Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Efficient DP-FL: Efficient Differential Privacy Federated Learning Based on Early Stopping Mechanism

    Sanxiu Jiao1, Lecai Cai2,*, Jintao Meng3, Yue Zhao3, Kui Cheng2

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 247-265, 2024, DOI:10.32604/csse.2023.040194

    Abstract Federated learning is a distributed machine learning framework that solves data security and data island problems faced by artificial intelligence. However, federated learning frameworks are not always secure, and attackers can attack customer privacy information by analyzing parameters in the training process of federated learning models. To solve the problems of data security and availability during federated learning training, this paper proposes an Efficient Differential Privacy Federated Learning Algorithm based on early stopping mechanism (Efficient DP-FL). This method inherits the advantages of differential privacy and federated learning and improves the performance of model training while protecting the parameter information uploaded… More >

  • Open Access

    ARTICLE

    RLAT: Lightweight Transformer for High-Resolution Range Profile Sequence Recognition

    Xiaodan Wang*, Peng Wang, Yafei Song, Qian Xiang, Jingtai Li

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 217-246, 2024, DOI:10.32604/csse.2023.039846

    Abstract High-resolution range profile (HRRP) automatic recognition has been widely applied to military and civilian domains. Present HRRP recognition methods have difficulty extracting deep and global information about the HRRP sequence, which performs poorly in real scenes due to the ambient noise, variant targets, and limited data. Moreover, most existing methods improve the recognition performance by stacking a large number of modules, but ignore the lightweight of methods, resulting in over-parameterization and complex computational effort, which will be challenging to meet the deployment and application on edge devices. To tackle the above problems, this paper proposes an HRRP sequence recognition method… More >

  • Open Access

    ARTICLE

    Fine-Tuned Extra Tree Classifier for Thermal Comfort Sensation Prediction

    Ahmad Almadhor1, Chitapong Wechtaisong2,*, Usman Tariq3, Natalia Kryvinska4,*, Abdullah Al Hejaili5, Uzma Ghulam Mohammad6, Mohana Alanazi7

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 199-216, 2024, DOI:10.32604/csse.2023.039546

    Abstract Thermal comfort is an essential component of smart cities that helps to upgrade, analyze, and realize intelligent buildings. It strongly affects human psychological and physiological levels. Residents of buildings suffer stress because of poor thermal comfort. Buildings frequently use Heating, Ventilation, and Air Conditioning (HVAC) systems for temperature control. Better thermal states directly impact people’s productivity and health. This study revealed a human thermal comfort model that makes better predictions of thermal sensation by identifying essential features and employing a tuned Extra Tree classifier, MultiLayer Perceptron (MLP) and Naive Bayes (NB) models. The study employs the ASHRAE RP-884 standard dataset… More >

  • Open Access

    ARTICLE

    Deep Autoencoder-Based Hybrid Network for Building Energy Consumption Forecasting

    Noman Khan1,2, Samee Ullah Khan1,2, Sung Wook Baik1,2,*

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 153-173, 2024, DOI:10.32604/csse.2023.039407

    Abstract Energy management systems for residential and commercial buildings must use an appropriate and efficient model to predict energy consumption accurately. To deal with the challenges in power management, the short-term Power Consumption (PC) prediction for household appliances plays a vital role in improving domestic and commercial energy efficiency. Big data applications and analytics have shown that data-driven load forecasting approaches can forecast PC in commercial and residential sectors and recognize patterns of electric usage in complex conditions. However, traditional Machine Learning (ML) algorithms and their features engineering procedure emphasize the practice of inefficient and ineffective techniques resulting in poor generalization.… More >

  • Open Access

    ARTICLE

    Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks

    Nadir Omer1,*, Ahmed H. Samak2, Ahmed I. Taloba3,4, Rasha M. Abd El-Aziz3,5

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 77-95, 2024, DOI:10.32604/csse.2023.039265

    Abstract Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone with malicious intent to steal data, destroy computer systems, or disrupt them. Due to rising cyber security concerns, cyber security has emerged as the key component in the fight against all online threats, forgeries, and assaults. A device capable of identifying network irregularities and cyber-attacks… More >

  • Open Access

    ARTICLE

    A Multi-Objective Genetic Algorithm Based Load Balancing Strategy for Health Monitoring Systems in Fog-Cloud

    Hayder Makki Shakir, Jaber Karimpour*, Jafar Razmara

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 35-55, 2024, DOI:10.32604/csse.2023.038545

    Abstract As the volume of data and data-generating equipment in healthcare settings grows, so do issues like latency and inefficient processing inside health monitoring systems. The Internet of Things (IoT) has been used to create a wide variety of health monitoring systems. Most modern health monitoring solutions are based on cloud computing. However, large-scale deployment of latency-sensitive healthcare applications is hampered by the cloud’s design, which introduces significant delays during the processing of vast data volumes. By strategically positioning servers close to end users, fog computing mitigates latency issues and dramatically improves scaling on demand, resource accessibility, and security. In this… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Prevention Model for Blockchain Based IoMT Applications

    Jameel Almalki*

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 131-152, 2024, DOI:10.32604/csse.2023.038085

    Abstract The recent global pandemic has resulted in growth in the medical and healthcare sectors. Applications used in these domains have become more advanced and digitally integrated. Sensor-based Internet of Things (IoT) devices are increasing in healthcare and medical units. The emerging trend with the use of IoT devices in medical healthcare is termed as Internet of Medical Things (IoMT). The instruments used in these healthcare units comprise various sensors that can record patient body observations. These recorded observations are streamed across Internet-based channels to be stored and analyzed in centralized servers. Patient diagnostics are performed based on the information retrieved… More >

  • Open Access

    ARTICLE

    Deep Learning Based Vehicle Detection and Counting System for Intelligent Transportation

    A. Vikram1, J. Akshya2, Sultan Ahmad3,4, L. Jerlin Rubini5, Seifedine Kadry6,7,8, Jungeun Kim9,*

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 115-130, 2024, DOI:10.32604/csse.2023.037928

    Abstract Traffic monitoring through remote sensing images (RSI) is considered an important research area in Intelligent Transportation Systems (ITSs). Vehicle counting systems must be simple enough to be implemented in real-time. With the fast expansion of road traffic, real-time vehicle counting becomes essential in constructing ITS. Compared with conventional technologies, the remote sensing-related technique for vehicle counting exhibits greater significance and considerable advantages in its flexibility, low cost, and high efficiency. But several techniques need help in balancing complexity and accuracy technique. Therefore, this article presents a deep learning-based vehicle detection and counting system for ITS (DLVDCS-ITS) in remote sensing images.… More >

  • Open Access

    ARTICLE

    Computational Linguistics Based Arabic Poem Classification and Dictarization Model

    Manar Ahmed Hamza1,*, Hala J. Alshahrani2, Najm Alotaibi3, Mohamed K. Nour4, Mahmoud Othman5, Gouse Pasha Mohammed1, Mohammed Rizwanullah1, Mohamed I. Eldesouki6

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 97-114, 2024, DOI:10.32604/csse.2023.034520

    Abstract Computational linguistics is the scientific and engineering discipline related to comprehending written and spoken language from a computational perspective and building artefacts that effectively process and produce language, either in bulk or in a dialogue setting. This paper develops a Chaotic Bird Swarm Optimization with deep ensemble learning based Arabic poem classification and dictarization (CBSOEDL-APCD) technique. The presented CBSOEDL-APCD technique involves the classification and dictarization of Arabic text into Arabic poetries and prose. Primarily, the CBSOEDL-APCD technique carries out data pre-processing to convert it into a useful format. Besides, the ensemble deep learning (EDL) model comprising deep belief network (DBN),… More >

  • Open Access

    ARTICLE

    An Efficient Character-Level Adversarial Attack Inspired by Textual Variations in Online Social Media Platforms

    Jebran Khan1, Kashif Ahmad2, Kyung-Ah Sohn1,3,*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2869-2894, 2023, DOI:10.32604/csse.2023.040159

    Abstract In recent years, the growing popularity of social media platforms has led to several interesting natural language processing (NLP) applications. However, these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning (ML) and NLP techniques. This work presents a new low-level adversarial attack recipe inspired by textual variations in online social media communication. These variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible form. The intuition of the proposed scheme is to generate adversarial examples… More >

Displaying 21-30 on page 3 of 1407. Per Page