Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Special Issues
  • Open AccessOpen Access

    ARTICLE

    A Framework of Deep Learning and Selection-Based Breast Cancer Detection from Histopathology Images

    Muhammad Junaid Umer1, Muhammad Sharif1, Majed Alhaisoni2, Usman Tariq3, Ye Jin Kim4, Byoungchol Chang5,*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1001-1016, 2023, DOI:10.32604/csse.2023.030463 - 03 November 2022
    Abstract Breast cancer (BC) is a most spreading and deadly cancerous malady which is mostly diagnosed in middle-aged women worldwide and effecting beyond a half-million people every year. The BC positive newly diagnosed cases in 2018 reached 2.1 million around the world with a death rate of 11.6% of total cases. Early diagnosis and detection of breast cancer disease with proper treatment may reduce the number of deaths. The gold standard for BC detection is biopsy analysis which needs an expert for correct diagnosis. Manual diagnosis of BC is a complex and challenging task. This work… More >

  • Open AccessOpen Access

    ARTICLE

    Breast Cancer Diagnosis Using Feature Selection Approaches and Bayesian Optimization

    Erkan Akkur1, Fuat TURK2,*, Osman Erogul1
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1017-1031, 2023, DOI:10.32604/csse.2023.033003 - 03 November 2022
    Abstract Breast cancer seriously affects many women. If breast cancer is detected at an early stage, it may be cured. This paper proposes a novel classification model based improved machine learning algorithms for diagnosis of breast cancer at its initial stage. It has been used by combining feature selection and Bayesian optimization approaches to build improved machine learning models. Support Vector Machine, K-Nearest Neighbor, Naive Bayes, Ensemble Learning and Decision Tree approaches were used as machine learning algorithms. All experiments were tested on two different datasets, which are Wisconsin Breast Cancer Dataset (WBCD) and Mammographic Breast… More >

  • Open AccessOpen Access

    ARTICLE

    Sea-Land Segmentation of Remote Sensing Images Based on SDW-UNet

    Tianyu Liu1,3,4, Pengyu Liu1,2,3,4,*, Xiaowei Jia5, Shanji Chen2, Ying Ma2, Qian Gao1,3,4
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1033-1045, 2023, DOI:10.32604/csse.2023.028225 - 03 November 2022
    Abstract Image segmentation of sea-land remote sensing images is of great importance for downstream applications including shoreline extraction, the monitoring of near-shore marine environment, and near-shore target recognition. To mitigate large number of parameters and improve the segmentation accuracy, we propose a new Squeeze-Depth-Wise UNet (SDW-UNet) deep learning model for sea-land remote sensing image segmentation. The proposed SDW-UNet model leverages the squeeze-excitation and depth-wise separable convolution to construct new convolution modules, which enhance the model capacity in combining multiple channels and reduces the model parameters. We further explore the effect of position-encoded information in NLP (Natural… More >

  • Open AccessOpen Access

    ARTICLE

    Effective and Efficient Video Compression by the Deep Learning Techniques

    Karthick Panneerselvam1,2,*, K. Mahesh1, V. L. Helen Josephine3, A. Ranjith Kumar2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1047-1061, 2023, DOI:10.32604/csse.2023.030513 - 03 November 2022
    Abstract Deep learning has reached many successes in Video Processing. Video has become a growing important part of our daily digital interactions. The advancement of better resolution content and the large volume offers serious challenges to the goal of receiving, distributing, compressing and revealing high-quality video content. In this paper we propose a novel Effective and Efficient video compression by the Deep Learning framework based on the flask, which creatively combines the Deep Learning Techniques on Convolutional Neural Networks (CNN) and Generative Adversarial Networks (GAN). The video compression method involves the layers are divided into different… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Home Using Fuzzy Control Based on AIoT

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1063-1081, 2023, DOI:10.32604/csse.2023.028438 - 03 November 2022
    Abstract The Internet of Things has grown rapidly in recent years, and the technologies related to it have been widely used in various fields. The idea of this paper is to build a set of Internet of Things systems in a smart home wireless network environment, with the purpose of providing people with a more comfortable, convenient, and safe life. In the sensing layer of the Internet of Things, we discuss the uses of common sensing technologies on the Internet and combine these with Arduino microprocessors to integrate temperature sensing modules, humidity sensing modules, gas sensing More >

  • Open AccessOpen Access

    ARTICLE

    Feature Matching Combining Variable Velocity Model with Reverse Optical Flow

    Chang Zhao1, Wei Sun1,3,*, Xiaorui Zhang2,3, Xiaozheng He4, Jun Zuo1, Wei Zhao1
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1083-1094, 2023, DOI:10.32604/csse.2023.032786 - 03 November 2022
    Abstract The ORB-SLAM2 based on the constant velocity model is difficult to determine the search window of the reprojection of map points when the objects are in variable velocity motion, which leads to a false matching, with an inaccurate pose estimation or failed tracking. To address the challenge above, a new method of feature point matching is proposed in this paper, which combines the variable velocity model with the reverse optical flow method. First, the constant velocity model is extended to a new variable velocity model, and the expanded variable velocity model is used to provide… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Framework for Blockchain Transactions Protection

    Wafaa N. Al-Sharu1,*, Majdi K. Qabalin2, Muawya Naser2, Omar A. Saraerh1
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1095-1111, 2023, DOI:10.32604/csse.2023.032862 - 03 November 2022
    Abstract One of the most extensively used technologies for improving the security of IoT devices is blockchain technology. It is a new technology that can be utilized to boost the security. It is a decentralized peer-to-peer network with no central authority. Multiple nodes on the network mine or verify the data recorded on the Blockchain. It is a distributed ledger that may be used to keep track of transactions between several parties. No one can tamper with the data on the blockchain since it is unchangeable. Because the blocks are connected by hashes, the transaction data… More >

  • Open AccessOpen Access

    ARTICLE

    Sentiment Analysis with Tweets Behaviour in Twitter Streaming API

    Kuldeep Chouhan1, Mukesh Yadav2, Ranjeet Kumar Rout3, Kshira Sagar Sahoo4, NZ Jhanjhi5,*, Mehedi Masud6, Sultan Aljahdali6
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1113-1128, 2023, DOI:10.32604/csse.2023.030842 - 03 November 2022
    Abstract Twitter is a radiant platform with a quick and effective technique to analyze users’ perceptions of activities on social media. Many researchers and industry experts show their attention to Twitter sentiment analysis to recognize the stakeholder group. The sentiment analysis needs an advanced level of approaches including adoption to encompass data sentiment analysis and various machine learning tools. An assessment of sentiment analysis in multiple fields that affect their elevations among the people in real-time by using Naive Bayes and Support Vector Machine (SVM). This paper focused on analysing the distinguished sentiment techniques in tweets… More >

  • Open AccessOpen Access

    ARTICLE

    Political Optimizer with Deep Learning-Enabled Tongue Color Image Analysis Model

    Anwer Mustafa Hilal1,*, Eatedal Alabdulkreem2, Jaber S. Alzahrani3, Majdy M. Eltahir4, Mohamed I. Eldesouki5, Ishfaq Yaseen1, Abdelwahed Motwakel1, Radwa Marzouk6
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1129-1143, 2023, DOI:10.32604/csse.2023.030080 - 03 November 2022
    Abstract Biomedical image processing is widely utilized for disease detection and classification of biomedical images. Tongue color image analysis is an effective and non-invasive tool for carrying out secondary detection at anytime and anywhere. For removing the qualitative aspect, tongue images are quantitatively inspected, proposing a novel disease classification model in an automated way is preferable. This article introduces a novel political optimizer with deep learning enabled tongue color image analysis (PODL-TCIA) technique. The presented PODL-TCIA model purposes to detect the occurrence of the disease by examining the color of the tongue. To attain this, the More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS

    Hoonyong Park1, TaeGuen Kim1, Daniel Gerbi Duguma1, Jiyoon Kim2, Ilsun You2,*, Willy Susilo3
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1145-1165, 2023, DOI:10.32604/csse.2023.032044 - 03 November 2022
    Abstract Network operators are attempting many innovations and changes in 5G using self-organizing networks (SON). The SON operates on the measurement reports (MR), which are obtained from user equipment (UE) and secured against malware and userspace programs. However, the synchronization signal block that the UE relies on to measure the wireless environment configured by a base station is not authenticated. As a result, the UE will likely gauge the wrong wireless environment configured by a false base station (FBS) and transmit the corresponding MR to the serving base station, which poisons the data used for 5G… More >

  • Open AccessOpen Access

    ARTICLE

    De-Noising Brain MRI Images by Mixing Concatenation and Residual Learning (MCR)

    Kazim Ali1,*, Adnan N. Qureshi1, Muhammad Shahid Bhatti2, Abid Sohail2, Muhammad Hijji3, Atif Saeed2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1167-1186, 2023, DOI:10.32604/csse.2023.032508 - 03 November 2022
    Abstract Brain magnetic resonance images (MRI) are used to diagnose the different diseases of the brain, such as swelling and tumor detection. The quality of the brain MR images is degraded by different noises, usually salt & pepper and Gaussian noises, which are added to the MR images during the acquisition process. In the presence of these noises, medical experts are facing problems in diagnosing diseases from noisy brain MR images. Therefore, we have proposed a de-noising method by mixing concatenation, and residual deep learning techniques called the MCR de-noising method. Our proposed MCR method is… More >

  • Open AccessOpen Access

    ARTICLE

    Cooperative NOMA Based on OAM Transmission for Beyond 5G Applications

    Mohammad Alkhawatrah*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1187-1197, 2023, DOI:10.32604/csse.2023.030699 - 03 November 2022
    Abstract Cooperative non-orthogonal multiple access (NOMA) is heavily studied in the literature as a solution for 5G and beyond 5G applications. Cooperative NOMA transmits a superimposed version of all users’ messages simultaneously with the aid of a relay, after that, each user decodes its own message. Accordingly, NOMA is deemed as a spectral efficient technique. Another emerging technique exploits orbital angular momentum (OAM), where OAM is an attractive character of electromagnetic waves. OAM gathered a great deal of attention in recent years (similar to the case with NOMA) due to its ability to enhance electromagnetic spectrum… More >

  • Open AccessOpen Access

    ARTICLE

    Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS

    Himanshu Sharma1, karthikeyan Rajagopal2, G. Gugapriya3, Rajneesh Pareek1, Arun Kumar4, Haya Mesfer Alshahrani5, Mohamed K. Nour6, Hany Mahgoub7, Mohamed Mousa8, Anwer Mustafa Hilal9,*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1199-1210, 2023, DOI:10.32604/csse.2023.030909 - 03 November 2022
    Abstract Multicarrier Waveform (MCW) has several advantages and plays a very important role in cellular systems. Fifth generation (5G) MCW such as Non-Orthogonal Multiple Access (NOMA) and Filter Bank Multicarrier (FBMC) are thought to be important in 5G implementation. High Peak to Average Power Ratio (PAPR) is seen as a serious concern in MCW since it reduces the efficiency of amplifier use in the user devices. The paper presents a novel Divergence Selective Mapping (DSLM) and Divergence Partial Transmission Sequence (D-PTS) for 5G waveforms. It is seen that the proposed D-SLM and PTS lower PAPR with More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Storage for Energy Conservation in Tracking Wireless Sensor Network Objects

    Vineet Sharma1, Mohammad Zubair Khan2,*, Shivani Batra1, Abdullah Alsaeedi3, Prakash Srivastava4
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1211-1231, 2023, DOI:10.32604/csse.2023.029184 - 03 November 2022
    Abstract The amount of needed control messages in wireless sensor networks (WSN) is affected by the storage strategy of detected events. Because broadcasting superfluous control messages consumes excess energy, the network lifespan can be extended if the quantity of control messages is decreased. In this study, an optimized storage technique having low control overhead for tracking the objects in WSN is introduced. The basic concept is to retain observed events in internal memory and preserve the relationship between sensed information and sensor nodes using a novel inexpensive data structure entitled Ordered Binary Linked List (OBLL). Whenever More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Deep Learning Model for Software Bug Detection and Classification

    S. Sivapurnima*, D. Manjula
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1233-1248, 2023, DOI:10.32604/csse.2023.025991 - 03 November 2022
    Abstract Software is unavoidable in software development and maintenance. In literature, many methods are discussed which fails to achieve efficient software bug detection and classification. In this paper, efficient Adaptive Deep Learning Model (ADLM) is developed for automatic duplicate bug report detection and classification process. The proposed ADLM is a combination of Conditional Random Fields decoding with Long Short-Term Memory (CRF-LSTM) and Dingo Optimizer (DO). In the CRF, the DO can be consumed to choose the efficient weight value in network. The proposed automatic bug report detection is proceeding with three stages like pre-processing, feature extraction… More >

  • Open AccessOpen Access

    ARTICLE

    Competitive Multi-Verse Optimization with Deep Learning Based Sleep Stage Classification

    Anwer Mustafa Hilal1,*, Amal Al-Rasheed2, Jaber S. Alzahrani3, Majdy M. Eltahir4, Mesfer Al Duhayyim5, Nermin M. Salem6, Ishfaq Yaseen1, Abdelwahed Motwakel1
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1249-1263, 2023, DOI:10.32604/csse.2023.030603 - 03 November 2022
    Abstract Sleep plays a vital role in optimum working of the brain and the body. Numerous people suffer from sleep-oriented illnesses like apnea, insomnia, etc. Sleep stage classification is a primary process in the quantitative examination of polysomnographic recording. Sleep stage scoring is mainly based on experts’ knowledge which is laborious and time consuming. Hence, it can be essential to design automated sleep stage classification model using machine learning (ML) and deep learning (DL) approaches. In this view, this study focuses on the design of Competitive Multi-verse Optimization with Deep Learning Based Sleep Stage Classification (CMVODL-SSC)… More >

  • Open AccessOpen Access

    ARTICLE

    Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection

    M. Reji1,*, Christeena Joseph2, K. Thaiyalnayaki2, R. Lathamanju2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1265-1278, 2023, DOI:10.32604/csse.2023.026776 - 03 November 2022
    Abstract The wireless ad-hoc networks are decentralized networks with a dynamic topology that allows for end-to-end communications via multi-hop routing operations with several nodes collaborating themselves, when the destination and source nodes are not in range of coverage. Because of its wireless type, it has lot of security concerns than an infrastructure networks. Wormhole attacks are one of the most serious security vulnerabilities in the network layers. It is simple to launch, even if there is no prior network experience. Signatures are the sole thing that preventive measures rely on. Intrusion detection systems (IDS) and other… More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Deep Learning Model for Effective Spectrum Sensing in Dynamic SNR Scenario

    G. Arunachalam1,*, P. SureshKumar2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1279-1294, 2023, DOI:10.32604/csse.2023.031001 - 03 November 2022
    Abstract The main components of Cognitive Radio networks are Primary Users (PU) and Secondary Users (SU). The most essential method used in Cognitive networks is Spectrum Sensing, which detects the spectrum band and opportunistically accesses the free white areas for different users. Exploiting the free spaces helps to increase the spectrum efficiency. But the existing spectrum sensing techniques such as energy detectors, cyclo-stationary detectors suffer from various problems such as complexity, non-responsive behaviors under low Signal to Noise Ratio (SNR) and computational overhead, which affects the performance of the sensing accuracy. Many algorithms such as Long-Short… More >

  • Open AccessOpen Access

    ARTICLE

    Intrusion Detection Using Federated Learning for Computing

    R. S. Aashmi1,*, T. Jaya2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1295-1308, 2023, DOI:10.32604/csse.2023.027216 - 03 November 2022
    Abstract The integration of clusters, grids, clouds, edges and other computing platforms result in contemporary technology of jungle computing. This novel technique has the aptitude to tackle high performance computation systems and it manages the usage of all computing platforms at a time. Federated learning is a collaborative machine learning approach without centralized training data. The proposed system effectively detects the intrusion attack without human intervention and subsequently detects anomalous deviations in device communication behavior, potentially caused by malicious adversaries and it can emerge with new and unknown attacks. The main objective is to learn overall… More >

  • Open AccessOpen Access

    ARTICLE

    Profiling of Urban Noise Using Artificial Intelligence

    Le Quang Thao1,2,*, Duong Duc Cuong2, Tran Thi Tuong Anh3, Tran Duc Luong4
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1309-1321, 2023, DOI:10.32604/csse.2023.031010 - 03 November 2022
    Abstract Noise pollution tends to receive less awareness compared to other types of pollution, however, it greatly impacts the quality of life for humans such as causing sleep disruption, stress or hearing impairment. Profiling urban sound through the identification of noise sources in cities could help to benefit livability by reducing exposure to noise pollution through methods such as noise control, planning of the soundscape environment, or selection of safe living space. In this paper, we proposed a self-attention long short-term memory (LSTM) method that can improve sound classification compared to previous baselines. An attention mechanism… More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Resource Allocation and Queue Management for Traffic Control in MANET

    I. Ambika1,*, Surbhi Bhatia2, Shakila Basheer3, Pankaj Dadheech4
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1323-1342, 2023, DOI:10.32604/csse.2023.030786 - 03 November 2022
    Abstract A set of mobile devices that employs wireless transmission for communication is termed Mobile Ad hoc Networks (MANETs). Offering better communication services among the users in a centralized organization is the primary objective of the MANET. Due to the features of MANET, this can directly End-to-End Delay (EED) the Quality of Service (QoS). Hence, the implementation of resource management becomes an essential issue in MANETs. This paper focuses on the efficient Resource Allocation (RA) for many types of Traffic Flows (TF) in MANET. In Mobile Ad hoc Networks environments, the main objective of Resource Allocation… More >

  • Open AccessOpen Access

    ARTICLE

    Neighborhood Search Based Improved Bat Algorithm for Web Service Composition

    Fadl Dahan1,2,*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1343-1356, 2023, DOI:10.32604/csse.2023.031142 - 03 November 2022
    Abstract Web services are provided as reusable software components in the services-oriented architecture. More complicated composite services can be combined from these components to satisfy the user requirements represented as a workflow with specified Quality of Service (QoS) limitations. The workflow consists of tasks where many services can be considered for each task. Searching for optimal services combination and optimizing the overall QoS limitations is a Non-deterministic Polynomial (NP)-hard problem. This work focuses on the Web Service Composition (WSC) problem and proposes a new service composition algorithm based on the micro-bats behavior while hunting the prey.… More >

  • Open AccessOpen Access

    ARTICLE

    Covid-19 Diagnosis Using a Deep Learning Ensemble Model with Chest X-Ray Images

    Fuat Türk*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1357-1373, 2023, DOI:10.32604/csse.2023.030772 - 03 November 2022
    Abstract Covid-19 is a deadly virus that is rapidly spread around the world towards the end of the 2020. The consequences of this virus are quite frightening, especially when accompanied by an underlying disease. The novelty of the virus, the constant emergence of different variants and its rapid spread have a negative impact on the control and treatment process. Although the new test kits provide almost certain results, chest X-rays are extremely important to detect the progression and degree of the disease. In addition to the Covid-19 virus, pneumonia and harmless opacity of the lungs also… More >

  • Open AccessOpen Access

    ARTICLE

    DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN

    A. Venkatesh1, S. Asha2,*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1375-1392, 2023, DOI:10.32604/csse.2023.030944 - 03 November 2022
    Abstract A Wireless Sensor Network (WSN) is constructed with numerous sensors over geographical regions. The basic challenge experienced while designing WSN is in increasing the network lifetime and use of low energy. As sensor nodes are resource constrained in nature, novel techniques are essential to improve lifetime of nodes in WSN. Nodes energy is considered as an important resource for sensor node which are battery powered based. In WSN, energy is consumed mainly while data is being transferred among nodes in the network. Several research works are carried out focusing on preserving energy of nodes in… More >

  • Open AccessOpen Access

    ARTICLE

    Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model

    Hanan Abdullah Mengash1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Fahd N. Al-Wesabi4, Abdullah Mohamed5, Manar Ahmed Hamza6,*, Radwa Marzouk7
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1393-1407, 2023, DOI:10.32604/csse.2023.030328 - 03 November 2022
    Abstract Presently, smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping, e-learning, e-healthcare, etc. Despite the benefits of advanced technologies, issues are also existed from the transformation of the physical word into digital word, particularly in online social networks (OSN). Cyberbullying (CB) is a major problem in OSN which needs to be addressed by the use of automated natural language processing (NLP) and machine learning (ML) approaches. This article devises a novel search and rescue optimization with machine learning enabled cybersecurity model for… More >

  • Open AccessOpen Access

    ARTICLE

    Image Enhancement Using Adaptive Fractional Order Filter

    Ayesha Heena1,*, Nagashettappa Biradar1, Najmuddin M. Maroof2, Surbhi Bhatia3, Arwa Mashat4, Shakila Basheer5
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1409-1422, 2023, DOI:10.32604/csse.2023.029611 - 03 November 2022
    Abstract Image enhancement is an important preprocessing task as the contrast is low in most of the medical images, Therefore, enhancement becomes the mandatory process before actual image processing should start. This research article proposes an enhancement of the model-based differential operator for the images in general and Echocardiographic images, the proposed operators are based on Grunwald-Letnikov (G-L), Riemann-Liouville (R-L) and Caputo (Li & Xie), which are the definitions of fractional order calculus. In this fractional-order, differentiation is well focused on the enhancement of echocardiographic images. This provoked for developing a non-linear filter mask for image… More >

  • Open AccessOpen Access

    ARTICLE

    Radial Basis Approximations Based BEMD for Enhancement of Non-Uniform Illumination Images

    Anchal Tyagi1, Salem Alelyani2, Sapna Katiyar3, Mohammad Rashid Hussain2,*, Rijwan Khan3, Mohammed Saleh Alsaqer2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1423-1438, 2023, DOI:10.32604/csse.2023.026057 - 03 November 2022
    Abstract An image can be degraded due to many environmental factors like foggy or hazy weather, low light conditions, extra light conditions etc. Image captured under the poor light conditions is generally known as non-uniform illumination image. Non-uniform illumination hides some important information present in an image during the image capture Also, it degrades the visual quality of image which generates the need for enhancement of such images. Various techniques have been present in literature for the enhancement of such type of images. In this paper, a novel architecture has been proposed for enhancement of poor… More >

  • Open AccessOpen Access

    ARTICLE

    Leveraging Readability and Sentiment in Spam Review Filtering Using Transformer Models

    Sujithra Kanmani*, Surendiran Balasubramanian
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1439-1454, 2023, DOI:10.32604/csse.2023.029953 - 03 November 2022
    Abstract Online reviews significantly influence decision-making in many aspects of society. The integrity of internet evaluations is crucial for both consumers and vendors. This concern necessitates the development of effective fake review detection techniques. The goal of this study is to identify fraudulent text reviews. A comparison is made on shill reviews vs. genuine reviews over sentiment and readability features using semi-supervised language processing methods with a labeled and balanced Deceptive Opinion dataset. We analyze textual features accessible in internet reviews by merging sentiment mining approaches with readability. Overall, the research improves fake review screening by using More >

  • Open AccessOpen Access

    ARTICLE

    A Machine Learning Approach for Artifact Removal from Brain Signal

    Sandhyalati Behera, Mihir Narayan Mohanty*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1455-1467, 2023, DOI:10.32604/csse.2023.029649 - 03 November 2022
    Abstract Electroencephalography (EEG), helps to analyze the neuronal activity of a human brain in the form of electrical signals with high temporal resolution in the millisecond range. To extract clean clinical information from EEG signals, it is essential to remove unwanted artifacts that are due to different causes including at the time of acquisition. In this piece of work, the authors considered the EEG signal contaminated with Electrocardiogram (ECG) artifacts that occurs mostly in cardiac patients. The clean EEG is taken from the openly available Mendeley database whereas the ECG signal is collected from the Physionet… More >

  • Open AccessOpen Access

    ARTICLE

    Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram

    Doaa Sami Khafaga1, Amel Ali Alhussan1,*, Abdelaziz A. Abdelhamid2,3, Abdelhameed Ibrahim4, Mohamed Saber5, El-Sayed M. El-kenawy6,7
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1469-1482, 2023, DOI:10.32604/csse.2023.031943 - 03 November 2022
    Abstract Arrhythmia has been classified using a variety of methods. Because of the dynamic nature of electrocardiogram (ECG) data, traditional handcrafted approaches are difficult to execute, making the machine learning (ML) solutions more appealing. Patients with cardiac arrhythmias can benefit from competent monitoring to save their lives. Cardiac arrhythmia classification and prediction have greatly improved in recent years. Arrhythmias are a category of conditions in which the heart's electrical activity is abnormally rapid or sluggish. Every year, it is one of the main reasons of mortality for both men and women, worldwide. For the classification of… More >

  • Open AccessOpen Access

    ARTICLE

    PSO-DBNet for Peak-to-Average Power Ratio Reduction Using Deep Belief Network

    A. Jameer Basha1,*, M. Ramya Devi2, S. Lokesh1, P. Sivaranjani3, D. Mansoor Hussain4, Venkat Padhy5
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1483-1493, 2023, DOI:10.32604/csse.2023.021540 - 03 November 2022
    Abstract Data transmission through a wireless network has faced various signal problems in the past decades. The orthogonal frequency division multiplexing (OFDM) technique is widely accepted in multiple data transfer patterns at various frequency bands. A recent wireless communication network uses OFDM in long-term evolution (LTE) and 5G, among others. The main problem faced by 5G wireless OFDM is distortion of transmission signals in the network. This transmission loss is called peak-to-average power ratio (PAPR). This wireless signal distortion can be reduced using various techniques. This study uses machine learning-based algorithm to solve the problem of More >

  • Open AccessOpen Access

    ARTICLE

    Real Time Automation and Ratio Control Using PLC & SCADA in Industry 4.0

    Basant Tomar*, Narendra Kumar, Mini Sreejeth
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1495-1516, 2023, DOI:10.32604/csse.2023.030635 - 03 November 2022
    Abstract Industrial Control Systems (ICS) and SCADA (Supervisory Control and Data Acquisition) systems play a critical role in the management and regulation of critical infrastructure. SCADA systems brings us closer to the real-time application world. All process and equipment control capability is typically provided by a Distributed Control System (DCS) in industries such as power stations, agricultural systems, chemical and water treatment plants. Instead of control through DCS, this paper proposes a SCADA and PLC (Programmable Logic Controller) system to control the ratio control division and the assembly line division inside the chemical plant. A specific… More >

  • Open AccessOpen Access

    ARTICLE

    Resource Allocation Based on SFLA Algorithm for D2D Multicast Communications

    Wisam Hayder Mahdi1,*, Necmi Taşpınar2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1517-1530, 2023, DOI:10.32604/csse.2023.030069 - 03 November 2022
    Abstract Multicast device-to-device (D2D) communication technology is considered as one of the new technologies in the fifth generation (5G) networks that directly addresses the need for content sharing among internet users. In fact, when direct communication is available between devices, the spectral efficiency is improved by reusing the licensed cellular spectrum. The current studies show that D2D communication increases network capacity and reduces latency. In order to achieve the alternate capabilities, coordination is required to implement interference management. We considered subcarrier allocation for the uplink, in addition to the power control that takes place on the… More >

  • Open AccessOpen Access

    ARTICLE

    Attribute Reduction for Information Systems via Strength of Rules and Similarity Matrix

    Mohsen Eid1, Tamer Medhat2,*, Manal E. Ali3
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1531-1544, 2023, DOI:10.32604/csse.2023.031745 - 03 November 2022
    Abstract An information system is a type of knowledge representation, and attribute reduction is crucial in big data, machine learning, data mining, and intelligent systems. There are several ways for solving attribute reduction problems, but they all require a common categorization. The selection of features in most scientific studies is a challenge for the researcher. When working with huge datasets, selecting all available attributes is not an option because it frequently complicates the study and decreases performance. On the other side, neglecting some attributes might jeopardize data accuracy. In this case, rough set theory provides a… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Soil Quality Prediction Model Using Deep Learning for Smart Agriculture Systems

    P. Sumathi1,*, V. V. Karthikeyan2, M. S. Kavitha3, S. Karthik3
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1545-1559, 2023, DOI:10.32604/csse.2023.027580 - 03 November 2022
    Abstract Soil is the major source of infinite lives on Earth and the quality of soil plays significant role on Agriculture practices all around. Hence, the evaluation of soil quality is very important for determining the amount of nutrients that the soil require for proper yield. In present decade, the application of deep learning models in many fields of research has created greater impact. The increasing soil data availability of soil data there is a greater demand for the remotely avail open source model, leads to the incorporation of deep learning method to predict the soil… More >

  • Open AccessOpen Access

    ARTICLE

    Internet of Things Enabled Energy Aware Metaheuristic Clustering for Real Time Disaster Management

    Riya Kumarasamy Santhanaraj1, Surendran Rajendran2,*, Carlos Andres Tavera Romero3, Sadish Sendil Murugaraj4
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1561-1576, 2023, DOI:10.32604/csse.2023.029463 - 03 November 2022
    Abstract Wireless Sensor Networks (WSNs) are a major element of Internet of Things (IoT) networks which offer seamless sensing and wireless connectivity. Disaster management in smart cities can be considered as a safety critical application. Therefore, it becomes essential in ensuring network accessibility by improving the lifetime of IoT assisted WSN. Clustering and multihop routing are considered beneficial solutions to accomplish energy efficiency in IoT networks. This article designs an IoT enabled energy aware metaheuristic clustering with routing protocol for real time disaster management (EAMCR-RTDM). The proposed EAMCR-RTDM technique mainly intends to manage the energy utilization… More >

  • Open AccessOpen Access

    ARTICLE

    Copy Move Forgery Detection Using Novel Quadsort Moth Flame Light Gradient Boosting Machine

    R. Dhanya1,*, R. Kalaiselvi2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1577-1593, 2023, DOI:10.32604/csse.2023.031319 - 03 November 2022
    Abstract A severe problem in modern information systems is Digital media tampering along with fake information. Even though there is an enhancement in image development, image forgery, either by the photographer or via image manipulations, is also done in parallel. Numerous researches have been concentrated on how to identify such manipulated media or information manually along with automatically; thus conquering the complicated forgery methodologies with effortlessly obtainable technologically enhanced instruments. However, high complexity affects the developed methods. Presently, it is complicated to resolve the issue of the speed-accuracy trade-off. For tackling these challenges, this article put… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Method for Accounting Information in Logistic Systems

    Ahmad Mohammed Alamri1, Ahmad Ali AlZubi2,*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1595-1609, 2023, DOI:10.32604/csse.2023.027971 - 03 November 2022
    Abstract In the era of rapid information development, with the popularity of computers, the advancement of science and technology, and the ongoing expansion of IT technology and business, the enterprise resource planning (ERP) system has evolved into a platform and a guarantee for the fulfilment of company management procedures after long-term operations. Because of developments in information technology, most manual accounting procedures are being replaced by computerized Accounting Information Systems (AIS), which are quicker and more accurate. The primary factors influencing the decisions of logistics firm trading parties are investigated in order to enhance the design… More >

  • Open AccessOpen Access

    ARTICLE

    Energy Proficient Reduced Coverage Set with Particle Swarm Optimization for Distributed Sensor Network

    T. V. Chithra1,*, A. Milton2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1611-1623, 2023, DOI:10.32604/csse.2023.026561 - 03 November 2022
    Abstract Retransmission avoidance is an essential need for any type of wireless communication. As retransmissions induce the unnecessary presence of redundant data in every accessible node. As storage capacity is symmetrical to the size of the memory, less storage capacity is experienced due to the restricted size of the respective node. In this proposed work, we have discussed the integration of the Energy Proficient Reduced Coverage Set with Particle Swarm Optimization (PSO). PSO is a metaheuristic global search enhancement technique that promotes the searching of the best nodes in the search space. PSO is integrated with More >

  • Open AccessOpen Access

    ARTICLE

    Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

    B. Yasotha1,*, T. Sasikala2, M. Krishnamurthy3
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1625-1640, 2023, DOI:10.32604/csse.2023.025669 - 03 November 2022
    Abstract The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Metaheuristic Based Failure Prediction with Migration Optimization in Cloud Environment

    K. Karthikeyan1,*, Liyakathunisa2, Eman Aljohani2, Thavavel Vaiyapuri3
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1641-1654, 2023, DOI:10.32604/csse.2023.031582 - 03 November 2022
    Abstract Cloud data centers consume high volume of energy for processing and switching the servers among different modes. Virtual Machine (VM) migration enhances the performance of cloud servers in terms of energy efficiency, internal failures and availability. On the other end, energy utilization can be minimized by decreasing the number of active, underutilized sources which conversely reduces the dependability of the system. In VM migration process, the VMs are migrated from underutilized physical resources to other resources to minimize energy utilization and optimize the operations. In this view, the current study develops an Improved Metaheuristic Based… More >

  • Open AccessOpen Access

    ARTICLE

    Liver Tumors Segmentation Using 3D SegNet Deep Learning Approach

    G. Nallasivan1,*, V. Ramachandran2, Roobaea Alroobaea3, Jasem Almotiri4
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1655-1677, 2023, DOI:10.32604/csse.2023.030697 - 03 November 2022
    Abstract An ultrasonic filter detects signs of malignant tumors by analysing the image’s pixel quality fluctuations caused by a liver ailment. Signs of malignant growth proximity are identified in an ultrasound filter through image pixel quality variations from a liver’s condition. Those changes are more common in alcoholic liver conditions than in other etiologies of cirrhosis, suggesting that the cause may be alcohol instead of liver disease. Existing Two-Dimensional (2D) ultrasound data sets contain an accuracy rate of 85.9% and a 2D Computed Tomography (CT) data set of 91.02%. The most recent work on designing a… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model

    Mashael M Asiri1, Heba G. Mohamed2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Amira Sayed A. Aziz5, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Mohamed I. Eldesouki7
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1679-1694, 2023, DOI:10.32604/csse.2023.031063 - 03 November 2022
    Abstract Due to exponential increase in smart resource limited devices and high speed communication technologies, Internet of Things (IoT) have received significant attention in different application areas. However, IoT environment is highly susceptible to cyber-attacks because of memory, processing, and communication restrictions. Since traditional models are not adequate for accomplishing security in the IoT environment, the recent developments of deep learning (DL) models find beneficial. This study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection (HMFS-SDLCAD) model. The major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks… More >

  • Open AccessOpen Access

    ARTICLE

    Fast Mesh Reconstruction from Single View Based on GCN and Topology Modification

    Xiaorui Zhang1,2,3,*, Feng Xu2, Wei Sun3,4, Yan Jiang2, Yi Cao5
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1695-1709, 2023, DOI:10.32604/csse.2023.031506 - 03 November 2022
    Abstract 3D reconstruction based on single view aims to reconstruct the entire 3D shape of an object from one perspective. When existing methods reconstruct the mesh surface of complex objects, the surface details are difficult to predict and the reconstruction visual effect is poor because the mesh representation is not easily integrated into the deep learning framework; the 3D topology is easily limited by predefined templates and inflexible, and unnecessary mesh self-intersections and connections will be generated when reconstructing complex topology, thus destroying the surface details; the training of the reconstruction network is limited by the… More >

  • Open AccessOpen Access

    ARTICLE

    Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network

    Manar Ahmed Hamza1,2,*, Aisha Hassan Abdalla Hashim1, Dalia H. Elkamchouchi3, Nadhem Nemri4, Jaber S. Alzahrani5, Amira Sayed A. Aziz6, Mnahel Ahmed Ibrahim7, Abdelwahed Motwakel2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1711-1726, 2023, DOI:10.32604/csse.2023.031467 - 03 November 2022
    Abstract Wireless Sensor Network (WSN) consists of a group of limited energy source sensors that are installed in a particular region to collect data from the environment. Designing the energy-efficient data collection methods in large-scale wireless sensor networks is considered to be a difficult area in the research. Sensor node clustering is a popular approach for WSN. Moreover, the sensor nodes are grouped to form clusters in a cluster-based WSN environment. The battery performance of the sensor nodes is likewise constrained. As a result, the energy efficiency of WSNs is critical. In specific, the energy usage… More >

  • Open AccessOpen Access

    ARTICLE

    DoS Attack Detection Based on Deep Factorization Machine in SDN

    Jing Wang1, Xiangyu Lei1, Qisheng Jiang1, Osama Alfarraj2, Amr Tolba2, Gwang-jun Kim3,*
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1727-1742, 2023, DOI:10.32604/csse.2023.030183 - 03 November 2022
    Abstract Software-Defined Network (SDN) decouples the control plane of network devices from the data plane. While alleviating the problems presented in traditional network architectures, it also brings potential security risks, particularly network Denial-of-Service (DoS) attacks. While many research efforts have been devoted to identifying new features for DoS attack detection, detection methods are less accurate in detecting DoS attacks against client hosts due to the high stealth of such attacks. To solve this problem, a new method of DoS attack detection based on Deep Factorization Machine (DeepFM) is proposed in SDN. Firstly, we select the Growth… More >

  • Open AccessOpen Access

    ARTICLE

    Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries

    G. Sharmila1,*, M. K. Kavitha Devi2
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1743-1758, 2023, DOI:10.32604/csse.2023.032127 - 03 November 2022
    Abstract Over the past era, subgraph mining from a large collection of graph database is a crucial problem. In addition, scalability is another big problem due to insufficient storage. There are several security challenges associated with subgraph mining in today’s on-demand system. To address this downside, our proposed work introduces a Blockchain-based Consensus algorithm for Authenticated query search in the Large-Scale Dynamic Graphs (BCCA-LSDG). The two-fold process is handled in the proposed BCCA-LSDG: graph indexing and authenticated query search (query processing). A blockchain-based reputation system is meant to maintain the trust blockchain and cloud server of… More >

  • Open AccessOpen Access

    ARTICLE

    Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol

    Manar Ahmed Hamza1,*, Haya Mesfer Alshahrani2, Sami Dhahbi3, Mohamed K Nour4, Mesfer Al Duhayyim5, ElSayed M. Tag El Din6, Ishfaq Yaseen1, Abdelwahed Motwakel1
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1759-1773, 2023, DOI:10.32604/csse.2023.030581 - 03 November 2022
    Abstract Wireless Sensor Networks (WSN) has evolved into a key technology for ubiquitous living and the domain of interest has remained active in research owing to its extensive range of applications. In spite of this, it is challenging to design energy-efficient WSN. The routing approaches are leveraged to reduce the utilization of energy and prolonging the lifespan of network. In order to solve the restricted energy problem, it is essential to reduce the energy utilization of data, transmitted from the routing protocol and improve network development. In this background, the current study proposes a novel Differential… More >

  • Open AccessOpen Access

    ARTICLE

    Edge Computing Platform with Efficient Migration Scheme for 5G/6G Networks

    Abdelhamied A. Ateya1, Amel Ali Alhussan2,*, Hanaa A. Abdallah3, Mona A. Al duailij2, Abdukodir Khakimov4, Ammar Muthanna5
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1775-1787, 2023, DOI:10.32604/csse.2023.031841 - 03 November 2022
    Abstract Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds and achieve ultra-high reliability, availability, and ultra-low latency. The requirements of such networks are the main challenges that can be handled using a range of recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), and software-defined networking. Many aspects and design challenges associated with the MEC-based 5G/6G networks should be solved to ensure the required quality of service (QoS). This article considers developing a complex MEC structure for fifth and sixth-generation (5G/6G) cellular networks. Furthermore, More >

  • Open AccessOpen Access

    ARTICLE

    Optimized Resource Allocation for IoT-D2D Communication Using WSN

    S. Arun Mozhi Selvi1,*, Roobaea Alroobaea2, Saeed Rubaiee3, Abdulkader S. Hanbazazah3
    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1789-1804, 2023, DOI:10.32604/csse.2023.031341 - 03 November 2022
    Abstract The need for a strong system to access radio resources demands a change in operating frequency in wireless networks as a part of Radio Resource Management (RRM). In the fifth-generation (5G) wireless networks, the capacity of the system is expected to be enhanced by Device-to-Device (D2D) communication. The cooperation and Resources Allocation (RA) in the development of Internet of Things (IoT) enabled 5G wireless networks are investigated in this paper. Developing radio RA methods for D2D communication while not affecting any Mobile Users’ (MU) communication is the main challenge of this research. Distinct performance goals… More >

Per Page:

Share Link