Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    Deep Learning-Based FOPID Controller for Cascaded DC-DC Converters

    S. Hema1,*, Y. Sukhi2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1503-1519, 2023, DOI:10.32604/csse.2023.036577 - 09 February 2023

    Abstract Smart grids and their technologies transform the traditional electric grids to assure safe, secure, cost-effective, and reliable power transmission. Non-linear phenomena in power systems, such as voltage collapse and oscillatory phenomena, can be investigated by chaos theory. Recently, renewable energy resources, such as wind turbines, and solar photovoltaic (PV) arrays, have been widely used for electric power generation. The design of the controller for the direct Current (DC) converter in a PV system is performed based on the linearized model at an appropriate operating point. However, these operating points are ever-changing in a PV system,… More >

  • Open Access

    ARTICLE

    Improved Siamese Palmprint Authentication Using Pre-Trained VGG16-Palmprint and Element-Wise Absolute Difference

    Mohamed Ezz, Waad Alanazi, Ayman Mohamed Mostafa*, Eslam Hamouda, Murtada K. Elbashir, Meshrif Alruily

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2299-2317, 2023, DOI:10.32604/csse.2023.036567 - 09 February 2023

    Abstract Palmprint identification has been conducted over the last two decades in many biometric systems. High-dimensional data with many uncorrelated and duplicated features remains difficult due to several computational complexity issues. This paper presents an interactive authentication approach based on deep learning and feature selection that supports Palmprint authentication. The proposed model has two stages of learning; the first stage is to transfer pre-trained VGG-16 of ImageNet to specific features based on the extraction model. The second stage involves the VGG-16 Palmprint feature extraction in the Siamese network to learn Palmprint similarity. The proposed model achieves More >

  • Open Access

    ARTICLE

    Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification

    Younghoon Ban, Jeong Hyun Yi, Haehyun Cho*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2215-2230, 2023, DOI:10.32604/csse.2023.036555 - 09 February 2023

    Abstract Android malware has evolved in various forms such as adware that continuously exposes advertisements, banking malware designed to access users’ online banking accounts, and Short Message Service (SMS) malware that uses a Command & Control (C&C) server to send malicious SMS, intercept SMS, and steal data. By using many malicious strategies, the number of malware is steadily increasing. Increasing Android malware threats numerous users, and thus, it is necessary to detect malware quickly and accurately. Each malware has distinguishable characteristics based on its actions. Therefore, security researchers have tried to categorize malware based on their… More >

  • Open Access

    ARTICLE

    Optimization of Quantum Cost for Low Energy Reversible Signed/Unsigned Multiplier Using Urdhva-Tiryakbhyam Sutra

    Marwa A. Elmenyawi1,2,*, Radwa M. Tawfeek1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1827-1844, 2023, DOI:10.32604/csse.2023.036474 - 09 February 2023

    Abstract One of the elementary operations in computing systems is multiplication. Therefore, high-speed and low-power multipliers design is mandatory for efficient computing systems. In designing low-energy dissipation circuits, reversible logic is more efficient than irreversible logic circuits but at the cost of higher complexity. This paper introduces an efficient signed/unsigned 4 × 4 reversible Vedic multiplier with minimum quantum cost. The Vedic multiplier is considered fast as it generates all partial product and their sum in one step. This paper proposes two reversible Vedic multipliers with optimized quantum cost and garbage output. First, the unsigned Vedic… More >

  • Open Access

    ARTICLE

    Leveraging Retinal Fundus Images with Deep Learning for Diabetic Retinopathy Grading and Classification

    Mohammad Yamin1,*, Sarah Basahel1, Saleh Bajaba2, Mona Abusurrah3, E. Laxmi Lydia4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1901-1916, 2023, DOI:10.32604/csse.2023.036455 - 09 February 2023

    Abstract Recently, there has been a considerable rise in the number of diabetic patients suffering from diabetic retinopathy (DR). DR is one of the most chronic diseases and makes the key cause of vision loss in middle-aged people in the developed world. Initial detection of DR becomes necessary for decreasing the disease severity by making use of retinal fundus images. This article introduces a Deep Learning Enabled Large Scale Healthcare Decision Making for Diabetic Retinopathy (DLLSHDM-DR) on Retinal Fundus Images. The proposed DLLSHDM-DR technique intends to assist physicians with the DR decision-making method. In the DLLSHDM-DR… More >

  • Open Access

    ARTICLE

    Using Recurrent Neural Network Structure and Multi-Head Attention with Convolution for Fraudulent Phone Text Recognition

    Junjie Zhou, Hongkui Xu*, Zifeng Zhang, Jiangkun Lu, Wentao Guo, Zhenye Li

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2277-2297, 2023, DOI:10.32604/csse.2023.036419 - 09 February 2023

    Abstract Fraud cases have been a risk in society and people’s property security has been greatly threatened. In recent studies, many promising algorithms have been developed for social media offensive text recognition as well as sentiment analysis. These algorithms are also suitable for fraudulent phone text recognition. Compared to these tasks, the semantics of fraudulent words are more complex and more difficult to distinguish. Recurrent Neural Networks (RNN), the variants of RNN, Convolutional Neural Networks (CNN), and hybrid neural networks to extract text features are used by most text classification research. However, a single network or… More >

  • Open Access

    ARTICLE

    Earthworm Optimization with Improved SqueezeNet Enabled Facial Expression Recognition Model

    N. Sharmili1, Saud Yonbawi2, Sultan Alahmari3, E. Laxmi Lydia4, Mohamad Khairi Ishak5, Hend Khalid Alkahtani6,*, Ayman Aljarbouh7, Samih M. Mostafa8

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2247-2262, 2023, DOI:10.32604/csse.2023.036377 - 09 February 2023

    Abstract Facial expression recognition (FER) remains a hot research area among computer vision researchers and still becomes a challenge because of high intra-class variations. Conventional techniques for this problem depend on hand-crafted features, namely, LBP, SIFT, and HOG, along with that a classifier trained on a database of videos or images. Many execute perform well on image datasets captured in a controlled condition; however not perform well in the more challenging dataset, which has partial faces and image variation. Recently, many studies presented an endwise structure for facial expression recognition by utilizing DL methods. Therefore, this… More >

  • Open Access

    ARTICLE

    Harris Hawks Optimizer with Graph Convolutional Network Based Weed Detection in Precision Agriculture

    Saud Yonbawi1, Sultan Alahmari2, T. Satyanarayana Murthy3, Padmakar Maddala4, E. Laxmi Lydia5, Seifedine Kadry6,7,8,*, Jungeun Kim9

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1533-1547, 2023, DOI:10.32604/csse.2023.036296 - 09 February 2023

    Abstract Precision agriculture includes the optimum and adequate use of resources depending on several variables that govern crop yield. Precision agriculture offers a novel solution utilizing a systematic technique for current agricultural problems like balancing production and environmental concerns. Weed control has become one of the significant problems in the agricultural sector. In traditional weed control, the entire field is treated uniformly by spraying the soil, a single herbicide dose, weed, and crops in the same way. For more precise farming, robots could accomplish targeted weed treatment if they could specifically find the location of the… More >

  • Open Access

    ARTICLE

    A Multimodel Transfer-Learning-Based Car Price Prediction Model with an Automatic Fuzzy Logic Parameter Optimizer

    Ping-Huan Kuo1,2, Sing-Yan Chen1, Her-Terng Yau1,2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1577-1596, 2023, DOI:10.32604/csse.2023.036292 - 09 February 2023

    Abstract Cars are regarded as an indispensable means of transportation in Taiwan. Several studies have indicated that the automotive industry has witnessed remarkable advances and that the market of used cars has rapidly expanded. In this study, a price prediction system for used BMW cars was developed. Nine parameters of used cars, including their model, registration year, and transmission style, were analyzed. The data obtained were then divided into three subsets. The first subset was used to compare the results of each algorithm. The predicted values produced by the two algorithms with the most satisfactory results… More >

  • Open Access

    ARTICLE

    SRC: Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC

    Basanta Kumar Swain1, Mohammad Zubair Khan2,*, Chiranji Lal Chowdhary3, Abdullah Alsaeedi4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2337-2349, 2023, DOI:10.32604/csse.2023.036192 - 09 February 2023

    Abstract This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients (GFCC) for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hunting optimization and artificial neural network (DHO-ANN). The noisy crowdsourced cough datasets were collected from the public domain. This research work claimed that the GFCC yielded better results in terms of COVID-19 detection as compared to the widely used Mel-frequency cepstral coefficient in noisy crowdsourced speech corpora. The proposed algorithm's performance for detecting COVID-19 disease is rigorously validated using statistical measures, F1 score, confusion matrix, More >

Displaying 371-380 on page 38 of 1494. Per Page