Home / Journals / CSSE / Vol.41, No.1, 2022
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Secured Vehicle Life Cycle Tracking Using Blockchain and Smart Contract

    Srinivasan Ananthanarayanan Bragadeesh, Arumugam Umamakeswari*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 1-18, 2022, DOI:10.32604/csse.2022.019842
    Abstract Life Cycle Tracking (LCT) involves continuous monitoring and analysis of various activities associated with a vehicle. The crucial factor in the LCT is to ensure the validity of gathered data as numerous supply chain phases are involved and the data is assessed by multiple stakeholders. Frauds and swindling activities can be prevented if the history of the vehicles is made available to the interested parties. Blockchain provides a way of enforcing trustworthiness to the supply chain participants and the data associated with the various actions performed. Machine learning techniques when combined decentralized nature of blockchains can be used to develop… More >

  • Open AccessOpen Access

    ARTICLE

    Detection of Fuel Adulteration Using Wave Optical with Machine Learning Algorithms

    S. Dilip Kumar1,*, T. V. Sivasubramonia Pillai2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 19-33, 2022, DOI:10.32604/csse.2022.019366
    Abstract Fuel is a very important factor and has considerable influence on the air quality in the environment, which is the heart of the world. The increase of vehicles in lived-in areas results in greater emission of carbon particles in the environment. Adulterated fuel causes more contaminated particles to mix with breathing air and becomes the main source of dangerous pollution. Adulteration is the mixing of foreign substances in fuel, which damages vehicles and causes more health problems in living beings such as humans, birds, aquatic life, and even water resources by emitting high levels of hydrocarbons, nitrogen oxides, and carbon… More >

  • Open AccessOpen Access

    ARTICLE

    Short Text Mining for Classifying Educational Objectives and Outcomes

    Yousef Asiri*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 35-50, 2022, DOI:10.32604/csse.2022.020100
    Abstract Most of the international accreditation bodies in engineering education (e.g., ABET) and outcome-based educational systems have based their assessments on learning outcomes and program educational objectives. However, mapping program educational objectives (PEOs) to student outcomes (SOs) is a challenging and time-consuming task, especially for a new program which is applying for ABET-EAC (American Board for Engineering and Technology the American Board for Engineering and Technology—Engineering Accreditation Commission) accreditation. In addition, ABET needs to automatically ensure that the mapping (classification) is reasonable and correct. The classification also plays a vital role in the assessment of students’ learning. Since the PEOs are… More >

  • Open AccessOpen Access

    ARTICLE

    Nonlinear Identification and Control of Laser Welding Based on RBF Neural Networks

    Hongfei Wei1,*, Hui Zhao2, Xinlong Shi1, Shuang Liang3
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 51-65, 2022, DOI:10.32604/csse.2022.017739
    Abstract A laser beam is a heat source with a high energy density; this technology has been rapidly developed and applied in the field of welding owing to its potential advantages, and supplements traditional welding techniques. An in-depth analysis of its operating process could establish a good foundation for its application in China. It is widely understood that the welding process is a highly nonlinear and multi-variable coupling process; it comprises a significant number of complex processes with random uncertain factors. Because of their nonlinear mapping and self-learning characteristics, artificial neural networks (ANNs) have certain advantages in comparison to traditional methods… More >

  • Open AccessOpen Access

    ARTICLE

    Cost Optimized Switching of Routing Protocol Scheme for IoT Applications

    Karunanithi Praveen kumar, Perumal Sivanesan*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 67-82, 2022, DOI:10.32604/csse.2022.018867
    Abstract In this work, we propose a context-aware switching of routing protocol scheme for specific application requirements of IoT in real-time using a software-defined networking controller in wireless sensor networks. The work planned has two stages i) Selection of suitable routing protocol (RP) for given IoT applications using higher cognitive process and ii) Deployment of the corresponding routing protocol. We use the supervised learning-regression method for classification of the routing protocol while considering the network parameters like stability, path delay, energy utilization, and throughput. The chosen routing protocol will be set in the sensor network using a software-defined networking controller in… More >

  • Open AccessOpen Access

    ARTICLE

    Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography

    N. Niyaz Ahamed*, N. Duraipandian
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 83-94, 2022, DOI:10.32604/csse.2022.020071
    Abstract The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an attack from the cloud server's… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure IoT-Cloud Based Healthcare System for Disease Classification Using Neural Network

    M. Vedaraj*, P. Ezhumalai
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 95-108, 2022, DOI:10.32604/csse.2022.019976
    Abstract The integration of the Internet of Things (IoT) and cloud computing is the most popular growing technology in the IT world. IoT integrated cloud computing technology can be used in smart cities, health care, smart homes, environmental monitoring, etc. In recent days, IoT integrated cloud can be used in the health care system for remote patient care, emergency care, disease prediction, pharmacy management, etc. but, still, security of patient data and disease prediction accuracy is a major concern. Numerous machine learning approaches were used for effective early disease prediction. However, machine learning takes more time and less performance while classification.… More >

  • Open AccessOpen Access

    ARTICLE

    Phishing Websites Detection by Using Optimized Stacking Ensemble Model

    Zeyad Ghaleb Al-Mekhlafi1, Badiea Abdulkarem Mohammed1,2,*, Mohammed Al-Sarem3, Faisal Saeed3, Tawfik Al-Hadhrami4, Mohammad T. Alshammari1, Abdulrahman Alreshidi1, Talal Sarheed Alshammari1
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 109-125, 2022, DOI:10.32604/csse.2022.020414
    Abstract Phishing attacks are security attacks that do not affect only individuals’ or organizations’ websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an exposed environment for such attacks. Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users. Machine and deep learning and other methods were used to design detection methods for these attacks. However, there is still a need to enhance detection accuracy. Optimization of an ensemble classification method for phishing website (PW) detection is proposed in this study. A Genetic Algorithm (GA) was used for… More >

  • Open AccessOpen Access

    ARTICLE

    Correlation Analysis between Economic Growth and Environmental Quality

    Baiqing Zhou1, Na Li1,*, Duan Lu1, Jinyue Xia2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 127-140, 2022, DOI:10.32604/csse.2022.017750
    Abstract With the rapid development of the economy, China’s environment has been damaged severely, which has attracted much attention from scholars and the local government. The concept of green development has been an underlying trend since 2012, and it is of great significance to explore the relationship between economic growth and environmental quality. Huzhou is a prefecture-level city under the jurisdiction of Zhejiang Province, and it is one of the 27 cities in the central area of the Yangtze River Delta. In recent years, this city develops well not only in economic development but also in maintaining a green environment. In… More >

  • Open AccessOpen Access

    ARTICLE

    Gaussian Kernel Based SVR Model for Short-Term Photovoltaic MPP Power Prediction

    Yasemin Onal*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 141-156, 2022, DOI:10.32604/csse.2022.020367
    Abstract Predicting the power obtained at the output of the photovoltaic (PV) system is fundamental for the optimum use of the PV system. However, it varies at different times of the day depending on intermittent and nonlinear environmental conditions including solar irradiation, temperature and the wind speed, Short-term power prediction is vital in PV systems to reconcile generation and demand in terms of the cost and capacity of the reserve. In this study, a Gaussian kernel based Support Vector Regression (SVR) prediction model using multiple input variables is proposed for estimating the maximum power obtained from using perturb observation method in… More >

  • Open AccessOpen Access

    ARTICLE

    Obtaining Crisp Priorities for Triangular and Trapezoidal Fuzzy Judgments

    Raman Kumar Goyal1, Jaskirat Singh1, Nidhi Kalra1, Anshu Parashar1,*, Gagan Singla2, Sakshi Kaushal2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 157-170, 2022, DOI:10.32604/csse.2022.018962
    Abstract This paper proposes anoptimal fuzzy-based model for obtaining crisp priorities for Fuzzy-AHP comparison matrices. Crisp judgments cannot be given for real-life situations, as most of these include some level of fuzziness and complexity. In these situations, judgments are represented by the set of fuzzy numbers. Most of the fuzzy optimization models derive crisp priorities for judgments represented with Triangular Fuzzy Numbers (TFNs) only. They do not work for other types of Triangular Shaped Fuzzy Numbers (TSFNs) and Trapezoidal Fuzzy Numbers (TrFNs). To overcome this problem, a sum of squared error (SSE) based optimization model is proposed. Unlike some other methods,… More >

  • Open AccessOpen Access

    ARTICLE

    Convolutional Neural Network Auto Encoder Channel Estimation Algorithm in MIMO-OFDM System

    I. Kalphana1,*, T. Kesavamurthy2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 171-185, 2022, DOI:10.32604/csse.2022.019799
    Abstract Higher transmission rate is one of the technological features of prominently used wireless communication namely Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO–OFDM). One among an effective solution for channel estimation in wireless communication system, specifically in different environments is Deep Learning (DL) method. This research greatly utilizes channel estimator on the basis of Convolutional Neural Network Auto Encoder (CNNAE) classifier for MIMO-OFDM systems. A CNNAE classifier is one among Deep Learning (DL) algorithm, in which video signal is fed as input by allotting significant learnable weights and biases in various aspects/objects for video signal and capable of differentiating from… More >

  • Open AccessOpen Access

    ARTICLE

    Classification of Foot Pressure Images Using Machine Learning Algorithm

    P. Ramya1, B. Padmapriya2, S. Poornachandra3
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 187-196, 2022, DOI:10.32604/csse.2022.020185
    Abstract Arthritis is an acute systemic disease of a joint accompanied by pain. In developed countries, it mainly causes disability among people over 50 years of age. Rheumatoid Arthritis is a type of arthritis that occurs commonly among elders. The incidence of arthritis is higher in females than in males. There is no permanent diagnosis method for arthritis, but if it was identified in the early stages based on the foot pressure, it can be diagnosed before attaining the critical stage of Rheumatoid Arthritis. The analysis and study of arthritis patients were done using design thinking methodology. Design thinking is a… More >

  • Open AccessOpen Access

    ARTICLE

    On Relations for Moments of Generalized Order Statistics for Lindley–Weibull Distribution

    Faten A. Momen khan1, Saman Hanif Shahbaz2, Muhammad Qaiser Shahbaz2,*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 197-208, 2022, DOI:10.32604/csse.2022.020448
    (This article belongs to this Special Issue: Advances in Computational Intelligence and its Applications)
    Abstract Moments of generalized order statistics appear in several areas of science and engineering. These moments are useful in studying properties of the random variables which are arranged in increasing order of importance, for example, time to failure of a computer system. The computation of these moments is sometimes very tedious and hence some algorithms are required. One algorithm is to use a recursive method of computation of these moments and is very useful as it provides the basis to compute higher moments of generalized order statistics from the corresponding lower-order moments. Generalized order statistics provides several models of ordered data… More >

  • Open AccessOpen Access

    ARTICLE

    Novel Power-Aware Optimization Methodology and Efficient Task Scheduling Algorithm

    K. Sathis Kumar1,*, K. Paramasivam2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 209-224, 2022, DOI:10.32604/csse.2022.019531
    Abstract The performance of central processing units (CPUs) can be enhanced by integrating multiple cores into a single chip. Cpu performance can be improved by allocating the tasks using intelligent strategy. If Small tasks wait for long time or executes for long time, then CPU consumes more power. Thus, the amount of power consumed by CPUs can be reduced without increasing the frequency. Lines are used to connect cores, which are organized together to form a network called network on chips (NOCs). NOCs are mainly used in the design of processors. However, its performance can still be enhanced by reducing power… More >

  • Open AccessOpen Access

    ARTICLE

    Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective

    Mwaffaq Abu-Alhaija1, Nidal M. Turab1,*, AbdelRahman Hamza2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 225-240, 2022, DOI:10.32604/csse.2022.019547
    Abstract Infrastructure as a Service (IaaS) provides logical separation between data, network, applications and machines from the physical constrains of real machines. IaaS is one of the basis of cloud virtualization. Recently, security issues are also gradually emerging with virtualization of cloud computing. Different security aspects of cloud virtualization will be explored in this research paper, security recognizing potential threats or attacks that exploit these vulnerabilities, and what security measures are used to alleviate such threats. In addition, a discussion of general security requirements and the existing security schemes is also provided. As shown in this paper, different components of virtualization… More >

  • Open AccessOpen Access

    ARTICLE

    Consensus-Based Ensemble Model for Arabic Cyberbullying Detection

    Asma A. Alhashmi*, Abdulbasit A. Darem
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 241-254, 2022, DOI:10.32604/csse.2022.020023
    Abstract Due to the proliferation of internet-enabled smartphones, many people, particularly young people in Arabic society, have widely adopted social media platforms as a primary means of communication, interaction and friendship making. The technological advances in smartphones and communication have enabled young people to keep in touch and form huge social networks from all over the world. However, such networks expose young people to cyberbullying and offensive content that puts their safety and emotional well-being at serious risk. Although, many solutions have been proposed to automatically detect cyberbullying, most of the existing solutions have been designed for English speaking consumers. The… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Scheme for Crowd Counting Using off-the-Shelf Wireless Routers

    Wei Zhuang1,2, Yixian Shen1, Chunming Gao3, Lu Li1, Haoran Sang4, Fei Qian5,*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 255-269, 2022, DOI:10.32604/csse.2022.020590
    Abstract Since the outbreak of the world-wide novel coronavirus pandemic, crowd counting in public areas, such as in shopping centers and in commercial streets, has gained popularity among public health administrations for preventing the crowds from gathering. In this paper, we propose a novel adaptive method for crowd counting based on Wi-Fi channel state information (CSI) by using common commercial wireless routers. Compared with previous researches on device-free crowd counting, our proposed method is more adaptive to the change of environment and can achieve high accuracy of crowd count estimation. Because the distance between access point (AP) and monitor point (MP)… More >

  • Open AccessOpen Access

    ARTICLE

    Green Measurements for Software Product Based on Sustainability Dimensions

    Komeil Raisian1, Jamaiah Yahaya2,*, Aziz Deraman3
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 271-288, 2022, DOI:10.32604/csse.2022.020496
    Abstract Software is a central component in the modern world and vastly affects the environment’s sustainability. The demand for energy and resource requirements is rising when producing hardware and software units. Literature study reveals that many studies focused on green hardware; however, limited efforts were made in the greenness of software products. Green software products are necessary to solve the issues and problems related to the long-term use of software, especially from a sustainability perspective. Without a proper mechanism for measuring the greenness of a particular software product executed in a specific environment, the mentioned benefits will not be attained. Currently,… More >

  • Open AccessOpen Access

    ARTICLE

    RFID Positioning and Physiological Signals for Remote Medical Care

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 289-304, 2022, DOI:10.32604/csse.2022.020453
    Abstract The safety of patients and the quality of medical care provided to them are vital for their wellbeing. This study establishes a set of RFID (Radio Frequency Identification)-based systems of patient care based on physiological signals in the pursuit of a remote medical care system. The RFID-based positioning system allows medical staff to continuously observe the patient's health and location. The staff can thus respond to medical emergencies in time and appropriately care for the patient. When the COVID-19 pandemic broke out, the proposed system was used to provide timely information on the location and body temperature of patients who… More >

  • Open AccessOpen Access

    ARTICLE

    Hybrid Feature Extractions and CNN for Enhanced Periocular Identification During Covid-19

    Raniyah Wazirali1, Rami Ahmed2,*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 305-320, 2022, DOI:10.32604/csse.2022.020504
    (This article belongs to this Special Issue: Healthcare Intelligence using Deep Learning and Computer Vision)
    Abstract The global pandemic of novel coronavirus that started in 2019 has seriously affected daily lives and placed everyone in a panic condition. Widespread coronavirus led to the adoption of social distancing and people avoiding unnecessary physical contact with each other. The present situation advocates the requirement of a contactless biometric system that could be used in future authentication systems which makes fingerprint-based person identification ineffective. Periocular biometric is the solution because it does not require physical contact and is able to identify people wearing face masks. However, the periocular biometric region is a small area, and extraction of the required… More >

  • Open AccessOpen Access

    ARTICLE

    A Survey on Technologies and Challenges of LTE-U

    Tong Gan1, Shi-You Wang1, Qiang Ma1, Yi-Dong Jia2,*, Yun-Yun Ma3
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 321-337, 2022, DOI:10.32604/csse.2022.019244
    Abstract The rapid growth of mobile data traffic has caused great pressure on the limited spectrum resources, and there must be some better methods to deal with this problem. The innovative technology of Long-Term Evolution (LTE) using the unlicensed spectrum, known as LTE-Unlicensed (LTE-U), has been proposed to effectively alleviate the shortage of authorized band resources. LTE-U has explored a lot of potential capacity in mobile communication systems with limited authorized spectrum resources, and improved the spectrum utilization of unauthorized frequency bands. However, LTE-U is still facing challenges in its application. In this paper, we summarize the key features of LTE-U… More >

  • Open AccessOpen Access

    ARTICLE

    Ensemble Variable Selection for Naive Bayes to Improve Customer Behaviour Analysis

    R. Siva Subramanian1,*, D. Prabha2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 339-355, 2022, DOI:10.32604/csse.2022.020043
    Abstract Executing customer analysis in a systemic way is one of the possible solutions for each enterprise to understand the behavior of consumer patterns in an efficient and in-depth manner. Further investigation of customer patterns helps the firm to develop efficient decisions and in turn, helps to optimize the enterprise’s business and maximizes consumer satisfaction correspondingly. To conduct an effective assessment about the customers, Naive Bayes(also called Simple Bayes), a machine learning model is utilized. However, the efficacious of the simple Bayes model is utterly relying on the consumer data used, and the existence of uncertain and redundant attributes in the… More >

  • Open AccessOpen Access

    ARTICLE

    Image Manipulation Detection Through Laterally Linked Pixels and Kernel Algorithms

    K. K. Thyagharajan, G. Nirmala*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 357-371, 2022, DOI:10.32604/csse.2022.020258
    Abstract In this paper, copy-move forgery in image is detected for single image with multiple manipulations such as blurring, noise addition, gray scale conversion, brightness modifications, rotation, Hu adjustment, color adjustment, contrast changes and JPEG Compression. However, traditional algorithms detect only copy-move attacks in image and never for different manipulation in single image. The proposed LLP (Laterally linked pixel) algorithm has two dimensional arrays and single layer is obtained through unit linking pulsed neural network for detection of copied region and kernel tricks is applied for detection of multiple manipulations in single forged image. LLP algorithm consists of two channels such… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Big Data Storage Reduction Model for Drill Down Search

    N. Ragavan, C. Yesubai Rubavathi*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 373-387, 2022, DOI:10.32604/csse.2022.020452
    Abstract Multi-level searching is called Drill down search. Right now, no drill down search feature is available in the existing search engines like Google, Yahoo, Bing and Baidu. Drill down search is very much useful for the end user to find the exact search results among the huge paginated search results. Higher level of drill down search with category based search feature leads to get the most accurate search results but it increases the number and size of the file system. The purpose of this manuscript is to implement a big data storage reduction binary file system model for category based… More >

  • Open AccessOpen Access

    ARTICLE

    Autism Spectrum Disorder Diagnosis Using Ensemble ML and Max Voting Techniques

    A. Arunkumar1,*, D. Surendran2
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 389-404, 2022, DOI:10.32604/csse.2022.020256
    Abstract Difficulty in communicating and interacting with other people are mainly due to the neurological disorder called autism spectrum disorder (ASD) diseases. These diseases can affect the nerves at any stage of the human being in childhood, adolescence, and adulthood. ASD is known as a behavioral disease due to the appearances of symptoms over the first two years that continue until adulthood. Most of the studies prove that the early detection of ASD helps improve the behavioral characteristics of patients with ASD. The detection of ASD is a very challenging task among various researchers. Machine learning (ML) algorithms still act very… More >

  • Open AccessOpen Access

    ARTICLE

    Statistical Inference of Sine Inverse Rayleigh Distribution

    Abdullah, Ali H. Ahmadini*
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 405-414, 2022, DOI:10.32604/csse.2022.020079
    Abstract We study in this manuscript a new one-parameter model called sine inverse Rayleigh (SIR) model that is a new extension of the classical inverse Rayleigh model. The sine inverse Rayleigh model is aiming to provide more fitting for real data sets of purposes. The proposed extension is more flexible than the original inverse Rayleigh (IR) model and it hasmany applications in physics and medicine. The sine inverse Rayleigh distribution can havea uni-model and right skewed probability density function (PDF). The hazard rate function (HRF) of sine inverse Rayleigh distribution can be increasing and J-shaped. Several of thenew model’s fundamental characteristics,… More >

  • Open AccessOpen Access

    ARTICLE

    Facial Expression Recognition Using Enhanced Convolution Neural Network with Attention Mechanism

    K. Prabhu1,*, S. SathishKumar2, M. Sivachitra3, S. Dineshkumar2, P. Sathiyabama4
    Computer Systems Science and Engineering, Vol.41, No.1, pp. 415-426, 2022, DOI:10.32604/csse.2022.019749
    Abstract Facial Expression Recognition (FER) has been an interesting area of research in places where there is human-computer interaction. Human psychology, emotions and behaviors can be analyzed in FER. Classifiers used in FER have been perfect on normal faces but have been found to be constrained in occluded faces. Recently, Deep Learning Techniques (DLT) have gained popularity in applications of real-world problems including recognition of human emotions. The human face reflects emotional states and human intentions. An expression is the most natural and powerful way of communicating non-verbally. Systems which form communications between the two are termed Human Machine Interaction (HMI)… More >

Per Page:

Share Link