Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    A Hybrid Regularization-Based Multi-Frame Super-Resolution Using Bayesian Framework

    Mahmoud M. Khattab1,2,*, Akram M Zeki1, Ali A. Alwan3, Belgacem Bouallegue2, Safaa S. Matter4, Abdelmoty M. Ahmed2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 35-54, 2023, DOI:10.32604/csse.2023.025251

    Abstract The prime purpose for the image reconstruction of a multi-frame super-resolution is to reconstruct a higher-resolution image through incorporating the knowledge obtained from a series of relevant low-resolution images, which is useful in numerous fields. Nevertheless, super-resolution image reconstruction methods are usually damaged by undesirable restorative artifacts, which include blurring distortion, noises, and stair-casing effects. Consequently, it is always challenging to achieve balancing between image smoothness and preservation of the edges inside the image. In this research work, we seek to increase the effectiveness of multi-frame super-resolution image reconstruction by increasing the visual information and improving the automated machine perception,… More >

  • Open Access

    ARTICLE

    Multi-Headed Deep Learning Models to Detect Abnormality of Alzheimer’s Patients

    S. Meenakshi Ammal*, P. S. Manoharan

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 367-390, 2023, DOI:10.32604/csse.2023.025230

    Abstract Worldwide, many elders are suffering from Alzheimer’s disease (AD). The elders with AD exhibit various abnormalities in their activities, such as sleep disturbances, wandering aimlessly, forgetting activities, etc., which are the strong signs and symptoms of AD progression. Recognizing these symptoms in advance could assist to a quicker diagnosis and treatment and to prevent the progression of Disease to the next stage. The proposed method aims to detect the behavioral abnormalities found in Daily activities of AD patients (ADP) using wearables. In the proposed work, a publicly available dataset collected using wearables is applied. Currently, no real-world data is available… More >

  • Open Access

    ARTICLE

    Histogram Matched Chest X-Rays Based Tuberculosis Detection Using CNN

    Joe Louis Paul Ignatius1,*, Sasirekha Selvakumar1, Kavin Gabriel Joe Louis Paul2, Aadhithya B. Kailash1, S. Keertivaas1, S. A. J. Akarvin Raja Prajan1

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 81-97, 2023, DOI:10.32604/csse.2023.025195

    Abstract Tuberculosis (TB) is a severe infection that mostly affects the lungs and kills millions of people’s lives every year. Tuberculosis can be diagnosed using chest X-rays (CXR) and data-driven deep learning (DL) approaches. Because of its better automated feature extraction capability, convolutional neural networks (CNNs) trained on natural images are particularly effective in image categorization. A combination of 3001 normal and 3001 TB CXR images was gathered for this study from different accessible public datasets. Ten different deep CNNs (Resnet50, Resnet101, Resnet152, InceptionV3, VGG16, VGG19, DenseNet121, DenseNet169, DenseNet201, MobileNet) are trained and tested for identifying TB and normal cases. This… More >

  • Open Access

    ARTICLE

    Vehicle Density Prediction in Low Quality Videos with Transformer Timeseries Prediction Model (TTPM)

    D. Suvitha*, M. Vijayalakshmi

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 873-894, 2023, DOI:10.32604/csse.2023.025189

    Abstract Recent advancement in low-cost cameras has facilitated surveillance in various developing towns in India. The video obtained from such surveillance are of low quality. Still counting vehicles from such videos are necessity to avoid traffic congestion and allows drivers to plan their routes more precisely. On the other hand, detecting vehicles from such low quality videos are highly challenging with vision based methodologies. In this research a meticulous attempt is made to access low-quality videos to describe traffic in Salem town in India, which is mostly an un-attempted entity by most available sources. In this work profound Detection Transformer (DETR)… More >

  • Open Access

    ARTICLE

    Container Based Nomadic Vehicular Cloud Using Cell Transmission Model

    Devakirubai Navulkumar1,*, Menakadevi Thangavelu2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 423-440, 2023, DOI:10.32604/csse.2023.025166

    Abstract Nomadic Vehicular Cloud (NVC) is envisaged in this work. The predominant aspects of NVC is, it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road without relying on any of the static infrastructure and NVC decides the initiation time of container migration using cell transmission model (CTM). Containers are used in the place of Virtual Machines (VM), as containers’ features are very apt to NVC’s dynamic environment. The specifications of 5G NR V2X PC5 interface are applied to NVC, for the feature of not relying on the… More >

  • Open Access

    ARTICLE

    A Component Selection Framework of Cohesion and Coupling Metrics

    Iyyappan. M1, Arvind Kumar1, Sultan Ahmad2,*, Sudan Jha3, Bader Alouffi4, Abdullah Alharbi5

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 351-365, 2023, DOI:10.32604/csse.2023.025163

    Abstract Component-based software engineering is concerned with the development of software that can satisfy the customer prerequisites through reuse or independent development. Coupling and cohesion measurements are primarily used to analyse the better software design quality, increase the reliability and reduced system software complexity. The complexity measurement of cohesion and coupling component to analyze the relationship between the component module. In this paper, proposed the component selection framework of Hexa-oval optimization algorithm for selecting the suitable components from the repository. It measures the interface density modules of coupling and cohesion in a modular software system. This cohesion measurement has been taken… More >

  • Open Access

    ARTICLE

    Deep Neural Network Based Detection and Segmentation of Ships for Maritime Surveillance

    Kyamelia Roy1, Sheli Sinha Chaudhuri1, Sayan Pramanik2, Soumen Banerjee2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 647-662, 2023, DOI:10.32604/csse.2023.024997

    Abstract In recent years, computer vision finds wide applications in maritime surveillance with its sophisticated algorithms and advanced architecture. Automatic ship detection with computer vision techniques provide an efficient means to monitor as well as track ships in water bodies. Waterways being an important medium of transport require continuous monitoring for protection of national security. The remote sensing satellite images of ships in harbours and water bodies are the image data that aid the neural network models to localize ships and to facilitate early identification of possible threats at sea. This paper proposes a deep learning based model capable enough to… More >

  • Open Access

    ARTICLE

    Adaptive Window Based 3-D Feature Selection for Multispectral Image Classification Using Firefly Algorithm

    M. Rajakani1,*, R. J. Kavitha2, A. Ramachandran3

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 265-280, 2023, DOI:10.32604/csse.2023.024994

    Abstract Feature extraction is the most critical step in classification of multispectral image. The classification accuracy is mainly influenced by the feature sets that are selected to classify the image. In the past, handcrafted feature sets are used which are not adaptive for different image domains. To overcome this, an evolutionary learning method is developed to automatically learn the spatial-spectral features for classification. A modified Firefly Algorithm (FA) which achieves maximum classification accuracy with reduced size of feature set is proposed to gain the interest of feature selection for this purpose. For extracting the most efficient features from the data set,… More >

  • Open Access

    ARTICLE

    Metaheuristics Based Node Localization Approach for Real-Time Clustered Wireless Networks

    R. Bhaskaran1, P. S. Sujith Kumar2, G. Shanthi3, L. Raja4, Gyanendra Prasad Joshi5, Woong Cho6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 1-17, 2023, DOI:10.32604/csse.2023.024973

    Abstract In recent times, real time wireless networks have found their applicability in several practical applications such as smart city, healthcare, surveillance, environmental monitoring, etc. At the same time, proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks. This study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization (IM-EECNL) approach for real-time wireless networks. The proposed IM-EECNL technique involves two major processes namely node localization and clustering. Firstly, Chaotic Water Strider Algorithm based Node Localization (CWSANL) technique to determine the unknown position of the nodes. Secondly, an Oppositional Archimedes Optimization… More >

  • Open Access

    ARTICLE

    Homogeneous Batch Memory Deduplication Using Clustering of Virtual Machines

    N. Jagadeeswari1,*, V. Mohan Raj2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 929-943, 2023, DOI:10.32604/csse.2023.024945

    Abstract Virtualization is the backbone of cloud computing, which is a developing and widely used paradigm. By finding and merging identical memory pages, memory deduplication improves memory efficiency in virtualized systems. Kernel Same Page Merging (KSM) is a Linux service for memory pages sharing in virtualized environments. Memory deduplication is vulnerable to a memory disclosure attack, which uses covert channel establishment to reveal the contents of other colocated virtual machines. To avoid a memory disclosure attack, sharing of identical pages within a single user’s virtual machine is permitted, but sharing of contents between different users is forbidden. In our proposed approach,… More >

Displaying 7801-7810 on page 781 of 22225. Per Page