Open Access
ARTICLE
Huiyu Sun*, Ralph Grishman
Computer Systems Science and Engineering, Vol.43, No.3, pp. 861-870, 2022, DOI:10.32604/csse.2022.030759
Abstract Log-linear models and more recently neural network models used for supervised relation extraction requires substantial amounts of training data and time, limiting the portability to new relations and domains. To this end, we propose a training representation based on the dependency paths between entities in a dependency tree which we call lexicalized dependency paths (LDPs). We show that this representation is fast, efficient and transparent. We further propose representations utilizing entity types and its subtypes to refine our model and alleviate the data sparsity problem. We apply lexicalized dependency paths to supervised learning using the ACE corpus and show that… More >
Open Access
ARTICLE
E. Kavitha1,*, R. Tamilarasan2, Arunadevi Baladhandapani3, M. K. Jayanthi Kannan4
Computer Systems Science and Engineering, Vol.43, No.3, pp. 871-886, 2022, DOI:10.32604/csse.2022.021215
Abstract Gene expression data represents a condition matrix where each row represents the gene and the column shows the condition. Micro array used to detect gene expression in lab for thousands of gene at a time. Genes encode proteins which in turn will dictate the cell function. The production of messenger RNA along with processing the same are the two main stages involved in the process of gene expression. The biological networks complexity added with the volume of data containing imprecision and outliers increases the challenges in dealing with them. Clustering methods are hence essential to identify the patterns present in… More >
Open Access
ARTICLE
S. Shanmuga Priya1, D. Yuvaraj2,*, T. Satyanarayana Murthy3, Varghese S. Chooralil4, S. Navaneetha Krishnan5, P. Banumathy6, P. SundaraVadivel7
Computer Systems Science and Engineering, Vol.43, No.3, pp. 887-896, 2022, DOI:10.32604/csse.2022.021845
Abstract Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on… More >
Open Access
ARTICLE
Maram Abdullah M. Alyahya1, Arshiya S. Ansari1,*, Mohammad Sajid Mohammadi2
Computer Systems Science and Engineering, Vol.43, No.3, pp. 897-914, 2022, DOI:10.32604/csse.2022.023904
Abstract The paper presents a novel Graphics Interchange Format (GIF) Steganography system. The algorithm uses an animated (GIF) file format video to apply on, a secured and variable image partition scheme for data embedding. The secret data could be any character text, any image, an audio file, or a video file; that is converted in the form of bits. The proposed method uses a variable partition scheme structure for data embedding in the (GIF) file format video. The algorithm estimates the capacity of the cover (GIF) image frames to embed data bits. Our method built variable partition blocks in an empty… More >
Open Access
ARTICLE
Attia Qammar1, Ahmad Karim1,*, Yasser Alharbi2, Mohammad Alsaffar2, Abdullah Alharbi2
Computer Systems Science and Engineering, Vol.43, No.3, pp. 915-930, 2022, DOI:10.32604/csse.2022.023652
Abstract Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination of static and dynamic methods… More >
Open Access
ARTICLE
S. Lakshmi Narayanan*
Computer Systems Science and Engineering, Vol.43, No.3, pp. 931-946, 2022, DOI:10.32604/csse.2022.022459
Abstract The main aim of this work is to improve the security of data hiding for secret image sharing. The privacy and security of digital information have become a primary concern nowadays due to the enormous usage of digital technology. The security and the privacy of users’ images are ensured through reversible data hiding techniques. The efficiency of the existing data hiding techniques did not provide optimum performance with multiple end nodes. These issues are solved by using Separable Data Hiding and Adaptive Particle Swarm Optimization (SDHAPSO) algorithm to attain optimal performance. Image encryption, data embedding, data extraction/image recovery are the… More >
Open Access
ARTICLE
R. Haripriya*, G. Kousalya
Computer Systems Science and Engineering, Vol.43, No.3, pp. 947-965, 2022, DOI:10.32604/csse.2022.024149
Abstract COVID-19 (Coronavirus disease of 2019) is caused by SARS-CoV2 (Severe Acute Respiratory Syndrome Coronavirus 2) and it was first diagnosed in December 2019 in China. As of 25th Aug 2021, there are 165 million confirmed COVID-19 positive cases and 4.4 million deaths globally. As of today, though there are approved COVID-19 vaccine candidates only 4 billion doses have been administered. Until 100% of the population is safe, no one is safe. Even though these vaccines can provide protection against getting seriously ill and dying from the disease, it does not provide 100% protection from getting infected and passing it on… More >
Open Access
ARTICLE
Amjad Alsirhani, Mohamed Ezz, Ayman Mohamed Mostafa*
Computer Systems Science and Engineering, Vol.43, No.3, pp. 967-984, 2022, DOI:10.32604/csse.2022.024854
Abstract Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome… More >
Open Access
ARTICLE
S. Saravanakumar1,*, S. Chitra2
Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508
Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, including revocation. This issue is… More >
Open Access
ARTICLE
Jiaming Wang2, Xiaolan Xie1,2,*, Xiaochun Cheng3, Yuhan Wang2
Computer Systems Science and Engineering, Vol.43, No.3, pp. 997-1008, 2022, DOI:10.32604/csse.2022.027005
Abstract
There is a large amount of information in the network data that we can exploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of network data is usually paired with clustering algorithms to solve the community detection problem. Meanwhile, there is always an unpredictable distribution of class clusters output by graph representation learning. Therefore, we propose an improved density peak clustering algorithm (ILDPC) for the community detection problem, which improves the local density mechanism in the original algorithm and can better accommodate class clusters of different shapes. And we study the… More >