Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications

    Romaissa Kebache1, Abdelkader Laouid1,*, Ahcene Bounceur2, Mostefa Kara1,3, Konstantinos Karampidis4, Giorgos Papadourakis4, Mohammad Hammoudeh2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1055-1072, 2024, DOI:10.32604/csse.2024.048738 - 17 July 2024

    Abstract Internet cloud services come at a price, especially when they provide top-tier security measures. The cost incurred by cloud utilization is directly proportional to the storage requirements. Companies are always looking to increase profits and reduce costs while preserving the security of their data by encrypting them. One of the offered solutions is to find an efficient encryption method that can store data in a much smaller space than traditional encryption techniques. This article introduces a novel encryption approach centered on consolidating information into a single ciphertext by implementing Multi-Key Embedded Encryption (MKEE). The effectiveness… More >

  • Open Access

    ARTICLE

    FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface

    Xingxing Zhang1, Liang Liu1,*, Yu Fan1, Qian Zhou2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 969-987, 2024, DOI:10.32604/csse.2024.046615 - 17 July 2024

    Abstract System calls are essential interfaces that enable applications to access and utilize the operating system’s services and resources. Attackers frequently exploit application’s vulnerabilities and misuse system calls to execute malicious code, aiming to elevate privileges and so on. Consequently, restricting the misuse of system calls becomes a crucial measure in ensuring system security. It is an effective method known as reducing the attack surface. Existing attack surface reduction techniques construct a global whitelist of system calls for the entire lifetime of the application, which is coarse-grained. In this paper, we propose a Fine-grained Function-level framework… More >

  • Open Access

    ARTICLE

    Intelligent Image Text Detection via Pixel Standard Deviation Representation

    Sana Sahar Guia1, Abdelkader Laouid1, Mohammad Hammoudeh2,*, Mostafa Kara1,3

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 915-935, 2024, DOI:10.32604/csse.2024.046414 - 17 July 2024

    Abstract Artificial intelligence has been involved in several domains. Despite the advantages of using artificial intelligence techniques, some crucial limitations prevent them from being implemented in specific domains and locations. The accuracy, poor quality of gathered data, and processing time are considered major concerns in implementing machine learning techniques, certainly in low-end smart devices. This paper aims to introduce a novel pre-treatment technique dedicated to image text detection that uses the images’ pixel divergence and similarity to reduce the image size. Mitigating the image size while keeping its features improves the model training time with an… More >

  • Open Access

    ARTICLE

    Microarray Gene Expression Classification: An Efficient Feature Selection Using Hybrid Swarm Intelligence Algorithm

    Punam Gulande*, R. N. Awale

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 937-952, 2024, DOI:10.32604/csse.2024.046123 - 17 July 2024

    Abstract The study of gene expression has emerged as a vital tool for cancer diagnosis and prognosis, particularly with the advent of microarray technology that enables the measurement of thousands of genes in a single sample. While this wealth of data offers invaluable insights for disease management, the high dimensionality poses a challenge for multiclass classification. In this context, selecting relevant features becomes essential to enhance classification model performance. Swarm Intelligence algorithms have proven effective in addressing this challenge, owing to their ability to navigate intricate, non-linear feature-class relationships. This paper introduces a novel hybrid swarm More >

  • Open Access

    ARTICLE

    MG-YOLOv5s: A Faster and Stronger Helmet Detection Algorithm

    Zerui Xiao, Wei Liu, Zhiwei Ye*, Jiatang Yuan, Shishi Liu

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1009-1029, 2024, DOI:10.32604/csse.2023.040475 - 17 July 2024

    Abstract Nowadays, construction site safety accidents are frequent, and wearing safety helmets is essential to prevent head injuries caused by object collisions and falls. However, existing helmet detection algorithms have several drawbacks, including a complex structure with many parameters, high calculation volume, and poor detection of small helmets, making deployment on embedded or mobile devices difficult. To address these challenges, this paper proposes a YOLOv5-based multi-head detection safety helmet detection algorithm that is faster and more robust for detecting helmets on construction sites. By replacing the traditional DarkNet backbone network of YOLOv5s with a new backbone… More >

  • Open Access

    CORRECTION

    Correction: Micro-Locational Fine Dust Prediction Utilizing Machine Learning and Deep Learning Models

    Seoyun Kim1,#, Hyerim Yu2,#, Jeewoo Yoon1,3, Eunil Park1,2,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 861-861, 2024, DOI:10.32604/csse.2024.053659 - 20 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Breast Calcifications and Histopathological Analysis on Tumour Detection by CNN

    D. Banumathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, P. Vishnu Raja4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 863-866, 2024, DOI:10.32604/csse.2024.053657 - 20 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Covid-19 Detection Using Deep Correlation-Grey Wolf Optimizer

    K. S. Bhuvaneshwari1, Ahmed Najat Ahmed2, Mehedi Masud3, Samah H. Alajmani4, Mohamed Abouhawwash5,6,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 867-868, 2024, DOI:10.32604/csse.2024.053658 - 20 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Computational Linguistics Based Arabic Poem Classification and Dictarization Model

    Manar Ahmed Hamza1,*, Hala J. Alshahrani2, Najm Alotaibi3, Mohamed K. Nour4, Mahmoud Othman5, Gouse Pasha Mohammed1, Mohammed Rizwanullah1, Mohamed I. Eldesouki6

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 869-870, 2024, DOI:10.32604/csse.2024.053660 - 20 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network

    R. Sangeetha, Usha Devi Gandhi*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 859-859, 2024, DOI:10.32604/csse.2024.052487 - 20 May 2024

    Abstract This article has no abstract. More >

Displaying 61-70 on page 7 of 1494. Per Page