Home / Journals / CSSE / Vol.44, No.3, 2023
  • Open AccessOpen Access

    ARTICLE

    Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT

    S. Siamala Devi1, K. Venkatachalam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1869-1880, 2023, DOI:10.32604/csse.2023.025505
    Abstract The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message… More >

  • Open AccessOpen Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690
    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open AccessOpen Access

    ARTICLE

    Visual Enhancement of Underwater Images Using Transmission Estimation and Multi-Scale Fusion

    R. Vijay Anandh1,*, S. Rukmani Devi2
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1897-1910, 2023, DOI:10.32604/csse.2023.027187
    Abstract The demand for the exploration of ocean resources is increasing exponentially. Underwater image data plays a significant role in many research areas. Despite this, the visual quality of underwater images is degraded because of two main factors namely, backscattering and attenuation. Therefore, visual enhancement has become an essential process to recover the required data from the images. Many algorithms had been proposed in a decade for improving the quality of images. This paper aims to propose a single image enhancement technique without the use of any external datasets. For that, the degraded images are subjected to two main processes namely,… More >

  • Open AccessOpen Access

    ARTICLE

    Cooperative Relay Networks Based on the OAM Technique for 5G Applications

    Mohammad Alkhawatrah, Ahmad Alamayreh, Nidal Qasem*
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1911-1919, 2023, DOI:10.32604/csse.2023.028614
    Abstract Orbital Angular Momentum (OAM) is an intrinsic property of electromagnetic waves. Great research has been witnessed in the last decades aiming at exploiting the OAM wave property in different areas in radio and optics. One promising area of particular interest is to enhance the efficiency of the available communications spectrum. However, adopting OAM-based solutions is not priceless as these suffer from wave divergence especially when the OAM order is high. This shall limit the practical communications distance, especially in the radio regime. In this paper, we propose a cooperative OAM relaying system consisting of a source, relay, and destination. Relays… More >

  • Open AccessOpen Access

    ARTICLE

    A Highly Accurate Dysphonia Detection System Using Linear Discriminant Analysis

    Anas Basalamah1, Mahedi Hasan2, Shovan Bhowmik2, Shaikh Akib Shahriyar2,*
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1921-1938, 2023, DOI:10.32604/csse.2023.027399
    Abstract The recognition of pathological voice is considered a difficult task for speech analysis. Moreover, otolaryngologists needed to rely on oral communication with patients to discover traces of voice pathologies like dysphonia that are caused by voice alteration of vocal folds and their accuracy is between 60%–70%. To enhance detection accuracy and reduce processing speed of dysphonia detection, a novel approach is proposed in this paper. We have leveraged Linear Discriminant Analysis (LDA) to train multiple Machine Learning (ML) models for dysphonia detection. Several ML models are utilized like Support Vector Machine (SVM), Logistic Regression, and K-nearest neighbor (K-NN) to predict… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-attribute Group Decision-making Based on Hesitant Bipolar-valued Fuzzy Information and Social Network

    Dhanalakshmi R1, Sovan Samanta2, Arun Kumar Sivaraman3, Jeong Gon Lee4,*, Balasundaram A5, Sanamdikar Sanjay Tanaji6, Priya Ravindran7
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1939-1950, 2023, DOI:10.32604/csse.2023.026254
    Abstract Fuzzy sets have undergone several expansions and generalisations in the literature, including Atanasov’s intuitionistic fuzzy sets, type 2 fuzzy sets, and fuzzy multisets, to name a few. They can be regarded as fuzzy multisets from a formal standpoint; nevertheless, their interpretation differs from the two other approaches to fuzzy multisets that are currently available. Hesitating fuzzy sets (HFS) are very useful if consultants have hesitation in dealing with group decision-making problems between several possible memberships. However, these possible memberships can be not only crisp values in [0,1], but also interval values during a practical evaluation process. Hesitant bipolar valued fuzzy… More >

  • Open AccessOpen Access

    ARTICLE

    Availability Capacity Evaluation and Reliability Assessment of Integrated Systems Using Metaheuristic Algorithm

    A. Durgadevi*, N. Shanmugavadivoo
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1951-1971, 2023, DOI:10.32604/csse.2023.026810
    Abstract

    Contemporarily, the development of distributed generations (DGs) technologies is fetching more, and their deployment in power systems is becoming broad and diverse. Consequently, several glitches are found in the recent studies due to the inappropriate/inadequate penetrations. This work aims to improve the reliable operation of the power system employing reliability indices using a metaheuristic-based algorithm before and after DGs penetration with feeder system. The assessment procedure is carried out using MATLAB software and Modified Salp Swarm Algorithm (MSSA) that helps assess the Reliability indices of the proposed integrated IEEE RTS79 system for seven different configurations. This algorithm modifies two control… More >

  • Open AccessOpen Access

    ARTICLE

    Data-Driven Load Forecasting Using Machine Learning and Meteorological Data

    Aishah Alrashidi, Ali Mustafa Qamar*
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1973-1988, 2023, DOI:10.32604/csse.2023.024633
    Abstract Electrical load forecasting is very crucial for electrical power systems’ planning and operation. Both electrical buildings’ load demand and meteorological datasets may contain hidden patterns that are required to be investigated and studied to show their potential impact on load forecasting. The meteorological data are analyzed in this study through different data mining techniques aiming to predict the electrical load demand of a factory located in Riyadh, Saudi Arabia. The factory load and meteorological data used in this study are recorded hourly between 2016 and 2017. These data are provided by King Abdullah City for Atomic and Renewable Energy and… More >

  • Open AccessOpen Access

    ARTICLE

    Non Sub-Sampled Contourlet with Joint Sparse Representation Based Medical Image Fusion

    Kandasamy Kittusamy*, Latha Shanmuga Vadivu Sampath Kumar
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1989-2005, 2023, DOI:10.32604/csse.2023.026501
    Abstract Medical Image Fusion is the synthesizing technology for fusing multimodal medical information using mathematical procedures to generate better visual on the image content and high-quality image output. Medical image fusion represents an indispensible role in fixing major solutions for the complicated medical predicaments, while the recent research results have an enhanced affinity towards the preservation of medical image details, leaving color distortion and halo artifacts to remain unaddressed. This paper proposes a novel method of fusing Computer Tomography (CT) and Magnetic Resonance Imaging (MRI) using a hybrid model of Non Sub-sampled Contourlet Transform (NSCT) and Joint Sparse Representation (JSR). This… More >

  • Open AccessOpen Access

    ARTICLE

    Proof-of-Improved-Participation: A New Consensus Protocol for Blockchain Technology

    N. Anita*, M. Vijayalakshmi, S. Mercy Shalinie
    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2007-2018, 2023, DOI:10.32604/csse.2023.025516
    Abstract The Internet of Things (IoT) is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale. The existing malicious node detection mechanism in traditional approaches lacks in transparency, availability, or traceability of the detection phase. To overcome these concerns, we provide a decentralized technique using blockchain technology. Despite the fact that blockchain technology is applicable to create that type of models, existing harmony set of instructions are susceptible to do violence to such as DoS and Sybil, making blockchain systems unfeasible. Here, a new Proof-of-Improved-Participation (PoIP) harmony instruction was suggested that benefits the… More >

Share Link

WeChat scan