Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    Deep Autoencoder-Based Hybrid Network for Building Energy Consumption Forecasting

    Noman Khan1,2, Samee Ullah Khan1,2, Sung Wook Baik1,2,*

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 153-173, 2024, DOI:10.32604/csse.2023.039407 - 26 January 2024

    Abstract Energy management systems for residential and commercial buildings must use an appropriate and efficient model to predict energy consumption accurately. To deal with the challenges in power management, the short-term Power Consumption (PC) prediction for household appliances plays a vital role in improving domestic and commercial energy efficiency. Big data applications and analytics have shown that data-driven load forecasting approaches can forecast PC in commercial and residential sectors and recognize patterns of electric usage in complex conditions. However, traditional Machine Learning (ML) algorithms and their features engineering procedure emphasize the practice of inefficient and ineffective… More >

  • Open Access

    ARTICLE

    Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks

    Nadir Omer1,*, Ahmed H. Samak2, Ahmed I. Taloba3,4, Rasha M. Abd El-Aziz3,5

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 77-95, 2024, DOI:10.32604/csse.2023.039265 - 26 January 2024

    Abstract Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone with malicious intent to steal data, destroy computer systems, or disrupt them. Due to rising cyber security concerns, cyber security has emerged as the key component in the fight against all online threats, forgeries, and assaults. A device capable of… More >

  • Open Access

    ARTICLE

    A Multi-Objective Genetic Algorithm Based Load Balancing Strategy for Health Monitoring Systems in Fog-Cloud

    Hayder Makki Shakir, Jaber Karimpour*, Jafar Razmara

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 35-55, 2024, DOI:10.32604/csse.2023.038545 - 26 January 2024

    Abstract As the volume of data and data-generating equipment in healthcare settings grows, so do issues like latency and inefficient processing inside health monitoring systems. The Internet of Things (IoT) has been used to create a wide variety of health monitoring systems. Most modern health monitoring solutions are based on cloud computing. However, large-scale deployment of latency-sensitive healthcare applications is hampered by the cloud’s design, which introduces significant delays during the processing of vast data volumes. By strategically positioning servers close to end users, fog computing mitigates latency issues and dramatically improves scaling on demand, resource… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Prevention Model for Blockchain Based IoMT Applications

    Jameel Almalki*

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 131-152, 2024, DOI:10.32604/csse.2023.038085 - 26 January 2024

    Abstract The recent global pandemic has resulted in growth in the medical and healthcare sectors. Applications used in these domains have become more advanced and digitally integrated. Sensor-based Internet of Things (IoT) devices are increasing in healthcare and medical units. The emerging trend with the use of IoT devices in medical healthcare is termed as Internet of Medical Things (IoMT). The instruments used in these healthcare units comprise various sensors that can record patient body observations. These recorded observations are streamed across Internet-based channels to be stored and analyzed in centralized servers. Patient diagnostics are performed… More >

  • Open Access

    ARTICLE

    Deep Learning Based Vehicle Detection and Counting System for Intelligent Transportation

    A. Vikram1, J. Akshya2, Sultan Ahmad3,4, L. Jerlin Rubini5, Seifedine Kadry6,7,8, Jungeun Kim9,*

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 115-130, 2024, DOI:10.32604/csse.2023.037928 - 26 January 2024

    Abstract Traffic monitoring through remote sensing images (RSI) is considered an important research area in Intelligent Transportation Systems (ITSs). Vehicle counting systems must be simple enough to be implemented in real-time. With the fast expansion of road traffic, real-time vehicle counting becomes essential in constructing ITS. Compared with conventional technologies, the remote sensing-related technique for vehicle counting exhibits greater significance and considerable advantages in its flexibility, low cost, and high efficiency. But several techniques need help in balancing complexity and accuracy technique. Therefore, this article presents a deep learning-based vehicle detection and counting system for ITS More >

  • Open Access

    ARTICLE

    Computational Linguistics Based Arabic Poem Classification and Dictarization Model

    Manar Ahmed Hamza1,*, Hala J. Alshahrani2, Najm Alotaibi3, Mohamed K. Nour4, Mahmoud Othman5, Gouse Pasha Mohammed1, Mohammed Rizwanullah1, Mohamed I. Eldesouki6

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 97-114, 2024, DOI:10.32604/csse.2023.034520 - 26 January 2024

    Abstract Computational linguistics is the scientific and engineering discipline related to comprehending written and spoken language from a computational perspective and building artefacts that effectively process and produce language, either in bulk or in a dialogue setting. This paper develops a Chaotic Bird Swarm Optimization with deep ensemble learning based Arabic poem classification and dictarization (CBSOEDL-APCD) technique. The presented CBSOEDL-APCD technique involves the classification and dictarization of Arabic text into Arabic poetries and prose. Primarily, the CBSOEDL-APCD technique carries out data pre-processing to convert it into a useful format. Besides, the ensemble deep learning (EDL) model More >

  • Open Access

    ARTICLE

    An Efficient Character-Level Adversarial Attack Inspired by Textual Variations in Online Social Media Platforms

    Jebran Khan1, Kashif Ahmad2, Kyung-Ah Sohn1,3,*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2869-2894, 2023, DOI:10.32604/csse.2023.040159 - 09 November 2023

    Abstract In recent years, the growing popularity of social media platforms has led to several interesting natural language processing (NLP) applications. However, these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning (ML) and NLP techniques. This work presents a new low-level adversarial attack recipe inspired by textual variations in online social media communication. These variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible form. The intuition of the proposed scheme… More >

  • Open Access

    ARTICLE

    A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection

    Quan Zhou1,*, Yulong Zheng1, Minhui Chen2, Kaijun Wei2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2851-2867, 2023, DOI:10.32604/csse.2023.039908 - 09 November 2023

    Abstract In recent years, the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention. To ensure privacy protection for both sides of the transaction, many researchers are using ring signature technology instead of the original signature technology. However, in practice, identifying the signer of an illegal blockchain transaction once it has been placed on the chain necessitates a signature technique that offers conditional anonymity. Some illegals can conduct illegal transactions and evade the law using ring signatures, which offer perfect anonymity. This paper firstly constructs a conditionally anonymous linkable ring… More >

  • Open Access

    ARTICLE

    An Adaptive Edge Detection Algorithm for Weed Image Analysis

    Yousef Alhwaiti1,*, Muhammad Hameed Siddiqi1, Irshad Ahmad2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3011-3031, 2023, DOI:10.32604/csse.2023.042110 - 09 November 2023

    Abstract Weeds are one of the utmost damaging agricultural annoyers that have a major influence on crops. Weeds have the responsibility to get higher production costs due to the waste of crops and also have a major influence on the worldwide agricultural economy. The significance of such concern got motivation in the research community to explore the usage of technology for the detection of weeds at early stages that support farmers in agricultural fields. Some weed methods have been proposed for these fields; however, these algorithms still have challenges as they were implemented against controlled environments.… More >

  • Open Access

    ARTICLE

    Optical Based Gradient-Weighted Class Activation Mapping and Transfer Learning Integrated Pneumonia Prediction Model

    Chia-Wei Jan1, Yu-Jhih Chiu1, Kuan-Lin Chen2, Ting-Chun Yao3, Ping-Huan Kuo1,4,*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2989-3010, 2023, DOI:10.32604/csse.2023.042078 - 09 November 2023

    Abstract Pneumonia is a common lung disease that is more prone to affect the elderly and those with weaker respiratory systems. However, hospital medical resources are limited, and sometimes the workload of physicians is too high, which can affect their judgment. Therefore, a good medical assistance system is of great significance for improving the quality of medical care. This study proposed an integrated system by combining transfer learning and gradient-weighted class activation mapping (Grad-CAM). Pneumonia is a common lung disease that is generally diagnosed using X-rays. However, in areas with limited medical resources, a shortage of… More >

Displaying 111-120 on page 12 of 1494. Per Page