Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    GTCS-Vagus Nerve Stimulator Automation Using Private IoT-Blockchain Smartcontract

    G. Karthikeyan*, G. Kousalya

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1325-1340, 2023, DOI:10.32604/csse.2023.026356

    Abstract Generalized Tonic Clonic Seizure (GTCS) is a form of epileptic seizure in which a patient loses control over their entire body, ultimately leading to loss of consciousness. The Vagus Nerve Stimulator (VNS) is a tool/method for treating epileptic episodes that sends counter-electrical stimulations to the Vagus Nerve in order to mitigate epileptic signals from the brain. The machine is a stand-alone device that depends on human decision-making. The proposed framework uses an IoT and Blockchain oversight mechanism to augment the device's transparency. The system counteracts against false-activation by monitoring the patient's vitals through a smart watch and allows only legitimate… More >

  • Open Access

    ARTICLE

    Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy

    Chin-Feng Lee, Kuo-Chung Chan*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1551-1566, 2023, DOI:10.32604/csse.2023.026294

    Abstract Dual-image reversible data hiding (RDH) is a technique for hiding important messages. This technology can be used to safely deliver secret messages to the recipient through dual images in an open network without being easily noticed. The recipient of the image must receive the two stego-images before the secret message can be completely retrieved. Imperceptibility is one of the main advantages of data hiding technology; to increase the imperceptibility, the quality requirements of the stego-images are relatively important. A dual steganographic image RDH method, called a DS-CF scheme that can achieve a better steganographic image quality using the center folding… More >

  • Open Access

    ARTICLE

    Haemoglobin Measurement from Eye Anterior Ciliary Arteries through Borescope Camera

    Mohamed Abbas Ahamed Farook1,*, S. Rukmanidevi2, N. R. Shanker3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1763-1774, 2023, DOI:10.32604/csse.2023.026260

    Abstract Nowadays, smartphones are used as self-health monitoring devices for humans. Self-health monitoring devices help clinicians with big data for accurate diagnosis and guidance for treatment through repetitive measurement. Repetitive measurement of haemoglobin requires for pregnant women, pediatric, pulmonary hypertension and obstetric patients. Noninvasive haemoglobin measurement through conjunctiva leads to inaccurate measurement. The inaccuracy is due to a decrease in the density of goblet cells and acinar units in Meibomian glands in the human eye as age increases. Furthermore, conjunctivitis is a disease in the eye due to inflammation or infection at the conjunctiva. Conjunctivitis is in the form of lines… More >

  • Open Access

    ARTICLE

    Emotional Vietnamese Speech Synthesis Using Style-Transfer Learning

    Thanh X. Le, An T. Le, Quang H. Nguyen*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1263-1278, 2023, DOI:10.32604/csse.2023.026234

    Abstract In recent years, speech synthesis systems have allowed for the production of very high-quality voices. Therefore, research in this domain is now turning to the problem of integrating emotions into speech. However, the method of constructing a speech synthesizer for each emotion has some limitations. First, this method often requires an emotional-speech data set with many sentences. Such data sets are very time-intensive and labor-intensive to complete. Second, training each of these models requires computers with large computational capabilities and a lot of effort and time for model tuning. In addition, each model for each emotion failed to take advantage… More >

  • Open Access

    ARTICLE

    An Improved Multi-Objective Particle Swarm Optimization Routing on MANET

    G. Rajeshkumar1,*, M. Vinoth Kumar2, K. Sailaja Kumar3, Surbhi Bhatia4, Arwa Mashat5, Pankaj Dadheech6

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1187-1200, 2023, DOI:10.32604/csse.2023.026137

    Abstract A Mobile Ad hoc Network (MANET) is a group of low-power consumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized organization. The primary aim of MANETs is to extend flexibility into the self-directed, mobile, and wireless domain, in which a cluster of autonomous nodes forms a MANET routing system. An Intrusion Detection System (IDS) is a tool that examines a network for malicious behavior/policy violations. A network monitoring system is often used to report/gather any suspicious attacks/violations. An IDS is a software program or hardware system that monitors network/security traffic for malicious… More >

  • Open Access

    ARTICLE

    Deep Learning with Optimal Hierarchical Spiking Neural Network for Medical Image Classification

    P. Immaculate Rexi Jenifer1,*, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1081-1097, 2023, DOI:10.32604/csse.2023.026128

    Abstract Medical image classification becomes a vital part of the design of computer aided diagnosis (CAD) models. The conventional CAD models are majorly dependent upon the shapes, colors, and/or textures that are problem oriented and exhibited complementary in medical images. The recently developed deep learning (DL) approaches pave an efficient method of constructing dedicated models for classification problems. But the maximum resolution of medical images and small datasets, DL models are facing the issues of increased computation cost. In this aspect, this paper presents a deep convolutional neural network with hierarchical spiking neural network (DCNN-HSNN) for medical image classification. The proposed… More >

  • Open Access

    ARTICLE

    Detection and Classification of Hemorrhages in Retinal Images

    Ghassan Ahmed Ali1, Thamer Mitib Ahmad Al Sariera2,*, Muhammad Akram1, Adel Sulaiman1, Fekry Olayah1

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1601-1616, 2023, DOI:10.32604/csse.2023.026119

    Abstract Damage of the blood vessels in retina due to diabetes is called diabetic retinopathy (DR). Hemorrhages is the first clinically visible symptoms of DR. This paper presents a new technique to extract and classify the hemorrhages in fundus images. The normal objects such as blood vessels, fovea and optic disc inside retinal images are masked to distinguish them from hemorrhages. For masking blood vessels, thresholding that separates blood vessels and background intensity followed by a new filter to extract the border of vessels based on orientations of vessels are used. For masking optic disc, the image is divided into sub-images… More >

  • Open Access

    ARTICLE

    An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation

    Junaid Rashid1, Sumera Kanwal2, Muhammad Wasif Nisar2, Jungeun Kim1,*, Amir Hussain3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1309-1324, 2023, DOI:10.32604/csse.2023.026018

    Abstract In project management, effective cost estimation is one of the most crucial activities to efficiently manage resources by predicting the required cost to fulfill a given task. However, finding the best estimation results in software development is challenging. Thus, accurate estimation of software development efforts is always a concern for many companies. In this paper, we proposed a novel software development effort estimation model based both on constructive cost model II (COCOMO II) and the artificial neural network (ANN). An artificial neural network enhances the COCOMO model, and the value of the baseline effort constant A is calibrated to use… More >

  • Open Access

    ARTICLE

    Secured ECG Signal Transmission Using Optimized EGC with Chaotic Neural Network in WBSN

    Ishani Mishra1,*, Sanjay Jain2, Vivek Maik3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.025999

    Abstract In wireless body sensor network (WBSN), the set of electrocardiogram (ECG) data which is collected from sensor nodes and transmitted to the server remotely supports the experts to monitor the health of a patient. While transmitting these collected data some adversaries may capture and misuse it due to the compromise of security. So, the major aim of this work is to enhance secure transmission of ECG signal in WBSN. To attain this goal, we present Pity Beetle Swarm Optimization Algorithm (PBOA) based Elliptic Galois Cryptography (EGC) with Chaotic Neural Network. To optimize the key generation process in Elliptic Curve Cryptography… More >

  • Open Access

    ARTICLE

    Speech Separation Methodology for Hearing Aid

    Joseph Sathiadhas Esra1,*, Y. Sukhi2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1659-1678, 2023, DOI:10.32604/csse.2023.025969

    Abstract In the design of hearing aids (HA), the real-time speech-enhancement is done. The digital hearing aids should provide high signal-to-noise ratio, gain improvement and should eliminate feedback. In generic hearing aids the performance towards different frequencies varies and non uniform. Existing noise cancellation and speech separation methods drops the voice magnitude under the noise environment. The performance of the HA for frequency response is non uniform. Existing noise suppression methods reduce the required signal strength also. So, the performance of uniform sub band analysis is poor when hearing aid is concern. In this paper, a speech separation method using Non-negative… More >

Displaying 7601-7610 on page 761 of 22233. Per Page