Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    Test Case Generation Evaluator for the Implementation of Test Case Generation Algorithms Based on Learning to Rank

    Zhonghao Guo*, Xinyue Xu, Xiangxian Chen

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.043932

    Abstract In software testing, the quality of test cases is crucial, but manual generation is time-consuming. Various automatic test case generation methods exist, requiring careful selection based on program features. Current evaluation methods compare a limited set of metrics, which does not support a larger number of metrics or consider the relative importance of each metric to the final assessment. To address this, we propose an evaluation tool, the Test Case Generation Evaluator (TCGE), based on the learning to rank (L2R) algorithm. Unlike previous approaches, our method comprehensively evaluates algorithms by considering multiple metrics, resulting in a more reasoned assessment. The… More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Gender Classification Accuracy across Varied Geographic Regions through the Application of Deep Learning Algorithms to Speech Signals

    Abhishek Singhal*, Devendra Kumar Sharma

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.046730

    Abstract This article presents an exhaustive comparative investigation into the accuracy of gender identification across diverse geographical regions, employing a deep learning classification algorithm for speech signal analysis. In this study, speech samples are categorized for both training and testing purposes based on their geographical origin. Category 1 comprises speech samples from speakers outside of India, whereas Category 2 comprises live-recorded speech samples from Indian speakers. Testing speech samples are likewise classified into four distinct sets, taking into consideration both geographical origin and the language spoken by the speakers. Significantly, the results indicate a noticeable difference in gender identification accuracy among… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks

    Abdullah Alsaleh1,2,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.043107

    Abstract With the increasing number of connected devices in the Internet of Things (IoT) era, the number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary intelligent system for monitoring, detecting and alerting against malicious activity. IDS is important in developing advanced security models. This study reviews the importance of various techniques, tools, and methods used in IoT detection and/or prevention systems. Specifically, it focuses on machine learning (ML) and deep learning (DL) techniques for IDS. This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles. To speed… More >

  • Open Access

    ARTICLE

    Micro-Locational Fine Dust Prediction Utilizing Machine Learning and Deep Learning Models

    Seoyun Kim1,#, Hyerim Yu2,#, Jeewoo Yoon1,3, Eunil Park1,2,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.041575

    Abstract Given the increasing number of countries reporting degraded air quality, effective air quality monitoring has become a critical issue in today’s world. However, the current air quality observatory systems are often prohibitively expensive, resulting in a lack of observatories in many regions within a country. Consequently, a significant problem arises where not every region receives the same level of air quality information. This disparity occurs because some locations have to rely on information from observatories located far away from their regions, even if they may be the closest available options. To address this challenge, a novel approach that leverages machine… More >

  • Open Access

    ARTICLE

    Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network

    R. Sangeetha, Usha Devi Gandhi*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.041217

    Abstract Wireless Body Area Network (WBAN) is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body. WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature, blood pressure, pulse rate, oxygen level, body motion, and so on. They sense the data and communicate it to the Body Area Network (BAN) Coordinator. The main challenge for the WBAN is energy consumption. These issues can be addressed by implementing an effective Medium Access Control (MAC) protocol that reduces energy consumption and increases network lifetime. The purpose of… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Maddalah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwali4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Mask Identification System Using ResNet Transfer Learning Architecture

    Arpit Jain1, Nageswara Rao Moparthi1, A. Swathi2, Yogesh Kumar Sharma1, Nitin Mittal3, Ahmed Alhussen4, Zamil S. Alzamil5,*, MohdAnul Haq5

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.036973

    Abstract Recently, the coronavirus disease 2019 has shown excellent attention in the global community regarding health and the economy. World Health Organization (WHO) and many others advised controlling Corona Virus Disease in 2019. The limited treatment resources, medical resources, and unawareness of immunity is an essential horizon to unfold. Among all resources, wearing a mask is the primary non-pharmaceutical intervention to stop the spreading of the virus caused by Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) droplets. All countries made masks mandatory to prevent infection. For such enforcement, automatic and effective face detection systems are crucial. This study presents a face… More >

  • Open Access

    ARTICLE

    Movement Function Assessment Based on Human Pose Estimation from Multi-View

    Lingling Chen1,2,*, Tong Liu1, Zhuo Gong1, Ding Wang1

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.037865

    Abstract Human pose estimation is a basic and critical task in the field of computer vision that involves determining the position (or spatial coordinates) of the joints of the human body in a given image or video. It is widely used in motion analysis, medical evaluation, and behavior monitoring. In this paper, the authors propose a method for multi-view human pose estimation. Two image sensors were placed orthogonally with respect to each other to capture the pose of the subject as they moved, and this yielded accurate and comprehensive results of three-dimensional (3D) motion reconstruction that helped capture their multi-directional poses.… More >

  • Open Access

    ARTICLE

    SwinVid: Enhancing Video Object Detection Using Swin Transformer

    Abdelrahman Maharek1,2,*, Amr Abozeid2,3, Rasha Orban1, Kamal ElDahshan2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.039436

    Abstract What causes object detection in video to be less accurate than it is in still images? Because some video frames have degraded in appearance from fast movement, out-of-focus camera shots, and changes in posture. These reasons have made video object detection (VID) a growing area of research in recent years. Video object detection can be used for various healthcare applications, such as detecting and tracking tumors in medical imaging, monitoring the movement of patients in hospitals and long-term care facilities, and analyzing videos of surgeries to improve technique and training. Additionally, it can be used in telemedicine to help diagnose… More >

  • Open Access

    ARTICLE

    Performance Enhancement of XML Parsing Using Regression and Parallelism

    Muhammad Ali, Minhaj Ahmad Khan*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.043010

    Abstract The Extensible Markup Language (XML) files, widely used for storing and exchanging information on the web require efficient parsing mechanisms to improve the performance of the applications. With the existing Document Object Model (DOM) based parsing, the performance degrades due to sequential processing and large memory requirements, thereby requiring an efficient XML parser to mitigate these issues. In this paper, we propose a Parallel XML Tree Generator (PXTG) algorithm for accelerating the parsing of XML files and a Regression-based XML Parsing Framework (RXPF) that analyzes and predicts performance through profiling, regression, and code generation for efficient parsing. The PXTG algorithm… More >

Displaying 21-30 on page 3 of 71. Per Page