Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Harris Hawks Optimizer with Graph Convolutional Network Based Weed Detection in Precision Agriculture

    Saud Yonbawi1, Sultan Alahmari2, T. Satyanarayana Murthy3, Padmakar Maddala4, E. Laxmi Lydia5, Seifedine Kadry6,7,8,*, Jungeun Kim9

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1533-1547, 2023, DOI:10.32604/csse.2023.036296

    Abstract Precision agriculture includes the optimum and adequate use of resources depending on several variables that govern crop yield. Precision agriculture offers a novel solution utilizing a systematic technique for current agricultural problems like balancing production and environmental concerns. Weed control has become one of the significant problems in the agricultural sector. In traditional weed control, the entire field is treated uniformly by spraying the soil, a single herbicide dose, weed, and crops in the same way. For more precise farming, robots could accomplish targeted weed treatment if they could specifically find the location of the dispensable plant and identify the… More >

  • Open Access

    ARTICLE

    A Multimodel Transfer-Learning-Based Car Price Prediction Model with an Automatic Fuzzy Logic Parameter Optimizer

    Ping-Huan Kuo1,2, Sing-Yan Chen1, Her-Terng Yau1,2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1577-1596, 2023, DOI:10.32604/csse.2023.036292

    Abstract Cars are regarded as an indispensable means of transportation in Taiwan. Several studies have indicated that the automotive industry has witnessed remarkable advances and that the market of used cars has rapidly expanded. In this study, a price prediction system for used BMW cars was developed. Nine parameters of used cars, including their model, registration year, and transmission style, were analyzed. The data obtained were then divided into three subsets. The first subset was used to compare the results of each algorithm. The predicted values produced by the two algorithms with the most satisfactory results were used as the input… More >

  • Open Access

    ARTICLE

    SRC: Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC

    Basanta Kumar Swain1, Mohammad Zubair Khan2,*, Chiranji Lal Chowdhary3, Abdullah Alsaeedi4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2337-2349, 2023, DOI:10.32604/csse.2023.036192

    Abstract This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients (GFCC) for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hunting optimization and artificial neural network (DHO-ANN). The noisy crowdsourced cough datasets were collected from the public domain. This research work claimed that the GFCC yielded better results in terms of COVID-19 detection as compared to the widely used Mel-frequency cepstral coefficient in noisy crowdsourced speech corpora. The proposed algorithm's performance for detecting COVID-19 disease is rigorously validated using statistical measures, F1 score, confusion matrix, specificity, and sensitivity parameters. Besides,… More >

  • Open Access

    ARTICLE

    Human Personality Assessment Based on Gait Pattern Recognition Using Smartphone Sensors

    Kainat Ibrar1, Abdul Muiz Fayyaz1, Muhammad Attique Khan2, Majed Alhaisoni3, Usman Tariq4, Seob Jeon5, Yunyoung Nam6,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2351-2368, 2023, DOI:10.32604/csse.2023.036185

    Abstract Human personality assessment using gait pattern recognition is one of the most recent and exciting research domains. Gait is a person’s identity that can reflect reliable information about his mood, emotions, and substantial personality traits under scrutiny. This research focuses on recognizing key personality traits, including neuroticism, extraversion, openness to experience, agreeableness, and conscientiousness, in line with the big-five model of personality. We inferred personality traits based on the gait pattern recognition of individuals utilizing built-in smartphone sensors. For experimentation, we collected a novel dataset of 22 participants using an android application and further segmented it into six data chunks… More >

  • Open Access

    ARTICLE

    Designing Adaptive Multiple Dependent State Sampling Plan for Accelerated Life Tests

    Pramote Charongrattanasakul1, Wimonmas Bamrungsetthapong2,*, Poom Kumam3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1631-1651, 2023, DOI:10.32604/csse.2023.036179

    Abstract A novel adaptive multiple dependent state sampling plan (AMDSSP) was designed to inspect products from a continuous manufacturing process under the accelerated life test (ALT) using both double sampling plan (DSP) and multiple dependent state sampling plan (MDSSP) concepts. Under accelerated conditions, the lifetime of a product follows the Weibull distribution with a known shape parameter, while the scale parameter can be determined using the acceleration factor (AF). The Arrhenius model is used to estimate AF when the damaging process is temperature-sensitive. An economic design of the proposed sampling plan was also considered for the ALT. A genetic algorithm with… More >

  • Open Access

    ARTICLE

    Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm

    Mohammed S. Alshehri1, Sultan Almakdi1,*, Mimonah Al Qathrady2, Jawad Ahmad3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2401-2414, 2023, DOI:10.32604/csse.2023.036152

    Abstract Chaos-based cryptosystems are considered a secure mode of communication due to their reliability. Chaotic maps are associated with the other domains to construct robust encryption algorithms. There exist numerous encryption schemes in the literature based on chaotic maps. This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem. The core notion of the original algorithm was based on permutation and diffusion. A bit-level permutation approach was used to do the permutation row-and column-wise. The diffusion was executed in the forward and backward directions. The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted… More >

  • Open Access

    ARTICLE

    An Improved Reptile Search Algorithm Based on Cauchy Mutation for Intrusion Detection

    Salahahaldeen Duraibi*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2509-2525, 2023, DOI:10.32604/csse.2023.036119

    Abstract With the growth of the discipline of digital communication, the topic has acquired more attention in the cybersecurity medium. The Intrusion Detection (ID) system monitors network traffic to detect malicious activities. The paper introduces a novel Feature Selection (FS) approach for ID. Reptile Search Algorithm (RSA)—is a new optimization algorithm; in this method, each agent searches a new region according to the position of the host, which makes the algorithm suffers from getting stuck in local optima and a slow convergence rate. To overcome these problems, this study introduces an improved RSA approach by integrating Cauchy Mutation (CM) into the… More >

  • Open Access

    ARTICLE

    An Effective Diagnosis System for Brain Tumor Detection and Classification

    Ahmed A. Alsheikhy1,*, Ahmad S. Azzahrani1, A. Khuzaim Alzahrani2, Tawfeeq Shawly3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2021-2037, 2023, DOI:10.32604/csse.2023.036107

    Abstract A brain tumor is an excessive development of abnormal and uncontrolled cells in the brain. This growth is considered deadly since it may cause death. The brain controls numerous functions, such as memory, vision, and emotions. Due to the location, size, and shape of these tumors, their detection is a challenging and complex task. Several efforts have been conducted toward improved detection and yielded promising results and outcomes. However, the accuracy should be higher than what has been reached. This paper presents a method to detect brain tumors with high accuracy. The method works using an image segmentation technique and… More >

  • Open Access

    ARTICLE

    Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN

    Ahmed Najat Ahmed1, JinHyung Kim2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2527-2542, 2023, DOI:10.32604/csse.2023.036106

    Abstract In this current century, most industries are moving towards automation, where human intervention is dramatically reduced. This revolution leads to industrial revolution 4.0, which uses the Internet of Things (IoT) and wireless sensor networks (WSN). With its associated applications, this IoT device is used to compute the received WSN data from devices and transfer it to remote locations for assistance. In general, WSNs, the gateways are a long distance from the base station (BS) and are communicated through the gateways nearer to the BS. At the gateway, which is closer to the BS, energy drains faster because of the heavy… More >

  • Open Access

    ARTICLE

    Adaptive Weighted Flow Net Algorithm for Human Activity Recognition Using Depth Learned Features

    G. Augusta Kani*, P. Geetha

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1447-1469, 2023, DOI:10.32604/csse.2023.035969

    Abstract Human Activity Recognition (HAR) from video data collections is the core application in vision tasks and has a variety of utilizations including object detection applications, video-based behavior monitoring, video classification, and indexing, patient monitoring, robotics, and behavior analysis. Although many techniques are available for HAR in video analysis tasks, most of them are not focusing on behavioral analysis. Hence, a new HAR system analysis the behavioral activity of a person based on the deep learning approach proposed in this work. The most essential aim of this work is to recognize the complex activities that are useful in many tasks that… More >

Displaying 291-300 on page 30 of 1407. Per Page