Home / Journals / CSSE / Vol.48, No.2, 2024
Special Issues
  • Open AccessOpen Access

    ARTICLE

    A Novel Deep Learning-Based Model for Classification of Wheat Gene Expression

    Amr Ismail1, Walid Hamdy1,2, Aya M. Al-Zoghby3, Wael A. Awad3, Ahmed Ismail Ebada3, Yunyoung Nam4, Byeong-Gwon Kang4,*, Mohamed Abouhawwash5,6
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 273-285, 2024, DOI:10.32604/csse.2023.038192 - 19 March 2024
    Abstract Deep learning (DL) plays a critical role in processing and converting data into knowledge and decisions. DL technologies have been applied in a variety of applications, including image, video, and genome sequence analysis. In deep learning the most widely utilized architecture is Convolutional Neural Networks (CNN) are taught discriminatory traits in a supervised environment. In comparison to other classic neural networks, CNN makes use of a limited number of artificial neurons, therefore it is ideal for the recognition and processing of wheat gene sequences. Wheat is an essential crop of cereals for people around the… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Enhancement of XML Parsing Using Regression and Parallelism

    Muhammad Ali, Minhaj Ahmad Khan*
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 287-303, 2024, DOI:10.32604/csse.2023.043010 - 19 March 2024
    Abstract The Extensible Markup Language (XML) files, widely used for storing and exchanging information on the web require efficient parsing mechanisms to improve the performance of the applications. With the existing Document Object Model (DOM) based parsing, the performance degrades due to sequential processing and large memory requirements, thereby requiring an efficient XML parser to mitigate these issues. In this paper, we propose a Parallel XML Tree Generator (PXTG) algorithm for accelerating the parsing of XML files and a Regression-based XML Parsing Framework (RXPF) that analyzes and predicts performance through profiling, regression, and code generation for… More >

  • Open AccessOpen Access

    ARTICLE

    SwinVid: Enhancing Video Object Detection Using Swin Transformer

    Abdelrahman Maharek1,2,*, Amr Abozeid2,3, Rasha Orban1, Kamal ElDahshan2
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 305-320, 2024, DOI:10.32604/csse.2024.039436 - 19 March 2024
    (This article belongs to the Special Issue: Explainable AI and Cybersecurity Techniques for IoT-Based Medical and Healthcare Applications)
    Abstract What causes object detection in video to be less accurate than it is in still images? Because some video frames have degraded in appearance from fast movement, out-of-focus camera shots, and changes in posture. These reasons have made video object detection (VID) a growing area of research in recent years. Video object detection can be used for various healthcare applications, such as detecting and tracking tumors in medical imaging, monitoring the movement of patients in hospitals and long-term care facilities, and analyzing videos of surgeries to improve technique and training. Additionally, it can be used… More >

  • Open AccessOpen Access

    ARTICLE

    Movement Function Assessment Based on Human Pose Estimation from Multi-View

    Lingling Chen1,2,*, Tong Liu1, Zhuo Gong1, Ding Wang1
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 321-339, 2024, DOI:10.32604/csse.2023.037865 - 19 March 2024
    (This article belongs to the Special Issue: Artificial Intelligence enabled Smart Health Care Decision Support Systems)
    Abstract Human pose estimation is a basic and critical task in the field of computer vision that involves determining the position (or spatial coordinates) of the joints of the human body in a given image or video. It is widely used in motion analysis, medical evaluation, and behavior monitoring. In this paper, the authors propose a method for multi-view human pose estimation. Two image sensors were placed orthogonally with respect to each other to capture the pose of the subject as they moved, and this yielded accurate and comprehensive results of three-dimensional (3D) motion reconstruction that… More >

  • Open AccessOpen Access

    ARTICLE

    Deep Learning-Based Mask Identification System Using ResNet Transfer Learning Architecture

    Arpit Jain1, Nageswara Rao Moparthi1, A. Swathi2, Yogesh Kumar Sharma1, Nitin Mittal3, Ahmed Alhussen4, Zamil S. Alzamil5,*, MohdAnul Haq5
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 341-362, 2024, DOI:10.32604/csse.2023.036973 - 19 March 2024
    (This article belongs to the Special Issue: Intelligent Devices and Computing Applications)
    Abstract Recently, the coronavirus disease 2019 has shown excellent attention in the global community regarding health and the economy. World Health Organization (WHO) and many others advised controlling Corona Virus Disease in 2019. The limited treatment resources, medical resources, and unawareness of immunity is an essential horizon to unfold. Among all resources, wearing a mask is the primary non-pharmaceutical intervention to stop the spreading of the virus caused by Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) droplets. All countries made masks mandatory to prevent infection. For such enforcement, automatic and effective face detection systems are crucial.… More >

  • Open AccessOpen Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721 - 19 March 2024
    (This article belongs to the Special Issue: Advances in Mobile Internet Security)
    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and… More >

  • Open AccessOpen Access

    ARTICLE

    Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network

    R. Sangeetha, Usha Devi Gandhi*
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 395-411, 2024, DOI:10.32604/csse.2023.041217 - 19 March 2024
    Abstract Wireless Body Area Network (WBAN) is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body. WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature, blood pressure, pulse rate, oxygen level, body motion, and so on. They sense the data and communicate it to the Body Area Network (BAN) Coordinator. The main challenge for the WBAN is energy consumption. These issues can be addressed by implementing an effective Medium Access Control (MAC) protocol that reduces energy consumption and increases… More >

  • Open AccessOpen Access

    ARTICLE

    Micro-Locational Fine Dust Prediction Utilizing Machine Learning and Deep Learning Models

    Seoyun Kim1,#, Hyerim Yu2,#, Jeewoo Yoon1,3, Eunil Park1,2,*
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 413-429, 2024, DOI:10.32604/csse.2023.041575 - 19 March 2024
    Abstract Given the increasing number of countries reporting degraded air quality, effective air quality monitoring has become a critical issue in today’s world. However, the current air quality observatory systems are often prohibitively expensive, resulting in a lack of observatories in many regions within a country. Consequently, a significant problem arises where not every region receives the same level of air quality information. This disparity occurs because some locations have to rely on information from observatories located far away from their regions, even if they may be the closest available options. To address this challenge, a… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks

    Abdullah Alsaleh1,2,*
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 431-449, 2024, DOI:10.32604/csse.2023.043107 - 19 March 2024
    (This article belongs to the Special Issue: Trustworthy Artificial Intelligence for Smart City)
    Abstract With the increasing number of connected devices in the Internet of Things (IoT) era, the number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary intelligent system for monitoring, detecting and alerting against malicious activity. IDS is important in developing advanced security models. This study reviews the importance of various techniques, tools, and methods used in IoT detection and/or prevention systems. Specifically, it focuses on machine learning (ML) and deep learning (DL) techniques for IDS. This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the… More >

  • Open AccessOpen Access

    ARTICLE

    TEAM: Transformer Encoder Attention Module for Video Classification

    Hae Sung Park1, Yong Suk Choi2,*
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 451-477, 2024, DOI:10.32604/csse.2023.043245 - 19 March 2024
    Abstract Much like humans focus solely on object movement to understand actions, directing a deep learning model’s attention to the core contexts within videos is crucial for improving video comprehension. In the recent study, Video Masked Auto-Encoder (VideoMAE) employs a pre-training approach with a high ratio of tube masking and reconstruction, effectively mitigating spatial bias due to temporal redundancy in full video frames. This steers the model’s focus toward detailed temporal contexts. However, as the VideoMAE still relies on full video frames during the action recognition stage, it may exhibit a progressive shift in attention towards… More >

  • Open AccessOpen Access

    ARTICLE

    Test Case Generation Evaluator for the Implementation of Test Case Generation Algorithms Based on Learning to Rank

    Zhonghao Guo*, Xinyue Xu, Xiangxian Chen
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 479-509, 2024, DOI:10.32604/csse.2023.043932 - 19 March 2024
    (This article belongs to the Special Issue: Emerging Artificial Intelligence Techniques for Software Engineering Process Optimization)
    Abstract In software testing, the quality of test cases is crucial, but manual generation is time-consuming. Various automatic test case generation methods exist, requiring careful selection based on program features. Current evaluation methods compare a limited set of metrics, which does not support a larger number of metrics or consider the relative importance of each metric to the final assessment. To address this, we propose an evaluation tool, the Test Case Generation Evaluator (TCGE), based on the learning to rank (L2R) algorithm. Unlike previous approaches, our method comprehensively evaluates algorithms by considering multiple metrics, resulting in… More >

  • Open AccessOpen Access

    ARTICLE

    DeepSVDNet: A Deep Learning-Based Approach for Detecting and Classifying Vision-Threatening Diabetic Retinopathy in Retinal Fundus Images

    Anas Bilal1, Azhar Imran2, Talha Imtiaz Baig3,4, Xiaowen Liu1,*, Haixia Long1, Abdulkareem Alzahrani5, Muhammad Shafiq6
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 511-528, 2024, DOI:10.32604/csse.2023.039672 - 19 March 2024
    (This article belongs to the Special Issue: Explainable AI and Cybersecurity Techniques for IoT-Based Medical and Healthcare Applications)
    Abstract Artificial Intelligence (AI) is being increasingly used for diagnosing Vision-Threatening Diabetic Retinopathy (VTDR), which is a leading cause of visual impairment and blindness worldwide. However, previous automated VTDR detection methods have mainly relied on manual feature extraction and classification, leading to errors. This paper proposes a novel VTDR detection and classification model that combines different models through majority voting. Our proposed methodology involves preprocessing, data augmentation, feature extraction, and classification stages. We use a hybrid convolutional neural network-singular value decomposition (CNN-SVD) model for feature extraction and selection and an improved SVM-RBF with a Decision Tree More >

  • Open AccessOpen Access

    ARTICLE

    An Artificial Intelligence-Based Framework for Fruits Disease Recognition Using Deep Learning

    Irfan Haider1, Muhammad Attique Khan1,*, Muhammad Nazir1, Taerang Kim2, Jae-Hyuk Cha2
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 529-554, 2024, DOI:10.32604/csse.2023.042080 - 19 March 2024
    (This article belongs to the Special Issue: Vision Transformer and Next-Generation AI Tools for Smart Surveillance, Healthcare, and Agriculture Systems)
    Abstract Fruit infections have an impact on both the yield and the quality of the crop. As a result, an automated recognition system for fruit leaf diseases is important. In artificial intelligence (AI) applications, especially in agriculture, deep learning shows promising disease detection and classification results. The recent AI-based techniques have a few challenges for fruit disease recognition, such as low-resolution images, small datasets for learning models, and irrelevant feature extraction. This work proposed a new fruit leaf leaf leaf disease recognition framework using deep learning features and improved pathfinder optimization. Three fruit types have been… More >

  • Open AccessOpen Access

    ARTICLE

    Virtual Keyboard: A Real-Time Hand Gesture Recognition-Based Character Input System Using LSTM and Mediapipe Holistic

    Bijon Mallik1, Md Abdur Rahim1, Abu Saleh Musa Miah2, Keun Soo Yun3,*, Jungpil Shin2
    Computer Systems Science and Engineering, Vol.48, No.2, pp. 555-570, 2024, DOI:10.32604/csse.2023.045981 - 19 March 2024
    Abstract In the digital age, non-touch communication technologies are reshaping human-device interactions and raising security concerns. A major challenge in current technology is the misinterpretation of gestures by sensors and cameras, often caused by environmental factors. This issue has spurred the need for advanced data processing methods to achieve more accurate gesture recognition and predictions. Our study presents a novel virtual keyboard allowing character input via distinct hand gestures, focusing on two key aspects: hand gesture recognition and character input mechanisms. We developed a novel model with LSTM and fully connected layers for enhanced sequential data… More >

Per Page:

Share Link