Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Fire Hawk Optimizer with Deep Learning Enabled Human Activity Recognition

    Mohammed Alonazi1, Mrim M. Alnfiai2,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3135-3150, 2023, DOI:10.32604/csse.2023.034124

    Abstract Human-Computer Interaction (HCI) is a sub-area within computer science focused on the study of the communication between people (users) and computers and the evaluation, implementation, and design of user interfaces for computer systems. HCI has accomplished effective incorporation of the human factors and software engineering of computing systems through the methods and concepts of cognitive science. Usability is an aspect of HCI dedicated to guaranteeing that human–computer communication is, amongst other things, efficient, effective, and sustaining for the user. Simultaneously, Human activity recognition (HAR) aim is to identify actions from a sequence of observations on the activities of subjects and… More >

  • Open Access

    ARTICLE

    Eye Detection-Based Deep Belief Neural Networks and Speeded-Up Robust Feature Algorithm

    Zahraa Tarek1, Samaa M. Shohieb1,*, Abdelghafar M. Elhady2, El-Sayed M. El-kenawy3, Mahmoud Y. Shams4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3195-3213, 2023, DOI:10.32604/csse.2023.034092

    Abstract The ability to detect and localize the human eye is critical for use in security applications and human identification and verification systems. This is because eye recognition algorithms have multiple challenges, such as multi-pose variations, ocular parts, and illumination. Moreover, the modern security applications fail to detect facial expressions from eye images. In this paper, a Speeded-Up Roust Feature (SURF) Algorithm was utilized to localize the face images of the enrolled subjects. We highlighted on eye and pupil parts to be detected based on SURF, Hough Circle Transform (HCT), and Local Binary Pattern (LBP). Afterward, Deep Belief Neural Networks (DBNN)… More >

  • Open Access

    ARTICLE

    Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection

    Fatma S. Alrayes1, Najm Alotaibi2, Jaber S. Alzahrani3, Sana Alazwari4, Areej Alhogail5, Ali M. Al-Sharafi6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3037-3052, 2023, DOI:10.32604/csse.2023.033970

    Abstract Recent developments in computer networks and Internet of Things (IoT) have enabled easy access to data. But the government and business sectors face several difficulties in resolving cybersecurity network issues, like novel attacks, hackers, internet criminals, and so on. Presently, malware attacks and software piracy pose serious risks in compromising the security of IoT. They can steal confidential data which results in financial and reputational losses. The advent of machine learning (ML) and deep learning (DL) models has been employed to accomplish security in the IoT cloud environment. This article presents an Enhanced Artificial Gorilla Troops Optimizer with Deep Learning… More >

  • Open Access

    ARTICLE

    Convolutional Deep Belief Network Based Short Text Classification on Arabic Corpus

    Abdelwahed Motwakel1,*, Badriyya B. Al-onazi2, Jaber S. Alzahrani3, Radwa Marzouk4, Amira Sayed A. Aziz5, Abu Sarwar Zamani1, Ishfaq Yaseen1, Amgad Atta Abdelmageed1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3097-3113, 2023, DOI:10.32604/csse.2023.033945

    Abstract With a population of 440 million, Arabic language users form the rapidly growing language group on the web in terms of the number of Internet users. 11 million monthly Twitter users were active and posted nearly 27.4 million tweets every day. In order to develop a classification system for the Arabic language there comes a need of understanding the syntactic framework of the words thereby manipulating and representing the words for making their classification effective. In this view, this article introduces a Dolphin Swarm Optimization with Convolutional Deep Belief Network for Short Text Classification (DSOCDBN-STC) model on Arabic Corpus. The… More >

  • Open Access

    ARTICLE

    New Trends in the Modeling of Diseases Through Computational Techniques

    Nesreen Althobaiti1, Ali Raza2,*, Arooj Nasir3,4, Jan Awrejcewicz5, Muhammad Rafiq6, Nauman Ahmed7, Witold Pawłowski8, Muhammad Jawaz7, Emad E. Mahmoud1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2935-2951, 2023, DOI:10.32604/csse.2023.033935

    Abstract The computational techniques are a set of novel problem-solving methodologies that have attracted wider attention for their excellent performance. The handling strategies of real-world problems are artificial neural networks (ANN), evolutionary computing (EC), and many more. An estimated fifty thousand to ninety thousand new leishmaniasis cases occur annually, with only 25% to 45% reported to the World Health Organization (WHO). It remains one of the top parasitic diseases with outbreak and mortality potential. In 2020, more than ninety percent of new cases reported to World Health Organization (WHO) occurred in ten countries: Brazil, China, Ethiopia, Eritrea, India, Kenya, Somalia, South… More >

  • Open Access

    ARTICLE

    RMCARTAM For DDoS Attack Mitigation in SDN Using Machine Learning

    M. Revathi, V. V. Ramalingam*, B. Amutha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3023-3036, 2023, DOI:10.32604/csse.2023.033600

    Abstract The impact of a Distributed Denial of Service (DDoS) attack on Software Defined Networks (SDN) is briefly analyzed. Many approaches to detecting DDoS attacks exist, varying on the feature being considered and the method used. Still, the methods have a deficiency in the performance of detecting DDoS attacks and mitigating them. To improve the performance of SDN, an efficient Real-time Multi-Constrained Adaptive Replication and Traffic Approximation Model (RMCARTAM) is sketched in this article. The RMCARTAM considers different parameters or constraints in running different controllers responsible for handling incoming packets. The model is designed with multiple controllers to handle network traffic… More >

  • Open Access

    ARTICLE

    3D Echocardiogram Reconstruction Employing a Flip Directional Texture Pyramid

    C. Preethi*, M. Mohamed Sathik, S. Shajun Nisha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2971-2988, 2023, DOI:10.32604/csse.2023.033423

    Abstract Three dimensional (3D) echocardiogram enables cardiologists to visualize suspicious cardiac structures in detail. In recent years, this three-dimensional echocardiogram carries important clinical value in virtual surgical simulation. However, this 3D echocardiogram involves a trade-off difficulty between accuracy and efficient computation in clinical diagnosis. This paper presents a novel Flip Directional 3D Volume Reconstruction (FD-3DVR) method for the reconstruction of echocardiogram images. The proposed method consists of two main steps: multiplanar volumetric imaging and 3D volume reconstruction. In the creation of multiplanar volumetric imaging, two-dimensional (2D) image pixels are mapped into voxels of the volumetric grid. As the obtained slices are… More >

  • Open Access

    ARTICLE

    Applying Wide & Deep Learning Model for Android Malware Classification

    Le Duc Thuan1,2,*, Pham Van Huong2, Hoang Van Hiep1, Nguyen Kim Khanh1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2741-2759, 2023, DOI:10.32604/csse.2023.033420

    Abstract Android malware has exploded in popularity in recent years, due to the platform’s dominance of the mobile market. With the advancement of deep learning technology, numerous deep learning-based works have been proposed for the classification of Android malware. Deep learning technology is designed to handle a large amount of raw and continuous data, such as image content data. However, it is incompatible with discrete features, i.e., features gathered from multiple sources. Furthermore, if the feature set is already well-extracted and sparsely distributed, this technology is less effective than traditional machine learning. On the other hand, a wide learning model can… More >

  • Open Access

    ARTICLE

    Android IoT Lifelog System and Its Application to Motion Inference

    Munkhtsetseg1, Jeongwook Seo2,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2989-3003, 2023, DOI:10.32604/csse.2023.033342

    Abstract In social science, health care, digital therapeutics, etc., smartphone data have played important roles to infer users’ daily lives. However, smartphone data collection systems could not be used effectively and widely because they did not exploit any Internet of Things (IoT) standards (e.g., oneM2M) and class labeling methods for machine learning (ML) services. Therefore, in this paper, we propose a novel Android IoT lifelog system complying with oneM2M standards to collect various lifelog data in smartphones and provide two manual and automated class labeling methods for inference of users’ daily lives. The proposed system consists of an Android IoT client… More >

  • Open Access

    ARTICLE

    A Novel Approximate Message Passing Detection for Massive MIMO 5G System

    Nidhi Gour1, Rajneesh Pareek1, Karthikeyan Rajagopal2,3, Himanshu Sharma1, Mrim M. Alnfiai4, Mohammed A. AlZain4, Mehedi Masud5, Arun Kumar6,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2827-2835, 2023, DOI:10.32604/csse.2023.033341

    Abstract Massive-Multiple Inputs and Multiple Outputs (M-MIMO) is considered as one of the standard techniques in improving the performance of Fifth Generation (5G) radio. 5G signal detection with low propagation delay and high throughput with minimum computational intricacy are some of the serious concerns in the deployment of 5G. The evaluation of 5G promises a high quality of service (QoS), a high data rate, low latency, and spectral efficiency, ensuring several applications that will improve the services in every sector. The existing detection techniques cannot be utilised in 5G and beyond 5G due to the high complexity issues in their implementation.… More >

Displaying 441-450 on page 45 of 1407. Per Page