Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Phishing Websites Detection by Using Optimized Stacking Ensemble Model

    Zeyad Ghaleb Al-Mekhlafi1, Badiea Abdulkarem Mohammed1,2,*, Mohammed Al-Sarem3, Faisal Saeed3, Tawfik Al-Hadhrami4, Mohammad T. Alshammari1, Abdulrahman Alreshidi1, Talal Sarheed Alshammari1

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 109-125, 2022, DOI:10.32604/csse.2022.020414

    Abstract Phishing attacks are security attacks that do not affect only individuals’ or organizations’ websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an exposed environment for such attacks. Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users. Machine and deep learning and other methods were used to design detection methods for these attacks. However, there is still a need to enhance detection accuracy. Optimization of an ensemble classification method for phishing website (PW) detection is proposed in this study. A Genetic Algorithm (GA) was used for… More >

  • Open Access

    ARTICLE

    Gaussian Kernel Based SVR Model for Short-Term Photovoltaic MPP Power Prediction

    Yasemin Onal*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 141-156, 2022, DOI:10.32604/csse.2022.020367

    Abstract Predicting the power obtained at the output of the photovoltaic (PV) system is fundamental for the optimum use of the PV system. However, it varies at different times of the day depending on intermittent and nonlinear environmental conditions including solar irradiation, temperature and the wind speed, Short-term power prediction is vital in PV systems to reconcile generation and demand in terms of the cost and capacity of the reserve. In this study, a Gaussian kernel based Support Vector Regression (SVR) prediction model using multiple input variables is proposed for estimating the maximum power obtained from using perturb observation method in… More >

  • Open Access

    ARTICLE

    Image Manipulation Detection Through Laterally Linked Pixels and Kernel Algorithms

    K. K. Thyagharajan, G. Nirmala*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 357-371, 2022, DOI:10.32604/csse.2022.020258

    Abstract In this paper, copy-move forgery in image is detected for single image with multiple manipulations such as blurring, noise addition, gray scale conversion, brightness modifications, rotation, Hu adjustment, color adjustment, contrast changes and JPEG Compression. However, traditional algorithms detect only copy-move attacks in image and never for different manipulation in single image. The proposed LLP (Laterally linked pixel) algorithm has two dimensional arrays and single layer is obtained through unit linking pulsed neural network for detection of copied region and kernel tricks is applied for detection of multiple manipulations in single forged image. LLP algorithm consists of two channels such… More >

  • Open Access

    ARTICLE

    Autism Spectrum Disorder Diagnosis Using Ensemble ML and Max Voting Techniques

    A. Arunkumar1,*, D. Surendran2

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 389-404, 2022, DOI:10.32604/csse.2022.020256

    Abstract Difficulty in communicating and interacting with other people are mainly due to the neurological disorder called autism spectrum disorder (ASD) diseases. These diseases can affect the nerves at any stage of the human being in childhood, adolescence, and adulthood. ASD is known as a behavioral disease due to the appearances of symptoms over the first two years that continue until adulthood. Most of the studies prove that the early detection of ASD helps improve the behavioral characteristics of patients with ASD. The detection of ASD is a very challenging task among various researchers. Machine learning (ML) algorithms still act very… More >

  • Open Access

    ARTICLE

    Classification of Foot Pressure Images Using Machine Learning Algorithm

    P. Ramya1, B. Padmapriya2, S. Poornachandra3

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 187-196, 2022, DOI:10.32604/csse.2022.020185

    Abstract Arthritis is an acute systemic disease of a joint accompanied by pain. In developed countries, it mainly causes disability among people over 50 years of age. Rheumatoid Arthritis is a type of arthritis that occurs commonly among elders. The incidence of arthritis is higher in females than in males. There is no permanent diagnosis method for arthritis, but if it was identified in the early stages based on the foot pressure, it can be diagnosed before attaining the critical stage of Rheumatoid Arthritis. The analysis and study of arthritis patients were done using design thinking methodology. Design thinking is a… More >

  • Open Access

    ARTICLE

    Short Text Mining for Classifying Educational Objectives and Outcomes

    Yousef Asiri*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 35-50, 2022, DOI:10.32604/csse.2022.020100

    Abstract Most of the international accreditation bodies in engineering education (e.g., ABET) and outcome-based educational systems have based their assessments on learning outcomes and program educational objectives. However, mapping program educational objectives (PEOs) to student outcomes (SOs) is a challenging and time-consuming task, especially for a new program which is applying for ABET-EAC (American Board for Engineering and Technology the American Board for Engineering and Technology—Engineering Accreditation Commission) accreditation. In addition, ABET needs to automatically ensure that the mapping (classification) is reasonable and correct. The classification also plays a vital role in the assessment of students’ learning. Since the PEOs are… More >

  • Open Access

    ARTICLE

    Statistical Inference of Sine Inverse Rayleigh Distribution

    Abdullah, Ali H. Ahmadini*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 405-414, 2022, DOI:10.32604/csse.2022.020079

    Abstract We study in this manuscript a new one-parameter model called sine inverse Rayleigh (SIR) model that is a new extension of the classical inverse Rayleigh model. The sine inverse Rayleigh model is aiming to provide more fitting for real data sets of purposes. The proposed extension is more flexible than the original inverse Rayleigh (IR) model and it hasmany applications in physics and medicine. The sine inverse Rayleigh distribution can havea uni-model and right skewed probability density function (PDF). The hazard rate function (HRF) of sine inverse Rayleigh distribution can be increasing and J-shaped. Several of thenew model’s fundamental characteristics,… More >

  • Open Access

    ARTICLE

    Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography

    N. Niyaz Ahamed*, N. Duraipandian

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 83-94, 2022, DOI:10.32604/csse.2022.020071

    Abstract The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an attack from the cloud server's… More >

  • Open Access

    ARTICLE

    Ensemble Variable Selection for Naive Bayes to Improve Customer Behaviour Analysis

    R. Siva Subramanian1,*, D. Prabha2

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 339-355, 2022, DOI:10.32604/csse.2022.020043

    Abstract Executing customer analysis in a systemic way is one of the possible solutions for each enterprise to understand the behavior of consumer patterns in an efficient and in-depth manner. Further investigation of customer patterns helps the firm to develop efficient decisions and in turn, helps to optimize the enterprise’s business and maximizes consumer satisfaction correspondingly. To conduct an effective assessment about the customers, Naive Bayes(also called Simple Bayes), a machine learning model is utilized. However, the efficacious of the simple Bayes model is utterly relying on the consumer data used, and the existence of uncertain and redundant attributes in the… More >

  • Open Access

    ARTICLE

    Consensus-Based Ensemble Model for Arabic Cyberbullying Detection

    Asma A. Alhashmi*, Abdulbasit A. Darem

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 241-254, 2022, DOI:10.32604/csse.2022.020023

    Abstract Due to the proliferation of internet-enabled smartphones, many people, particularly young people in Arabic society, have widely adopted social media platforms as a primary means of communication, interaction and friendship making. The technological advances in smartphones and communication have enabled young people to keep in touch and form huge social networks from all over the world. However, such networks expose young people to cyberbullying and offensive content that puts their safety and emotional well-being at serious risk. Although, many solutions have been proposed to automatically detect cyberbullying, most of the existing solutions have been designed for English speaking consumers. The… More >

Displaying 1051-1060 on page 106 of 1407. Per Page