Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,134)
  • Open Access

    ARTICLE

    Machine Learning for Detecting Blood Transfusion Needs Using Biosignals

    Hoon Ko1, Chul Park2, Wu Seong Kang3, Yunyoung Nam4, Dukyong Yoon5, Jinseok Lee1,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2369-2381, 2023, DOI:10.32604/csse.2023.035641

    Abstract Adequate oxygen in red blood cells carrying through the body to the heart and brain is important to maintain life. For those patients requiring blood, blood transfusion is a common procedure in which donated blood or blood components are given through an intravenous line. However, detecting the need for blood transfusion is time-consuming and sometimes not easily diagnosed, such as internal bleeding. This study considered physiological signals such as electrocardiogram (ECG), photoplethysmogram (PPG), blood pressure, oxygen saturation (SpO2), and respiration, and proposed the machine learning model to detect the need for blood transfusion accurately. For the model, this study extracted… More >

  • Open Access

    ARTICLE

    Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment

    Mesfer Al Duhayyim1,*, Heba G. Mohamed2, Fadwa Alrowais3, Fahd N. Al-Wesabi4, Anwer Mustafa Hilal5, Abdelwahed Motwakel5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1293-1310, 2023, DOI:10.32604/csse.2023.035589

    Abstract The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.… More >

  • Open Access

    ARTICLE

    Red Deer Optimization with Artificial Intelligence Enabled Image Captioning System for Visually Impaired People

    Anwer Mustafa Hilal1,*, Fadwa Alrowais2, Fahd N. Al-Wesabi3, Radwa Marzouk4,5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1929-1945, 2023, DOI:10.32604/csse.2023.035529

    Abstract The problem of producing a natural language description of an image for describing the visual content has gained more attention in natural language processing (NLP) and computer vision (CV). It can be driven by applications like image retrieval or indexing, virtual assistants, image understanding, and support of visually impaired people (VIP). Though the VIP uses other senses, touch and hearing, for recognizing objects and events, the quality of life of those persons is lower than the standard level. Automatic Image captioning generates captions that will be read loudly to the VIP, thereby realizing matters happening around them. This article introduces… More >

  • Open Access

    ARTICLE

    Computer-Aided Diagnosis Model Using Machine Learning for Brain Tumor Detection and Classification

    M. Uvaneshwari1, M. Baskar2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1811-1826, 2023, DOI:10.32604/csse.2023.035455

    Abstract The Brain Tumor (BT) is created by an uncontrollable rise of anomalous cells in brain tissue, and it consists of 2 types of cancers they are malignant and benign tumors. The benevolent BT does not affect the neighbouring healthy and normal tissue; however, the malignant could affect the adjacent brain tissues, which results in death. Initial recognition of BT is highly significant to protecting the patient’s life. Generally, the BT can be identified through the magnetic resonance imaging (MRI) scanning technique. But the radiotherapists are not offering effective tumor segmentation in MRI images because of the position and unequal shape… More >

  • Open Access

    ARTICLE

    Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network

    Lei Feng1, Bo Wang1,*, Fuqi Ma1, Hengrui Ma2, Mohamed A. Mohamed3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1487-1501, 2023, DOI:10.32604/csse.2023.035377

    Abstract As the scale of the power system continues to expand, the environment for power operations becomes more and more complex. Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately. Therefore, more reliable and accurate security control methods are urgently needed. In order to improve the accuracy and reliability of the operation risk management and control method, this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network. To… More >

  • Open Access

    ARTICLE

    An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images

    R. Bala Krishnan1, D. Yuvaraj2, P. Suthanthira Devi3, Varghese S. Chooralil4, N. Rajesh Kumar1, B. Karthikeyan5, G. Manikandan5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1563-1576, 2023, DOI:10.32604/csse.2023.035307

    Abstract With the improvement of current online communication schemes, it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate. Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission. Both of the techniques mentioned above aid in the confidentiality of feature content. The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red, Green, and Blue. The private Content originated from a medical client and was forwarded to a medical practitioner… More >

  • Open Access

    ARTICLE

    Computer-Aided Diagnosis for Tuberculosis Classification with Water Strider Optimization Algorithm

    José Escorcia-Gutierrez1,*, Roosvel Soto-Diaz2, Natasha Madera3, Carlos Soto3, Francisco Burgos-Florez2, Alexander Rodríguez4, Romany F. Mansour5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1337-1353, 2023, DOI:10.32604/csse.2023.035253

    Abstract Computer-aided diagnosis (CAD) models exploit artificial intelligence (AI) for chest X-ray (CXR) examination to identify the presence of tuberculosis (TB) and can improve the feasibility and performance of CXR for TB screening and triage. At the same time, CXR interpretation is a time-consuming and subjective process. Furthermore, high resemblance among the radiological patterns of TB and other lung diseases can result in misdiagnosis. Therefore, computer-aided diagnosis (CAD) models using machine learning (ML) and deep learning (DL) can be designed for screening TB accurately. With this motivation, this article develops a Water Strider Optimization with Deep Transfer Learning Enabled Tuberculosis Classification… More >

  • Open Access

    ARTICLE

    Classification of Multi-view Digital Mammogram Images Using SMO-WkNN

    P. Malathi1,*, G. Charlyn Pushpa Latha2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1741-1758, 2023, DOI:10.32604/csse.2023.035185

    Abstract Breast cancer (BCa) is a leading cause of death in the female population across the globe. Approximately 2.3 million new BCa cases are recorded globally in females, overtaking lung cancer as the most prevalent form of cancer to be diagnosed. However, the mortality rates for cervical and BCa are significantly higher in developing nations than in developed countries. Early diagnosis is the only option to minimize the risks of BCa. Deep learning (DL)-based models have performed well in image processing in recent years, particularly convolutional neural network (CNN). Hence, this research proposes a DL-based CNN model to diagnose BCa from… More >

  • Open Access

    ARTICLE

    Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework

    Muhammad Rizwan Rashid Rana1,*, Saif Ur Rehman1, Asif Nawaz1, Tariq Ali1, Azhar Imran2, Abdulkareem Alzahrani3, Abdullah Almuhaimeed4,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2415-2428, 2023, DOI:10.32604/csse.2023.035149

    Abstract People utilize microblogs and other social media platforms to express their thoughts and feelings regarding current events, public products and the latest affairs. People share their thoughts and feelings about various topics, including products, news, blogs, etc. In user reviews and tweets, sentiment analysis is used to discover opinions and feelings. Sentiment polarity is a term used to describe how sentiment is represented. Positive, neutral and negative are all examples of it. This area is still in its infancy and needs several critical upgrades. Slang and hidden emotions can detract from the accuracy of traditional techniques. Existing methods only evaluate… More >

  • Open Access

    ARTICLE

    Power Scheduling with Max User Comfort in Smart Home: Performance Analysis and Tradeoffs

    Muhammad Irfan1, Ch. Anwar Ul Hassan2, Faisal Althobiani3, Nasir Ayub4,*, Raja Jalees Ul Hussen Khan5, Emad Ismat Ghandourah6, Majid A. Almas7, Saleh Mohammed Ghonaim3, V. R. Shamji3, Saifur Rahman1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1723-1740, 2023, DOI:10.32604/csse.2023.035141

    Abstract The smart grid has enabled users to control their home energy more effectively and efficiently. A home energy management system (HEM) is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy. Here, we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm (GWA) and Harmony Search Algorithms (HSA). Moreover, a fusion initiated on HSA and GWA operators is used to optimize energy intake. Furthermore, many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge. Hybridization has proven beneficial in achieving numerous… More >

Displaying 31-40 on page 4 of 1134. Per Page  

Share Link

WeChat scan