Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Chest Radiographs Based Pneumothorax Detection Using Federated Learning

    Ahmad Almadhor1,*, Arfat Ahmad Khan2, Chitapong Wechtaisong3,*, Iqra Yousaf4, Natalia Kryvinska5, Usman Tariq6, Haithem Ben Chikha1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1775-1791, 2023, DOI:10.32604/csse.2023.039007

    Abstract Pneumothorax is a thoracic condition that occurs when a person’s lungs collapse, causing air to enter the pleural cavity, the area close to the lungs and chest wall. The most persistent disease, as well as one that necessitates particular patient care and the privacy of their health records. The radiologists find it challenging to diagnose pneumothorax due to the variations in images. Deep learning-based techniques are commonly employed to solve image categorization and segmentation problems. However, it is challenging to employ it in the medical field due to privacy issues and a lack of data. To address this issue, a… More >

  • Open Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917

    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open Access

    ARTICLE

    Business Blockchain Suitability Determinants: Decision-Making through an Intuitionistic Fuzzy Method

    Tomader Almeshal1,*, Jawad Berri1, Tarifa Almulhim2, Areej Alhogail1, Emam Ahmed3

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1665-1690, 2023, DOI:10.32604/csse.2023.038871

    Abstract Blockchain is one of the innovative and disruptive technologies that has a wide range of applications in multiple industries beyond cryptocurrency. The widespread adoption of blockchain technology in various industries has shown its potential to solve challenging business problems, as well as the possibility to create new business models which can increase a firm’s competitiveness. Due to the novelty of the technology, whereby many companies are still exploring potential use cases, and considering the complexity of blockchain technology, which may require huge changes to a company’s existing systems and processes, it is important for companies to carefully evaluate suitable use… More >

  • Open Access

    ARTICLE

    CT-NET: A Novel Convolutional Transformer-Based Network for Short-Term Solar Energy Forecasting Using Climatic Information

    Muhammad Munsif1,2, Fath U Min Ullah1,2, Samee Ullah Khan1,2, Noman Khan1,2, Sung Wook Baik1,2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1751-1773, 2023, DOI:10.32604/csse.2023.038514

    Abstract Photovoltaic (PV) systems are environmentally friendly, generate green energy, and receive support from policies and organizations. However, weather fluctuations make large-scale PV power integration and management challenging despite the economic benefits. Existing PV forecasting techniques (sequential and convolutional neural networks (CNN)) are sensitive to environmental conditions, reducing energy distribution system performance. To handle these issues, this article proposes an efficient, weather-resilient convolutional-transformer-based network (CT-NET) for accurate and efficient PV power forecasting. The network consists of three main modules. First, the acquired PV generation data are forwarded to the pre-processing module for data refinement. Next, to carry out data encoding, a… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access

    ARTICLE

    Sand Cat Swarm Optimization with Deep Transfer Learning for Skin Cancer Classification

    C. S. S. Anupama1, Saud Yonbawi2, G. Jose Moses3, E. Laxmi Lydia4, Seifedine Kadry5,6,7, Jungeun Kim8,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2079-2095, 2023, DOI:10.32604/csse.2023.038322

    Abstract Skin cancer is one of the most dangerous cancer. Because of the high melanoma death rate, skin cancer is divided into non-melanoma and melanoma. The dermatologist finds it difficult to identify skin cancer from dermoscopy images of skin lesions. Sometimes, pathology and biopsy examinations are required for cancer diagnosis. Earlier studies have formulated computer-based systems for detecting skin cancer from skin lesion images. With recent advancements in hardware and software technologies, deep learning (DL) has developed as a potential technique for feature learning. Therefore, this study develops a new sand cat swarm optimization with a deep transfer learning method for… More >

  • Open Access

    ARTICLE

    Automatic Examination of Condition of Used Books with YOLO-Based Object Detection Framework

    Sumin Hong1, Jin-Woo Jeong2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1611-1632, 2023, DOI:10.32604/csse.2023.038319

    Abstract As the demand for used books has grown in recent years, various online/offline market platforms have emerged to support the trade in used books. The price of used books can depend on various factors, such as the state of preservation (i.e., condition), the value of possession, and so on. Therefore, some online platforms provide a reference document to evaluate the condition of used books, but it is still not trivial for individual sellers to determine the price. The lack of a standard quantitative method to assess the condition of the used book would confuse both sellers and consumers, thereby decreasing… More >

  • Open Access

    ARTICLE

    Multi-Target Tracking of Person Based on Deep Learning

    Xujun Li*, Guodong Fang, Liming Rao, Tengze Zhang

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2671-2688, 2023, DOI:10.32604/csse.2023.038154

    Abstract To improve the tracking accuracy of persons in the surveillance video, we proposed an algorithm for multi-target tracking persons based on deep learning. In this paper, we used You Only Look Once v5 (YOLOv5) to obtain person targets of each frame in the video and used Simple Online and Realtime Tracking with a Deep Association Metric (DeepSORT) to do cascade matching and Intersection Over Union (IOU) matching of person targets between different frames. To solve the IDSwitch problem caused by the low feature extraction ability of the Re-Identification (ReID) network in the process of cascade matching, we introduced Spatial Relation-aware… More >

  • Open Access

    ARTICLE

    A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption

    Nashat Salih Abdulkarim Alsandi1, Dilovan Asaad Zebari2,*, Adel Al-Zebari3, Falah Y. H. Ahmed4, Mazin Abed Mohammed5, Marwan Albahar6, Abdulaziz Ali Albahr7,8

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1321-1347, 2023, DOI:10.32604/csse.2023.038089

    Abstract Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks. Thus, the progress of image encryption techniques is becoming an increasingly serious issue and considerable problem. Small space of the key, encryption-based low confidentiality, low key sensitivity, and easily exploitable existing image encryption techniques integrating chaotic system and DNA computing are purposing the main problems to propose a new encryption technique in this study. In our proposed scheme, a three-dimensional Chen’s map and a one-dimensional Logistic map are employed to construct a double-layer image encryption scheme. In the confusion stage,… More >

  • Open Access

    ARTICLE

    An Efficient MPPT Tracking in Solar PV System with Smart Grid Enhancement Using CMCMAC Protocol

    B. Jegajothi1,*, Sundaram Arumugam2, Neeraj Kumar Shukla3, I. Kathir4, P. Yamunaa5, Monia Digra6

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2417-2437, 2023, DOI:10.32604/csse.2023.038074

    Abstract Renewable energy sources like solar, wind, and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment. Because, Since the production of renewable energy sources is still in the process of being created, photovoltaic (PV) systems are commonly utilized for installation situations that are acceptable, clean, and simple. This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking (MPPT) in solar systems with the help of an embedded controller. The adaptive method incorporates both the Whale Optimization Algorithm (WOA) and the Artificial Neural Network (ANN). The WOA… More >

Displaying 101-110 on page 11 of 1407. Per Page