Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (72)
  • Open Access

    ARTICLE

    Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks

    Nadir Omer1,*, Ahmed H. Samak2, Ahmed I. Taloba3,4, Rasha M. Abd El-Aziz3,5

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.039265

    Abstract Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone with malicious intent to steal data, destroy computer systems, or disrupt them. Due to rising cyber security concerns, cyber security has emerged as the key component in the fight against all online threats, forgeries, and assaults. A device capable of identifying network irregularities and cyber-attacks… More >

  • Open Access

    CORRECTION

    Correction: Learning-Based Metaheuristic Approach for Home Healthcare Optimization Problem

    Mariem Belhor1,2,3, Adnen El-Amraoui1,*, Abderrazak Jemai2, François Delmotte1

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.048573

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Heart Disease Prediction Using Convolutional Neural Network with Elephant Herding Optimization

    P. Nandakumar, R. Subhashini*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.042294

    Abstract Heart disease is a major cause of death for many people in the world. Each year the death rate of people affected with heart disease increased a lot. Machine learning models have been widely used for the prediction of heart disease from the different University of California Irvine (UCI) Machine Learning Repositories. But, due to certain data, it predicts less accurately, whereas, for large data, its sub-model deep learning is used. Our literature work has identified that only traditional methods are used for the prediction of heart disease. It will produce less accuracy. To produce more efficacy, Euclidean Distance was… More >

  • Open Access

    CORRECTION

    Correction: Prediction of Alzheimer’s Using Random Forest with Radiomic Features

    Anuj Singh*, Raman Kumar, Arvind Kumar Tiwari

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.047533

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Spatio Temporal Tourism Tracking System Based on Adaptive Convolutional Neural Network

    L. Maria Michael Visuwasam1,*, D. Paul Raj2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.047461

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Multi-Objective Genetic Algorithm Based Load Balancing Strategy for Health Monitoring Systems in Fog-Cloud

    Hayder Makki Shakir, Jaber Karimpour*, Jafar Razmara

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.038545

    Abstract As the volume of data and data-generating equipment in healthcare settings grows, so do issues like latency and inefficient processing inside health monitoring systems. The Internet of Things (IoT) has been used to create a wide variety of health monitoring systems. Most modern health monitoring solutions are based on cloud computing. However, large-scale deployment of latency-sensitive healthcare applications is hampered by the cloud’s design, which introduces significant delays during the processing of vast data volumes. By strategically positioning servers close to end users, fog computing mitigates latency issues and dramatically improves scaling on demand, resource accessibility, and security. In this… More >

  • Open Access

    ARTICLE

    An Efficient Character-Level Adversarial Attack Inspired by Textual Variations in Online Social Media Platforms

    Jebran Khan1, Kashif Ahmad2, Kyung-Ah Sohn1,3,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.040159

    Abstract In recent years, the growing popularity of social media platforms has led to several interesting natural language processing (NLP) applications. However, these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning (ML) and NLP techniques. This work presents a new low-level adversarial attack recipe inspired by textual variations in online social media communication. These variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible form. The intuition of the proposed scheme is to generate adversarial examples… More >

  • Open Access

    ARTICLE

    A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection

    Quan Zhou1,*, Yulong Zheng1, Minhui Chen2, Kaijun Wei2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.039908

    Abstract In recent years, the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention. To ensure privacy protection for both sides of the transaction, many researchers are using ring signature technology instead of the original signature technology. However, in practice, identifying the signer of an illegal blockchain transaction once it has been placed on the chain necessitates a signature technique that offers conditional anonymity. Some illegals can conduct illegal transactions and evade the law using ring signatures, which offer perfect anonymity. This paper firstly constructs a conditionally anonymous linkable ring signature using the Diffie-Hellman key… More >

  • Open Access

    REVIEW

    AI-Based UAV Swarms for Monitoring and Disease Identification of Brassica Plants Using Machine Learning: A Review

    Zain Anwar Ali1,2,*, Dingnan Deng1, Muhammad Kashif Shaikh3, Raza Hasan4, Muhammad Aamir Khan2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.041866

    Abstract Technological advances in unmanned aerial vehicles (UAVs) pursued by artificial intelligence (AI) are improving remote sensing applications in smart agriculture. These are valuable tools for monitoring and disease identification of plants as they can collect data with no damage and effects on plants. However, their limited carrying and battery capacities restrict their performance in larger areas. Therefore, using multiple UAVs, especially in the form of a swarm is more significant for monitoring larger areas such as crop fields and forests. The diversity of research studies necessitates a literature review for more progress and contribution in the agricultural field. In this… More >

  • Open Access

    ARTICLE

    Suspicious Activities Recognition in Video Sequences Using DarkNet-NasNet Optimal Deep Features

    Safdar Khan1, Muhammad Attique Khan2, Jamal Hussain Shah1,*, Faheem Shehzad2, Taerang Kim3, Jae-Hyuk Cha3

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.040410

    Abstract Human Suspicious Activity Recognition (HSAR) is a critical and active research area in computer vision that relies on artificial intelligence reasoning. Significant advances have been made in this field recently due to important applications such as video surveillance. In video surveillance, humans are monitored through video cameras when doing suspicious activities such as kidnapping, fighting, snatching, and a few more. Although numerous techniques have been introduced in the literature for routine human actions (HAR), very few studies are available for HSAR. This study proposes a deep convolutional neural network (CNN) and optimal featuresbased framework for HSAR in video frames. The… More >

Displaying 41-50 on page 5 of 72. Per Page