Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    3D Object Detection with Attention: Shell-Based Modeling

    Xiaorui Zhang1,2,3,4,*, Ziquan Zhao1, Wei Sun4,5, Qi Cui6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 537-550, 2023, DOI:10.32604/csse.2023.034230

    Abstract LIDAR point cloud-based 3D object detection aims to sense the surrounding environment by anchoring objects with the Bounding Box (BBox). However, under the three-dimensional space of autonomous driving scenes, the previous object detection methods, due to the pre-processing of the original LIDAR point cloud into voxels or pillars, lose the coordinate information of the original point cloud, slow detection speed, and gain inaccurate bounding box positioning. To address the issues above, this study proposes a new two-stage network structure to extract point cloud features directly by PointNet++, which effectively preserves the original point cloud coordinate information. To improve the detection… More >

  • Open Access

    ARTICLE

    A Novel Gradient Boosted Energy Optimization Model (GBEOM) for MANET

    Neenavath Veeraiah1,*, Youseef Alotaibi2, Saleh Alghamdi3, Satish Thatavarti4

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 637-657, 2023, DOI:10.32604/csse.2023.034224

    Abstract Mobile Ad Hoc Network (MANET) is an infrastructure-less network that is comprised of a set of nodes that move randomly. In MANET, the overall performance is improved through multipath multicast routing to achieve the quality of service (quality of service). In this, different nodes are involved in the information data collection and transmission to the destination nodes in the network. The different nodes are combined and presented to achieve energy-efficient data transmission and classification of the nodes. The route identification and routing are established based on the data broadcast by the network nodes. In transmitting the data packet, evaluating the… More >

  • Open Access

    ARTICLE

    Coot Optimization with Deep Learning-Based False Data Injection Attack Recognition

    T. Satyanarayana Murthy1, P. Udayakumar2, Fayadh Alenezi3, E. Laxmi Lydia4, Mohamad Khairi Ishak5,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 255-271, 2023, DOI:10.32604/csse.2023.034193

    Abstract The recent developments in smart cities pose major security issues for the Internet of Things (IoT) devices. These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers. Cyber-attackers take advantage of such gadgets’ vulnerabilities through various attacks such as injection and Distributed Denial of Service (DDoS) attacks. In this background, Intrusion Detection (ID) is the only way to identify the attacks and mitigate their damage. The recent advancements in Machine Learning (ML) and Deep Learning (DL) models are useful in effectively classifying cyber-attacks. The current research paper introduces a new Coot Optimization Algorithm… More >

  • Open Access

    ARTICLE

    SNELM: SqueezeNet-Guided ELM for COVID-19 Recognition

    Yudong Zhang1, Muhammad Attique Khan2, Ziquan Zhu1, Shuihua Wang1,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 13-26, 2023, DOI:10.32604/csse.2023.034172

    Abstract (Aim) The COVID-19 has caused 6.26 million deaths and 522.06 million confirmed cases till 17/May/2022. Chest computed tomography is a precise way to help clinicians diagnose COVID-19 patients. (Method) Two datasets are chosen for this study. The multiple-way data augmentation, including speckle noise, random translation, scaling, salt-and-pepper noise, vertical shear, Gamma correction, rotation, Gaussian noise, and horizontal shear, is harnessed to increase the size of the training set. Then, the SqueezeNet (SN) with complex bypass is used to generate SN features. Finally, the extreme learning machine (ELM) is used to serve as the classifier due to its simplicity of usage,… More >

  • Open Access

    ARTICLE

    An Efficient Intrusion Detection Framework for Industrial Internet of Things Security

    Samah Alshathri1, Ayman El-Sayed2, Walid El-Shafai3,4,*, Ezz El-Din Hemdan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 819-834, 2023, DOI:10.32604/csse.2023.034095

    Abstract Recently, the Internet of Things (IoT) has been used in various applications such as manufacturing, transportation, agriculture, and healthcare that can enhance efficiency and productivity via an intelligent management console remotely. With the increased use of Industrial IoT (IIoT) applications, the risk of brutal cyber-attacks also increased. This leads researchers worldwide to work on developing effective Intrusion Detection Systems (IDS) for IoT infrastructure against any malicious activities. Therefore, this paper provides effective IDS to detect and classify unpredicted and unpredictable severe attacks in contradiction to the IoT infrastructure. A comprehensive evaluation examined on a new available benchmark TON_IoT dataset is… More >

  • Open Access

    ARTICLE

    Optimization of Interactive Videos Empowered the Experience of Learning Management System

    Muhammad Akram1, Muhammad Waseem Iqbal2,*, M. Usman Ashraf3, Erssa Arif1, Khalid Alsubhi4, Hani Moaiteq Aljahdali5

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1021-1038, 2023, DOI:10.32604/csse.2023.034085

    Abstract The Learning management system (LMS) is now being used for uploading educational content in both distance and blended setups. LMS platform has two types of users: the educators who upload the content, and the students who have to access the content. The students, usually rely on text notes or books and video tutorials while their exams are conducted with formal methods. Formal assessments and examination criteria are ineffective with restricted learning space which makes the student tend only to read the educational contents and videos instead of interactive mode. The aim is to design an interactive LMS and examination video-based… More >

  • Open Access

    ARTICLE

    IoT-Driven Optimal Lightweight RetinaNet-Based Object Detection for Visually Impaired People

    Mesfer Alduhayyem1,*, Mrim M. Alnfiai2,3, Nabil Almalki4, Fahd N. Al-Wesabi5, Anwer Mustafa Hilal6, Manar Ahmed Hamza6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 475-489, 2023, DOI:10.32604/csse.2023.034067

    Abstract Visual impairment is one of the major problems among people of all age groups across the globe. Visually Impaired Persons (VIPs) require help from others to carry out their day-to-day tasks. Since they experience several problems in their daily lives, technical intervention can help them resolve the challenges. In this background, an automatic object detection tool is the need of the hour to empower VIPs with safe navigation. The recent advances in the Internet of Things (IoT) and Deep Learning (DL) techniques make it possible. The current study proposes IoT-assisted Transient Search Optimization with a Lightweight RetinaNet-based object detection (TSOLWR-ODVIP)… More >

  • Open Access

    ARTICLE

    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the… More >

  • Open Access

    ARTICLE

    Byte-Level Function-Associated Method for Malware Detection

    Jingwei Hao*, Senlin Luo, Limin Pan

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 719-734, 2023, DOI:10.32604/csse.2023.033923

    Abstract The byte stream is widely used in malware detection due to its independence of reverse engineering. However, existing methods based on the byte stream implement an indiscriminate feature extraction strategy, which ignores the byte function difference in different segments and fails to achieve targeted feature extraction for various byte semantic representation modes, resulting in byte semantic confusion. To address this issue, an enhanced adversarial byte function associated method for malware backdoor attack is proposed in this paper by categorizing various function bytes into three functions involving structure, code, and data. The Minhash algorithm, grayscale mapping, and state transition probability statistics… More >

  • Open Access

    ARTICLE

    Improving QoS Using Mobility-Based Optimized Multipath Routing Protocol in MANET

    S. J. Sangeetha1,*, T. Rajendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1169-1181, 2023, DOI:10.32604/csse.2023.033392

    Abstract Mobile Ad-hoc Networks (MANETs) connect numerous nodes to communicate data from the sender node to the target node. Due to the lack of an infrastructure network, mobile nodes communicate through wireless without an access point. MANET does not have a centralized controller and has a dynamic network topology, which increases link failure and energy consumption resulting in excessive path delay, loss of Quality of service (QoS), and reduced throughput during data communication. Congestion is a significant problem when the QoS of the link carrying the data is degraded. Routing is one of the vital challenges of MANET due to the… More >

Displaying 401-410 on page 41 of 1407. Per Page