Empowering Human Decision-Making in AI Models: The Path to Trust and Transparency
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1947-1960, 2023, DOI:10.32604/csse.2023.035118
Abstract Structural reliability is an important method to measure the safety performance of structures under the influence of uncertain factors. Traditional structural reliability analysis methods often convert the limit state function to the polynomial form to measure whether the structure is invalid. The uncertain parameters mainly exist in the form of intervals. This method requires a lot of calculation and is often difficult to achieve efficiently. In order to solve this problem, this paper proposes an interval variable multivariate polynomial algorithm based on Bernstein polynomials and evidence theory to solve the structural reliability problem with cognitive uncertainty. Based on the non-probabilistic… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064
Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1549-1561, 2023, DOI:10.32604/csse.2023.035031
Abstract Interconnected devices and intelligent applications have slashed human intervention in the Internet of Things (IoT), making it possible to accomplish tasks with less human interaction. However, it faces many problems, including lower capacity links, energy utilization, enhancement of resources and limited resources due to its openness, heterogeneity, limited resources and extensiveness. It is challenging to route packets in such a constrained environment. In an IoT network constrained by limited resources, minimal routing control overhead is required without packet loss. Such constrained environments can be improved through the optimal routing protocol. It is challenging to route packets in such a constrained… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951
Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the quality of service. But due… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1311-1336, 2023, DOI:10.32604/csse.2023.034910
Abstract For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events. The data set was balanced using the Borderline-SMOTE technique,… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1401-1414, 2023, DOI:10.32604/csse.2023.034757
Abstract In recent years, the development of deep learning has further improved hash retrieval technology. Most of the existing hashing methods currently use Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) to process image and text information, respectively. This makes images or texts subject to local constraints, and inherent label matching cannot capture fine-grained information, often leading to suboptimal results. Driven by the development of the transformer model, we propose a framework called ViT2CMH mainly based on the Vision Transformer to handle deep Cross-modal Hashing tasks rather than CNNs or RNNs. Specifically, we use a BERT network to extract text… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1355-1369, 2023, DOI:10.32604/csse.2023.034682
Abstract Assistive devices for disabled people with the help of Brain-Computer Interaction (BCI) technology are becoming vital bio-medical engineering. People with physical disabilities need some assistive devices to perform their daily tasks. In these devices, higher latency factors need to be addressed appropriately. Therefore, the main goal of this research is to implement a real-time BCI architecture with minimum latency for command actuation. The proposed architecture is capable to communicate between different modules of the system by adopting an automotive, intelligent data processing and classification approach. Neuro-sky mind wave device has been used to transfer the data to our implemented server… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1617-1630, 2023, DOI:10.32604/csse.2023.034681
Abstract The method opted for accuracy, and no existing studies are based on this method. A design and characteristic survey of a new small band gap semiconducting Single Wall Carbon Nano Tube (SWCNT) Field Effect Transistor as a photodetector is carried out. In the proposed device, better performance is achieved by increasing the diameter and introducing a new single halo (SH) doping in the channel length of the CNTFET device. This paper is a study and analysis of the performance of a Carbon Nano Tube Field Effect Transistor (CNTFET) as a photodetector using the self-consistent Poisson and Green function method. The… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1879-1900, 2023, DOI:10.32604/csse.2023.034658
Abstract An abnormality that develops in white blood cells is called leukemia. The diagnosis of leukemia is made possible by microscopic investigation of the smear in the periphery. Prior training is necessary to complete the morphological examination of the blood smear for leukemia diagnosis. This paper proposes a Histogram Threshold Segmentation Classifier (HTsC) for a decision support system. The proposed HTsC is evaluated based on the color and brightness variation in the dataset of blood smear images. Arithmetic operations are used to crop the nucleus based on automated approximation. White Blood Cell (WBC) segmentation is calculated using the active contour model… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.46, No.2, pp. 1689-1705, 2023, DOI:10.32604/csse.2023.034613
Abstract The fifth-generation (5G) wireless technology is the most recent standardization in communication services of interest across the globe. The concept of Multiple-Input-Multiple-Output antenna (MIMO) systems has recently been incorporated to operate at higher frequencies without limitations. This paper addresses, design of a high-gain MIMO antenna that offers a bandwidth of 400 MHz and 2.58 GHz by resonating at 28 and 38 GHz, respectively for 5G millimeter (mm)-wave applications. The proposed design is developed on a RT Duroid 5880 substrate with a single elemental dimension of 9.53 × 7.85 × 0.8 mm3. The patch antenna is fully grounded and is fed with a 50-ohm stepped impedance… More >