Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (137)
  • Open Access

    ARTICLE

    Power Scheduling with Max User Comfort in Smart Home: Performance Analysis and Tradeoffs

    Muhammad Irfan1, Ch. Anwar Ul Hassan2, Faisal Althobiani3, Nasir Ayub4,*, Raja Jalees Ul Hussen Khan5, Emad Ismat Ghandourah6, Majid A. Almas7, Saleh Mohammed Ghonaim3, V. R. Shamji3, Saifur Rahman1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1723-1740, 2023, DOI:10.32604/csse.2023.035141 - 09 February 2023

    Abstract The smart grid has enabled users to control their home energy more effectively and efficiently. A home energy management system (HEM) is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy. Here, we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm (GWA) and Harmony Search Algorithms (HSA). Moreover, a fusion initiated on HSA and GWA operators is used to optimize energy intake. Furthermore, many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge. Hybridization has… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks

    A. Francis Saviour Devaraj1, T. Satyanarayana Murthy2, Fayadh Alenezi3, E. Laxmi Lydia4, Mohamad Adzhar Md Zawawi5, Mohamad Khairi Ishak5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1431-1445, 2023, DOI:10.32604/csse.2023.034421 - 09 February 2023

    Abstract Recently, a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks (WSN). In routing, the trust system includes or avoids nodes related to the estimated trust values in the routing function. This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol (EMTA-SRSP) for WSN. The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN. To accomplish this, the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication. For the clustering process, the nodes with maximum More >

  • Open Access

    ARTICLE

    Dragonfly Optimization with Deep Learning Enabled Sentiment Analysis for Arabic Tweets

    Aisha M. Mashraqi, Hanan T. Halawani*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2555-2570, 2023, DOI:10.32604/csse.2023.031246 - 09 February 2023

    Abstract Sentiment Analysis (SA) is one of the Machine Learning (ML) techniques that has been investigated by several researchers in recent years, especially due to the evolution of novel data collection methods focused on social media. In literature, it has been reported that SA data is created for English language in excess of any other language. It is challenging to perform SA for Arabic Twitter data owing to informal nature and rich morphology of Arabic language. An earlier study conducted upon SA for Arabic Twitter focused mostly on automatic extraction of the features from the text.… More >

  • Open Access

    ARTICLE

    Improved Chameleon Swarm Optimization-Based Load Scheduling for IoT-Enabled Cloud Environment

    Manar Ahmed Hamza1,*, Shaha Al-Otaibi2, Sami Althahabi3, Jaber S. Alzahrani4, Abdullah Mohamed5, Abdelwahed Motwakel1, Abu Sarwar Zamani1, Mohamed I. Eldesouki6

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1371-1383, 2023, DOI:10.32604/csse.2023.030232 - 09 February 2023

    Abstract Internet of things (IoT) and cloud computing (CC) becomes widespread in different application domains such as business, e-commerce, healthcare, etc. The recent developments of IoT technology have led to an increase in large amounts of data from various sources. In IoT enabled cloud environment, load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization. The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics. In this view, this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling (C3SOA-LS) technique for… More >

  • Open Access

    ARTICLE

    Blood Vessel Segmentation with Classification Model for Diabetic Retinopathy Screening

    Abdullah O. Alamoudi1,*, Sarah Mohammed Allabun2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2265-2281, 2023, DOI:10.32604/cmc.2023.032429 - 06 February 2023

    Abstract Biomedical image processing is finding useful in healthcare sector for the investigation, enhancement, and display of images gathered by distinct imaging technologies. Diabetic retinopathy (DR) is an illness caused by diabetes complications and leads to irreversible injury to the retina blood vessels. Retinal vessel segmentation techniques are a basic element of automated retinal disease screening system. In this view, this study presents a novel blood vessel segmentation with deep learning based classification (BVS-DLC) model for DR diagnosis using retinal fundus images. The proposed BVS-DLC model involves different stages of operations such as preprocessing, segmentation, feature… More >

  • Open Access

    ARTICLE

    Chaotic Metaheuristics with Multi-Spiking Neural Network Based Cloud Intrusion Detection

    Mohammad Yamin1,*, Saleh Bajaba2, Zenah Mahmoud AlKubaisy1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6101-6118, 2023, DOI:10.32604/cmc.2023.033677 - 28 December 2022

    Abstract Cloud Computing (CC) provides data storage options as well as computing services to its users through the Internet. On the other hand, cloud users are concerned about security and privacy issues due to the increased number of cyberattacks. Data protection has become an important issue since the users’ information gets exposed to third parties. Computer networks are exposed to different types of attacks which have extensively grown in addition to the novel intrusion methods and hacking tools. Intrusion Detection Systems (IDSs) can be used in a network to manage suspicious activities. These IDSs monitor the… More >

  • Open Access

    ARTICLE

    Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment

    Fatma S. Alrayes1, Nuha Alshuqayran2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Abdullah Mohamed5, Amgad Atta Abdelmageed Mohammed6, Gouse Pasha Mohammed6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6737-6753, 2023, DOI:10.32604/cmc.2023.032591 - 28 December 2022

    Abstract Recently, Internet of Things (IoT) devices have developed at a faster rate and utilization of devices gets considerably increased in day to day lives. Despite the benefits of IoT devices, security issues remain challenging owing to the fact that most devices do not include memory and computing resources essential for satisfactory security operation. Consequently, IoT devices are vulnerable to different kinds of attacks. A single attack on networking system/device could result in considerable data to data security and privacy. But the emergence of artificial intelligence (AI) techniques can be exploited for attack detection and classification… More >

  • Open Access

    ARTICLE

    Al-Biruni Earth Radius (BER) Metaheuristic Search Optimization Algorithm

    El-Sayed M. El-kenawy1,2, Abdelaziz A. Abdelhamid3,4, Abdelhameed Ibrahim5, Seyedali Mirjalili6,7, Nima Khodadad8, Mona A. Al duailij9, Amel Ali Alhussan9,*, Doaa Sami Khafaga9

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1917-1934, 2023, DOI:10.32604/csse.2023.032497 - 03 November 2022

    Abstract Metaheuristic optimization algorithms present an effective method for solving several optimization problems from various types of applications and fields. Several metaheuristics and evolutionary optimization algorithms have been emerged recently in the literature and gained widespread attention, such as particle swarm optimization (PSO), whale optimization algorithm (WOA), grey wolf optimization algorithm (GWO), genetic algorithm (GA), and gravitational search algorithm (GSA). According to the literature, no one metaheuristic optimization algorithm can handle all present optimization problems. Hence novel optimization methodologies are still needed. The Al-Biruni earth radius (BER) search optimization algorithm is proposed in this paper. The More >

  • Open Access

    ARTICLE

    Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram

    Doaa Sami Khafaga1, Amel Ali Alhussan1,*, Abdelaziz A. Abdelhamid2,3, Abdelhameed Ibrahim4, Mohamed Saber5, El-Sayed M. El-kenawy6,7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1469-1482, 2023, DOI:10.32604/csse.2023.031943 - 03 November 2022

    Abstract Arrhythmia has been classified using a variety of methods. Because of the dynamic nature of electrocardiogram (ECG) data, traditional handcrafted approaches are difficult to execute, making the machine learning (ML) solutions more appealing. Patients with cardiac arrhythmias can benefit from competent monitoring to save their lives. Cardiac arrhythmia classification and prediction have greatly improved in recent years. Arrhythmias are a category of conditions in which the heart's electrical activity is abnormally rapid or sluggish. Every year, it is one of the main reasons of mortality for both men and women, worldwide. For the classification of… More >

  • Open Access

    ARTICLE

    Improved Metaheuristic Based Failure Prediction with Migration Optimization in Cloud Environment

    K. Karthikeyan1,*, Liyakathunisa2, Eman Aljohani2, Thavavel Vaiyapuri3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1641-1654, 2023, DOI:10.32604/csse.2023.031582 - 03 November 2022

    Abstract Cloud data centers consume high volume of energy for processing and switching the servers among different modes. Virtual Machine (VM) migration enhances the performance of cloud servers in terms of energy efficiency, internal failures and availability. On the other end, energy utilization can be minimized by decreasing the number of active, underutilized sources which conversely reduces the dependability of the system. In VM migration process, the VMs are migrated from underutilized physical resources to other resources to minimize energy utilization and optimize the operations. In this view, the current study develops an Improved Metaheuristic Based… More >

Displaying 31-40 on page 4 of 137. Per Page