Open Access
ARTICLE
S. Siamala Devi1, K. Venkatachalam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1869-1880, 2023, DOI:10.32604/csse.2023.025505
Abstract The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message… More >
Open Access
ARTICLE
S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690
Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >
Open Access
ARTICLE
R. Vijay Anandh1,*, S. Rukmani Devi2
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1897-1910, 2023, DOI:10.32604/csse.2023.027187
Abstract The demand for the exploration of ocean resources is increasing exponentially. Underwater image data plays a significant role in many research areas. Despite this, the visual quality of underwater images is degraded because of two main factors namely, backscattering and attenuation. Therefore, visual enhancement has become an essential process to recover the required data from the images. Many algorithms had been proposed in a decade for improving the quality of images. This paper aims to propose a single image enhancement technique without the use of any external datasets. For that, the degraded images are subjected to two main processes namely,… More >
Open Access
ARTICLE
Mohammad Alkhawatrah, Ahmad Alamayreh, Nidal Qasem*
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1911-1919, 2023, DOI:10.32604/csse.2023.028614
Abstract Orbital Angular Momentum (OAM) is an intrinsic property of electromagnetic waves. Great research has been witnessed in the last decades aiming at exploiting the OAM wave property in different areas in radio and optics. One promising area of particular interest is to enhance the efficiency of the available communications spectrum. However, adopting OAM-based solutions is not priceless as these suffer from wave divergence especially when the OAM order is high. This shall limit the practical communications distance, especially in the radio regime. In this paper, we propose a cooperative OAM relaying system consisting of a source, relay, and destination. Relays… More >
Open Access
ARTICLE
Anas Basalamah1, Mahedi Hasan2, Shovan Bhowmik2, Shaikh Akib Shahriyar2,*
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1921-1938, 2023, DOI:10.32604/csse.2023.027399
Abstract The recognition of pathological voice is considered a difficult task for speech analysis. Moreover, otolaryngologists needed to rely on oral communication with patients to discover traces of voice pathologies like dysphonia that are caused by voice alteration of vocal folds and their accuracy is between 60%–70%. To enhance detection accuracy and reduce processing speed of dysphonia detection, a novel approach is proposed in this paper. We have leveraged Linear Discriminant Analysis (LDA) to train multiple Machine Learning (ML) models for dysphonia detection. Several ML models are utilized like Support Vector Machine (SVM), Logistic Regression, and K-nearest neighbor (K-NN) to predict… More >
Open Access
ARTICLE
Dhanalakshmi R1, Sovan Samanta2, Arun Kumar Sivaraman3, Jeong Gon Lee4,*, Balasundaram A5, Sanamdikar Sanjay Tanaji6, Priya Ravindran7
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1939-1950, 2023, DOI:10.32604/csse.2023.026254
Abstract Fuzzy sets have undergone several expansions and generalisations in the literature, including Atanasov’s intuitionistic fuzzy sets, type 2 fuzzy sets, and fuzzy multisets, to name a few. They can be regarded as fuzzy multisets from a formal standpoint; nevertheless, their interpretation differs from the two other approaches to fuzzy multisets that are currently available. Hesitating fuzzy sets (HFS) are very useful if consultants have hesitation in dealing with group decision-making problems between several possible memberships. However, these possible memberships can be not only crisp values in [0,1], but also interval values during a practical evaluation process. Hesitant bipolar valued fuzzy… More >
Open Access
ARTICLE
A. Durgadevi*, N. Shanmugavadivoo
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1951-1971, 2023, DOI:10.32604/csse.2023.026810
Abstract
Contemporarily, the development of distributed generations (DGs) technologies is fetching more, and their deployment in power systems is becoming broad and diverse. Consequently, several glitches are found in the recent studies due to the inappropriate/inadequate penetrations. This work aims to improve the reliable operation of the power system employing reliability indices using a metaheuristic-based algorithm before and after DGs penetration with feeder system. The assessment procedure is carried out using MATLAB software and Modified Salp Swarm Algorithm (MSSA) that helps assess the Reliability indices of the proposed integrated IEEE RTS79 system for seven different configurations. This algorithm modifies two control… More >
Open Access
ARTICLE
Aishah Alrashidi, Ali Mustafa Qamar*
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1973-1988, 2023, DOI:10.32604/csse.2023.024633
Abstract Electrical load forecasting is very crucial for electrical power systems’ planning and operation. Both electrical buildings’ load demand and meteorological datasets may contain hidden patterns that are required to be investigated and studied to show their potential impact on load forecasting. The meteorological data are analyzed in this study through different data mining techniques aiming to predict the electrical load demand of a factory located in Riyadh, Saudi Arabia. The factory load and meteorological data used in this study are recorded hourly between 2016 and 2017. These data are provided by King Abdullah City for Atomic and Renewable Energy and… More >
Open Access
ARTICLE
Kandasamy Kittusamy*, Latha Shanmuga Vadivu Sampath Kumar
Computer Systems Science and Engineering, Vol.44, No.3, pp. 1989-2005, 2023, DOI:10.32604/csse.2023.026501
Abstract Medical Image Fusion is the synthesizing technology for fusing multimodal medical information using mathematical procedures to generate better visual on the image content and high-quality image output. Medical image fusion represents an indispensible role in fixing major solutions for the complicated medical predicaments, while the recent research results have an enhanced affinity towards the preservation of medical image details, leaving color distortion and halo artifacts to remain unaddressed. This paper proposes a novel method of fusing Computer Tomography (CT) and Magnetic Resonance Imaging (MRI) using a hybrid model of Non Sub-sampled Contourlet Transform (NSCT) and Joint Sparse Representation (JSR). This… More >
Open Access
ARTICLE
N. Anita*, M. Vijayalakshmi, S. Mercy Shalinie
Computer Systems Science and Engineering, Vol.44, No.3, pp. 2007-2018, 2023, DOI:10.32604/csse.2023.025516
Abstract The Internet of Things (IoT) is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale. The existing malicious node detection mechanism in traditional approaches lacks in transparency, availability, or traceability of the detection phase. To overcome these concerns, we provide a decentralized technique using blockchain technology. Despite the fact that blockchain technology is applicable to create that type of models, existing harmony set of instructions are susceptible to do violence to such as DoS and Sybil, making blockchain systems unfeasible. Here, a new Proof-of-Improved-Participation (PoIP) harmony instruction was suggested that benefits the… More >