Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    A Steganography Based on Optimal Multi-Threshold Block Labeling

    Shuying Xu1, Chin-Chen Chang1, Ji-Hwei Horng2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.026046

    Abstract Hiding secret data in digital images is one of the major research fields in information security. Recently, reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services. This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique (OMTBL-RDHEI). In our scheme, the content owner encrypts the cover image with block permutation, pixel permutation, and stream cipher, which preserve the in-block correlation of pixel values. After uploading to the cloud service, the data hider applies the prediction error rearrangement (PER), the optimal threshold selection… More >

  • Open Access

    ARTICLE

    Combining Entropy Optimization and Sobel Operator for Medical Image Fusion

    Nguyen Tu Trung1,*, Tran Thi Ngan1, Tran Manh Tuan1, To Huu Nguyen2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 535-544, 2023, DOI:10.32604/csse.2023.026011

    Abstract Fusing medical images is a topic of interest in processing medical images. This is achieved to through fusing information from multimodality images for the purpose of increasing the clinical diagnosis accuracy. This fusion aims to improve the image quality and preserve the specific features. The methods of medical image fusion generally use knowledge in many different fields such as clinical medicine, computer vision, digital imaging, machine learning, pattern recognition to fuse different medical images. There are two main approaches in fusing image, including spatial domain approach and transform domain approachs. This paper proposes a new algorithm to fusion multimodal images.… More >

  • Open Access

    ARTICLE

    A Deep Learning Based Approach for Context-Aware Multi-Criteria Recommender Systems

    Son-Lam VU, Quang-Hung LE*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 471-483, 2023, DOI:10.32604/csse.2023.025897

    Abstract Recommender systems are similar to an information filtering system that helps identify items that best satisfy the users’ demands based on their preference profiles. Context-aware recommender systems (CARSs) and multi-criteria recommender systems (MCRSs) are extensions of traditional recommender systems. CARSs have integrated additional contextual information such as time, place, and so on for providing better recommendations. However, the majority of CARSs use ratings as a unique criterion for building communities. Meanwhile, MCRSs utilize user preferences in multiple criteria to better generate recommendations. Up to now, how to exploit context in MCRSs is still an open issue. This paper proposes a… More >

  • Open Access

    ARTICLE

    A Smart Room to Promote Autonomy of Disabled People due to Stroke

    Moeiz Miraoui1,2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 677-692, 2023, DOI:10.32604/csse.2023.025799

    Abstract A cerebral vascular accident, known as common language stroke, is one of the main causes of mortality and remains the primary cause of acquired disabilities in adults. Those disabled people spend most of their time at home in their living rooms. In most cases, appliances of a living room (TV, light, cooler/heater, window blinds, etc.) are generally controlled by direct manipulation of a set of remote controls. Handling many remote controls can be disturbing and inappropriate for these people. In addition, in many cases these people could be alone at home and must open the door for visitors after their… More >

  • Open Access

    ARTICLE

    Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique

    Fawaz Alassery1, Ahmed Alzahrani2, Asif Irshad Khan2, Kanika Sharma3, Masood Ahmad4, Raees Ahmad Khan4,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 859-872, 2023, DOI:10.32604/csse.2023.025796

    Abstract In recent years, it has been observed that the disclosure of information increases the risk of terrorism. Without restricting the accessibility of information, providing security is difficult. So, there is a demand for time to fill the gap between security and accessibility of information. In fact, security tools should be usable for improving the security as well as the accessibility of information. Though security and accessibility are not directly influenced, some of their factors are indirectly influenced by each other. Attributes play an important role in bridging the gap between security and accessibility. In this paper, we identify the key… More >

  • Open Access

    ARTICLE

    Novel Sensing Hole Recovery with Expanded Relay Node Capability

    Moonseong Kim1, Woochan Lee2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 663-675, 2023, DOI:10.32604/csse.2023.025615

    Abstract The occurrence of ‘sensing holes’ not only hinders seamless data collection but also leads to misinterpretation of information in certain areas under extensive data analysis. In order to overcome this, various sensor relocation strategies have been proposed, but the existing relocation strategies revealed problems such as the ping-pong, shaded area, network disconnection, etc. This paper conducted research on relocation protocols in a distributed environment that is very suitable for real-world situations and efficiently recovering the problem of sensing holes. First, a simulation was performed on the distribution of the shaded area for data collection, which is a problem with the… More >

  • Open Access

    ARTICLE

    Breast Calcifications and Histopathological Analysis on Tumour Detection by CNN

    D. Banumathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, P. Vishnu Raja4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 595-612, 2023, DOI:10.32604/csse.2023.025611

    Abstract The most salient argument that needs to be addressed universally is Early Breast Cancer Detection (EBCD), which helps people live longer lives. The Computer-Aided Detection (CADs)/Computer-Aided Diagnosis (CADx) system is indeed a software automation tool developed to assist the health professions in Breast Cancer Detection and Diagnosis (BCDD) and minimise mortality by the use of medical histopathological image classification in much less time. This paper purposes of examining the accuracy of the Convolutional Neural Network (CNN), which can be used to perceive breast malignancies for initial breast cancer detection to determine which strategy is efficient for the early identification of… More >

  • Open Access

    ARTICLE

    Computerised Gate Firing Control for 17-Level MLI using Staircase PWM

    M. Geetha1,*, R. Vijayabhasker2, Suresh Seetharaman1

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 813-832, 2023, DOI:10.32604/csse.2023.025575

    Abstract A basic 7-level MLI topology is developed and the same is extended to the 9-level then further increased to 17-levels. The developed structure minimizes the component’s count and size to draw out the system economy. Despite the various advantages of MLIs, efficiency and reliability play a major role since the usage of components is higher for getting a low Total Harmonics Distortion (THD) value. This becomes a major challenge incorporated in boosting the efficiency without affecting the THD value. Various parametric observations are done and realized for the designed 9-level and 17-level MLI, being the Total Standing Voltage (TSV), efficiency,… More >

  • Open Access

    ARTICLE

    Improved-Equalized Cluster Head Election Routing Protocol for Wireless Sensor Networks

    Muhammad Shahzeb Ali1, Ali Alqahtani2,*, Ansar Munir Shah1, Adel Rajab2, Mahmood Ul Hassan3, Asadullah Shaikh2, Khairan Rajab2, Basit Shahzad4

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 845-858, 2023, DOI:10.32604/csse.2023.025449

    Abstract Throughout the use of the small battery-operated sensor nodes encourage us to develop an energy-efficient routing protocol for wireless sensor networks (WSNs). The development of an energy-efficient routing protocol is a mainly adopted technique to enhance the lifetime of WSN. Many routing protocols are available, but the issue is still alive. Clustering is one of the most important techniques in the existing routing protocols. In the clustering-based model, the important thing is the selection of the cluster heads. In this paper, we have proposed a scheme that uses the bubble sort algorithm for cluster head selection by considering the remaining… More >

  • Open Access

    ARTICLE

    Weed Classification Using Particle Swarm Optimization and Deep Learning Models

    M. Manikandakumar1,*, P. Karthikeyan2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 913-927, 2023, DOI:10.32604/csse.2023.025434

    Abstract Weed is a plant that grows along with nearly all field crops, including rice, wheat, cotton, millets and sugar cane, affecting crop yield and quality. Classification and accurate identification of all types of weeds is a challenging task for farmers in earlier stage of crop growth because of similarity. To address this issue, an efficient weed classification model is proposed with the Deep Convolutional Neural Network (CNN) that implements automatic feature extraction and performs complex feature learning for image classification. Throughout this work, weed images were trained using the proposed CNN model with evolutionary computing approach to classify the weeds… More >

Displaying 7771-7780 on page 778 of 22212. Per Page