Home / Journals / CSSE / Vol.45, No.1, 2023
  • Open AccessOpen Access

    ARTICLE

    Learning-Based Metaheuristic Approach for Home Healthcare Optimization Problem

    Mariem Belhor1,2,3, Adnen El-Amraoui1,*, Abderrazak Jemai2, François Delmotte1
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 1-19, 2023, DOI:10.32604/csse.2023.029058
    Abstract This research focuses on the home health care optimization problem that involves staff routing and scheduling problems. The considered problem is an extension of multiple travelling salesman problem. It consists of finding the shortest path for a set of caregivers visiting a set of patients at their homes in order to perform various tasks during a given horizon. Thus, a mixed-integer linear programming model is proposed to minimize the overall service time performed by all caregivers while respecting the workload balancing constraint. Nevertheless, when the time horizon become large, practical-sized instances become very difficult to solve in a reasonable computational… More >

  • Open AccessOpen Access

    ARTICLE

    WACPN: A Neural Network for Pneumonia Diagnosis

    Shui-Hua Wang1, Muhammad Attique Khan2, Ziquan Zhu1, Yu-Dong Zhang1,*
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 21-34, 2023, DOI:10.32604/csse.2023.031330
    Abstract Community-acquired pneumonia (CAP) is considered a sort of pneumonia developed outside hospitals and clinics. To diagnose community-acquired pneumonia (CAP) more efficiently, we proposed a novel neural network model. We introduce the 2-dimensional wavelet entropy (2d-WE) layer and an adaptive chaotic particle swarm optimization (ACP) algorithm to train the feed-forward neural network. The ACP uses adaptive inertia weight factor (AIWF) and Rossler attractor (RA) to improve the performance of standard particle swarm optimization. The final combined model is named WE-layer ACP-based network (WACPN), which attains a sensitivity of 91.87 ± 1.37%, a specificity of 90.70 ± 1.19%, a precision of 91.01 ± 1.12%, an accuracy of 91.29 ± 1.09%,… More >

  • Open AccessOpen Access

    ARTICLE

    Developing Reliable Digital Healthcare Service Using Semi-Quantitative Functional Resonance Analysis

    Zhengshu Zhou*, Yutaka Matsubara, Hiroaki Takada
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 35-50, 2023, DOI:10.32604/csse.2023.030848
    Abstract Since entering the era of Industry 4.0, the concept of Healthcare 4.0 has also been put forward and explored by researchers. How to use Information Technology (IT) to better serve people’s healthcare is one of the most featured emerging directions in the academic circle. An important field of Healthcare 4.0 research is the reliability engineering of healthcare service. Because healthcare systems often affect the health and even life of their users, developers must be very cautious in the design, development, and operation of these healthcare systems and services. The problems to be solved include the reliability of business process, system… More >

  • Open AccessOpen Access

    ARTICLE

    ASL Recognition by the Layered Learning Model Using Clustered Groups

    Jungsoo Shin, Jaehee Jung*
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 51-68, 2023, DOI:10.32604/csse.2023.030647
    Abstract American Sign Language (ASL) images can be used as a communication tool by determining numbers and letters using the shape of the fingers. Particularly, ASL can have an key role in communication for hearing-impaired persons and conveying information to other persons, because sign language is their only channel of expression. Representative ASL recognition methods primarily adopt images, sensors, and pose-based recognition techniques, and employ various gestures together with hand-shapes. This study briefly reviews these attempts at ASL recognition and provides an improved ASL classification model that attempts to develop a deep learning method with meta-layers. In the proposed model, the… More >

  • Open AccessOpen Access

    ARTICLE

    Training Neuro-Fuzzy by Using Meta-Heuristic Algorithms for MPPT

    Ceren Baştemur Kaya1, Ebubekir Kaya2,*, Göksel Gökkuş3
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 69-84, 2023, DOI:10.32604/csse.2023.030598
    Abstract It is one of the topics that have been studied extensively on maximum power point tracking (MPPT) recently. Traditional or soft computing methods are used for MPPT. Since soft computing approaches are more effective than traditional approaches, studies on MPPT have shifted in this direction. This study aims comparison of performance of seven meta-heuristic training algorithms in the neuro-fuzzy training for MPPT. The meta-heuristic training algorithms used are particle swarm optimization (PSO), harmony search (HS), cuckoo search (CS), artificial bee colony (ABC) algorithm, bee algorithm (BA), differential evolution (DE) and flower pollination algorithm (FPA). The antecedent and conclusion parameters of… More >

  • Open AccessOpen Access

    ARTICLE

    Fine Grained Feature Extraction Model of Riot-related Images Based on YOLOv5

    Shaofan Su1, Deyu Yuan2,*, Yuanxin Wang2, Meng Ding3
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 85-97, 2023, DOI:10.32604/csse.2023.030849
    Abstract With the rapid development of Internet technology, the type of information in the Internet is extremely complex, and a large number of riot contents containing bloody, violent and riotous components have appeared. These contents pose a great threat to the network ecology and national security. As a result, the importance of monitoring riotous Internet activity cannot be overstated. Convolutional Neural Network (CNN-based) target detection algorithm has great potential in identifying rioters, so this paper focused on the use of improved backbone and optimization function of You Only Look Once v5 (YOLOv5), and further optimization of hyperparameters using genetic algorithm to… More >

  • Open AccessOpen Access

    ARTICLE

    Coupled CUBIC Congestion Control for MPTCP in Broadband Networks

    Jae Yong Lee1, Byung Chul Kim1, Youngmi Kwon1,*, Kimoon Han2
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 99-115, 2023, DOI:10.32604/csse.2023.030801
    Abstract Recently, multipath transmission control protocol (MPTCP) was standardized so that data can be transmitted through multiple paths to utilize all available path bandwidths. However, when high-speed long-distance networks are included in MPTCP paths, the traffic transmission performance of MPTCP is severely deteriorated, especially in case the multiple paths’ characteristics are heavily asymmetric. In order to alleviate this problem, we propose a “Coupled CUBIC congestion control” that adopts TCP CUBIC on a large bandwidth-delay product (BDP) path in a linked increase manner for maintaining fairness with an ordinary TCP traversing the same bottleneck path. To verify the performance excellence of the… More >

  • Open AccessOpen Access

    ARTICLE

    An Adaptive Wireless Power Sharing Control for Multiterminal HVDC

    Hasan Alrajhi*
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 117-129, 2023, DOI:10.32604/csse.2023.022464
    Abstract Power sharing among multiterminal high voltage direct current terminals (MT-HVDC) is mainly developed based on a priority or sequential manners, which uses to prevent the problem of overloading due to a predefined controller coefficient. Furthermore, fixed power sharing control also suffers from an inability to identify power availability at a rectification station. There is a need for a controller that ensures an efficient power sharing among the MT-HVDC terminals, prevents the possibility of overloading, and utilizes the available power sharing. A new adaptive wireless control for active power sharing among multiterminal (MT-HVDC) systems, including power availability and power management policy,… More >

  • Open AccessOpen Access

    ARTICLE

    Design of Semipersistent Resource Allocation in LTE-V Network

    Yi-Ting Mai1,*, Chi-En Li2
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 131-147, 2023, DOI:10.32604/csse.2023.027833
    Abstract Radio network access technology currently used in 4G/5G is Long Term Evolution-Advanced (LTE-A), which was developed by 3rd Generation Partnership Project (3GPP). Device-to-device (D2D) communication is a technology enabling direct communications among wireless devices without forwarding through an evolved Node B (eNB). Moreover, D2D transmission can support vehicles as a vehicle-to-vehicle (V2V) environment. It is possible to avoid accidents via exchanging movement-related information among vehicles and effectively increase driving safety (and efficiency). However, radio resources are limited in radio networks. A vehicle transmits through D2D in Long Term Evolution-Vehicle (LTE-V) mode-3 standard, and an eNB can allocate the same spectrum… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud

    P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6
    Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424
    Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence, to boost the functionality of… More >

Share Link

WeChat scan