Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23,819)
  • Open Access

    ARTICLE

    Data-Driven Load Forecasting Using Machine Learning and Meteorological Data

    Aishah Alrashidi, Ali Mustafa Qamar*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1973-1988, 2023, DOI:10.32604/csse.2023.024633

    Abstract Electrical load forecasting is very crucial for electrical power systems’ planning and operation. Both electrical buildings’ load demand and meteorological datasets may contain hidden patterns that are required to be investigated and studied to show their potential impact on load forecasting. The meteorological data are analyzed in this study through different data mining techniques aiming to predict the electrical load demand of a factory located in Riyadh, Saudi Arabia. The factory load and meteorological data used in this study are recorded hourly between 2016 and 2017. These data are provided by King Abdullah City for… More >

  • Open Access

    ARTICLE

    Efficient Grad-Cam-Based Model for COVID-19 Classification and Detection

    Saleh Albahli1,*, Ghulam Nabi Ahmad Hassan Yar2,3

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2743-2757, 2023, DOI:10.32604/csse.2023.024463

    Abstract Corona Virus (COVID-19) is a novel virus that crossed an animal-human barrier and emerged in Wuhan, China. Until now it has affected more than 119 million people. Detection of COVID-19 is a critical task and due to a large number of patients, a shortage of doctors has occurred for its detection. In this paper, a model has been suggested that not only detects the COVID-19 using X-ray and CT-Scan images but also shows the affected areas. Three classes have been defined; COVID-19, normal, and Pneumonia for X-ray images. For CT-Scan images, 2 classes have been… More >

  • Open Access

    ARTICLE

    Swarm Intelligence Based Routing with Black Hole Attack Detection in MANET

    S. A. Arunmozhi*, S. Rajeswari, Y. Venkataramani

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2337-2347, 2023, DOI:10.32604/csse.2023.024340

    Abstract Mobile Ad hoc Network (MANET) possesses unique characteristics which makes it vulnerable to security threats. In MANET, it is highly challenging to protect the nodes from cyberattacks. Power conservation improves both life time of nodes as well as the network. Computational capabilities and memory constraints are critical issues in the implementation of cryptographic techniques. Energy and security are two important factors that need to be considered for improving the performance of MANET. So, the incorporation of an energy efficient secure routing protocol becomes inevitable to ensure appropriate action upon the network. The nodes present in More >

  • Open Access

    ARTICLE

    Process Discovery and Refinement of an Enterprise Management System

    Faizan Ahmed Khan1, Farooq Ahmad1, Arfat Ahmad Khan2, Chitapong Wechtaisong2,*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2019-2032, 2023, DOI:10.32604/csse.2023.023490

    Abstract The need for the analysis of modern businesses is rapidly increasing as the supporting enterprise systems generate more and more data. This data can be extremely valuable for executing organizations because the data allows constant monitoring, analyzing, and improving the underlying processes, which leads to the reduction of cost and the improvement of the quality. Process mining is a useful technique for analyzing enterprise systems by using an event log that contains behaviours. This research focuses on the process discovery and refinement using real-life event log data collected from a large multinational organization that deals… More >

  • Open Access

    ARTICLE

    Design of Online Vitals Monitor by Integrating Big Data and IoT

    E. Afreen Banu1,*, V. Rajamani2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2469-2487, 2023, DOI:10.32604/csse.2023.021332

    Abstract In this work, we design a multisensory IoT-based online vitals monitor (hereinafter referred to as the VITALS) to sense four bedside physiological parameters including pulse (heart) rate, body temperature, blood pressure, and peripheral oxygen saturation. Then, the proposed system constantly transfers these signals to the analytics system which aids in enhancing diagnostics at an earlier stage as well as monitoring after recovery. The core hardware of the VITALS includes commercial off-the-shelf sensing devices/medical equipment, a powerful microcontroller, a reliable wireless communication module, and a big data analytics system. It extracts human vital signs in a… More >

  • Open Access

    ARTICLE

    Investigation of Android Malware Using Deep Learning Approach

    V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2413-2429, 2023, DOI:10.32604/iasc.2023.030527

    Abstract In recent days the usage of android smartphones has increased extensively by end-users. There are several applications in different categories banking/finance, social engineering, education, sports and fitness, and many more applications. The android stack is more vulnerable compared to other mobile platforms like IOS, Windows, or Blackberry because of the open-source platform. In the Existing system, malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware. The attackers target the victim with various attacks like adware, backdoor, spyware, ransomware, and zero-day exploits… More >

  • Open Access

    ARTICLE

    Deep Fake Detection Using Computer Vision-Based Deep Neural Network with Pairwise Learning

    R. Saravana Ram1, M. Vinoth Kumar2, Tareq M. Al-shami3, Mehedi Masud4, Hanan Aljuaid5, Mohamed Abouhawwash6,7,*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2449-2462, 2023, DOI:10.32604/iasc.2023.030486

    Abstract Deep learning-based approaches are applied successfully in many fields such as deepFake identification, big data analysis, voice recognition, and image recognition. Deepfake is the combination of deep learning in fake creation, which states creating a fake image or video with the help of artificial intelligence for political abuse, spreading false information, and pornography. The artificial intelligence technique has a wide demand, increasing the problems related to privacy, security, and ethics. This paper has analyzed the features related to the computer vision of digital content to determine its integrity. This method has checked the computer vision More >

  • Open Access

    ARTICLE

    An Enhanced Trust-Based Secure Route Protocol for Malicious Node Detection

    S. Neelavathy Pari1,*, K. Sudharson2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2541-2554, 2023, DOI:10.32604/iasc.2023.030284

    Abstract The protection of ad-hoc networks is becoming a severe concern because of the absence of a central authority. The intensity of the harm largely depends on the attacker’s intentions during hostile assaults. As a result, the loss of Information, power, or capacity may occur. The authors propose an Enhanced Trust-Based Secure Route Protocol (ETBSRP) using features extraction. First, the primary and secondary trust characteristics are retrieved and achieved routing using a calculation. The complete trust characteristic obtains by integrating all logical and physical trust from every node. To assure intermediate node trustworthiness, we designed an… More >

  • Open Access

    ARTICLE

    Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks

    S. M. Udhaya Sankar1,*, Mary Subaja Christo2, P. S. Uma Priyadarsini3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2337-2351, 2023, DOI:10.32604/iasc.2023.030278

    Abstract Energy conservation has become a significant consideration in wireless sensor networks (WSN). In the sensor network, the sensor nodes have internal batteries, and as a result, they expire after a certain period. As a result, expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge. Also, the clustering strategy employs to enhance or extend the life cycle of WSNs. We identify the supervisory head node (SH) or cluster head (CH) in every grouping considered the feasible strategy for power-saving route discovery in the clustering… More >

  • Open Access

    ARTICLE

    Deep Learning Prediction Model for Heart Disease for Elderly Patients

    Abeer Abdulaziz AlArfaj, Hanan Ahmed Hosni Mahmoud*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2527-2540, 2023, DOI:10.32604/iasc.2023.030168

    Abstract The detection of heart disease is a problematic task in medical research. This diagnosis utilizes a thorough analysis of the clinical tests from the patient’s medical history. The massive advances in deep learning models pursue the development of intelligent computerized systems that aid medical professionals to detect the disease type with the internet of things support. Therefore, in this paper, we propose a deep learning model for elderly patients to aid and enhance the diagnosis of heart disease. The proposed model utilizes a deeper neural architecture with multiple perceptron layers with regularization learning techniques. The… More >

Displaying 6781-6790 on page 679 of 23819. Per Page