The Computer Systems Science and Engineering journal is devoted to the publication of high quality papers on theoretical developments in computer systems science, and their applications in computer systems engineering. Original research papers, state-of-the-art reviews and technical notes are invited for publication. Computer Systems Science and Engineering is published monthly by Tech Science Press.
Science Citation Index (Web of Science): 2021 Impact Factor 4.397; Scopus Cite Score (Impact per Publication 2021): 1.9; SNIP (Source Normalized Impact per Paper 2021): 0.827; ACM Digital Library.
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2651-2666, 2023, DOI:10.32604/csse.2023.031720
Abstract With the advent of Reinforcement Learning (RL) and its continuous
progress, state-of-the-art RL systems have come up for many challenging and
real-world tasks. Given the scope of this area, various techniques are found in
the literature. One such notable technique, Multiple Deep Q-Network (DQN) based
RL systems use multiple DQN-based-entities, which learn together and communicate with each other. The learning has to be distributed wisely among all entities in
such a scheme and the inter-entity communication protocol has to be carefully
designed. As more complex DQNs come to the fore, the overall complexity of these
multi-entity systems has increased many… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2667-2685, 2023, DOI:10.32604/csse.2023.031114
Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques)
train datasets which sometime are inadequate in terms of sample for inferring
information. A dynamic strategy, DevMLOps (Development Machine Learning
Operations) used in automatic selections and tunings of MLTs result in significant
performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and
increased classification execution times. RFEs (Recursive Feature Eliminations)
are computationally very expensive in its operations as it traverses through each
feature without considering correlations between them. This problem can… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2687-2709, 2023, DOI:10.32604/csse.2023.036293
Abstract The power factor is the ratio between the active and apparent power, and it is available to determine the operational capability of the intended circuit or the parts. The excitation current of the synchronous motor is an essential parameter required for adjusting the power factor because it determines whether the motor is under the optimal operating status. Although the excitation current should predict with the experimental devices, such a method is unsuitable for online real-time prediction. The artificial intelligence algorithm can compensate for the defect of conventional measurement methods requiring the measuring devices and the model optimization is compared during… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2711-2724, 2023, DOI:10.32604/csse.2023.032047
Abstract Fine-grained image search is one of the most challenging tasks
in computer vision that aims to retrieve similar images at the fine-grained
level for a given query image. The key objective is to learn discriminative
fine-grained features by training deep models such that similar images are
clustered, and dissimilar images are separated in the low embedding space.
Previous works primarily focused on defining local structure loss functions
like triplet loss, pairwise loss, etc. However, training via these approaches
takes a long training time, and they have poor accuracy. Additionally, representations learned through it tend to tighten up in the embedded… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2725-2739, 2023, DOI:10.32604/csse.2023.030504
Abstract Deep Learning (DL) is known for its golden standard computing paradigm in the learning community. However, it turns out to be an extensively utilized computing approach in the ML field. Therefore, attaining superior outcomes over cognitive tasks based on human performance. The primary benefit of DL is its competency in learning massive data. The DL-based technologies have grown faster and are widely adopted to handle the conventional approaches resourcefully. Specifically, various DL approaches outperform the conventional ML approaches in real-time applications. Indeed, various research works are reviewed to understand the significance of the individual DL models and some computational complexity… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2741-2754, 2023, DOI:10.32604/csse.2023.037706
Abstract The analysis of overcrowded areas is essential for flow monitoring, assembly control, and security. Crowd counting’s primary goal is to calculate the population in a given region, which requires real-time analysis of congested scenes for prompt reactionary actions. The crowd is always unexpected, and the benchmarked available datasets have a lot of variation, which limits the trained models’ performance on unseen test data. In this paper, we proposed an end-to-end deep neural network that takes an input image and generates a density map of a crowd scene. The proposed model consists of encoder and decoder networks comprising batch-free normalization layers… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2755-2772, 2023, DOI:10.32604/csse.2023.034609
Abstract Natural Language Processing (NLP) for the Arabic language has gained much significance in recent years. The most commonly-utilized NLP task is the ‘Text Classification’ process. Its main intention is to apply the Machine Learning (ML) approaches for automatically classifying the textual files into one or more pre-defined categories. In ML approaches, the first and foremost crucial step is identifying an appropriate large dataset to test and train the method. One of the trending ML techniques, i.e., Deep Learning (DL) technique needs huge volumes of different types of datasets for training to yield the best outcomes. The current study designs a… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2773-2795, 2023, DOI:10.32604/csse.2023.036371
Abstract The precise diagnosis of Alzheimer’s disease is critical for patient treatment, especially at the early stage, because awareness of the severity and progression risks lets patients take preventative actions before irreversible brain damage occurs. It is possible to gain a holistic view of Alzheimer’s disease staging by combining multiple data modalities, known as image fusion. In this paper, the study proposes the early detection of Alzheimer’s disease using different modalities of Alzheimer’s disease brain images. First, the preprocessing was performed on the data. Then, the data augmentation techniques are used to handle overfitting. Also, the skull is removed to lead… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2797-2808, 2023, DOI:10.32604/csse.2023.031988
Abstract The field of sentiment analysis (SA) has grown in tandem with the aid of social networking platforms to exchange opinions and ideas. Many people share their views and ideas around the world through social media like Facebook and Twitter. The goal of opinion mining, commonly referred to as sentiment analysis, is to categorise and forecast a target’s opinion. Depending on if they provide a positive or negative perspective on a given topic, text documents or sentences can be classified. When compared to sentiment analysis, text categorization may appear to be a simple process, but number of challenges have prompted numerous… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2809-2820, 2023, DOI:10.32604/csse.2023.035494
Abstract Complex systems in the real world often can be modeled as network structures, and community discovery algorithms for complex networks enable researchers to understand the internal structure and implicit information of networks. Existing community discovery algorithms are usually designed for single-layer networks or single-interaction relationships and do not consider the attribute information of nodes. However, many real-world networks consist of multiple types of nodes and edges, and there may be rich semantic information on nodes and edges. The methods for single-layer networks cannot effectively tackle multi-layer information, multi-relationship information, and attribute information. This paper proposes a community discovery algorithm based… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2821-2844, 2023, DOI:10.32604/csse.2023.037330
Abstract Expert knowledge is the key to modeling milling fault detection systems based on the belief rule base. The construction of an initial expert knowledge base seriously affects the accuracy and interpretability of the milling fault detection model. However, due to the complexity of the milling system structure and the uncertainty of the milling failure index, it is often impossible to construct model expert knowledge effectively. Therefore, a milling system fault detection method based on fault tree analysis and hierarchical BRB (FTBRB) is proposed. Firstly, the proposed method uses a fault tree and hierarchical BRB modeling. Through fault tree analysis (FTA),… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2845-2859, 2023, DOI:10.32604/csse.2023.033326
Abstract As the use of mobile devices continues to rise, trust administration will significantly improve security in routing the guaranteed quality of service (QoS) supply in Mobile Ad Hoc Networks (MANET) due to the mobility of the nodes. There is no continuance of network communication between nodes in a delay-tolerant network (DTN). DTN is designed to complete recurring connections between nodes. This approach proposes a dynamic source routing protocol (DSR) based on a feed-forward neural network (FFNN) and energy-based random repetition trust calculation in DTN. If another node is looking for a node that swerved off of its path in this… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2861-2880, 2023, DOI:10.32604/csse.2023.036810
Abstract Aquaculture has long been a critical economic sector in Taiwan. Since a key factor in aquaculture production efficiency is water quality, an effective means of monitoring the dissolved oxygen content (DOC) of aquaculture water is essential. This study developed an internet of things system for monitoring DOC by collecting essential data related to water quality. Artificial intelligence technology was used to construct a water quality prediction model for use in a complete system for managing water quality. Since aquaculture water quality depends on a continuous interaction among multiple factors, and the current state is correlated with the previous state, a… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2881-2897, 2023, DOI:10.32604/csse.2023.036864
Abstract In recent years, real-time video streaming has grown in popularity. The growing popularity of the Internet of Things (IoT) and other wireless heterogeneous networks mandates that network resources be carefully apportioned among versatile users in order to achieve the best Quality of Experience (QoE) and performance objectives. Most researchers focused on Forward Error Correction (FEC) techniques when attempting to strike a balance between QoE and performance. However, as network capacity increases, the performance degrades, impacting the live visual experience. Recently, Deep Learning (DL) algorithms have been successfully integrated with FEC to stream videos across multiple heterogeneous networks. But these algorithms… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2899-2915, 2023, DOI:10.32604/csse.2023.036657
Abstract The rapid growth of the Internet of Things (IoT) in the industrial
sector has given rise to a new term: the Industrial Internet of Things (IIoT).
The IIoT is a collection of devices, apps, and services that connect physical and virtual worlds to create smart, cost-effective, and scalable systems.
Although the IIoT has been implemented and incorporated into a wide range
of industrial control systems, maintaining its security and privacy remains
a significant concern. In the IIoT contexts, an intrusion detection system
(IDS) can be an effective security solution for ensuring data confidentiality,
integrity, and availability. In this paper, we… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2917-2932, 2023, DOI:10.32604/csse.2023.037016
Abstract In the Internet of Things (IoT) based system, the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems (UCS). The UCS necessitates heterogeneity, management level, and data transmission for distributed users. Simultaneously, security remains a major issue in the IoT-driven UCS. Besides, energy-limited IoT devices need an effective clustering strategy for optimal energy utilization. The recent developments of explainable artificial intelligence (XAI) concepts can be employed to effectively design intrusion detection systems (IDS) for accomplishing security in UCS. In this view, this study designs a novel Blockchain with Explainable Artificial Intelligence… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2933-2945, 2023, DOI:10.32604/csse.2023.034288
Abstract The immediate and quick spread of the coronavirus has become a life-threatening disease around the globe. The widespread illness has dramatically changed almost all sectors, moving from offline to online, resulting in a new normal lifestyle for people. The impact of coronavirus is tremendous in the healthcare sector, which has experienced a decline in the first quarter of 2020. This pandemic has created an urge to use computer-aided diagnosis techniques for classifying the Covid-19 dataset to reduce the burden of clinical results. The current situation motivated me to choose correlation-based development called correlation-based grey wolf optimizer to perform accurate classification.… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2947-2961, 2023, DOI:10.32604/csse.2023.034456
Abstract Online reviews regarding purchasing services or products offered are the main source of users’ opinions. To gain fame or profit, generally, spam reviews are written to demote or promote certain targeted products or services. This practice is called review spamming. During the last few years, various techniques have been recommended to solve the problem of spam reviews. Previous spam detection study focuses on English reviews, with a lesser interest in other languages. Spam review detection in Arabic online sources is an innovative topic despite the vast amount of data produced. Thus, this study develops an Automated Spam Review Detection using… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2963-2974, 2023, DOI:10.32604/csse.2023.025908
Abstract Acoustic emission (AE) is a nondestructive real-time monitoring technology, which has been proven to be a valid way of monitoring dynamic damage to materials. The classification and recognition methods of the AE signals of the rotor are mostly focused on machine learning. Considering that the huge success of deep learning technologies, where the Recurrent Neural Network (RNN) has been widely applied to sequential classification tasks and Convolutional Neural Network (CNN) has been widely applied to image recognition tasks. A novel three-streams neural network (TSANN) model is proposed in this paper to deal with fault detection tasks. Based on residual connection… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2975-2994, 2023, DOI:10.32604/csse.2023.037505
Abstract
In order to obtain information or discover knowledge from system logs, the first step is to perform log parsing, whereby unstructured raw logs can be transformed into a sequence of structured events. Although comprehensive studies on log parsing have been conducted in recent years, most assume that one event object corresponds to a single-line message. However, in a growing number of scenarios, one event object spans multiple lines in the log, for which parsing methods toward single-line events are not applicable. In order to address this problem, this paper proposes an automated
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 2995-3015, 2023, DOI:10.32604/csse.2023.036778
Abstract Timely identification and treatment of medical conditions could facilitate faster recovery and better health. Existing systems address this issue using custom-built sensors, which are invasive and difficult to generalize. A low-complexity scalable process is proposed to detect and identify medical conditions from 2D skeletal movements on video feed data. Minimal set of features relevant to distinguish medical conditions: AMF, PVF and GDF are derived from skeletal data on sampled frames across the entire action. The AMF (angular motion features) are derived to capture the angular motion of limbs during a specific action. The relative position of joints is represented by… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3017-3036, 2023, DOI:10.32604/csse.2023.037281
Abstract Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data. Medical picture encryption is a crucial step in many cloud-based and healthcare applications. In this study, a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things (IoMT) and cloud storage. A disorganized three-dimensional map is the foundation of the proposed cipher. The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process. The suggested cryptosystem… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3037-3058, 2023, DOI:10.32604/csse.2023.037113
Abstract The continuing advances in deep learning have paved the way for several challenging ideas. One such idea is visual lip-reading, which has recently drawn many research interests. Lip-reading, often referred to as visual speech recognition, is the ability to understand and predict spoken speech based solely on lip movements without using sounds. Due to the lack of research studies on visual speech recognition for the Arabic language in general, and its absence in the Quranic research, this research aims to fill this gap. This paper introduces a new publicly available Arabic lip-reading dataset containing 10490 videos captured from multiple viewpoints… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3059-3073, 2023, DOI:10.32604/csse.2023.038664
Abstract Nowadays, with the significant growth of the mobile market, security issues on the Android Operation System have also become an urgent matter. Trusted execution environment (TEE) technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security. However, for Android, TEE technologies still contain restrictions and limitations. The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE. Another issue of hardware-based TEE is the cross-platform problem. Since every mobile device supports different TEE vendors, it becomes an obstacle for developers to migrate their trusted applications to other… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3075-3085, 2023, DOI:10.32604/csse.2023.034268
Abstract The current adversarial attacks against deep learning models have achieved incredible success in the white-box scenario. However, they often exhibit weak transferability in the black-box scenario, especially when attacking those with defense mechanisms. In this work, we propose a new transfer-based black-box attack called the channel decomposition attack method (CDAM). It can attack multiple black-box models by enhancing the transferability of the adversarial examples. On the one hand, it tunes the gradient and stabilizes the update direction by decomposing the channels of the input example and calculating the aggregate gradient. On the other hand, it helps to escape from local… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3087-3102, 2023, DOI:10.32604/csse.2023.036802
Abstract With the advent of the Internet of Things (IoT), several devices like sensors nowadays can interact and easily share information. But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable. In such scenarios, security concern is the most prominent. Different models were intended to address these security problems; still, several emergent variants of botnet attacks like Bashlite, Mirai, and Persirai use security breaches. The malware classification and detection in the IoT model is still a problem, as the adversary reliably generates a new variant of IoT malware and actively… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3103-3119, 2023, DOI:10.32604/csse.2023.034034
Abstract Malware is a ‘malicious software program that performs multiple cyberattacks on the Internet, involving fraud, scams, nation-state cyberwar, and cybercrime. Such malicious software programs come under different classifications, namely Trojans, viruses, spyware, worms, ransomware, Rootkit, botnet malware, etc. Ransomware is a kind of malware that holds the victim’s data hostage by encrypting the information on the user’s computer to make it inaccessible to users and only decrypting it; then, the user pays a ransom procedure of a sum of money. To prevent detection, various forms of ransomware utilize more than one mechanism in their attack flow in conjunction with Machine… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3121-3139, 2023, DOI:10.32604/csse.2023.036352
Abstract With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL)… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3141-3158, 2023, DOI:10.32604/csse.2023.038017
Abstract The products of an archival culture in colleges and universities are the final result of the development of archival cultural resources, and the development of archival cultural effects in colleges and universities should be an important part of improving the artistic level of libraries. The existing RippleNet model doesn’t consider the influence of key nodes on recommendation results, and the recommendation accuracy is not high. Therefore, based on the RippleNet model, this paper introduces the influence of complex network nodes into the model and puts forward the Cn RippleNet model. The performance of the model is verified by experiments, which… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3159-3174, 2023, DOI:10.32604/csse.2023.035900
Abstract Recently, computer assisted diagnosis (CAD) model creation has
become more dependent on medical picture categorization. It is often used
to identify several conditions, including brain disorders, diabetic retinopathy,
and skin cancer. Most traditional CAD methods relied on textures, colours,
and forms. Because many models are issue-oriented, they need a more substantial capacity to generalize and cannot capture high-level problem domain
notions. Recent deep learning (DL) models have been published, providing
a practical way to develop models specifically for classifying input medical
pictures. This paper offers an intelligent beetle antenna search (IBAS-DTL)
method for classifying medical images facilitated by deep transfer… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3175-3190, 2023, DOI:10.32604/csse.2023.034550
Abstract An intelligent sound-based early fault detection system has been proposed for vehicles using machine learning. The system is designed to detect faults in vehicles at an early stage by analyzing the sound emitted by the car. Early detection and correction of defects can improve the efficiency and life of the engine and other mechanical parts. The system uses a microphone to capture the sound emitted by the vehicle and a machine-learning algorithm to analyze the sound and detect faults. A possible fault is determined in the vehicle based on this processed sound. Binary classification is done at the first stage… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3191-3207, 2023, DOI:10.32604/csse.2023.036980
Abstract Artificial Intelligence (AI) and Computer Vision (CV) advancements have led to many useful methodologies in recent years, particularly to help visually-challenged people. Object detection includes a variety of challenges, for example, handling multiple class images, images that get augmented when captured by a camera and so on. The test images include all these variants as well. These detection models alert them about their surroundings when they want to walk independently. This study compares four CNN-based pre-trained models: Residual Network (ResNet-50), Inception v3, Dense Convolutional Network (DenseNet-121), and SqueezeNet, predominantly used in image recognition applications. Based on the analysis performed on… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3209-3223, 2023, DOI:10.32604/csse.2023.034185
Abstract The Internet of Things (IoT) offers a new era of connectivity, which goes beyond laptops and smart connected devices for connected vehicles, smart homes, smart cities, and connected healthcare. The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users. With the increasing use of multimedia in communications, the content security of remote-sensing images attracted much attention in academia and industry. Image encryption is important for securing remote sensing images in the IoT environment. Recently, researchers have introduced plenty of algorithms for encrypting images. This study introduces an Improved Sine Cosine Algorithm with Chaotic… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3225-3238, 2023, DOI:10.32604/csse.2023.037434
Abstract Solar energy will be a great alternative to fossil fuels since it is clean and renewable. The photovoltaic (PV) mechanism produces sunbeams’ green energy without noise or pollution. The PV mechanism seems simple, seldom malfunctioning, and easy to install. PV energy productivity significantly contributes to smart grids through many small PV mechanisms. Precise solar radiation (SR) prediction could substantially reduce the impact and cost relating to the advancement of solar energy. In recent times, several SR predictive mechanism was formulated, namely artificial neural network (ANN), autoregressive moving average, and support vector machine (SVM). Therefore, this article develops an optimal Modified… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3239-3260, 2023, DOI:10.32604/csse.2023.036629
Abstract Data mining and analytics involve inspecting and modeling large pre-existing datasets to discover decision-making information. Precision agriculture uses data mining to advance agricultural developments. Many farmers aren’t getting the most out of their land because they don’t use precision agriculture. They harvest crops without a well-planned recommendation system. Future crop production is calculated by combining environmental conditions and management behavior, yielding numerical and categorical data. Most existing research still needs to address data preprocessing and crop categorization/classification. Furthermore, statistical analysis receives less attention, despite producing more accurate and valid results. The study was conducted on a dataset about Karnataka state,… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3261-3284, 2023, DOI:10.32604/csse.2023.037615
Abstract Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3285-3301, 2023, DOI:10.32604/csse.2023.035356
Abstract The human face forms a canvas wherein various non-verbal expressions are communicated. These expressional cues and verbal communication represent the accurate perception of the actual intent. In many cases, a person may present an outward expression that might differ from the genuine emotion or the feeling that the person experiences. Even when people try to hide these emotions, the real emotions that are internally felt might reflect as facial expressions in the form of micro expressions. These micro expressions cannot be masked and reflect the actual emotional state of a person under study. Such micro expressions are on display for… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3303-3319, 2023, DOI:10.32604/csse.2023.034823
Abstract The term ‘corpus’ refers to a huge volume of structured datasets containing machine-readable texts. Such texts are generated in a natural communicative setting. The explosion of social media permitted individuals to spread data with minimal examination and filters freely. Due to this, the old problem of fake news has resurfaced. It has become an important concern due to its negative impact on the community. To manage the spread of fake news, automatic recognition approaches have been investigated earlier using Artificial Intelligence (AI) and Machine Learning (ML) techniques. To perform the medicinal text classification tasks, the ML approaches were applied, and… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3321-3338, 2023, DOI:10.32604/csse.2023.033901
Abstract Arabic is the world’s first language, categorized by its rich and complicated grammatical formats. Furthermore, the Arabic morphology can be perplexing because nearly 10,000 roots and 900 patterns were the basis for verbs and nouns. The Arabic language consists of distinct variations utilized in a community and particular situations. Social media sites are a medium for expressing opinions and social phenomena like racism, hatred, offensive language, and all kinds of verbal violence. Such conduct does not impact particular nations, communities, or groups only, extending beyond such areas into people’s everyday lives. This study introduces an Improved Ant Lion Optimizer with… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3339-3353, 2023, DOI:10.32604/csse.2023.030630
Abstract An intrusion detection system (IDS) becomes an important tool for
ensuring security in the network. In recent times, machine learning (ML) and deep
learning (DL) models can be applied for the identification of intrusions over the
network effectively. To resolve the security issues, this paper presents a new
Binary Butterfly Optimization algorithm based on Feature Selection with DRL
technique, called BBOFS-DRL for intrusion detection. The proposed BBOFSDRL model mainly accomplishes the recognition of intrusions in the network.
To attain this, the BBOFS-DRL model initially designs the BBOFS algorithm
based on the traditional butterfly optimization algorithm (BOA) to elect feature
subsets.… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3355-3369, 2023, DOI:10.32604/csse.2023.037373
Abstract Speech signals play an essential role in communication and provide an efficient way to exchange information between humans and machines. Speech Emotion Recognition (SER) is one of the critical sources for human evaluation, which is applicable in many real-world applications such as healthcare, call centers, robotics, safety, and virtual reality. This work developed a novel TCN-based emotion recognition system using speech signals through a spatial-temporal convolution network to recognize the speaker’s emotional state. The authors designed a Temporal Convolutional Network (TCN) core block to recognize long-term dependencies in speech signals and then feed these temporal cues to a dense network… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3371-3386, 2023, DOI:10.32604/csse.2023.034465
Abstract High precision and reliable wind speed forecasting have become a challenge for meteorologists. Convective events, namely, strong winds, thunderstorms, and tornadoes, along with large hail, are natural calamities that disturb
daily life. For accurate prediction of wind speed and overcoming its uncertainty
of change, several prediction approaches have been presented over the last few
decades. As wind speed series have higher volatility and nonlinearity, it is urgent
to present cutting-edge artificial intelligence (AI) technology. In this aspect, this
paper presents an intelligent wind speed prediction using chicken swarm optimization with the hybrid deep learning (IWSP-CSODL) method. The presented
IWSP-CSODL model… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3387-3401, 2023, DOI:10.32604/csse.2023.029904
Abstract The invention of Phasor Measurement Units (PMUs) produce synchronized phasor measurements with high resolution real time monitoring and control of power system in smart grids that make possible. PMUs are used in transmitting data to Phasor Data Concentrators (PDC) placed in control centers for monitoring purpose. A primary concern of system operators in control centers is maintaining safe and efficient operation of the power grid. This can be achieved by continuous monitoring of the PMU data that contains both normal and abnormal data. The normal data indicates the normal behavior of the grid whereas the abnormal data indicates fault or… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3403-3421, 2023, DOI:10.32604/csse.2023.036658
Abstract The development of information technology allows the collaborative business process to be run across multiple enterprises in a larger market environment. However, while collaborative business expands the realm of businesses, it also causes various hazards in collaborative Interaction, such as data falsification, inconstancy, and misuse. To solve these issues, a blockchain-based collaborative business modeling approach was proposed and analyzed. However, the existing studies lack the blockchain risk problem-solving specification, and there is no verification technique to examine the process. Consequently, it is difficult to confirm the appropriateness of the approach. Thus, here, we propose and build a blockchain-based trust model… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3423-3438, 2023, DOI:10.32604/csse.2023.033834
Abstract Arabic is one of the most spoken languages across the globe. However, there are fewer studies concerning Sentiment Analysis (SA) in Arabic. In recent years, the detected sentiments and emotions expressed in tweets have received significant interest. The substantial role played by the Arab region in international politics and the global economy has urged the need to examine the sentiments and emotions in the Arabic language. Two common models are available: Machine Learning and lexicon-based approaches to address emotion classification problems. With this motivation, the current research article develops a Teaching and Learning Optimization with Machine Learning Based Emotion Recognition… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3439-3455, 2023, DOI:10.32604/csse.2023.030311
Abstract The practice of integrating images from two or more sensors collected from the same area or object is known as image fusion. The goal is to extract more spatial and spectral information from the resulting fused image than from the component images. The images must be fused to improve the spatial and spectral quality of both panchromatic and multispectral images. This study provides a novel picture fusion technique that employs L0 smoothening Filter, Non-subsampled Contour let Transform (NSCT) and Sparse Representation (SR) followed by the Max absolute rule (MAR). The fusion approach is as follows: first, the multispectral and panchromatic… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3457-3469, 2023, DOI:10.32604/csse.2023.035428
Abstract Recently, research on a distributed storage system that efficiently manages a large amount of data has been actively conducted following data production and demand increase. Physical expansion limits exist for traditional standalone storage systems, such as I/O and file system capacity. However, the existing distributed storage system does not consider where data is consumed and is more focused on data dissemination and optimizing the lookup cost of data location. And this leads to system performance degradation due to low locality occurring in a Wide Area Network (WAN) environment with high network latency. This problem hinders deploying distributed storage systems to… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3471-3489, 2023, DOI:10.32604/csse.2023.035570
Abstract Question-answering (QA) models find answers to a given question. The necessity of automatically finding answers is increasing because it is very important and challenging from the large-scale QA data sets. In this paper, we deal with the QA pair matching approach in QA models, which finds the most relevant question and its recommended answer for a given question. Existing studies for the approach performed on the entire dataset or datasets within a category that the question writer manually specifies. In contrast, we aim to automatically find the category to which the question belongs by employing the text classification model and… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3491-3508, 2023, DOI:10.32604/csse.2023.029165
Abstract Suspicious mass traffic constantly evolves, making network behaviour tracing and structure more complex. Neural networks yield promising results by considering a sufficient number of processing elements with strong interconnections between them. They offer efficient computational Hopfield neural networks models and optimization constraints used by undergoing a good amount of parallelism to yield optimal results. Artificial neural network (ANN) offers optimal solutions in classifying and clustering the various reels of data, and the results obtained purely depend on identifying a problem. In this research work, the design of optimized applications is presented in an organized manner. In addition, this research work… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3509-3525, 2023, DOI:10.32604/csse.2023.037258
Abstract Hand Gesture Recognition (HGR) is a promising research area with an extensive range of applications, such as surgery, video game techniques, and sign language translation, where sign language is a complicated structured form of hand gestures. The fundamental building blocks of structured expressions in sign language are the arrangement of the fingers, the orientation of the hand, and the hand’s position concerning the body. The importance of HGR has increased due to the increasing number of touchless applications and the rapid growth of the hearing-impaired population. Therefore, real-time HGR is one of the most effective interaction methods between computers and… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3527-3540, 2023, DOI:10.32604/csse.2023.027081
Abstract Read-write dependency is an important factor restricting software efficiency. Timing Speculative (TS) is a processing architecture aiming to improve energy efficiency of microprocessors. Timing error rate, influenced by the read-write dependency, bottlenecks the voltage down-scaling and so the energy efficiency of TS processors. We proposed a method called Read-Write Dependency Aware Register Allocation. It is based on the Read-Write Dependency aware Interference Graph (RWDIG) conception. Registers are reallocated to loosen the read-write dependencies, so resulting in a reduction of timing errors. The traditional no operation (Nop) padding method is also redesigned to increase the distance value to above 2. We… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3541-3558, 2023, DOI:10.32604/csse.2023.036476
Abstract Leukemia is a kind of blood cancer that damages the cells in the blood and bone marrow of the human body. It produces cancerous blood cells that disturb the human’s immune system and significantly affect bone marrow’s production ability to effectively create different types of blood cells like red blood cells (RBCs) and white blood cells (WBC), and platelets. Leukemia can be diagnosed manually by taking a complete blood count test of the patient’s blood, from which medical professionals can investigate the signs of leukemia cells. Furthermore, two other methods, microscopic inspection of blood smears and bone marrow aspiration, are… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3559-3582, 2023, DOI:10.32604/csse.2023.036534
Abstract The diagnosis of liver fibrosis (LF) is crucial as it is a deadly and life-threatening disease. Artificial intelligence techniques aid doctors by using the previous data on health and making a diagnostic system, which helps to take decisions about patients’ health as experts can. The historical data of a patient’s health can have vagueness, inaccurate, and can also have missing values. The fuzzy logic theory can deal with these issues in the dataset. In this paper, a multilayer fuzzy expert system is developed to diagnose LF. The model is created by using multiple layers of the fuzzy logic approach. This… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3583-3598, 2023, DOI:10.32604/csse.2023.037545
Abstract With recent advancements in information and communication technology, a huge volume of corporate and sensitive user data was shared consistently across the network, making it vulnerable to an attack that may be brought some factors under risk: data availability, confidentiality, and integrity. Intrusion Detection Systems (IDS) were mostly exploited in various networks to help promptly recognize intrusions. Nowadays, blockchain (BC) technology has received much more interest as a means to share data without needing a trusted third person. Therefore, this study designs a new Blockchain Assisted Optimal Machine Learning based Cyberattack Detection and Classification (BAOML-CADC) technique. In the BAOML-CADC technique,… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3599-3618, 2023, DOI:10.32604/csse.2023.037655
Abstract This paper presents a robust multi-stage security solution based on fusion, encryption, and watermarking processes to transmit color healthcare images, efficiently. The presented solution depends on the features of discrete cosine transform (DCT), lifting wavelet transform (LWT), and singular value decomposition (SVD). The primary objective of this proposed solution is to ensure robustness for the color medical watermarked images against transmission attacks. During watermark embedding, the host color medical image is transformed into four sub-bands by employing three stages of LWT. The resulting low-frequency sub-band is then transformed by employing three stages of DCT followed by SVD operation. Furthermore, a… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3619-3635, 2023, DOI:10.32604/csse.2023.038025
Abstract To solve the problem of slow convergence and easy to get into the local optimum of the spider monkey optimization algorithm, this paper presents a new algorithm based on multi-strategy (ISMO). First, the initial population is generated by a refracted opposition-based learning strategy to enhance diversity and ergodicity. Second, this paper introduces a non-linear adaptive dynamic weight factor to improve convergence efficiency. Then, using the crisscross strategy, using the horizontal crossover to enhance the global search and vertical crossover to keep the diversity of the population to avoid being trapped in the local optimum. At last, we adopt a Gauss-Cauchy… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3637-3652, 2023, DOI:10.32604/csse.2023.038376
Abstract One of the issues in Computer Vision is the automatic development of descriptions for images, sometimes known as image captioning. Deep Learning techniques have made significant progress in this area. The typical architecture of image captioning systems consists mainly of an image feature extractor subsystem followed by a caption generation lingual subsystem. This paper aims to find optimized models for these two subsystems. For the image feature extraction subsystem, the research tested eight different concatenations of pairs of vision models to get among them the most expressive extracted feature vector of the image. For the caption generation lingual subsystem, this… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916
Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In addition, Trusted Forwarding Factor (TFF)… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3667-3684, 2023, DOI:10.32604/csse.2023.037531
Abstract Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things (IoMT). The existing cloud-based, centralized IoMT architectures are vulnerable to multiple security and privacy problems. The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks. This article presents a private and easily expandable blockchain-based framework for the IoMT. The proposed framework contains several participants, including private blockchain, hospital management systems, cloud service providers, doctors, and patients. Data security is ensured by incorporating an attribute-based encryption scheme. Furthermore,… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3685-3701, 2023, DOI:10.32604/csse.2023.032024
Abstract One of the important research issues in wireless sensor networks
(WSNs) is the optimal layout designing for the deployment of sensor nodes. It
directly affects the quality of monitoring, cost, and detection capability of WSNs.
Layout optimization is an NP-hard combinatorial problem, which requires optimization of multiple competing objectives like cost, coverage, connectivity, lifetime,
load balancing, and energy consumption of sensor nodes. In the last decade, several meta-heuristic optimization techniques have been proposed to solve this problem, such as genetic algorithms (GA) and particle swarm optimization (PSO).
However, these approaches either provided computationally expensive solutions
or covered a limited number… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3703-3713, 2023, DOI:10.32604/csse.2023.032706
Abstract The study aims to find a successful solution by using computer algorithms to detect remote homologous proteins, which is a significant problem in the bioinformatics field. In this experimental study, structural classification of proteins (SCOP) 1.53, SCOP benchmark, and the newly created SCOP protein database from the structural classification of proteins—extended (SCOPe) 2.07 were used to detect remote homolog proteins. N-gram method and then Term Frequency-Inverse Document Frequency (TF-IDF) weighting were performed to extract features of the protein sequences taken from these databases. Next, a smoothing process on the obtained features was performed to avoid misclassification. Finally, the proteins with… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3715-3728, 2023, DOI:10.32604/csse.2023.035687
Abstract Obesity is a critical health condition that severely affects an individual’s quality of life and well-being. The occurrence of obesity is strongly associated with extreme health conditions, such as cardiac diseases, diabetes, hypertension, and some types of cancer. Therefore, it is vital to avoid obesity and or reverse its occurrence. Incorporating healthy food habits and an active lifestyle can help to prevent obesity. In this regard, artificial intelligence (AI) can play an important role in estimating health conditions and detecting obesity and its types. This study aims to see obesity levels in adults by implementing AI-enabled machine learning on a… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3729-3748, 2023, DOI:10.32604/csse.2023.034509
Abstract Software Defined Networks (SDN) introduced better network management by decoupling control and data plane. However, communication reliability is the desired property in computer networks. The frequency of communication link failure degrades network performance, and service disruptions are likely to occur. Emerging network applications, such as delay-sensitive applications, suffer packet loss with higher Round Trip Time (RTT). Several failure recovery schemes have been proposed to address link failure recovery issues in SDN. However, these schemes have various weaknesses, which may not always guarantee service availability. Communication paths differ in their roles; some paths are critical because of the higher frequency usage.… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3749-3765, 2023, DOI:10.32604/csse.2023.036796
Abstract The concept of smart healthcare has seen a gradual increase with the expansion of information technology. Smart healthcare will use a new generation of information technologies, like artificial intelligence, the Internet of Things (IoT), cloud computing, and big data, to transform the conventional medical system in an all-around way, making healthcare highly effective, more personalized, and more convenient. This work designs a new Heap Based Optimization with Deep Quantum Neural Network (HBO-DQNN) model for decision-making in smart healthcare applications. The presented HBO-DQNN model majorly focuses on identifying and classifying healthcare data. In the presented HBO-DQNN model, three stages of operations… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3767-3782, 2023, DOI:10.32604/csse.2023.033991
Abstract Forecasting the weather is a challenging task for human beings because of the unpredictable nature of the climate. However, effective forecasting is vital for the general growth of a country due to the significance of weather forecasting in science and technology. The primary motivation behind this work is to achieve a higher level of forecasting accuracy to avoid any damage. Currently, most weather forecasting work is based on initially observed numerical weather data that cannot fully cover the changing essence of the atmosphere. In this work, sensors are used to collect real-time data for a particular location to capture the… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3783-3798, 2023, DOI:10.32604/csse.2023.037130
Abstract The Internet of Things (IoT) is one of the emergent technologies with advanced developments in several applications like creating smart environments, enabling Industry 4.0, etc. As IoT devices operate via an inbuilt and limited power supply, the effective utilization of available energy plays a vital role in designing the IoT environment. At the same time, the communication of IoT devices in wireless mediums poses security as a challenging issue. Recently, intrusion detection systems (IDS) have paved the way to detect the presence of intrusions in the IoT environment. With this motivation, this article introduces a novel Quantum Cat Swarm Optimization… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3799-3814, 2023, DOI:10.32604/csse.2023.037131
Abstract In 2020, COVID-19 started spreading throughout the world. This deadly infection was identified as a virus that may affect the lungs and, in severe cases, could be the cause of death. The polymerase chain reaction (PCR) test is commonly used to detect this virus through the nasal passage or throat. However, the PCR test exposes health workers to this deadly virus. To limit human exposure while detecting COVID-19, image processing techniques using deep learning have been successfully applied. In this paper, a strategy based on deep learning is employed to classify the COVID-19 virus. To extract features, two deep learning… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3815-3829, 2023, DOI:10.32604/csse.2023.036316
Abstract Health monitoring systems are now required, particularly for essential patients, following the COVID-19 pandemic, which was followed by its variants and other epidemics of a similar nature. Effective procedures and strategies are required, though, to react promptly to the enormous volume of real-time data offered by monitoring equipment. Although fog-based designs for IoT health systems typically result in enhanced services, they also give rise to issues that need to be resolved. In this paper, we propose a two-way strategy to reduce network latency and use while increasing real-time data transmission of device gateways used for sensors by making educated judgments… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3831-3845, 2023, DOI:10.32604/csse.2023.037580
Abstract Nowadays, smart healthcare and biomedical research have marked a substantial growth rate in terms of their presence in the literature, computational approaches, and discoveries, owing to which a massive quantity of experimental datasets was published and generated (Big Data) for describing and validating such novelties. Drug-drug interaction (DDI) significantly contributed to drug administration and development. It continues as the main obstacle in offering inexpensive and safe healthcare. It normally happens for patients with extensive medication, leading them to take many drugs simultaneously. DDI may cause side effects, either mild or severe health problems. This reduced victims’ quality of life and… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3847-3864, 2023, DOI:10.32604/csse.2023.036552
Abstract Crop insect detection becomes a tedious process for agronomists because a substantial part of the crops is damaged, and due to the pest attacks, the quality is degraded. They are the major reason behind crop quality degradation and diminished crop productivity. Hence, accurate pest detection is essential to guarantee safety and crop quality. Conventional identification of insects necessitates highly trained taxonomists to detect insects precisely based on morphological features. Lately, some progress has been made in agriculture by employing machine learning (ML) to classify and detect pests. This study introduces a Modified Metaheuristics with Transfer Learning based Insect Pest Classification… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3865-3881, 2023, DOI:10.32604/csse.2023.037748
Abstract Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications. Internet of Things (IoT), fog computing, edge computing, cloud computing, and the edge of things are the spine of all real-time and scalable applications. Conspicuously, this study proposed a novel framework for a real-time and scalable application that changes dynamically with time. In this study, IoT deployment is recommended for data acquisition. The Pre-Processing of data with local edge and fog nodes is implemented in this study. The threshold-oriented data classification method is deployed to improve the intrusion detection mechanism’s performance.… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3883-3899, 2023, DOI:10.32604/csse.2023.037050
Abstract The deep learning models are identified as having a significant impact on various problems. The same can be adapted to the problem of brain tumor classification. However, several deep learning models are presented earlier, but they need better classification accuracy. An efficient Multi-Feature Approximation Based Convolution Neural Network (CNN) model (MFA-CNN) is proposed to handle this issue. The method reads the input 3D Magnetic Resonance Imaging (MRI) images and applies Gabor filters at multiple levels. The noise-removed image has been equalized for its quality by using histogram equalization. Further, the features like white mass, grey mass, texture, and shape are… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3901-3909, 2023, DOI:10.32604/csse.2023.032311
Abstract Fusing satellite (remote sensing) images is an interesting topic in processing satellite images. The result image is achieved through fusing information from spectral and panchromatic images for sharpening. In this paper, a new algorithm based on based the Artificial bee colony (ABC) algorithm with peak signal-to-noise ratio (PSNR) index optimization is proposed to fusing remote sensing images in this paper. Firstly, Wavelet transform is used to split the input images into components over the high and low frequency domains. Then, two fusing rules are used for obtaining the fused images. The first rule is “the high frequency components are fused… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3911-3923, 2023, DOI:10.32604/csse.2023.036709
Abstract For Printed Circuit Board (PCB) surface defect detection, traditional detection methods mostly focus on template matching-based reference method and manual detections, which have the disadvantages of low defect detection efficiency, large errors in defect identification and localization, and low versatility of detection methods. In order to further meet the requirements of high detection accuracy, real-time and interactivity required by the PCB industry in actual production life. In the current work, we improve the You-only-look-once (YOLOv4) defect detection method to train and detect six types of PCB small target defects. Firstly, the original Cross Stage Partial Darknet53 (CSPDarknet53) backbone network is… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3925-3938, 2023, DOI:10.32604/csse.2023.034727
Abstract Cloud computing (CC) is developing as a powerful and flexible computational structure for providing ubiquitous service to users. It receives interrelated software and hardware resources in an integrated manner distinct from the classical computational environment. The variation of software and hardware resources were combined and composed as a resource pool. The software no more resided in the single hardware environment, it can be executed on the schedule of resource pools to optimize resource consumption. Optimizing energy consumption in CC environments is the question that allows utilizing several energy conservation approaches for effective resource allocation. This study introduces a Battle Royale… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3939-3958, 2023, DOI:10.32604/csse.2023.034805
Abstract In the present technological world, surveillance cameras generate an immense amount of video data from various sources, making its scrutiny tough for computer vision specialists. It is difficult to search for anomalous events manually in these massive video records since they happen infrequently and with a low probability in real-world monitoring systems. Therefore, intelligent surveillance is a requirement of the modern day, as it enables the automatic identification of normal and aberrant behavior using artificial intelligence and computer vision technologies. In this article, we introduce an efficient Attention-based deep-learning approach for anomaly detection in surveillance video (ADSV). At the input… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3959-3978, 2023, DOI:10.32604/csse.2023.038429
Abstract Recently, the semantic classification (SC) algorithm for remote sensing images (RSI) has been greatly improved by deep learning (DL) techniques, e.g., deep convolutional neural networks (CNNs). However, too many methods employ complex procedures (e.g., multi-stages), excessive hardware budgets (e.g., multi-models), and an extreme reliance on domain knowledge (e.g., handcrafted features) for the pure purpose of improving accuracy. It obviously goes against the superiority of DL, i.e., simplicity and automation. Meanwhile, these algorithms come with unnecessarily expensive overhead on parameters and hardware costs. As a solution, the author proposed a fast and simple training algorithm based on the smallest architecture of… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3979-3991, 2023, DOI:10.32604/csse.2023.031627
Abstract Sensor networks are regularly sent to monitor certain physical properties that run in length from divisions of a second to many months or indeed several years. Nodes must advance their energy use for expanding network lifetime.
The fault detection of the network node is very significant for guaranteeing the
correctness of monitoring results. Due to different network resource constraints
and malicious attacks, security assurance in wireless sensor networks has been
a difficult task. The implementation of these features requires larger space due
to distributed module. This research work proposes new sensor node architecture
integrated with a self-testing core and cryptoprocessor… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 3993-4006, 2023, DOI:10.32604/csse.2023.035244
Abstract Cardiovascular disease is among the top five fatal diseases that affect
lives worldwide. Therefore, its early prediction and detection are crucial, allowing
one to take proper and necessary measures at earlier stages. Machine learning
(ML) techniques are used to assist healthcare providers in better diagnosing heart
disease. This study employed three boosting algorithms, namely, gradient boost,
XGBoost, and AdaBoost, to predict heart disease. The dataset contained heart disease-related clinical features and was sourced from the publicly available UCI ML
repository. Exploratory data analysis is performed to find the characteristics of
data samples about descriptive and inferential statistics. Specifically, it was… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.3, pp. 4007-4022, 2023, DOI:10.32604/csse.2023.032359
Abstract The identification of cancer tissues in Gastroenterology imaging poses novel challenges to the computer vision community in designing generic decision support systems. This generic nature demands the image descriptors to be invariant to illumination gradients, scaling, homogeneous illumination, and rotation. In this article, we devise a novel feature extraction methodology, which explores the effectiveness of Gabor filters coupled with Block Local Binary Patterns in designing such descriptors. We effectively exploit the illumination invariance properties of Block Local Binary Patterns and the inherent capability of convolutional neural networks to construct novel rotation, scale and illumination invariant features. The invariance characteristics of… More >