Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Deep Learning Framework for the Prediction of Childhood Medulloblastoma

    M. Muthalakshmi1,*, T. Merlin Inbamalar2, C. Chandravathi3, K. Saravanan4

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 735-747, 2023, DOI:10.32604/csse.2023.032449

    Abstract This research work develops new and better prognostic markers for predicting Childhood MedulloBlastoma (CMB) using a well-defined deep learning architecture. A deep learning architecture could be designed using ideas from image processing and neural networks to predict CMB using histopathological images. First, a convolution process transforms the histopathological image into deep features that uniquely describe it using different two-dimensional filters of various sizes. A 10-layer deep learning architecture is designed to extract deep features. The introduction of pooling layers in the architecture reduces the feature dimension. The extracted and dimension-reduced deep features from the arrangement of convolution layers and pooling… More >

  • Open Access

    ARTICLE

    Video Transmission Secrecy Improvement Based on Fractional Order Hyper Chaotic System

    S. Kayalvizhi*, S. Malarvizhi

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1201-1214, 2023, DOI:10.32604/csse.2023.032381

    Abstract In the Digital World scenario, the confidentiality of information in video transmission plays an important role. Chaotic systems have been shown to be effective for video signal encryption. To improve video transmission secrecy, compressive encryption method is proposed to accomplish compression and encryption based on fractional order hyper chaotic system that incorporates Compressive Sensing (CS), pixel level, bit level scrambling and nucleotide Sequences operations. The measurement matrix generates by the fractional order hyper chaotic system strengthens the efficiency of the encryption process. To avoid plain text attack, the CS measurement is scrambled to its pixel level, bit level scrambling decreases… More >

  • Open Access

    ARTICLE

    Detection of Abnormal Network Traffic Using Bidirectional Long Short-Term Memory

    Nga Nguyen Thi Thanh, Quang H. Nguyen*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 491-504, 2023, DOI:10.32604/csse.2023.032107

    Abstract Nowadays, web systems and servers are constantly at great risk from cyberattacks. This paper proposes a novel approach to detecting abnormal network traffic using a bidirectional long short-term memory (LSTM) network in combination with the ensemble learning technique. First, the binary classification module was used to detect the current abnormal flow. Then, the abnormal flows were fed into the multilayer classification module to identify the specific type of flow. In this research, a deep learning bidirectional LSTM model, in combination with the convolutional neural network and attention technique, was deployed to identify a specific attack. To solve the real-time intrusion-detecting… More >

  • Open Access

    ARTICLE

    Efficient Crack Severity Level Classification Using Bilayer Detection for Building Structures

    M. J. Anitha1,*, R. Hemalatha2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1183-1200, 2023, DOI:10.32604/csse.2023.031888

    Abstract Detection of cracks at the early stage is considered as very constructive since precautionary steps need to be taken to avoid the damage to the civil structures. Moreover, identifying and classifying the severity level of cracks is inevitable in order to find the stability of buildings. Hence, this paper proposes an efficient strategy to classify the cracks into fine, medium, and thick using a novel bilayer crack detection algorithm. The bilayer crack detection algorithm helps in extracting the requisite features from the crack for efficient classification. The proposed algorithm works well in the dark background and connects the discontinued cracks… More >

  • Open Access

    ARTICLE

    A Deep Learning Model to Analyse Social-Cyber Psychological Problems in Youth

    Ali Alqazzaz1, Mohammad Tabrez Quasim1,*, Mohammed Mujib Alshahrani1, Ibrahim Alrashdi2, Mohammad Ayoub Khan1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 551-562, 2023, DOI:10.32604/csse.2023.031048

    Abstract Facebook, Twitter, Instagram, and other social media have emerged as excellent platforms for interacting with friends and expressing thoughts, posts, comments, images, and videos that express moods, sentiments, and feelings. With this, it has become possible to examine user thoughts and feelings in social network data to better understand their perspectives and attitudes. However, the analysis of depression based on social media has gained widespread acceptance worldwide, other verticals still have yet to be discovered. The depression analysis uses Twitter data from a publicly available web source in this work. To assess the accuracy of depression detection, long-short-term memory (LSTM)… More >

  • Open Access

    ARTICLE

    Efficient Energy and Delay Reduction Model for Wireless Sensor Networks

    Arslan Iftikhar1, M. A. Elmagzoub2, Ansar Munir1,*, Hamad Abosaq Al Salem2, Mahmood ul Hassan3, Jarallah Alqahtani2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1153-1168, 2023, DOI:10.32604/csse.2023.030802

    Abstract In every network, delay and energy are crucial for communication and network life. In wireless sensor networks, many tiny nodes create networks with high energy consumption and compute routes for better communication. Wireless Sensor Networks (WSN) is a very complex scenario to compute minimal delay with data aggregation and energy efficiency. In this research, we compute minimal delay and energy efficiency for improving the quality of service of any WSN. The proposed work is based on energy and distance parameters as taken dependent variables with data aggregation. Data aggregation performs on different models, namely Hybrid-Low Energy Adaptive Clustering Hierarchy (H-LEACH),… More >

  • Open Access

    ARTICLE

    Automated White Blood Cell Disease Recognition Using Lightweight Deep Learning

    Abdullah Alqahtani1, Shtwai Alsubai1, Mohemmed Sha1,*, Muhammad Attique Khan2, Majed Alhaisoni3, Syed Rameez Naqvi2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 107-123, 2023, DOI:10.32604/csse.2023.030727

    Abstract White blood cells (WBC) are immune system cells, which is why they are also known as immune cells. They protect the human body from a variety of dangerous diseases and outside invaders. The majority of WBCs come from red bone marrow, although some come from other important organs in the body. Because manual diagnosis of blood disorders is difficult, it is necessary to design a computerized technique. Researchers have introduced various automated strategies in recent years, but they still face several obstacles, such as imbalanced datasets, incorrect feature selection, and incorrect deep model selection. We proposed an automated deep learning… More >

  • Open Access

    ARTICLE

    Hash-Indexing Block-Based Deduplication Algorithm for Reducing Storage in the Cloud

    D. Viji*, S. Revathy

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 27-42, 2023, DOI:10.32604/csse.2023.030259

    Abstract Cloud storage is essential for managing user data to store and retrieve from the distributed data centre. The storage service is distributed as pay a service for accessing the size to collect the data. Due to the massive amount of data stored in the data centre containing similar information and file structures remaining in multi-copy, duplication leads to increase storage space. The potential deduplication system doesn’t make efficient data reduction because of inaccuracy in finding similar data analysis. It creates a complex nature to increase the storage consumption under cost. To resolve this problem, this paper proposes an efficient storage… More >

  • Open Access

    ARTICLE

    Implementation of ID-based Audit Protocols to Enhance Security and Productivity

    R. Hariharan1,*, G. Komarasamy2, S. Daniel Madan Raja3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 873-882, 2023, DOI:10.32604/csse.2023.029899

    Abstract Cloud storage has gained increasing popularity, as it helps cloud users arbitrarily store and access the related outsourced data. Numerous public audit buildings have been presented to ensure data transparency. However, modern developments have mostly been constructed on the public key infrastructure. To achieve data integrity, the auditor must first authenticate the legality of the public key certificate, which adds to an immense workload for the auditor, in order to ensure that data integrity is accomplished. The data facilities anticipate that the storage data quality should be regularly tracked to minimize disruption to the saved data in order to maintain… More >

  • Open Access

    ARTICLE

    Alpha Fusion Adversarial Attack Analysis Using Deep Learning

    Mohibullah Khan1, Ata Ullah1, Isra Naz2, Sajjad Haider1, Nz Jhanji3,*, Mohammad Shorfuzzaman4, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 461-473, 2023, DOI:10.32604/csse.2023.029642

    Abstract The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for… More >

Displaying 421-430 on page 43 of 1407. Per Page