Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    CORRECTION

    Correction: Spatio Temporal Tourism Tracking System Based on Adaptive Convolutional Neural Network

    L. Maria Michael Visuwasam1,*, D. Paul Raj2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.047461

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Multi-Objective Genetic Algorithm Based Load Balancing Strategy for Health Monitoring Systems in Fog-Cloud

    Hayder Makki Shakir, Jaber Karimpour*, Jafar Razmara

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.038545

    Abstract As the volume of data and data-generating equipment in healthcare settings grows, so do issues like latency and inefficient processing inside health monitoring systems. The Internet of Things (IoT) has been used to create a wide variety of health monitoring systems. Most modern health monitoring solutions are based on cloud computing. However, large-scale deployment of latency-sensitive healthcare applications is hampered by the cloud’s design, which introduces significant delays during the processing of vast data volumes. By strategically positioning servers close to end users, fog computing mitigates latency issues and dramatically improves scaling on demand, resource accessibility, and security. In this… More >

  • Open Access

    ARTICLE

    An Efficient Character-Level Adversarial Attack Inspired by Textual Variations in Online Social Media Platforms

    Jebran Khan1, Kashif Ahmad2, Kyung-Ah Sohn1,3,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.040159

    Abstract In recent years, the growing popularity of social media platforms has led to several interesting natural language processing (NLP) applications. However, these social media-based NLP applications are subject to different types of adversarial attacks due to the vulnerabilities of machine learning (ML) and NLP techniques. This work presents a new low-level adversarial attack recipe inspired by textual variations in online social media communication. These variations are generated to convey the message using out-of-vocabulary words based on visual and phonetic similarities of characters and words in the shortest possible form. The intuition of the proposed scheme is to generate adversarial examples… More >

  • Open Access

    ARTICLE

    A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection

    Quan Zhou1,*, Yulong Zheng1, Minhui Chen2, Kaijun Wei2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.039908

    Abstract In recent years, the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention. To ensure privacy protection for both sides of the transaction, many researchers are using ring signature technology instead of the original signature technology. However, in practice, identifying the signer of an illegal blockchain transaction once it has been placed on the chain necessitates a signature technique that offers conditional anonymity. Some illegals can conduct illegal transactions and evade the law using ring signatures, which offer perfect anonymity. This paper firstly constructs a conditionally anonymous linkable ring signature using the Diffie-Hellman key… More >

  • Open Access

    REVIEW

    AI-Based UAV Swarms for Monitoring and Disease Identification of Brassica Plants Using Machine Learning: A Review

    Zain Anwar Ali1,2,*, Dingnan Deng1, Muhammad Kashif Shaikh3, Raza Hasan4, Muhammad Aamir Khan2

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.041866

    Abstract Technological advances in unmanned aerial vehicles (UAVs) pursued by artificial intelligence (AI) are improving remote sensing applications in smart agriculture. These are valuable tools for monitoring and disease identification of plants as they can collect data with no damage and effects on plants. However, their limited carrying and battery capacities restrict their performance in larger areas. Therefore, using multiple UAVs, especially in the form of a swarm is more significant for monitoring larger areas such as crop fields and forests. The diversity of research studies necessitates a literature review for more progress and contribution in the agricultural field. In this… More >

  • Open Access

    ARTICLE

    Suspicious Activities Recognition in Video Sequences Using DarkNet-NasNet Optimal Deep Features

    Safdar Khan1, Muhammad Attique Khan2, Jamal Hussain Shah1,*, Faheem Shehzad2, Taerang Kim3, Jae-Hyuk Cha3

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.040410

    Abstract Human Suspicious Activity Recognition (HSAR) is a critical and active research area in computer vision that relies on artificial intelligence reasoning. Significant advances have been made in this field recently due to important applications such as video surveillance. In video surveillance, humans are monitored through video cameras when doing suspicious activities such as kidnapping, fighting, snatching, and a few more. Although numerous techniques have been introduced in the literature for routine human actions (HAR), very few studies are available for HSAR. This study proposes a deep convolutional neural network (CNN) and optimal featuresbased framework for HSAR in video frames. The… More >

  • Open Access

    ARTICLE

    Billiards Optimization with Modified Deep Learning for Fault Detection in Wireless Sensor Network

    Yousif Sufyan Jghef1, Mohammed Jasim Mohammed Jasim2, Subhi R. M. Zeebaree3,*, Rizgar R. Zebari4

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.037449

    Abstract Wireless Sensor Networks (WSNs) gather data in physical environments, which is some type. These ubiquitous sensors face several challenges responsible for corrupting them (mostly sensor failure and intrusions in external agents). WSNs were disposed to error, and effectual fault detection techniques are utilized for detecting faults from WSNs in a timely approach. Machine learning (ML) was extremely utilized for detecting faults in WSNs. Therefore, this study proposes a billiards optimization algorithm with modified deep learning for fault detection (BIOMDL-FD) in WSN. The BIOMDLFD technique mainly concentrates on identifying sensor faults to enhance network efficiency. To do so, the presented BIOMDL-FD… More >

  • Open Access

    ARTICLE

    Intrusion Detection in 5G Cellular Network Using Machine Learning

    Ishtiaque Mahmood1, Tahir Alyas2, Sagheer Abbas3, Tariq Shahzad4, Qaiser Abbas5,6, Khmaies Ouahada7,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.033842

    Abstract Attacks on fully integrated servers, apps, and communication networks via the Internet of Things (IoT) are growing exponentially. Sensitive devices’ effectiveness harms end users, increases cyber threats and identity theft, raises costs, and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods. Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security. Following the 1, 2, 3, and 4G cellular networks, the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as the global advancement of cellular… More >

  • Open Access

    ARTICLE

    Intelligent Intrusion Detection System for the Internet of Medical Things Based on Data-Driven Techniques

    Okba Taouali1,*, Sawcen Bacha2, Khaoula Ben Abdellafou1, Ahamed Aljuhani1, Kamel Zidi3, Rehab Alanazi1, Mohamed Faouzi Harkat4

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.039984

    Abstract Introducing IoT devices to healthcare fields has made it possible to remotely monitor patients’ information and provide a proper diagnosis as needed, resulting in the Internet of Medical Things (IoMT). However, obtaining good security features that ensure the integrity and confidentiality of patient’s information is a significant challenge. However, due to the computational resources being limited, an edge device may struggle to handle heavy detection tasks such as complex machine learning algorithms. Therefore, designing and developing a lightweight detection mechanism is crucial. To address the aforementioned challenges, a new lightweight IDS approach is developed to effectively combat a diverse range… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Optimization Algorithm for Materialized View Selection from Data Warehouse Environments

    Popuri Srinivasarao, Aravapalli Rama Satish*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.038951

    Abstract Responding to complex analytical queries in the data warehouse (DW) is one of the most challenging tasks that require prompt attention. The problem of materialized view (MV) selection relies on selecting the most optimal views that can respond to more queries simultaneously. This work introduces a combined approach in which the constraint handling process is combined with metaheuristics to select the most optimal subset of DW views from DWs. The proposed work initially refines the solution to enable a feasible selection of views using the ensemble constraint handling technique (ECHT). The constraints such as self-adaptive penalty, epsilon (ε)-parameter and stochastic… More >

Displaying 51-60 on page 6 of 78. Per Page