Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    An Improved Deep Structure for Accurately Brain Tumor Recognition

    Mohamed Maher Ata1, Reem N. Yousef2, Faten Khalid Karim3,*, Doaa Sami Khafaga3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1597-1616, 2023, DOI:10.32604/csse.2023.034375

    Abstract Brain neoplasms are recognized with a biopsy, which is not commonly done before decisive brain surgery. By using Convolutional Neural Networks (CNNs) and textural features, the process of diagnosing brain tumors by radiologists would be a noninvasive procedure. This paper proposes a features fusion model that can distinguish between no tumor and brain tumor types via a novel deep learning structure. The proposed model extracts Gray Level Co-occurrence Matrix (GLCM) textural features from MRI brain tumor images. Moreover, a deep neural network (DNN) model has been proposed to select the most salient features from the GLCM. Moreover, it manipulates the… More >

  • Open Access

    ARTICLE

    Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model

    R. Sheeba1,*, R. Sharmila2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1415-1429, 2023, DOI:10.32604/csse.2023.034321

    Abstract Lately, the Internet of Things (IoT) application requires millions of structured and unstructured data since it has numerous problems, such as data organization, production, and capturing. To address these shortcomings, big data analytics is the most superior technology that has to be adapted. Even though big data and IoT could make human life more convenient, those benefits come at the expense of security. To manage these kinds of threats, the intrusion detection system has been extensively applied to identify malicious network traffic, particularly once the preventive technique fails at the level of endpoint IoT devices. As cyberattacks targeting IoT have… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A hidden message is first included… More >

  • Open Access

    ARTICLE

    Advance IoT Intelligent Healthcare System for Lung Disease Classification Using Ensemble Techniques

    J. Prabakaran1,*, P. Selvaraj2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2141-2157, 2023, DOI:10.32604/csse.2023.034210

    Abstract In healthcare systems, the Internet of Things (IoT) innovation and development approached new ways to evaluate patient data. A cloud-based platform tends to process data generated by IoT medical devices instead of high storage, and computational hardware. In this paper, an intelligent healthcare system has been proposed for the prediction and severity analysis of lung disease from chest computer tomography (CT) images of patients with pneumonia, Covid-19, tuberculosis (TB), and cancer. Firstly, the CT images are captured and transmitted to the fog node through IoT devices. In the fog node, the image gets modified into a convenient and efficient format… More >

  • Open Access

    ARTICLE

    Diagnosis of Middle Ear Diseases Based on Convolutional Neural Network

    Yunyoung Nam1, Seong Jun Choi2, Jihwan Shin1, Jinseok Lee3,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1521-1532, 2023, DOI:10.32604/csse.2023.034192

    Abstract An otoscope is traditionally used to examine the eardrum and ear canal. A diagnosis of otitis media (OM) relies on the experience of clinicians. If an examiner lacks experience, the examination may be difficult and time-consuming. This paper presents an ear disease classification method using middle ear images based on a convolutional neural network (CNN). Especially the segmentation and classification networks are used to classify an otoscopic image into six classes: normal, acute otitis media (AOM), otitis media with effusion (OME), chronic otitis media (COM), congenital cholesteatoma (CC) and traumatic perforations (TMPs). The Mask R-CNN is utilized for the segmentation… More >

  • Open Access

    ARTICLE

    A Method for Classification and Evaluation of Pilot’s Mental States Based on CNN

    Qianlei Wang1,2,3,*, Zaijun Wang3, Renhe Xiong4, Xingbin Liao1,2, Xiaojun Tan5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1999-2020, 2023, DOI:10.32604/csse.2023.034183

    Abstract How to accurately recognize the mental state of pilots is a focus in civil aviation safety. The mental state of pilots is closely related to their cognitive ability in piloting. Whether the cognitive ability meets the standard is related to flight safety. However, the pilot's working state is unique, which increases the difficulty of analyzing the pilot's mental state. In this work, we proposed a Convolutional Neural Network (CNN) that merges attention to classify the mental state of pilots through electroencephalography (EEG). Considering the individual differences in EEG, semi-supervised learning based on improved K-Means is used in the model training… More >

  • Open Access

    ARTICLE

    Modified Garden Balsan Optimization Based Machine Learning for Intrusion Detection

    Mesfer Al Duhayyim1,*, Jaber S. Alzahrani2, Hanan Abdullah Mengash3, Mrim M. Alnfiai4, Radwa Marzouk3, Gouse Pasha Mohammed5, Mohammed Rizwanullah5, Amgad Atta Abdelmageed5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1471-1485, 2023, DOI:10.32604/csse.2023.034137

    Abstract The Internet of Things (IoT) environment plays a crucial role in the design of smart environments. Security and privacy are the major challenging problems that exist in the design of IoT-enabled real-time environments. Security susceptibilities in IoT-based systems pose security threats which affect smart environment applications. Intrusion detection systems (IDS) can be used for IoT environments to mitigate IoT-related security attacks which use few security vulnerabilities. This paper introduces a modified garden balsan optimization-based machine learning model for intrusion detection (MGBO-MLID) in the IoT cloud environment. The presented MGBO-MLID technique focuses on the identification and classification of intrusions in the… More >

  • Open Access

    ARTICLE

    An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection

    Deris Stiawan1, Ali Bardadi1, Nurul Afifah1, Lisa Melinda1, Ahmad Heryanto1, Tri Wanda Septian1, Mohd Yazid Idris2, Imam Much Ibnu Subroto3, Lukman4, Rahmat Budiarto5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1759-1774, 2023, DOI:10.32604/csse.2023.034047

    Abstract The Repository Mahasiswa (RAMA) is a national repository of research reports in the form of final assignments, student projects, theses, dissertations, and research reports of lecturers or researchers that have not yet been published in journals, conferences, or integrated books from the scientific repository of universities and research institutes in Indonesia. The increasing popularity of the RAMA Repository leads to security issues, including the two most widespread, vulnerable attacks i.e., Structured Query Language (SQL) injection and cross-site scripting (XSS) attacks. An attacker gaining access to data and performing unauthorized data modifications is extremely dangerous. This paper aims to provide an… More >

  • Open Access

    ARTICLE

    A Novel Explainable CNN Model for Screening COVID-19 on X-ray Images

    Hicham Moujahid1, Bouchaib Cherradi1,2,*, Oussama El Gannour1, Wamda Nagmeldin3, Abdelzahir Abdelmaboud4, Mohammed Al-Sarem5,6, Lhoussain Bahatti1, Faisal Saeed7, Mohammed Hadwan8,9

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1789-1809, 2023, DOI:10.32604/csse.2023.034022

    Abstract Due to the rapid propagation characteristic of the Coronavirus (COVID-19) disease, manual diagnostic methods cannot handle the large number of infected individuals to prevent the spread of infection. Despite, new automated diagnostic methods have been brought on board, particularly methods based on artificial intelligence using different medical data such as X-ray imaging. Thoracic imaging, for example, produces several image types that can be processed and analyzed by machine and deep learning methods. X-ray imaging materials widely exist in most hospitals and health institutes since they are affordable compared to other imaging machines. Through this paper, we propose a novel Convolutional… More >

  • Open Access

    ARTICLE

    Brain Tumor Identification Using Data Augmentation and Transfer Learning Approach

    K. Kavin Kumar1, P. M. Dinesh2, P. Rayavel3, L. Vijayaraja4, R. Dhanasekar4, Rupa Kesavan5, Kannadasan Raju6, Arfat Ahmad Khan7, Chitapong Wechtaisong8,*, Mohd Anul Haq9, Zamil S. Alzamil9, Ahmed Alhussen10

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1845-1861, 2023, DOI:10.32604/csse.2023.033927

    Abstract A brain tumor is a lethal neurological disease that affects the average performance of the brain and can be fatal. In India, around 15 million cases are diagnosed yearly. To mitigate the seriousness of the tumor it is essential to diagnose at the beginning. Notwithstanding, the manual evaluation process utilizing Magnetic Resonance Imaging (MRI) causes a few worries, remarkably inefficient and inaccurate brain tumor diagnoses. Similarly, the examination process of brain tumors is intricate as they display high unbalance in nature like shape, size, appearance, and location. Therefore, a precise and expeditious prognosis of brain tumors is essential for implementing… More >

Displaying 331-340 on page 34 of 1407. Per Page