with Deep Transfer Learning Enabled Tuberculosis Classification… More >

  • Open Access

    ARTICLE

    Enhanced Adaptive Brain-Computer Interface Approach for Intelligent Assistance to Disabled Peoples

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1355-1369, 2023, DOI:10.32604/csse.2023.034682
    Abstract Assistive devices for disabled people with the help of Brain-Computer Interaction (BCI) technology are becoming vital bio-medical engineering. People with physical disabilities need some assistive devices to perform their daily tasks. In these devices, higher latency factors need to be addressed appropriately. Therefore, the main goal of this research is to implement a real-time BCI architecture with minimum latency for command actuation. The proposed architecture is capable to communicate between different modules of the system by adopting an automotive, intelligent data processing and classification approach. Neuro-sky mind wave device has been used to transfer the data to our implemented server… More >

  • Open Access

    ARTICLE

    Improved Chameleon Swarm Optimization-Based Load Scheduling for IoT-Enabled Cloud Environment

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1371-1383, 2023, DOI:10.32604/csse.2023.030232
    Abstract Internet of things (IoT) and cloud computing (CC) becomes widespread in different application domains such as business, e-commerce, healthcare, etc. The recent developments of IoT technology have led to an increase in large amounts of data from various sources. In IoT enabled cloud environment, load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization. The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics. In this view, this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling (C3SOA-LS) technique for IoT enabled cloud environment. The… More >

  • Open Access

    ARTICLE

    Contrastive Clustering for Unsupervised Recognition of Interference Signals

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1385-1400, 2023, DOI:10.32604/csse.2023.034543
    Abstract Interference signals recognition plays an important role in anti-jamming communication. With the development of deep learning, many supervised interference signals recognition algorithms based on deep learning have emerged recently and show better performance than traditional recognition algorithms. However, there is no unsupervised interference signals recognition algorithm at present. In this paper, an unsupervised interference signals recognition method called double phases and double dimensions contrastive clustering (DDCC) is proposed. Specifically, in the first phase, four data augmentation strategies for interference signals are used in data-augmentation-based (DA-based) contrastive learning. In the second phase, the original dataset’s k-nearest neighbor set (KNNset) is designed… More >

  • Open Access

    ARTICLE

    ViT2CMH: Vision Transformer Cross-Modal Hashing for Fine-Grained Vision-Text Retrieval

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1401-1414, 2023, DOI:10.32604/csse.2023.034757
    Abstract In recent years, the development of deep learning has further improved hash retrieval technology. Most of the existing hashing methods currently use Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) to process image and text information, respectively. This makes images or texts subject to local constraints, and inherent label matching cannot capture fine-grained information, often leading to suboptimal results. Driven by the development of the transformer model, we propose a framework called ViT2CMH mainly based on the Vision Transformer to handle deep Cross-modal Hashing tasks rather than CNNs or RNNs. Specifically, we use a BERT network to extract text… More >

  • Open Access

    ARTICLE

    Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1415-1429, 2023, DOI:10.32604/csse.2023.034321
    Abstract Lately, the Internet of Things (IoT) application requires millions of structured and unstructured data since it has numerous problems, such as data organization, production, and capturing. To address these shortcomings, big data analytics is the most superior technology that has to be adapted. Even though big data and IoT could make human life more convenient, those benefits come at the expense of security. To manage these kinds of threats, the intrusion detection system has been extensively applied to identify malicious network traffic, particularly once the preventive technique fails at the level of endpoint IoT devices. As cyberattacks targeting IoT have… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1431-1445, 2023, DOI:10.32604/csse.2023.034421
    Abstract Recently, a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks (WSN). In routing, the trust system includes or avoids nodes related to the estimated trust values in the routing function. This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol (EMTA-SRSP) for WSN. The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN. To accomplish this, the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication. For the clustering process, the nodes with maximum residual energy will be considered… More >

  • Open Access

    ARTICLE

    Adaptive Weighted Flow Net Algorithm for Human Activity Recognition Using Depth Learned Features

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1447-1469, 2023, DOI:10.32604/csse.2023.035969
    Abstract Human Activity Recognition (HAR) from video data collections is the core application in vision tasks and has a variety of utilizations including object detection applications, video-based behavior monitoring, video classification, and indexing, patient monitoring, robotics, and behavior analysis. Although many techniques are available for HAR in video analysis tasks, most of them are not focusing on behavioral analysis. Hence, a new HAR system analysis the behavioral activity of a person based on the deep learning approach proposed in this work. The most essential aim of this work is to recognize the complex activities that are useful in many tasks that… More >

  • Open Access

    ARTICLE

    Modified Garden Balsan Optimization Based Machine Learning for Intrusion Detection

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1471-1485, 2023, DOI:10.32604/csse.2023.034137
    Abstract The Internet of Things (IoT) environment plays a crucial role in the design of smart environments. Security and privacy are the major challenging problems that exist in the design of IoT-enabled real-time environments. Security susceptibilities in IoT-based systems pose security threats which affect smart environment applications. Intrusion detection systems (IDS) can be used for IoT environments to mitigate IoT-related security attacks which use few security vulnerabilities. This paper introduces a modified garden balsan optimization-based machine learning model for intrusion detection (MGBO-MLID) in the IoT cloud environment. The presented MGBO-MLID technique focuses on the identification and classification of intrusions in the… More >

  • Open Access

    ARTICLE

    Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1487-1501, 2023, DOI:10.32604/csse.2023.035377
    Abstract As the scale of the power system continues to expand, the environment for power operations becomes more and more complex. Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately. Therefore, more reliable and accurate security control methods are urgently needed. In order to improve the accuracy and reliability of the operation risk management and control method, this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network. To… More >

  • Open Access

    ARTICLE

    Deep Learning-Based FOPID Controller for Cascaded DC-DC Converters

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1503-1519, 2023, DOI:10.32604/csse.2023.036577
    Abstract Smart grids and their technologies transform the traditional electric grids to assure safe, secure, cost-effective, and reliable power transmission. Non-linear phenomena in power systems, such as voltage collapse and oscillatory phenomena, can be investigated by chaos theory. Recently, renewable energy resources, such as wind turbines, and solar photovoltaic (PV) arrays, have been widely used for electric power generation. The design of the controller for the direct Current (DC) converter in a PV system is performed based on the linearized model at an appropriate operating point. However, these operating points are ever-changing in a PV system, and the design of the… More >

  • Open Access

    ARTICLE

    Diagnosis of Middle Ear Diseases Based on Convolutional Neural Network

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1521-1532, 2023, DOI:10.32604/csse.2023.034192
    Abstract An otoscope is traditionally used to examine the eardrum and ear canal. A diagnosis of otitis media (OM) relies on the experience of clinicians. If an examiner lacks experience, the examination may be difficult and time-consuming. This paper presents an ear disease classification method using middle ear images based on a convolutional neural network (CNN). Especially the segmentation and classification networks are used to classify an otoscopic image into six classes: normal, acute otitis media (AOM), otitis media with effusion (OME), chronic otitis media (COM), congenital cholesteatoma (CC) and traumatic perforations (TMPs). The Mask R-CNN is utilized for the segmentation… More >

  • Open Access

    ARTICLE

    Harris Hawks Optimizer with Graph Convolutional Network Based Weed Detection in Precision Agriculture

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1533-1547, 2023, DOI:10.32604/csse.2023.036296
    Abstract Precision agriculture includes the optimum and adequate use of resources depending on several variables that govern crop yield. Precision agriculture offers a novel solution utilizing a systematic technique for current agricultural problems like balancing production and environmental concerns. Weed control has become one of the significant problems in the agricultural sector. In traditional weed control, the entire field is treated uniformly by spraying the soil, a single herbicide dose, weed, and crops in the same way. For more precise farming, robots could accomplish targeted weed treatment if they could specifically find the location of the dispensable plant and identify the… More >

  • Open Access

    ARTICLE

    Optimized Tuning of LOADng Routing Protocol Parameters for IoT

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1549-1561, 2023, DOI:10.32604/csse.2023.035031
    Abstract Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things (IoT), making it possible to accomplish tasks with less human interaction. However, it faces many problems, including lower capacity links, energy utilization, enhancement of resources and limited resources due to its openness, heterogeneity, limited resources and extensiveness. It is challenging to route packets in such a constrained environment. In an IoT network constrained by limited resources, minimal routing control overhead is required without packet loss. Such constrained environments can be improved through the optimal routing protocol. It is challenging to route packets in such a constrained… More >

  • Open Access

    ARTICLE

    An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1563-1576, 2023, DOI:10.32604/csse.2023.035307
    Abstract With the improvement of current online communication schemes, it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate. Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission. Both of the techniques mentioned above aid in the confidentiality of feature content. The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red, Green, and Blue. The private Content originated from a medical client and was forwarded to a medical practitioner… More >

  • Open Access

    ARTICLE

    A Multimodel Transfer-Learning-Based Car Price Prediction Model with an Automatic Fuzzy Logic Parameter Optimizer

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1577-1596, 2023, DOI:10.32604/csse.2023.036292
    Abstract Cars are regarded as an indispensable means of transportation in Taiwan. Several studies have indicated that the automotive industry has witnessed remarkable advances and that the market of used cars has rapidly expanded. In this study, a price prediction system for used BMW cars was developed. Nine parameters of used cars, including their model, registration year, and transmission style, were analyzed. The data obtained were then divided into three subsets. The first subset was used to compare the results of each algorithm. The predicted values produced by the two algorithms with the most satisfactory results were used as the input… More >

  • Open Access

    ARTICLE

    An Improved Deep Structure for Accurately Brain Tumor Recognition

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1597-1616, 2023, DOI:10.32604/csse.2023.034375
    Abstract Brain neoplasms are recognized with a biopsy, which is not commonly done before decisive brain surgery. By using Convolutional Neural Networks (CNNs) and textural features, the process of diagnosing brain tumors by radiologists would be a noninvasive procedure. This paper proposes a features fusion model that can distinguish between no tumor and brain tumor types via a novel deep learning structure. The proposed model extracts Gray Level Co-occurrence Matrix (GLCM) textural features from MRI brain tumor images. Moreover, a deep neural network (DNN) model has been proposed to select the most salient features from the GLCM. Moreover, it manipulates the… More >

  • Open Access

    ARTICLE

    Semiconducting SWCNT Photo Detector for High Speed Switching Through Single Halo Doping

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1617-1630, 2023, DOI:10.32604/csse.2023.034681
    Abstract The method opted for accuracy, and no existing studies are based on this method. A design and characteristic survey of a new small band gap semiconducting Single Wall Carbon Nano Tube (SWCNT) Field Effect Transistor as a photodetector is carried out. In the proposed device, better performance is achieved by increasing the diameter and introducing a new single halo (SH) doping in the channel length of the CNTFET device. This paper is a study and analysis of the performance of a Carbon Nano Tube Field Effect Transistor (CNTFET) as a photodetector using the self-consistent Poisson and Green function method. The… More >

  • Open Access

    ARTICLE

    Designing Adaptive Multiple Dependent State Sampling Plan for Accelerated Life Tests

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1631-1651, 2023, DOI:10.32604/csse.2023.036179
    Abstract A novel adaptive multiple dependent state sampling plan (AMDSSP) was designed to inspect products from a continuous manufacturing process under the accelerated life test (ALT) using both double sampling plan (DSP) and multiple dependent state sampling plan (MDSSP) concepts. Under accelerated conditions, the lifetime of a product follows the Weibull distribution with a known shape parameter, while the scale parameter can be determined using the acceleration factor (AF). The Arrhenius model is used to estimate AF when the damaging process is temperature-sensitive. An economic design of the proposed sampling plan was also considered for the ALT. A genetic algorithm with… More >

  • Open Access

    ARTICLE

    Liver Tumor Decision Support System on Human Magnetic Resonance Images: A Comparative Study

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1653-1671, 2023, DOI:10.32604/csse.2023.033861
    Abstract Liver cancer is the second leading cause of cancer death worldwide. Early tumor detection may help identify suitable treatment and increase the survival rate. Medical imaging is a non-invasive tool that can help uncover abnormalities in human organs. Magnetic Resonance Imaging (MRI), in particular, uses magnetic fields and radio waves to differentiate internal human organs tissue. However, the interpretation of medical images requires the subjective expertise of a radiologist and oncologist. Thus, building an automated diagnosis computer-based system can help specialists reduce incorrect diagnoses. This paper proposes a hybrid automated system to compare the performance of 3D features and 2D… More >

  • Open Access

    ARTICLE

    Hyperspectral Remote Sensing Image Classification Using Improved Metaheuristic with Deep Learning

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1673-1688, 2023, DOI:10.32604/csse.2023.034414
    Abstract Remote sensing image (RSI) classifier roles a vital play in earth observation technology utilizing Remote sensing (RS) data are extremely exploited from both military and civil fields. More recently, as novel DL approaches develop, techniques for RSI classifiers with DL have attained important breakthroughs, providing a new opportunity for the research and development of RSI classifiers. This study introduces an Improved Slime Mould Optimization with a graph convolutional network for the hyperspectral remote sensing image classification (ISMOGCN-HRSC) model. The ISMOGCN-HRSC model majorly concentrates on identifying and classifying distinct kinds of RSIs. In the presented ISMOGCN-HRSC model, the synergic deep learning… More >

  • Open Access

    ARTICLE

    Design of Six Element MIMO Antenna with Enhanced Gain for 28/38 GHz mm-Wave 5G Wireless Application

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1689-1705, 2023, DOI:10.32604/csse.2023.034613
    Abstract The fifth-generation (5G) wireless technology is the most recent standardization in communication services of interest across the globe. The concept of Multiple-Input-Multiple-Output antenna (MIMO) systems has recently been incorporated to operate at higher frequencies without limitations. This paper addresses, design of a high-gain MIMO antenna that offers a bandwidth of 400 MHz and 2.58 GHz by resonating at 28 and 38 GHz, respectively for 5G millimeter (mm)-wave applications. The proposed design is developed on a RT Duroid 5880 substrate with a single elemental dimension of 9.53 × 7.85 × 0.8 mm3. The patch antenna is fully grounded and is fed with a 50-ohm stepped impedance… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270
    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A hidden message is first included… More >

  • Open Access

    ARTICLE

    Power Scheduling with Max User Comfort in Smart Home: Performance Analysis and Tradeoffs

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1723-1740, 2023, DOI:10.32604/csse.2023.035141
    Abstract The smart grid has enabled users to control their home energy more effectively and efficiently. A home energy management system (HEM) is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy. Here, we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm (GWA) and Harmony Search Algorithms (HSA). Moreover, a fusion initiated on HSA and GWA operators is used to optimize energy intake. Furthermore, many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge. Hybridization has proven beneficial in achieving numerous… More >

  • Open Access

    ARTICLE

    Classification of Multi-view Digital Mammogram Images Using SMO-WkNN

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1741-1758, 2023, DOI:10.32604/csse.2023.035185
    Abstract Breast cancer (BCa) is a leading cause of death in the female population across the globe. Approximately 2.3 million new BCa cases are recorded globally in females, overtaking lung cancer as the most prevalent form of cancer to be diagnosed. However, the mortality rates for cervical and BCa are significantly higher in developing nations than in developed countries. Early diagnosis is the only option to minimize the risks of BCa. Deep learning (DL)-based models have performed well in image processing in recent years, particularly convolutional neural network (CNN). Hence, this research proposes a DL-based CNN model to diagnose BCa from… More >

  • Open Access

    ARTICLE

    An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1759-1774, 2023, DOI:10.32604/csse.2023.034047
    Abstract The Repository Mahasiswa (RAMA) is a national repository of research reports in the form of final assignments, student projects, theses, dissertations, and research reports of lecturers or researchers that have not yet been published in journals, conferences, or integrated books from the scientific repository of universities and research institutes in Indonesia. The increasing popularity of the RAMA Repository leads to security issues, including the two most widespread, vulnerable attacks i.e., Structured Query Language (SQL) injection and cross-site scripting (XSS) attacks. An attacker gaining access to data and performing unauthorized data modifications is extremely dangerous. This paper aims to provide an… More >

  • Open Access

    ARTICLE

    Improving Recommendation for Effective Personalization in Context-Aware Data Using Novel Neural Network

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1775-1787, 2023, DOI:10.32604/csse.2023.031552
    Abstract The digital technologies that run based on users’ content provide a platform for users to help air their opinions on various aspects of a particular subject or product. The recommendation agents play a crucial role in personalizing the needs of individual users. Therefore, it is essential to improve the user experience. The recommender system focuses on recommending a set of items to a user to help the decision-making process and is prevalent across e-commerce and media websites. In Context-Aware Recommender Systems (CARS), several influential and contextual variables are identified to provide an effective recommendation. A substantial trade-off is applied in… More >

  • Open Access

    ARTICLE

    A Novel Explainable CNN Model for Screening COVID-19 on X-ray Images

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1789-1809, 2023, DOI:10.32604/csse.2023.034022
    Abstract Due to the rapid propagation characteristic of the Coronavirus (COVID-19) disease, manual diagnostic methods cannot handle the large number of infected individuals to prevent the spread of infection. Despite, new automated diagnostic methods have been brought on board, particularly methods based on artificial intelligence using different medical data such as X-ray imaging. Thoracic imaging, for example, produces several image types that can be processed and analyzed by machine and deep learning methods. X-ray imaging materials widely exist in most hospitals and health institutes since they are affordable compared to other imaging machines. Through this paper, we propose a novel Convolutional… More >

  • Open Access

    ARTICLE

    Computer-Aided Diagnosis Model Using Machine Learning for Brain Tumor Detection and Classification

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1811-1826, 2023, DOI:10.32604/csse.2023.035455
    Abstract The Brain Tumor (BT) is created by an uncontrollable rise of anomalous cells in brain tissue, and it consists of 2 types of cancers they are malignant and benign tumors. The benevolent BT does not affect the neighbouring healthy and normal tissue; however, the malignant could affect the adjacent brain tissues, which results in death. Initial recognition of BT is highly significant to protecting the patient’s life. Generally, the BT can be identified through the magnetic resonance imaging (MRI) scanning technique. But the radiotherapists are not offering effective tumor segmentation in MRI images because of the position and unequal shape… More >

  • Open Access

    ARTICLE

    Optimization of Quantum Cost for Low Energy Reversible Signed/Unsigned Multiplier Using Urdhva-Tiryakbhyam Sutra

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1827-1844, 2023, DOI:10.32604/csse.2023.036474
    Abstract One of the elementary operations in computing systems is multiplication. Therefore, high-speed and low-power multipliers design is mandatory for efficient computing systems. In designing low-energy dissipation circuits, reversible logic is more efficient than irreversible logic circuits but at the cost of higher complexity. This paper introduces an efficient signed/unsigned 4 × 4 reversible Vedic multiplier with minimum quantum cost. The Vedic multiplier is considered fast as it generates all partial product and their sum in one step. This paper proposes two reversible Vedic multipliers with optimized quantum cost and garbage output. First, the unsigned Vedic multiplier is designed based on… More >

  • Open Access

    ARTICLE

    Brain Tumor Identification Using Data Augmentation and Transfer Learning Approach

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1845-1861, 2023, DOI:10.32604/csse.2023.033927
    Abstract A brain tumor is a lethal neurological disease that affects the average performance of the brain and can be fatal. In India, around 15 million cases are diagnosed yearly. To mitigate the seriousness of the tumor it is essential to diagnose at the beginning. Notwithstanding, the manual evaluation process utilizing Magnetic Resonance Imaging (MRI) causes a few worries, remarkably inefficient and inaccurate brain tumor diagnoses. Similarly, the examination process of brain tumors is intricate as they display high unbalance in nature like shape, size, appearance, and location. Therefore, a precise and expeditious prognosis of brain tumors is essential for implementing… More >

  • Open Access

    ARTICLE

    Deep Learning Based Face Mask Detection in Religious Mass Gathering During COVID-19 Pandemic

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1863-1877, 2023, DOI:10.32604/csse.2023.035869
    Abstract Notwithstanding the religious intention of billions of devotees, the religious mass gathering increased major public health concerns since it likely became a huge super spreading event for the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Most attendees ignored preventive measures, namely maintaining physical distance, practising hand hygiene, and wearing facemasks. Wearing a face mask in public areas protects people from spreading COVID-19. Artificial intelligence (AI) based on deep learning (DL) and machine learning (ML) could assist in fighting covid-19 in several ways. This study introduces a new deep learning-based Face Mask Detection in Religious Mass Gathering (DLFMD-RMG) technique during the… More >

  • Open Access

    ARTICLE

    Histogram-Based Decision Support System for Extraction and Classification of Leukemia in Blood Smear Images

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1879-1900, 2023, DOI:10.32604/csse.2023.034658
    Abstract An abnormality that develops in white blood cells is called leukemia. The diagnosis of leukemia is made possible by microscopic investigation of the smear in the periphery. Prior training is necessary to complete the morphological examination of the blood smear for leukemia diagnosis. This paper proposes a Histogram Threshold Segmentation Classifier (HTsC) for a decision support system. The proposed HTsC is evaluated based on the color and brightness variation in the dataset of blood smear images. Arithmetic operations are used to crop the nucleus based on automated approximation. White Blood Cell (WBC) segmentation is calculated using the active contour model… More >

  • Open Access

    ARTICLE

    Leveraging Retinal Fundus Images with Deep Learning for Diabetic Retinopathy Grading and Classification

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1901-1916, 2023, DOI:10.32604/csse.2023.036455
    Abstract Recently, there has been a considerable rise in the number of diabetic patients suffering from diabetic retinopathy (DR). DR is one of the most chronic diseases and makes the key cause of vision loss in middle-aged people in the developed world. Initial detection of DR becomes necessary for decreasing the disease severity by making use of retinal fundus images. This article introduces a Deep Learning Enabled Large Scale Healthcare Decision Making for Diabetic Retinopathy (DLLSHDM-DR) on Retinal Fundus Images. The proposed DLLSHDM-DR technique intends to assist physicians with the DR decision-making method. In the DLLSHDM-DR technique, image preprocessing is initially… More >

  • Open Access

    ARTICLE

    Horizontal Voting Ensemble Based Predictive Modeling System for Colon Cancer

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1917-1928, 2023, DOI:10.32604/csse.2023.032523
    Abstract Colon cancer is the third most commonly diagnosed cancer in the world. Most colon AdenoCArcinoma (ACA) arises from pre-existing benign polyps in the mucosa of the bowel. Thus, detecting benign at the earliest helps reduce the mortality rate. In this work, a Predictive Modeling System (PMS) is developed for the classification of colon cancer using the Horizontal Voting Ensemble (HVE) method. Identifying different patterns in microscopic images is essential to an effective classification system. A twelve-layer deep learning architecture has been developed to extract these patterns. The developed HVE algorithm can increase the system’s performance according to the combined models… More >

  • Open Access

    ARTICLE

    Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System for Visually Impaired People

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1929-1945, 2023, DOI:10.32604/csse.2023.035529
    Abstract The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing (NLP) and computer vision (CV). It can be driven by applications like image retrieval or indexing, virtual assistants, image understanding, and support of visually impaired people (VIP). Though the VIP uses other senses, touch and hearing, for recognizing objects and events, the quality of life of those persons is lower than the standard level. Automatic Image captioning generates captions that will be read loudly to the VIP, thereby realizing matters happening around them. This article introduces… More >

  • Open Access

    ARTICLE

    Structural Interval Reliability Algorithm Based on Bernstein Polynomials and Evidence Theory

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1947-1960, 2023, DOI:10.32604/csse.2023.035118
    Abstract Structural reliability is an important method to measure the safety performance of structures under the influence of uncertain factors. Traditional structural reliability analysis methods often convert the limit state function to the polynomial form to measure whether the structure is invalid. The uncertain parameters mainly exist in the form of intervals. This method requires a lot of calculation and is often difficult to achieve efficiently. In order to solve this problem, this paper proposes an interval variable multivariate polynomial algorithm based on Bernstein polynomials and evidence theory to solve the structural reliability problem with cognitive uncertainty. Based on the non-probabilistic… More >

  • Open Access

    ARTICLE

    Optimized Model Based Controller with Model Plant Mismatch for NMP Mitigation in Boost Converter

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1961-1979, 2023, DOI:10.32604/csse.2023.032424
    Abstract In this paper, an optimized Genetic Algorithm (GA) based internal model controller-proportional integral derivative (IMC-PID) controller has been designed for the control variable to output variable transfer function of dc-dc boost converter to mitigate the effect of non-minimum phase (NMP) behavior due to the presence of a right-half plane zero (RHPZ). This RHPZ limits the dynamic performance of the converter and leads to internal instability. The IMC PID is a streamlined counterpart of the standard feedback controller and easily achieves optimal set point and load change performance with a single filter tuning parameter λ. Also, this paper addresses the influences… More >

  • Open Access

    ARTICLE

    Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering for Noisy Data

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1981-1997, 2023, DOI:10.32604/csse.2023.035692
    Abstract Clustering is a crucial method for deciphering data structure and producing new information. Due to its significance in revealing fundamental connections between the human brain and events, it is essential to utilize clustering for cognitive research. Dealing with noisy data caused by inaccurate synthesis from several sources or misleading data production processes is one of the most intriguing clustering difficulties. Noisy data can lead to incorrect object recognition and inference. This research aims to innovate a novel clustering approach, named Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering (PNTS3FCM), to solve the clustering problem with noisy data using neutral and refusal degrees… More >

  • Open Access

    ARTICLE

    A Method for Classification and Evaluation of Pilot’s Mental States Based on CNN

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1999-2020, 2023, DOI:10.32604/csse.2023.034183
    Abstract How to accurately recognize the mental state of pilots is a focus in civil aviation safety. The mental state of pilots is closely related to their cognitive ability in piloting. Whether the cognitive ability meets the standard is related to flight safety. However, the pilot's working state is unique, which increases the difficulty of analyzing the pilot's mental state. In this work, we proposed a Convolutional Neural Network (CNN) that merges attention to classify the mental state of pilots through electroencephalography (EEG). Considering the individual differences in EEG, semi-supervised learning based on improved K-Means is used in the model training… More >

  • Open Access

    ARTICLE

    An Effective Diagnosis System for Brain Tumor Detection and Classification

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2021-2037, 2023, DOI:10.32604/csse.2023.036107
    Abstract A brain tumor is an excessive development of abnormal and uncontrolled cells in the brain. This growth is considered deadly since it may cause death. The brain controls numerous functions, such as memory, vision, and emotions. Due to the location, size, and shape of these tumors, their detection is a challenging and complex task. Several efforts have been conducted toward improved detection and yielded promising results and outcomes. However, the accuracy should be higher than what has been reached. This paper presents a method to detect brain tumors with high accuracy. The method works using an image segmentation technique and… More >

  • Open Access

    ARTICLE

    MayGAN: Mayfly Optimization with Generative Adversarial Network-Based Deep Learning Method to Classify Leukemia Form Blood Smear Images

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2039-2058, 2023, DOI:10.32604/csse.2023.036985
    Abstract Leukemia, often called blood cancer, is a disease that primarily affects white blood cells (WBCs), which harms a person’s tissues and plasma. This condition may be fatal when if it is not diagnosed and recognized at an early stage. The physical technique and lab procedures for Leukaemia identification are considered time-consuming. It is crucial to use a quick and unexpected way to identify different forms of Leukaemia. Timely screening of the morphologies of immature cells is essential for reducing the severity of the disease and reducing the number of people who require treatment. Various deep-learning (DL) model-based segmentation and categorization… More >

  • Open Access

    ARTICLE

    An Unsupervised Writer Identification Based on Generating Clusterable Embeddings

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2059-2073, 2023, DOI:10.32604/csse.2023.032977
    Abstract The writer identification system identifies individuals based on their handwriting is a frequent topic in biometric authentication and verification systems. Due to its importance, numerous studies have been conducted in various languages. Researchers have established several learning methods for writer identification including supervised and unsupervised learning. However, supervised methods require a large amount of annotation data, which is impossible in most scenarios. On the other hand, unsupervised writer identification methods may be limited and dependent on feature extraction that cannot provide the proper objectives to the architecture and be misinterpreted. This paper introduces an unsupervised writer identification system that analyzes… More >

  • Open Access

    ARTICLE

    Novel Metrics for Mutation Analysis

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2075-2089, 2023, DOI:10.32604/csse.2023.036791
    Abstract A measure of the “goodness” or efficiency of the test suite is used to determine the proficiency of a test suite. The appropriateness of the test suite is determined through mutation analysis. Several Finite State Machine (FSM) mutants are produced in mutation analysis by injecting errors against hypotheses. These mutants serve as test subjects for the test suite (TS). The effectiveness of the test suite is proportional to the number of eliminated mutants. The most effective test suite is the one that removes the most significant number of mutants at the optimal time. It is difficult to determine the fault… More >

  • Open Access

    ARTICLE

    Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064
    Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >

  • Open Access

    ARTICLE

    Defected Ground Structure Multiple Input-Output Antenna For Wireless Applications

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2109-2122, 2023, DOI:10.32604/csse.2023.036781
    Abstract In this paper, the investigation of a novel compact 2 × 2, 2 × 1, and 1 × 1 Ultra-Wide Band (UWB) based Multiple-Input Multiple-Output (MIMO) antenna with Defected Ground Structure (DGS) is employed. The proposed Electromagnetic Radiation Structures (ERS) is composed of multiple radiating elements. These MIMO antennas are designed and analyzed with and without DGS. The feeding is introduced by a microstrip-fed line to significantly moderate the radiating structure’s overall size, which is 60 × 40 × 1 mm. The high directivity and divergence characteristics are attained by introducing the microstrip-fed lines perpendicular to each other. And the… More >

  • Open Access

    ARTICLE

    A Novel Machine Learning–Based Hand Gesture Recognition Using HCI on IoT Assisted Cloud Platform

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2123-2140, 2023, DOI:10.32604/csse.2023.034431
    Abstract Machine learning is a technique for analyzing data that aids the construction of mathematical models. Because of the growth of the Internet of Things (IoT) and wearable sensor devices, gesture interfaces are becoming a more natural and expedient human-machine interaction method. This type of artificial intelligence that requires minimal or no direct human intervention in decision-making is predicated on the ability of intelligent systems to self-train and detect patterns. The rise of touch-free applications and the number of deaf people have increased the significance of hand gesture recognition. Potential applications of hand gesture recognition research span from online gaming to… More >

  • Open Access

    ARTICLE

    Advance IoT Intelligent Healthcare System for Lung Disease Classification Using Ensemble Techniques

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2141-2157, 2023, DOI:10.32604/csse.2023.034210
    Abstract In healthcare systems, the Internet of Things (IoT) innovation and development approached new ways to evaluate patient data. A cloud-based platform tends to process data generated by IoT medical devices instead of high storage, and computational hardware. In this paper, an intelligent healthcare system has been proposed for the prediction and severity analysis of lung disease from chest computer tomography (CT) images of patients with pneumonia, Covid-19, tuberculosis (TB), and cancer. Firstly, the CT images are captured and transmitted to the fog node through IoT devices. In the fog node, the image gets modified into a convenient and efficient format… More >

  • Open Access

    ARTICLE

    Data Analytics on Unpredictable Pregnancy Data Records Using Ensemble Neuro-Fuzzy Techniques

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2159-2175, 2023, DOI:10.32604/csse.2023.036598
    Abstract The immune system goes through a profound transformation during pregnancy, and certain unexpected maternal complications have been correlated to this transition. The ability to correctly examine, diagnoses, and predict pregnancy-hastened diseases via the available big data is a delicate problem since the range of information continuously increases and is scalable. Many approaches for disease diagnosis/classification have been established with the use of data mining concepts. However, such methods do not provide an appropriate classification/diagnosis model. Furthermore, single learning approaches are used to create the bulk of these systems. Classification issues may be made more accurate by combining predictions from many… More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438
    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an Aquila Optimizer with Parameter Tuned… More >

  • Open Access

    ARTICLE

    A Novel Metadata Based Multi-Label Document Classification Technique

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2195-2214, 2023, DOI:10.32604/csse.2023.033844
    Abstract From the beginning, the process of research and its publication is an ever-growing phenomenon and with the emergence of web technologies, its growth rate is overwhelming. On a rough estimate, more than thirty thousand research journals have been issuing around four million papers annually on average. Search engines, indexing services, and digital libraries have been searching for such publications over the web. Nevertheless, getting the most relevant articles against the user requests is yet a fantasy. It is mainly because the articles are not appropriately indexed based on the hierarchies of granular subject classification. To overcome this issue, researchers are… More >

  • Open Access

    ARTICLE

    Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2215-2230, 2023, DOI:10.32604/csse.2023.036555
    Abstract Android malware has evolved in various forms such as adware that continuously exposes advertisements, banking malware designed to access users’ online banking accounts, and Short Message Service (SMS) malware that uses a Command & Control (C&C) server to send malicious SMS, intercept SMS, and steal data. By using many malicious strategies, the number of malware is steadily increasing. Increasing Android malware threats numerous users, and thus, it is necessary to detect malware quickly and accurately. Each malware has distinguishable characteristics based on its actions. Therefore, security researchers have tried to categorize malware based on their behaviors by conducting the familial… More >

  • Open Access

    ARTICLE

    Predicting Bitcoin Trends Through Machine Learning Using Sentiment Analysis with Technical Indicators

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2231-2246, 2023, DOI:10.32604/csse.2023.034466
    Abstract Predicting Bitcoin price trends is necessary because they represent the overall trend of the cryptocurrency market. As the history of the Bitcoin market is short and price volatility is high, studies have been conducted on the factors affecting changes in Bitcoin prices. Experiments have been conducted to predict Bitcoin prices using Twitter content. However, the amount of data was limited, and prices were predicted for only a short period (less than two years). In this study, data from Reddit and LexisNexis, covering a period of more than four years, were collected. These data were utilized to estimate and compare the… More >

  • Open Access

    ARTICLE

    Earthworm Optimization with Improved SqueezeNet Enabled Facial Expression Recognition Model

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2247-2262, 2023, DOI:10.32604/csse.2023.036377
    Abstract Facial expression recognition (FER) remains a hot research area among computer vision researchers and still becomes a challenge because of high intra-class variations. Conventional techniques for this problem depend on hand-crafted features, namely, LBP, SIFT, and HOG, along with that a classifier trained on a database of videos or images. Many execute perform well on image datasets captured in a controlled condition; however not perform well in the more challenging dataset, which has partial faces and image variation. Recently, many studies presented an endwise structure for facial expression recognition by utilizing DL methods. Therefore, this study develops an earthworm optimization… More >

  • Open Access

    ARTICLE

    Hybrid Optimization Algorithm for Resource Allocation in LTE-Based D2D Communication

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2263-2276, 2023, DOI:10.32604/csse.2023.032323
    Abstract In a cellular network, direct Device-to-Device (D2D) communication enhances Quality of Service (QoS) in terms of coverage, throughput and amount of power consumed. Since the D2D pairs involve cellular resources for communication, the chances of interference are high. D2D communications demand minimum interference along with maximum throughput and sum rate which can be achieved by employing optimal resources and efficient power allocation procedures. In this research, a hybrid optimization model called Genetic Algorithm-Adaptive Bat Optimization (GA-ABO) algorithm is proposed for efficient resource allocation in a cellular network with D2D communication. Simulation analysis demonstrates that the proposed model involves reduced interference… More >

  • Open Access

    ARTICLE

    Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2277-2297, 2023, DOI:10.32604/csse.2023.036419
    Abstract Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or a simple network combination cannot… More >

  • Open Access

    ARTICLE

    Improved Siamese Palmprint Authentication Using Pre-Trained VGG16-Palmprint and Element-Wise Absolute Difference

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2299-2317, 2023, DOI:10.32604/csse.2023.036567
    Abstract Palmprint identification has been conducted over the last two decades in many biometric systems. High-dimensional data with many uncorrelated and duplicated features remains difficult due to several computational complexity issues. This paper presents an interactive authentication approach based on deep learning and feature selection that supports Palmprint authentication. The proposed model has two stages of learning; the first stage is to transfer pre-trained VGG-16 of ImageNet to specific features based on the extraction model. The second stage involves the VGG-16 Palmprint feature extraction in the Siamese network to learn Palmprint similarity. The proposed model achieves robust and reliable end-to-end Palmprint… More >

  • Open Access

    ARTICLE

    Modeling of Sensor Enabled Irrigation Management for Intelligent Agriculture Using Hybrid Deep Belief Network

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2319-2335, 2023, DOI:10.32604/csse.2023.036721
    Abstract Artificial intelligence (AI) technologies and sensors have recently received significant interest in intellectual agriculture. Accelerating the application of AI technologies and agriculture sensors in intellectual agriculture is urgently required for the growth of modern agriculture and will help promote smart agriculture. Automatic irrigation scheduling systems were highly required in the agricultural field due to their capability to manage and save water deficit irrigation techniques. Automatic learning systems devise an alternative to conventional irrigation management through the automatic elaboration of predictions related to the learning of an agronomist. With this motivation, this study develops a modified black widow optimization with a… More >

  • Open Access

    ARTICLE

    SRC: Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2337-2349, 2023, DOI:10.32604/csse.2023.036192
    Abstract This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients (GFCC) for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hunting optimization and artificial neural network (DHO-ANN). The noisy crowdsourced cough datasets were collected from the public domain. This research work claimed that the GFCC yielded better results in terms of COVID-19 detection as compared to the widely used Mel-frequency cepstral coefficient in noisy crowdsourced speech corpora. The proposed algorithm's performance for detecting COVID-19 disease is rigorously validated using statistical measures, F1 score, confusion matrix, specificity, and sensitivity parameters. Besides,… More >

  • Open Access

    ARTICLE

    Human Personality Assessment Based on Gait Pattern Recognition Using Smartphone Sensors

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2351-2368, 2023, DOI:10.32604/csse.2023.036185
    Abstract Human personality assessment using gait pattern recognition is one of the most recent and exciting research domains. Gait is a person’s identity that can reflect reliable information about his mood, emotions, and substantial personality traits under scrutiny. This research focuses on recognizing key personality traits, including neuroticism, extraversion, openness to experience, agreeableness, and conscientiousness, in line with the big-five model of personality. We inferred personality traits based on the gait pattern recognition of individuals utilizing built-in smartphone sensors. For experimentation, we collected a novel dataset of 22 participants using an android application and further segmented it into six data chunks… More >

  • Open Access

    ARTICLE

    Machine Learning for Detecting Blood Transfusion Needs Using Biosignals

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2369-2381, 2023, DOI:10.32604/csse.2023.035641
    Abstract Adequate oxygen in red blood cells carrying through the body to the heart and brain is important to maintain life. For those patients requiring blood, blood transfusion is a common procedure in which donated blood or blood components are given through an intravenous line. However, detecting the need for blood transfusion is time-consuming and sometimes not easily diagnosed, such as internal bleeding. This study considered physiological signals such as electrocardiogram (ECG), photoplethysmogram (PPG), blood pressure, oxygen saturation (SpO2), and respiration, and proposed the machine learning model to detect the need for blood transfusion accurately. For the model, this study extracted… More >

  • Open Access

    ARTICLE

    A General Linguistic Steganalysis Framework Using Multi-Task Learning

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2383-2399, 2023, DOI:10.32604/csse.2023.037067
    Abstract Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts, by performing binary classification. While it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts coexist. In this paper, we propose a general linguistic steganalysis framework named LS-MTL, which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic texts. LS-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a… More >

  • Open Access

    ARTICLE

    Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2401-2414, 2023, DOI:10.32604/csse.2023.036152
    Abstract Chaos-based cryptosystems are considered a secure mode of communication due to their reliability. Chaotic maps are associated with the other domains to construct robust encryption algorithms. There exist numerous encryption schemes in the literature based on chaotic maps. This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem. The core notion of the original algorithm was based on permutation and diffusion. A bit-level permutation approach was used to do the permutation row-and column-wise. The diffusion was executed in the forward and backward directions. The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted… More >

  • Open Access

    ARTICLE

    Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2415-2428, 2023, DOI:10.32604/csse.2023.035149
    Abstract People utilize microblogs and other social media platforms to express their thoughts and feelings regarding current events, public products and the latest affairs. People share their thoughts and feelings about various topics, including products, news, blogs, etc. In user reviews and tweets, sentiment analysis is used to discover opinions and feelings. Sentiment polarity is a term used to describe how sentiment is represented. Positive, neutral and negative are all examples of it. This area is still in its infancy and needs several critical upgrades. Slang and hidden emotions can detract from the accuracy of traditional techniques. Existing methods only evaluate… More >

  • Open Access

    ARTICLE

    Hybridizing Artificial Bee Colony with Bat Algorithm for Web Service Composition

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2429-2445, 2023, DOI:10.32604/csse.2023.037692
    Abstract In the Internet of Things (IoT), the users have complex needs, and the Web Service Composition (WSC) was introduced to address these needs. The WSC’s main objective is to search for the optimal combination of web services in response to the user needs and the level of Quality of Services (QoS) constraints. The challenge of this problem is the huge number of web services that achieve similar functionality with different levels of QoS constraints. In this paper, we introduce an extension of our previous works on the Artificial Bee Colony (ABC) and Bat Algorithm (BA). A new hybrid algorithm was… More >

  • Open Access

    ARTICLE

    AlertInsight: Mining Multiple Correlation For Alert Reduction

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2447-2469, 2023, DOI:10.32604/csse.2023.037506
    Abstract Modern cloud services are monitored by numerous multidomain and multivendor monitoring tools, which generate massive numbers of alerts and events that are not actionable. These alerts usually carry isolated messages that are missing service contexts. Administrators become inundated with tickets caused by such alert events when they are routed directly to incident management systems. Noisy alerts increase the risk of crucial warnings going undetected and leading to service outages. One of the feasible ways to cope with the above problems involves revealing the correlations behind a large number of alerts and then aggregating the related alerts according to their correlations.… More >

  • Open Access

    ARTICLE

    ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951
    Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the quality of service. But due… More >

  • Open Access

    ARTICLE

    Quantum Computing Based Neural Networks for Anomaly Classification in Real-Time Surveillance Videos

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2489-2508, 2023, DOI:10.32604/csse.2023.035732
    Abstract For intelligent surveillance videos, anomaly detection is extremely important. Deep learning algorithms have been popular for evaluating real-time surveillance recordings, like traffic accidents, and criminal or unlawful incidents such as suicide attempts. Nevertheless, Deep learning methods for classification, like convolutional neural networks, necessitate a lot of computing power. Quantum computing is a branch of technology that solves abnormal and complex problems using quantum mechanics. As a result, the focus of this research is on developing a hybrid quantum computing model which is based on deep learning. This research develops a Quantum Computing-based Convolutional Neural Network (QC-CNN) to extract features and… More >

  • Open Access

    ARTICLE

    An Improved Reptile Search Algorithm Based on Cauchy Mutation for Intrusion Detection

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2509-2525, 2023, DOI:10.32604/csse.2023.036119
    Abstract With the growth of the discipline of digital communication, the topic has acquired more attention in the cybersecurity medium. The Intrusion Detection (ID) system monitors network traffic to detect malicious activities. The paper introduces a novel Feature Selection (FS) approach for ID. Reptile Search Algorithm (RSA)—is a new optimization algorithm; in this method, each agent searches a new region according to the position of the host, which makes the algorithm suffers from getting stuck in local optima and a slow convergence rate. To overcome these problems, this study introduces an improved RSA approach by integrating Cauchy Mutation (CM) into the… More >

  • Open Access

    ARTICLE

    Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2527-2542, 2023, DOI:10.32604/csse.2023.036106
    Abstract In this current century, most industries are moving towards automation, where human intervention is dramatically reduced. This revolution leads to industrial revolution 4.0, which uses the Internet of Things (IoT) and wireless sensor networks (WSN). With its associated applications, this IoT device is used to compute the received WSN data from devices and transfer it to remote locations for assistance. In general, WSNs, the gateways are a long distance from the base station (BS) and are communicated through the gateways nearer to the BS. At the gateway, which is closer to the BS, energy drains faster because of the heavy… More >

  • Open Access

    ARTICLE

    Cardiac CT Image Segmentation for Deep Learning–Based Coronary Calcium Detection Using K-Means Clustering and Grabcut Algorithm

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2543-2554, 2023, DOI:10.32604/csse.2023.037055
    Abstract Specific medical data has limitations in that there are not many numbers and it is not standardized. to solve these limitations, it is necessary to study how to efficiently process these limited amounts of data. In this paper, deep learning methods for automatically determining cardiovascular diseases are described, and an effective preprocessing method for CT images that can be applied to improve the performance of deep learning was conducted. The cardiac CT images include several parts of the body such as the heart, lungs, spine, and ribs. The preprocessing step proposed in this paper divided CT image data into regions… More >

  • Open Access

    ARTICLE

    Dragonfly Optimization with Deep Learning Enabled Sentiment Analysis for Arabic Tweets

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2555-2570, 2023, DOI:10.32604/csse.2023.031246
    Abstract Sentiment Analysis (SA) is one of the Machine Learning (ML) techniques that has been investigated by several researchers in recent years, especially due to the evolution of novel data collection methods focused on social media. In literature, it has been reported that SA data is created for English language in excess of any other language. It is challenging to perform SA for Arabic Twitter data owing to informal nature and rich morphology of Arabic language. An earlier study conducted upon SA for Arabic Twitter focused mostly on automatic extraction of the features from the text. Neural word embedding has been… More >

  • Open Access

    ARTICLE

    An Intelligent Approach for Accurate Prediction of Chronic Diseases

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2571-2587, 2023, DOI:10.32604/csse.2023.031761
    Abstract Around the globe, chronic diseases pose a serious hazard to healthcare communities. The majority of the deaths are due to chronic diseases, and it causes burdens across the world. Through analyzing healthcare data and extracting patterns healthcare administrators, victims, and healthcare communities will get an advantage if the diseases are early predicted. The majority of the existing works focused on increasing the accuracy of the techniques but didn’t concentrate on other performance measures. Thus, the proposed work improves the early detection of chronic disease and safeguards the lives of the patients by increasing the specificity and sensitivity of the classifiers… More >

  • Open Access

    ARTICLE

    Nonlinear Teager-Kaiser Infomax Boost Clustering Algorithm for Brain Tumor Detection Technique

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2589-2599, 2023, DOI:10.32604/csse.2023.028542
    Abstract Brain tumor detection and division is a difficult tedious undertaking in clinical image preparation. When it comes to the new technology that enables accurate identification of the mysterious tissues of the brain, magnetic resonance imaging (MRI) is a great tool. It is possible to alter the tumor’s size and shape at any time for any number of patients by using the Brain picture. Radiologists have a difficult time sorting and classifying tumors from multiple images. Brain tumors may be accurately detected using a new approach called Nonlinear Teager-Kaiser Iterative Infomax Boost Clustering-Based Image Segmentation (NTKFIBC-IS). Teager-Kaiser filtering is used to… More >

  • Open Access

    ARTICLE

    Earlier Detection of Alzheimer’s Disease Using 3D-Convolutional Neural Networks

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2601-2618, 2023, DOI:10.32604/csse.2023.030503
    Abstract The prediction of mild cognitive impairment or Alzheimer’s disease (AD) has gained the attention of huge researchers as the disease occurrence is increasing, and there is a need for earlier prediction. Regrettably, due to the high-dimensionality nature of neural data and the least available samples, modelling an efficient computer diagnostic system is highly solicited. Learning approaches, specifically deep learning approaches, are essential in disease prediction. Deep Learning (DL) approaches are successfully demonstrated for their higher-level performance in various fields like medical imaging. A novel 3D-Convolutional Neural Network (3D-CNN) architecture is proposed to predict AD with Magnetic resonance imaging (MRI) data.… More >

  • Open Access

    ARTICLE

    Battle Royale Optimization with Fuzzy Deep Learning for Arabic Sentiment Classification

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2619-2635, 2023, DOI:10.32604/csse.2023.034519
    Abstract Aspect-Based Sentiment Analysis (ABSA) on Arabic corpus has become an active research topic in recent days. ABSA refers to a fine-grained Sentiment Analysis (SA) task that focuses on the extraction of the conferred aspects and the identification of respective sentiment polarity from the provided text. Most of the prevailing Arabic ABSA techniques heavily depend upon dreary feature-engineering and pre-processing tasks and utilize external sources such as lexicons. In literature, concerning the Arabic language text analysis, the authors made use of regular Machine Learning (ML) techniques that rely on a group of rare sources and tools. These sources were used for… More >

  • Open Access

    ARTICLE

    An Efficient Indoor Localization Based on Deep Attention Learning Model

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2637-2650, 2023, DOI:10.32604/csse.2023.037761
    Abstract Indoor localization methods can help many sectors, such as healthcare centers, smart homes, museums, warehouses, and retail malls, improve their service areas. As a result, it is crucial to look for low-cost methods that can provide exact localization in indoor locations. In this context, image-based localization methods can play an important role in estimating both the position and the orientation of cameras regarding an object. Image-based localization faces many issues, such as image scale and rotation variance. Also, image-based localization’s accuracy and speed (latency) are two critical factors. This paper proposes an efficient 6-DoF deep-learning model for image-based localization. This… More >

Share Link

WeChat scan