Open Access
ARTICLE
Mariem Belhor1,2,3, Adnen El-Amraoui1,*, Abderrazak Jemai2, François Delmotte1
Computer Systems Science and Engineering, Vol.45, No.1, pp. 1-19, 2023, DOI:10.32604/csse.2023.029058
Abstract This research focuses on the home health care optimization problem that involves staff routing and scheduling problems. The considered problem is an extension of multiple travelling salesman problem. It consists of finding the shortest path for a set of caregivers visiting a set of patients at their homes in order to perform various tasks during a given horizon. Thus, a mixed-integer linear programming model is proposed to minimize the overall service time performed by all caregivers while respecting the workload balancing constraint. Nevertheless, when the time horizon become large, practical-sized instances become very difficult to solve in a reasonable computational… More >
Open Access
ARTICLE
Shui-Hua Wang1, Muhammad Attique Khan2, Ziquan Zhu1, Yu-Dong Zhang1,*
Computer Systems Science and Engineering, Vol.45, No.1, pp. 21-34, 2023, DOI:10.32604/csse.2023.031330
Abstract Community-acquired pneumonia (CAP) is considered a sort of pneumonia developed outside hospitals and clinics. To diagnose community-acquired pneumonia (CAP) more efficiently, we proposed a novel neural network model. We introduce the 2-dimensional wavelet entropy (2d-WE) layer and an adaptive chaotic particle swarm optimization (ACP) algorithm to train the feed-forward neural network. The ACP uses adaptive inertia weight factor (AIWF) and Rossler attractor (RA) to improve the performance of standard particle swarm optimization. The final combined model is named WE-layer ACP-based network (WACPN), which attains a sensitivity of 91.87 ± 1.37%, a specificity of 90.70 ± 1.19%, a precision of 91.01 ± 1.12%, an accuracy of 91.29 ± 1.09%,… More >
Open Access
ARTICLE
Zhengshu Zhou*, Yutaka Matsubara, Hiroaki Takada
Computer Systems Science and Engineering, Vol.45, No.1, pp. 35-50, 2023, DOI:10.32604/csse.2023.030848
Abstract Since entering the era of Industry 4.0, the concept of Healthcare 4.0 has also been put forward and explored by researchers. How to use Information Technology (IT) to better serve people’s healthcare is one of the most featured emerging directions in the academic circle. An important field of Healthcare 4.0 research is the reliability engineering of healthcare service. Because healthcare systems often affect the health and even life of their users, developers must be very cautious in the design, development, and operation of these healthcare systems and services. The problems to be solved include the reliability of business process, system… More >
Open Access
ARTICLE
Jungsoo Shin, Jaehee Jung*
Computer Systems Science and Engineering, Vol.45, No.1, pp. 51-68, 2023, DOI:10.32604/csse.2023.030647
Abstract American Sign Language (ASL) images can be used as a communication tool by determining numbers and letters using the shape of the fingers. Particularly, ASL can have an key role in communication for hearing-impaired persons and conveying information to other persons, because sign language is their only channel of expression. Representative ASL recognition methods primarily adopt images, sensors, and pose-based recognition techniques, and employ various gestures together with hand-shapes. This study briefly reviews these attempts at ASL recognition and provides an improved ASL classification model that attempts to develop a deep learning method with meta-layers. In the proposed model, the… More >
Open Access
ARTICLE
Ceren Baştemur Kaya1, Ebubekir Kaya2,*, Göksel Gökkuş3
Computer Systems Science and Engineering, Vol.45, No.1, pp. 69-84, 2023, DOI:10.32604/csse.2023.030598
Abstract It is one of the topics that have been studied extensively on maximum power point tracking (MPPT) recently. Traditional or soft computing methods are used for MPPT. Since soft computing approaches are more effective than traditional approaches, studies on MPPT have shifted in this direction. This study aims comparison of performance of seven meta-heuristic training algorithms in the neuro-fuzzy training for MPPT. The meta-heuristic training algorithms used are particle swarm optimization (PSO), harmony search (HS), cuckoo search (CS), artificial bee colony (ABC) algorithm, bee algorithm (BA), differential evolution (DE) and flower pollination algorithm (FPA). The antecedent and conclusion parameters of… More >
Open Access
ARTICLE
Shaofan Su1, Deyu Yuan2,*, Yuanxin Wang2, Meng Ding3
Computer Systems Science and Engineering, Vol.45, No.1, pp. 85-97, 2023, DOI:10.32604/csse.2023.030849
Abstract With the rapid development of Internet technology, the type of information in the Internet is extremely complex, and a large number of riot contents containing bloody, violent and riotous components have appeared. These contents pose a great threat to the network ecology and national security. As a result, the importance of monitoring riotous Internet activity cannot be overstated. Convolutional Neural Network (CNN-based) target detection algorithm has great potential in identifying rioters, so this paper focused on the use of improved backbone and optimization function of You Only Look Once v5 (YOLOv5), and further optimization of hyperparameters using genetic algorithm to… More >
Open Access
ARTICLE
Jae Yong Lee1, Byung Chul Kim1, Youngmi Kwon1,*, Kimoon Han2
Computer Systems Science and Engineering, Vol.45, No.1, pp. 99-115, 2023, DOI:10.32604/csse.2023.030801
Abstract Recently, multipath transmission control protocol (MPTCP) was standardized so that data can be transmitted through multiple paths to utilize all available path bandwidths. However, when high-speed long-distance networks are included in MPTCP paths, the traffic transmission performance of MPTCP is severely deteriorated, especially in case the multiple paths’ characteristics are heavily asymmetric. In order to alleviate this problem, we propose a “Coupled CUBIC congestion control” that adopts TCP CUBIC on a large bandwidth-delay product (BDP) path in a linked increase manner for maintaining fairness with an ordinary TCP traversing the same bottleneck path. To verify the performance excellence of the… More >
Open Access
ARTICLE
Hasan Alrajhi*
Computer Systems Science and Engineering, Vol.45, No.1, pp. 117-129, 2023, DOI:10.32604/csse.2023.022464
Abstract Power sharing among multiterminal high voltage direct current terminals (MT-HVDC) is mainly developed based on a priority or sequential manners, which uses to prevent the problem of overloading due to a predefined controller coefficient. Furthermore, fixed power sharing control also suffers from an inability to identify power availability at a rectification station. There is a need for a controller that ensures an efficient power sharing among the MT-HVDC terminals, prevents the possibility of overloading, and utilizes the available power sharing. A new adaptive wireless control for active power sharing among multiterminal (MT-HVDC) systems, including power availability and power management policy,… More >
Open Access
ARTICLE
Yi-Ting Mai1,*, Chi-En Li2
Computer Systems Science and Engineering, Vol.45, No.1, pp. 131-147, 2023, DOI:10.32604/csse.2023.027833
Abstract Radio network access technology currently used in 4G/5G is Long Term Evolution-Advanced (LTE-A), which was developed by 3rd Generation Partnership Project (3GPP). Device-to-device (D2D) communication is a technology enabling direct communications among wireless devices without forwarding through an evolved Node B (eNB). Moreover, D2D transmission can support vehicles as a vehicle-to-vehicle (V2V) environment. It is possible to avoid accidents via exchanging movement-related information among vehicles and effectively increase driving safety (and efficiency). However, radio resources are limited in radio networks. A vehicle transmits through D2D in Long Term Evolution-Vehicle (LTE-V) mode-3 standard, and an eNB can allocate the same spectrum… More >
Open Access
ARTICLE
P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6
Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424
Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence, to boost the functionality of… More >