Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Brain Tumor Segmentation through Level Based Learning Model

    K. Dinesh Babu1,*, C. Senthil Singh2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 709-720, 2023, DOI:10.32604/csse.2023.024295 - 01 June 2022

    Abstract Brain tumors are potentially fatal presence of cancer cells over a human brain, and they need to be segmented for accurate and reliable planning of diagnosis. Segmentation process must be carried out in different regions based on which the stages of cancer can be accurately derived. Glioma patients exhibit a different level of challenge in terms of cancer or tumors detection as the Magnetic Resonance Imaging (MRI) images possess varying sizes, shapes, positions, and modalities. The scanner used for sensing the location of tumors cells will be subjected to additional protocols and measures for accuracy,… More >

  • Open Access

    ARTICLE

    Covid-19 Forecasting with Deep Learning-based Half-binomial Distribution Cat Swarm Optimization

    P. Renukadevi1,*, A. Rajiv Kannan2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 629-645, 2023, DOI:10.32604/csse.2023.024217 - 01 June 2022

    Abstract About 170 nations have been affected by the COvid VIrus Disease-19 (COVID-19) epidemic. On governing bodies across the globe, a lot of stress is created by COVID-19 as there is a continuous rise in patient count testing positive, and they feel challenging to tackle this situation. Most researchers concentrate on COVID-19 data analysis using the machine learning paradigm in these situations. In the previous works, Long Short-Term Memory (LSTM) was used to predict future COVID-19 cases. According to LSTM network data, the outbreak is expected to finish by June 2020. However, there is a chance… More >

  • Open Access

    ARTICLE

    Optimal Artificial Intelligence Based Automated Skin Lesion Detection and Classification Model

    Kingsley A. Ogudo1, R. Surendran2,*, Osamah Ibrahim Khalaf3

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 693-707, 2023, DOI:10.32604/csse.2023.024154 - 01 June 2022

    Abstract Skin lesions have become a critical illness worldwide, and the earlier identification of skin lesions using dermoscopic images can raise the survival rate. Classification of the skin lesion from those dermoscopic images will be a tedious task. The accuracy of the classification of skin lesions is improved by the use of deep learning models. Recently, convolutional neural networks (CNN) have been established in this domain, and their techniques are extremely established for feature extraction, leading to enhanced classification. With this motivation, this study focuses on the design of artificial intelligence (AI) based solutions, particularly deep… More >

  • Open Access

    ARTICLE

    Image Captioning Using Detectors and Swarm Based Learning Approach for Word Embedding Vectors

    B. Lalitha1,*, V. Gomathi2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 173-189, 2023, DOI:10.32604/csse.2023.024118 - 01 June 2022

    Abstract IC (Image Captioning) is a crucial part of Visual Data Processing and aims at understanding for providing captions that verbalize an image’s important elements. However, in existing works, because of the complexity in images, neglecting major relation between the object in an image, poor quality image, labelling it remains a big problem for researchers. Hence, the main objective of this work attempts to overcome these challenges by proposing a novel framework for IC. So in this research work the main contribution deals with the framework consists of three phases that is image understanding, textual understanding and… More >

  • Open Access

    ARTICLE

    Phish Block: A Blockchain Framework for Phish Detection in Cloud

    R. N. Karthika*, C. Valliyammai, M. Naveena

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 777-795, 2023, DOI:10.32604/csse.2023.024086 - 01 June 2022

    Abstract The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy. But, deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular… More >

  • Open Access

    ARTICLE

    Design of Clustering Techniques in Cognitive Radio Sensor Networks

    R. Ganesh Babu1,*, D. Hemanand2, V. Amudha3, S. Sugumaran4

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 441-456, 2023, DOI:10.32604/csse.2023.024049 - 01 June 2022

    Abstract In recent decades, several optimization algorithms have been developed for selecting the most energy efficient clusters in order to save power during transmission to a shorter distance while restricting the Primary Users (PUs) interference. The Cognitive Radio (CR) system is based on the Adaptive Swarm Distributed Intelligent based Clustering algorithm (ASDIC) that shows better spectrum sensing among group of multiusers in terms of sensing error, power saving, and convergence time. In this research paper, the proposed ASDIC algorithm develops better energy efficient distributed cluster based sensing with the optimal number of clusters on their connectivity.… More >

  • Open Access

    ARTICLE

    Community Detection Using Jaacard Similarity with SIM-Edge Detection Techniques

    K. Chitra*, A. Tamilarasi

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 327-337, 2023, DOI:10.32604/csse.2023.023920 - 01 June 2022

    Abstract The structure and dynamic nature of real-world networks can be revealed by communities that help in promotion of recommendation systems. Social Media platforms were initially developed for effective communication, but now it is being used widely for extending and to obtain profit among business community. The numerous data generated through these platforms are utilized by many companies that make a huge profit out of it. A giant network of people in social media is grouped together based on their similar properties to form a community. Community detection is recent topic among the research community due… More >

  • Open Access

    ARTICLE

    Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack

    Saraswathi Shunmuganathan*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 67-79, 2023, DOI:10.32604/csse.2023.023858 - 01 June 2022

    Abstract The exponential advancement in telecommunication embeds the Internet in every aspect of communication. Interconnections of networks all over the world impose monumental risks on the Internet. A Flooding Attack (FA) is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services. Irrespective of the protective measures incorporated in the communication infrastructure, FA still persists due to the lack of global cooperation. Most of the existing mitigation is set up either at the traffic starting point or at the traffic ending point. Providing mitigation at one or the… More >

  • Open Access

    ARTICLE

    Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method

    J. S. Sujin1,*, S. Sophia2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 157-171, 2023, DOI:10.32604/csse.2023.023747 - 01 June 2022

    Abstract Digital picture forgery detection has recently become a popular and significant topic in image processing. Due to advancements in image processing and the availability of sophisticated software, picture fabrication may hide evidence and hinder the detection of such criminal cases. The practice of modifying original photographic images to generate a forged image is known as digital image forging. A section of an image is copied and pasted into another part of the same image to hide an item or duplicate particular image elements in copy-move forgery. In order to make the forgeries real and inconspicuous,… More >

  • Open Access

    ARTICLE

    Multiple Object Tracking through Background Learning

    Deependra Sharma*, Zainul Abdin Jaffery

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 191-204, 2023, DOI:10.32604/csse.2023.023728 - 01 June 2022

    Abstract This paper discusses about the new approach of multiple object tracking relative to background information. The concept of multiple object tracking through background learning is based upon the theory of relativity, that involves a frame of reference in spatial domain to localize and/or track any object. The field of multiple object tracking has seen a lot of research, but researchers have considered the background as redundant. However, in object tracking, the background plays a vital role and leads to definite improvement in the overall process of tracking. In the present work an algorithm is proposed More >

Displaying 12471-12480 on page 1248 of 31589. Per Page