Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,493)
  • Open Access

    ARTICLE

    Explainable Transformer-Based Approach for Dental Disease Prediction

    Sari Masri, Ahmad Hasasneh*

    Computer Systems Science and Engineering, Vol.49, pp. 481-497, 2025, DOI:10.32604/csse.2025.068616 - 10 October 2025

    Abstract Diagnosing dental disorders using routine photographs can significantly reduce chair-side workload and expand access to care. However, most AI-based image analysis systems suffer from limited interpretability and are trained on class-imbalanced datasets. In this study, we developed a balanced, transformer-based pipeline to detect three common dental disorders: tooth discoloration, calculus, and hypodontia, from standard color images. After applying a color-standardized preprocessing pipeline and performing stratified data splitting, the proposed vision transformer model was fine-tuned and subsequently evaluated using standard classification benchmarks. The model achieved an impressive accuracy of 98.94%, with precision, recall and F1 scores More >

  • Open Access

    ARTICLE

    DPZTN: Data-Plane-Based Access Control Zero-Trust Network

    Jingfu Yan, Huachun Zhou*, Weilin Wang

    Computer Systems Science and Engineering, Vol.49, pp. 499-531, 2025, DOI:10.32604/csse.2025.068151 - 10 October 2025

    Abstract The 6G network architecture introduces the paradigm of Trust + Security, representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement. While ZTNs (zero-trust networks) have demonstrated significant advancements in constructing trust-centric frameworks, most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities. Furthermore, current ZTN designs generally do not facilitate dynamic assessment of user reputation. To address these limitations, this study proposes a DPZTN (Data-plane-based Zero Trust Network). DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane. Additionally, blockchain infrastructure… More > Graphic Abstract

    DPZTN: Data-Plane-Based Access Control Zero-Trust Network

  • Open Access

    ARTICLE

    Enhancing Employee Turnover Prediction: An Advanced Feature Engineering Analysis with CatBoost

    Md Monir Ahammod Bin Atique1,#, Md Ilias Bappi1,#, Kwanghoon Choi1,*, Kyungbaek Kim1,*, Md Abul Ala Walid2, Pranta Kumar Sarkar3

    Computer Systems Science and Engineering, Vol.49, pp. 455-479, 2025, DOI:10.32604/csse.2025.069213 - 19 August 2025

    Abstract Employee turnover presents considerable challenges for organizations, leading to increased recruitment costs and disruptions in ongoing operations. High voluntary attrition rates can result in substantial financial losses, making it essential for Human Resource (HR) departments to prioritize turnover reduction. In this context, Artificial Intelligence (AI) has emerged as a vital tool in strengthening business strategies and people management. This paper incorporates two new representative features, introducing three types of feature engineering to enhance the analysis of employee turnover in the IBM HR Analytics dataset. Key Machine Learning (ML) techniques were subsequently employed in this work,… More >

  • Open Access

    ARTICLE

    Robust Reversible Watermarking Technique Based on Improved Polar Harmonic Transform

    Muath AlShaikh*

    Computer Systems Science and Engineering, Vol.49, pp. 435-453, 2025, DOI:10.32604/csse.2025.062432 - 13 May 2025

    Abstract Many existing watermarking approaches aim to provide a Robust Reversible Data Hiding (RRDH) method. However, most of these approaches degrade under geometric and non-geometric attacks. This paper presents a novel RRDH approach using Polar Harmonic Fourier Moments (PHFMs) and linear interpolation. The primary objective is to enhance the robustness of the embedded watermark and improve the imperceptibility of the watermarked image. The proposed method leverages the high-fidelity and anti-geometric transformation properties of PHFMs. The image is transformed into the frequency domain of RRDH, after which compensation data is embedded using a two-dimensional RDH scheme. Linear… More >

  • Open Access

    ARTICLE

    Multi-Stage Vision Transformer and Knowledge Graph Fusion for Enhanced Plant Disease Classification

    Wafaa H. Alwan1,*, Sabah M. Alturfi2

    Computer Systems Science and Engineering, Vol.49, pp. 419-434, 2025, DOI:10.32604/csse.2025.064195 - 30 April 2025

    Abstract Plant diseases pose a significant challenge to global agricultural productivity, necessitating efficient and precise diagnostic systems for early intervention and mitigation. In this study, we propose a novel hybrid framework that integrates EfficientNet-B8, Vision Transformer (ViT), and Knowledge Graph Fusion (KGF) to enhance plant disease classification across 38 distinct disease categories. The proposed framework leverages deep learning and semantic enrichment to improve classification accuracy and interpretability. EfficientNet-B8, a convolutional neural network (CNN) with optimized depth and width scaling, captures fine-grained spatial details in high-resolution plant images, aiding in the detection of subtle disease symptoms. In… More >

  • Open Access

    ARTICLE

    Evaluation and Benchmarking of Cybersecurity DDoS Attacks Detection Models through the Integration of FWZIC and MABAC Methods

    Alaa Mahmood, İsa Avcı*

    Computer Systems Science and Engineering, Vol.49, pp. 401-417, 2025, DOI:10.32604/csse.2025.062413 - 25 April 2025

    Abstract A Distributed Denial-of-Service (DDoS) attack poses a significant challenge in the digital age, disrupting online services with operational and financial consequences. Detecting such attacks requires innovative and effective solutions. The primary challenge lies in selecting the best among several DDoS detection models. This study presents a framework that combines several DDoS detection models and Multiple-Criteria Decision-Making (MCDM) techniques to compare and select the most effective models. The framework integrates a decision matrix from training several models on the CiC-DDOS2019 dataset with Fuzzy Weighted Zero Inconsistency Criterion (FWZIC) and Multi-Attribute Boundary Approximation Area Comparison (MABAC) methodologies.… More >

  • Open Access

    ARTICLE

    OD-YOLOv8: A Lightweight and Enhanced New Algorithm for Ship Detection

    Zhuowei Wang1,*, Dezhi Han1, Bing Han2, Zhongdai Wu2

    Computer Systems Science and Engineering, Vol.49, pp. 377-399, 2025, DOI:10.32604/csse.2025.059634 - 09 April 2025

    Abstract Synthetic Aperture Radar (SAR) has become one of the most effective tools in ship detection. However, due to significant background interference, small targets, and challenges related to target scattering intensity in SAR images, current ship target detection faces serious issues of missed detections and false positives, and the network structures are overly complex. To address this issue, this paper proposes a lightweight model based on YOLOv8, named OD-YOLOv8. Firstly, we adopt a simplified neural network architecture, VanillaNet, to replace the backbone network, significantly reducing the number of parameters and computational complexity while ensuring accuracy. Secondly,… More >

  • Open Access

    ARTICLE

    Improved Resilience of Image Encryption Based on Hybrid TEA and RSA Techniques

    Muath AlShaikh1,*, Ahmed Manea Alkhalifah2, Sultan Alamri3

    Computer Systems Science and Engineering, Vol.49, pp. 353-376, 2025, DOI:10.32604/csse.2025.062433 - 21 March 2025

    Abstract Data security is crucial for improving the confidentiality, integrity, and authenticity of the image content. Maintaining these security factors poses significant challenges, particularly in healthcare, business, and social media sectors, where information security and personal privacy are paramount. The cryptography concept introduces a solution to these challenges. This paper proposes an innovative hybrid image encryption algorithm capable of encrypting several types of images. The technique merges the Tiny Encryption Algorithm (TEA) and Rivest-Shamir-Adleman (RSA) algorithms called (TEA-RSA). The performance of this algorithm is promising in terms of cost and complexity, an encryption time which is… More >

  • Open Access

    ARTICLE

    Classifying Network Flows through a Multi-Modal 1D CNN Approach Using Unified Traffic Representations

    Ravi Veerabhadrappa*, Poornima Athikatte Sampigerayappa

    Computer Systems Science and Engineering, Vol.49, pp. 333-351, 2025, DOI:10.32604/csse.2025.061285 - 19 March 2025

    Abstract In recent years, the analysis of encrypted network traffic has gained momentum due to the widespread use of Transport Layer Security and Quick UDP Internet Connections protocols, which complicate and prolong the analysis process. Classification models face challenges in understanding and classifying unknown traffic because of issues related to interpret ability and the representation of traffic data. To tackle these complexities, multi-modal representation learning can be employed to extract meaningful features and represent them in a lower-dimensional latent space. Recently, auto-encoder-based multi-modal representation techniques have shown superior performance in representing network traffic. By combining the… More >

  • Open Access

    ARTICLE

    An Enhanced Task Migration Technique Based on Convolutional Neural Network in Machine Learning Framework

    Hamayun Khan1,*, Muhammad Atif Imtiaz2, Hira Siddique3, Muhammad Tausif Afzal Rana4, Arshad Ali5, Muhammad Zeeshan Baig6, Saif ur Rehman7, Yazed Alsaawy5

    Computer Systems Science and Engineering, Vol.49, pp. 317-331, 2025, DOI:10.32604/csse.2025.061118 - 19 March 2025

    Abstract The migration of tasks aided by machine learning (ML) predictions IN (DPM) is a system-level design technique that is used to reduce energy by enhancing the overall performance of the processor. In this paper, we address the issue of system-level higher task dissipation during the execution of parallel workloads with common deadlines by introducing a machine learning-based framework that includes task migration using energy-efficient earliest deadline first scheduling (EA-EDF). ML-based EA-EDF enhances the overall throughput and optimizes the energy to avoid delay and performance degradation in a multiprocessor system. The proposed system model allocates processors… More >

Displaying 1-10 on page 1 of 1493. Per Page