Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications

    Walid El-Shafai1,2,*, Fatma Khallaf2,3, El-Sayed M. El-Rabaie2, Fathi E. Abd El-Samie2, Iman Almomani1,4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655

    Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation. Furthermore, a… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE)

    Lelisa Adeba Jilcha1, Deuk-Hun Kim2, Julian Jang-Jaccard3, Jin Kwak4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3261-3284, 2023, DOI:10.32604/csse.2023.037615

    Abstract Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.… More >

  • Open Access

    ARTICLE

    Spotted Hyena Optimizer Driven Deep Learning-Based Drug-Drug Interaction Prediction in Big Data Environment

    Mohammed Jasim Mohammed Jasim1, Shakir Fattah Kak2, Zainab Salih Ageed3, Subhi R. M. Zeebaree4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3831-3845, 2023, DOI:10.32604/csse.2023.037580

    Abstract Nowadays, smart healthcare and biomedical research have marked a substantial growth rate in terms of their presence in the literature, computational approaches, and discoveries, owing to which a massive quantity of experimental datasets was published and generated (Big Data) for describing and validating such novelties. Drug-drug interaction (DDI) significantly contributed to drug administration and development. It continues as the main obstacle in offering inexpensive and safe healthcare. It normally happens for patients with extensive medication, leading them to take many drugs simultaneously. DDI may cause side effects, either mild or severe health problems. This reduced victims’ quality of life and… More >

  • Open Access

    ARTICLE

    Blockchain Assisted Optimal Machine Learning Based Cyberattack Detection and Classification Scheme

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2,*, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3583-3598, 2023, DOI:10.32604/csse.2023.037545

    Abstract With recent advancements in information and communication technology, a huge volume of corporate and sensitive user data was shared consistently across the network, making it vulnerable to an attack that may be brought some factors under risk: data availability, confidentiality, and integrity. Intrusion Detection Systems (IDS) were mostly exploited in various networks to help promptly recognize intrusions. Nowadays, blockchain (BC) technology has received much more interest as a means to share data without needing a trusted third person. Therefore, this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification (BAOML-CADC) technique. In the BAOML-CADC technique,… More >

  • Open Access

    ARTICLE

    BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things

    Sahar Badri1, Sana Ullah Jan2,*, Daniyal Alghazzawi1, Sahar Aldhaheri1, Nikolaos Pitropakis2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3667-3684, 2023, DOI:10.32604/csse.2023.037531

    Abstract Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things (IoMT). The existing cloud-based, centralized IoMT architectures are vulnerable to multiple security and privacy problems. The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks. This article presents a private and easily expandable blockchain-based framework for the IoMT. The proposed framework contains several participants, including private blockchain, hospital management systems, cloud service providers, doctors, and patients. Data security is ensured by incorporating an attribute-based encryption scheme. Furthermore,… More >

  • Open Access

    ARTICLE

    An Efficient Way to Parse Logs Automatically for Multiline Events

    Mingguang Yu1,2, Xia Zhang1,2,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2975-2994, 2023, DOI:10.32604/csse.2023.037505

    Abstract

    In order to obtain information or discover knowledge from system logs, the first step is to perform log parsing, whereby unstructured raw logs can be transformed into a sequence of structured events. Although comprehensive studies on log parsing have been conducted in recent years, most assume that one event object corresponds to a single-line message. However, in a growing number of scenarios, one event object spans multiple lines in the log, for which parsing methods toward single-line events are not applicable. In order to address this problem, this paper proposes an automated log parsing method for multiline events (LPME). LPME… More >

  • Open Access

    ARTICLE

    Solar Radiation Prediction Using Satin Bowerbird Optimization with Modified Deep Learning

    Sheren Sadiq Hasan1, Zainab Salih Agee2, Bareen Shamsaldeen Tahir3, Subhi R. M. Zeebaree4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3225-3238, 2023, DOI:10.32604/csse.2023.037434

    Abstract Solar energy will be a great alternative to fossil fuels since it is clean and renewable. The photovoltaic (PV) mechanism produces sunbeams’ green energy without noise or pollution. The PV mechanism seems simple, seldom malfunctioning, and easy to install. PV energy productivity significantly contributes to smart grids through many small PV mechanisms. Precise solar radiation (SR) prediction could substantially reduce the impact and cost relating to the advancement of solar energy. In recent times, several SR predictive mechanism was formulated, namely artificial neural network (ANN), autoregressive moving average, and support vector machine (SVM). Therefore, this article develops an optimal Modified… More >

  • Open Access

    ARTICLE

    TC-Net: A Modest & Lightweight Emotion Recognition System Using Temporal Convolution Network

    Muhammad Ishaq1, Mustaqeem Khan1,2, Soonil Kwon1,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3355-3369, 2023, DOI:10.32604/csse.2023.037373

    Abstract Speech signals play an essential role in communication and provide an efficient way to exchange information between humans and machines. Speech Emotion Recognition (SER) is one of the critical sources for human evaluation, which is applicable in many real-world applications such as healthcare, call centers, robotics, safety, and virtual reality. This work developed a novel TCN-based emotion recognition system using speech signals through a spatial-temporal convolution network to recognize the speaker’s emotional state. The authors designed a Temporal Convolutional Network (TCN) core block to recognize long-term dependencies in speech signals and then feed these temporal cues to a dense network… More >

  • Open Access

    ARTICLE

    Milling Fault Detection Method Based on Fault Tree Analysis and Hierarchical Belief Rule Base

    Xiaoyu Cheng1, Mingxian Long1, Wei He1,2,*, Hailong Zhu1

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2821-2844, 2023, DOI:10.32604/csse.2023.037330

    Abstract Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base. The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model. However, due to the complexity of the milling system structure and the uncertainty of the milling failure index, it is often impossible to construct model expert knowledge effectively. Therefore, a milling system fault detection method based on fault tree analysis and hierarchical BRB (FTBRB) is proposed. Firstly, the proposed method uses a fault tree and hierarchical BRB modeling. Through fault tree analysis (FTA),… More >

  • Open Access

    ARTICLE

    A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map

    Sultan Almakdi1, Mohammed S. Alshehri1, Yousef Asiri1, Mimonah Al Qathrady2,*, Anas Ibrar3, Jawad Ahmad4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3017-3036, 2023, DOI:10.32604/csse.2023.037281

    Abstract Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data. Medical picture encryption is a crucial step in many cloud-based and healthcare applications. In this study, a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things (IoMT) and cloud storage. A disorganized three-dimensional map is the foundation of the proposed cipher. The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process. The suggested cryptosystem… More >

Displaying 211-220 on page 22 of 1407. Per Page