Home / Journals / CSSE / Vol.49, No.1, 2025
Special Issues
  • Open AccessOpen Access

    ARTICLE

    OD-YOLOv8: A Lightweight and Enhanced New Algorithm for Ship Detection

    Zhuowei Wang1,*, Dezhi Han1, Bing Han2, Zhongdai Wu2
    Computer Systems Science and Engineering, Vol.49, pp. 377-399, 2025, DOI:10.32604/csse.2025.059634 - 09 April 2025
    Abstract Synthetic Aperture Radar (SAR) has become one of the most effective tools in ship detection. However, due to significant background interference, small targets, and challenges related to target scattering intensity in SAR images, current ship target detection faces serious issues of missed detections and false positives, and the network structures are overly complex. To address this issue, this paper proposes a lightweight model based on YOLOv8, named OD-YOLOv8. Firstly, we adopt a simplified neural network architecture, VanillaNet, to replace the backbone network, significantly reducing the number of parameters and computational complexity while ensuring accuracy. Secondly,… More >

  • Open AccessOpen Access

    ARTICLE

    Improved Resilience of Image Encryption Based on Hybrid TEA and RSA Techniques

    Muath AlShaikh1,*, Ahmed Manea Alkhalifah2, Sultan Alamri3
    Computer Systems Science and Engineering, Vol.49, pp. 353-376, 2025, DOI:10.32604/csse.2025.062433 - 21 March 2025
    Abstract Data security is crucial for improving the confidentiality, integrity, and authenticity of the image content. Maintaining these security factors poses significant challenges, particularly in healthcare, business, and social media sectors, where information security and personal privacy are paramount. The cryptography concept introduces a solution to these challenges. This paper proposes an innovative hybrid image encryption algorithm capable of encrypting several types of images. The technique merges the Tiny Encryption Algorithm (TEA) and Rivest-Shamir-Adleman (RSA) algorithms called (TEA-RSA). The performance of this algorithm is promising in terms of cost and complexity, an encryption time which is… More >

  • Open AccessOpen Access

    ARTICLE

    Classifying Network Flows through a Multi-Modal 1D CNN Approach Using Unified Traffic Representations

    Ravi Veerabhadrappa*, Poornima Athikatte Sampigerayappa
    Computer Systems Science and Engineering, Vol.49, pp. 333-351, 2025, DOI:10.32604/csse.2025.061285 - 19 March 2025
    Abstract In recent years, the analysis of encrypted network traffic has gained momentum due to the widespread use of Transport Layer Security and Quick UDP Internet Connections protocols, which complicate and prolong the analysis process. Classification models face challenges in understanding and classifying unknown traffic because of issues related to interpret ability and the representation of traffic data. To tackle these complexities, multi-modal representation learning can be employed to extract meaningful features and represent them in a lower-dimensional latent space. Recently, auto-encoder-based multi-modal representation techniques have shown superior performance in representing network traffic. By combining the… More >

  • Open AccessOpen Access

    ARTICLE

    An Enhanced Task Migration Technique Based on Convolutional Neural Network in Machine Learning Framework

    Hamayun Khan1,*, Muhammad Atif Imtiaz2, Hira Siddique3, Muhammad Tausif Afzal Rana4, Arshad Ali5, Muhammad Zeeshan Baig6, Saif ur Rehman7, Yazed Alsaawy5
    Computer Systems Science and Engineering, Vol.49, pp. 317-331, 2025, DOI:10.32604/csse.2025.061118 - 19 March 2025
    Abstract The migration of tasks aided by machine learning (ML) predictions IN (DPM) is a system-level design technique that is used to reduce energy by enhancing the overall performance of the processor. In this paper, we address the issue of system-level higher task dissipation during the execution of parallel workloads with common deadlines by introducing a machine learning-based framework that includes task migration using energy-efficient earliest deadline first scheduling (EA-EDF). ML-based EA-EDF enhances the overall throughput and optimizes the energy to avoid delay and performance degradation in a multiprocessor system. The proposed system model allocates processors… More >

  • Open AccessOpen Access

    ARTICLE

    SPQ: An Improved Q Algorithm Based on Slot Prediction

    Jiacheng Luo, Jiahao Wen, Jian Yang*
    Computer Systems Science and Engineering, Vol.49, pp. 301-316, 2025, DOI:10.32604/csse.2025.060757 - 27 February 2025
    Abstract Mitigating tag collisions is paramount for enhancing throughput in Radio Frequency Identification (RFID) systems. However, traditional algorithms encounter challenges like slot wastage and inefficient frame length adjustments. To tackle these challenges, the Slot Prediction Q (SPQ) algorithm was introduced, integrating the Vogt-II prediction algorithm and slot grouping to improve the initial Q value by predicting the first frame. This method quickly estimates the number of tags based on slot utilization, accelerating Q value adjustments when slot utilization is low. Furthermore, a Markov decision chain is used to optimize the relationship between the number of slot groupings (x) More >

  • Open AccessOpen Access

    ARTICLE

    Point-Based Fusion for Multimodal 3D Detection in Autonomous Driving

    Xinxin Liu, Bin Ye*
    Computer Systems Science and Engineering, Vol.49, pp. 287-300, 2025, DOI:10.32604/csse.2025.061655 - 20 February 2025
    (This article belongs to the Special Issue: Advanced Machine Learning and Artificial Intelligence in Engineering Applications)
    Abstract In the broader field of mechanical technology, and particularly in the context of self-driving vehicles, cameras and Light Detection and Ranging (LiDAR) sensors provide complementary modalities that hold significant potential for sensor fusion. However, directly merging multi-sensor data through point projection often results in information loss due to quantization, and managing the differing data formats from multiple sensors remains a persistent challenge. To address these issues, we propose a new fusion method that leverages continuous convolution, point-pooling, and a learned Multilayer Perceptron (MLP) to achieve superior detection performance. Our approach integrates the segmentation mask with… More >

  • Open AccessOpen Access

    ARTICLE

    Cloud-Based Deep Learning for Real-Time URL Anomaly Detection: LSTM/GRU and CNN/LSTM Models

    Ayman Noor*
    Computer Systems Science and Engineering, Vol.49, pp. 259-286, 2025, DOI:10.32604/csse.2025.060387 - 21 February 2025
    Abstract Precisely forecasting the performance of Deep Learning (DL) models, particularly in critical areas such as Uniform Resource Locator (URL)-based threat detection, aids in improving systems developed for difficult tasks. In cybersecurity, recognizing harmful URLs is vital to lowering risks associated with phishing, malware, and other online-based attacks. Since it directly affects the model’s capacity to differentiate between benign and harmful URLs, finding the optimum mix of hyperparameters in DL models is a significant difficulty. Two commonly used architectures for sequential and spatial data processing, Long Short-Term Memory (LSTM)/Gated Recurrent Unit (GRU) and Convolutional Neural Network… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Vehicle Overtaking System via LoRa-Enabled Vehicular Communication Approach

    Kwang Chee Seng, Siti Fatimah Abdul Razak*, Sumendra Yogarayan
    Computer Systems Science and Engineering, Vol.49, pp. 239-258, 2025, DOI:10.32604/csse.2024.056582 - 10 January 2025
    Abstract Vehicle overtaking poses significant risks and leads to injuries and losses on Malaysia’s roads. In most scenarios, insufficient and untimely information available to drivers for accessing road conditions and their surrounding environment is the primary factor that causes these incidents. To address these issues, a comprehensive system is required to provide real-time assistance to drivers. Building upon our previous research on a LoRa-based lane change decision-aid system, this study proposes an enhanced Vehicle Overtaking System (VOS). This system utilizes long-range (LoRa) communication for reliable real-time data exchange between vehicles (V2V) and the cloud (V2C). By More >

  • Open AccessOpen Access

    ARTICLE

    3D Reconstruction for Early Detection of Liver Cancer

    Rana Mohamed1,2,*, Mostafa Elgendy1, Mohamed Taha1
    Computer Systems Science and Engineering, Vol.49, pp. 213-238, 2025, DOI:10.32604/csse.2024.059491 - 10 January 2025
    Abstract Globally, liver cancer ranks as the sixth most frequent malignancy cancer. The importance of early detection is undeniable, as liver cancer is the fifth most common disease in men and the ninth most common cancer in women. Recent advances in imaging, biomarker discovery, and genetic profiling have greatly enhanced the ability to diagnose liver cancer. Early identification is vital since liver cancer is often asymptomatic, making diagnosis difficult. Imaging techniques such as Magnetic Resonance Imaging (MRI), Computed Tomography (CT), and ultrasonography can be used to identify liver cancer once a sample of liver tissue is… More >

  • Open AccessOpen Access

    ARTICLE

    Energy-Efficient Internet of Things-Based Wireless Sensor Network for Autonomous Data Validation for Environmental Monitoring

    Tabassum Kanwal1, Saif Ur Rehman1,*, Azhar Imran2, Haitham A. Mahmoud3
    Computer Systems Science and Engineering, Vol.49, pp. 185-212, 2025, DOI:10.32604/csse.2024.056535 - 10 January 2025
    Abstract This study presents an energy-efficient Internet of Things (IoT)-based wireless sensor network (WSN) framework for autonomous data validation in remote environmental monitoring. We address two critical challenges in WSNs: ensuring data reliability and optimizing energy consumption. Our novel approach integrates an artificial neural network (ANN)-based multi-fault detection algorithm with an energy-efficient IoT-WSN architecture. The proposed ANN model is designed to simultaneously detect multiple fault types, including spike faults, stuck-at faults, outliers, and out-of-range faults. We collected sensor data at 5-minute intervals over three months, using temperature and humidity sensors. The ANN was trained on 70%… More >

  • Open AccessOpen Access

    ARTICLE

    XGBoost Based Multiclass NLOS Channels Identification in UWB Indoor Positioning System

    Ammar Fahem Majeed1,2,*, Rashidah Arsat1, Muhammad Ariff Baharudin1, Nurul Mu’azzah Abdul Latiff1, Abbas Albaidhani3
    Computer Systems Science and Engineering, Vol.49, pp. 159-183, 2025, DOI:10.32604/csse.2024.058741 - 03 January 2025
    Abstract Accurate non-line of sight (NLOS) identification technique in ultra-wideband (UWB) location-based services is critical for applications like drone communication and autonomous navigation. However, current methods using binary classification (LOS/NLOS) oversimplify real-world complexities, with limited generalisation and adaptability to varying indoor environments, thereby reducing the accuracy of positioning. This study proposes an extreme gradient boosting (XGBoost) model to identify multi-class NLOS conditions. We optimise the model using grid search and genetic algorithms. Initially, the grid search approach is used to identify the most favourable values for integer hyperparameters. In order to achieve an optimised model configuration,… More >

  • Open AccessOpen Access

    REVIEW

    Navigating the Complexities of Controller Placement in SD-WANs: A Multi-Objective Perspective on Current Trends and Future Challenges

    Abdulrahman M. Abdulghani1,*, Azizol Abdullah1, A. R. Rahiman1, Nor Asilah Wati Abdul Hamid1,2, Bilal Omar Akram3,4, Hafsa Raissouli1
    Computer Systems Science and Engineering, Vol.49, pp. 123-157, 2025, DOI:10.32604/csse.2024.058314 - 03 January 2025
    Abstract This review article provides a comprehensive analysis of the latest advancements and persistent challenges in Software-Defined Wide Area Networks (SD-WANs), with a particular emphasis on the multi-objective Controller Placement Problem (CPP). As SD-WAN technology continues to gain prominence for its capacity to offer flexible and efficient network management, the task of 36optimally placing controllers—responsible for orchestrating and managing network traffic—remains a critical yet complex challenge. This review delves into recent innovations in multi-objective controller placement strategies, including clustering techniques, heuristic-based approaches, and the integration of machine learning and deep learning models. Each methodology is critically More >

  • Open AccessOpen Access

    ARTICLE

    Revolutionizing Automotive Security: Connected Vehicle Security Blockchain Solutions for Enhancing Physical Flow in the Automotive Supply Chain

    Khadija El Fellah1,*, Ikram El Azami2,*, Adil El Makrani2, Habiba Bouijij3, Oussama El Azzouzy4
    Computer Systems Science and Engineering, Vol.49, pp. 99-122, 2025, DOI:10.32604/csse.2024.057754 - 03 January 2025
    (This article belongs to the Special Issue: Blockchain, Artificial Intelligence, Internet of Things and 6G Convergence)
    Abstract The rapid growth of the automotive industry has raised significant concerns about the security of connected vehicles and their integrated supply chains, which are increasingly vulnerable to advanced cyber threats. Traditional authentication methods have proven insufficient, exposing systems to risks such as Sybil, Denial of Service (DoS), and Eclipse attacks. This study critically examines the limitations of current security protocols, focusing on authentication and data exchange vulnerabilities, and explores blockchain technology as a potential solution. Blockchain’s decentralized and cryptographically secure framework can significantly enhance Vehicle-to-Vehicle (V2V) communication, ensure data integrity, and enable transparent, immutable transactions More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs

    Sameh Zarif1,2,*, Hadier Moawad2, Khalid Amin2, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5, Marian Wagdy6
    Computer Systems Science and Engineering, Vol.49, pp. 79-98, 2025, DOI:10.32604/csse.2024.057439 - 03 January 2025
    Abstract Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity. Cloud computing provides a shared electronic device resource for users via the internet, and the authentication techniques used must protect data from attacks. Previous approaches failed to resolve the challenge of making passwords secure, memorable, usable, and time-saving. Graphical Password (GP) is still not widely utilized in reality because consumers suffer from multiple login stages. This paper proposes an Indexed Choice-Based Graphical Password (ICGP) scheme for improving the authentication part. ICGP consists of two stages: registration and authentication. At the… More >

  • Open AccessOpen Access

    ARTICLE

    Prairie Araneida Optimization Based Fused CNN Model for Intrusion Detection

    Nishit Patil, Shubhalaxmi Joshi*
    Computer Systems Science and Engineering, Vol.49, pp. 49-77, 2025, DOI:10.32604/csse.2024.057702 - 03 January 2025
    (This article belongs to the Special Issue: Artificial Intelligence for Cyber Security)
    Abstract Intrusion detection (ID) is a cyber security practice that encompasses the process of monitoring network activities to identify unauthorized or malicious actions. This includes problems like the difficulties of existing intrusion detection models to identify emerging attacks, generating many false alarms, and their inability and difficulty to adapt themselves with time when it comes to threats, hence to overcome all those existing challenges in this research develop a Prairie Araneida optimization based fused Convolutional Neural Network model (PAO-CNN) for intrusion detection. The fused CNN (Convolutional Neural Netowrk) is a remarkable development since it combines statistical… More >

  • Open AccessOpen Access

    ARTICLE

    An Intelligent Security Service Optimization Method Based on Knowledge Base

    Xianju Gao*, Huachun Zhou, Weilin Wang, Jingfu Yan
    Computer Systems Science and Engineering, Vol.49, pp. 19-48, 2025, DOI:10.32604/csse.2024.058327 - 03 January 2025
    (This article belongs to the Special Issue: Artificial Intelligence for Cyber Security)
    Abstract The network security knowledge base standardizes and integrates network security data, providing a reliable foundation for real-time network security protection solutions. However, current research on network security knowledge bases mainly focuses on their construction, while the potential to optimize intelligent security services for real-time network security protection requires further exploration. Therefore, how to effectively utilize the vast amount of historical knowledge in the field of network security and establish a feedback mechanism to update it in real time, thereby enhancing the detection capability of security services against malicious traffic, has become an important issue. Our… More >

  • Open AccessOpen Access

    ARTICLE

    Automation of Software Development Stages with the OpenAI API

    Verónica C. Tapia1,2,*, Carlos M. Gaona2
    Computer Systems Science and Engineering, Vol.49, pp. 1-17, 2025, DOI:10.32604/csse.2024.056979 - 03 January 2025
    Abstract In recent years, automation has become a key focus in software development as organizations seek to improve efficiency and reduce time-to-market. The integration of artificial intelligence (AI) tools, particularly those using natural language processing (NLP) like ChatGPT, has opened new possibilities for automating various stages of the development lifecycle. The primary objective of this study is to evaluate the effectiveness of ChatGPT in automating various phases of software development. An artificial intelligence (AI) tool was developed using the OpenAI—Application Programming Interface (API), incorporating two key functionalities: 1) generating user stories based on case or process… More >

Per Page:

Share Link