Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Virtual Keyboard: A Real-Time Hand Gesture Recognition-Based Character Input System Using LSTM and Mediapipe Holistic

    Bijon Mallik1, Md Abdur Rahim1, Abu Saleh Musa Miah2, Keun Soo Yun3,*, Jungpil Shin2

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 555-570, 2024, DOI:10.32604/csse.2023.045981

    Abstract In the digital age, non-touch communication technologies are reshaping human-device interactions and raising security concerns. A major challenge in current technology is the misinterpretation of gestures by sensors and cameras, often caused by environmental factors. This issue has spurred the need for advanced data processing methods to achieve more accurate gesture recognition and predictions. Our study presents a novel virtual keyboard allowing character input via distinct hand gestures, focusing on two key aspects: hand gesture recognition and character input mechanisms. We developed a novel model with LSTM and fully connected layers for enhanced sequential data processing and hand gesture recognition.… More >

  • Open Access

    ARTICLE

    Test Case Generation Evaluator for the Implementation of Test Case Generation Algorithms Based on Learning to Rank

    Zhonghao Guo*, Xinyue Xu, Xiangxian Chen

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 479-509, 2024, DOI:10.32604/csse.2023.043932

    Abstract In software testing, the quality of test cases is crucial, but manual generation is time-consuming. Various automatic test case generation methods exist, requiring careful selection based on program features. Current evaluation methods compare a limited set of metrics, which does not support a larger number of metrics or consider the relative importance of each metric to the final assessment. To address this, we propose an evaluation tool, the Test Case Generation Evaluator (TCGE), based on the learning to rank (L2R) algorithm. Unlike previous approaches, our method comprehensively evaluates algorithms by considering multiple metrics, resulting in a more reasoned assessment. The… More >

  • Open Access

    ARTICLE

    TEAM: Transformer Encoder Attention Module for Video Classification

    Hae Sung Park1, Yong Suk Choi2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 451-477, 2024, DOI:10.32604/csse.2023.043245

    Abstract Much like humans focus solely on object movement to understand actions, directing a deep learning model’s attention to the core contexts within videos is crucial for improving video comprehension. In the recent study, Video Masked Auto-Encoder (VideoMAE) employs a pre-training approach with a high ratio of tube masking and reconstruction, effectively mitigating spatial bias due to temporal redundancy in full video frames. This steers the model’s focus toward detailed temporal contexts. However, as the VideoMAE still relies on full video frames during the action recognition stage, it may exhibit a progressive shift in attention towards spatial contexts, deteriorating its ability… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks

    Abdullah Alsaleh1,2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 431-449, 2024, DOI:10.32604/csse.2023.043107

    Abstract With the increasing number of connected devices in the Internet of Things (IoT) era, the number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary intelligent system for monitoring, detecting and alerting against malicious activity. IDS is important in developing advanced security models. This study reviews the importance of various techniques, tools, and methods used in IoT detection and/or prevention systems. Specifically, it focuses on machine learning (ML) and deep learning (DL) techniques for IDS. This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles. To speed… More >

  • Open Access

    ARTICLE

    Performance Enhancement of XML Parsing Using Regression and Parallelism

    Muhammad Ali, Minhaj Ahmad Khan*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 287-303, 2024, DOI:10.32604/csse.2023.043010

    Abstract The Extensible Markup Language (XML) files, widely used for storing and exchanging information on the web require efficient parsing mechanisms to improve the performance of the applications. With the existing Document Object Model (DOM) based parsing, the performance degrades due to sequential processing and large memory requirements, thereby requiring an efficient XML parser to mitigate these issues. In this paper, we propose a Parallel XML Tree Generator (PXTG) algorithm for accelerating the parsing of XML files and a Regression-based XML Parsing Framework (RXPF) that analyzes and predicts performance through profiling, regression, and code generation for efficient parsing. The PXTG algorithm… More >

  • Open Access

    ARTICLE

    An Artificial Intelligence-Based Framework for Fruits Disease Recognition Using Deep Learning

    Irfan Haider1, Muhammad Attique Khan1,*, Muhammad Nazir1, Taerang Kim2, Jae-Hyuk Cha2

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 529-554, 2024, DOI:10.32604/csse.2023.042080

    Abstract Fruit infections have an impact on both the yield and the quality of the crop. As a result, an automated recognition system for fruit leaf diseases is important. In artificial intelligence (AI) applications, especially in agriculture, deep learning shows promising disease detection and classification results. The recent AI-based techniques have a few challenges for fruit disease recognition, such as low-resolution images, small datasets for learning models, and irrelevant feature extraction. This work proposed a new fruit leaf leaf leaf disease recognition framework using deep learning features and improved pathfinder optimization. Three fruit types have been employed in this work for… More >

  • Open Access

    ARTICLE

    Micro-Locational Fine Dust Prediction Utilizing Machine Learning and Deep Learning Models

    Seoyun Kim1,#, Hyerim Yu2,#, Jeewoo Yoon1,3, Eunil Park1,2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 413-429, 2024, DOI:10.32604/csse.2023.041575

    Abstract Given the increasing number of countries reporting degraded air quality, effective air quality monitoring has become a critical issue in today’s world. However, the current air quality observatory systems are often prohibitively expensive, resulting in a lack of observatories in many regions within a country. Consequently, a significant problem arises where not every region receives the same level of air quality information. This disparity occurs because some locations have to rely on information from observatories located far away from their regions, even if they may be the closest available options. To address this challenge, a novel approach that leverages machine… More >

  • Open Access

    ARTICLE

    Priority Based Energy Efficient MAC Protocol by Varying Data Rate for Wireless Body Area Network

    R. Sangeetha, Usha Devi Gandhi*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 395-411, 2024, DOI:10.32604/csse.2023.041217

    Abstract Wireless Body Area Network (WBAN) is a cutting-edge technology that is being used in healthcare applications to monitor critical events in the human body. WBAN is a collection of in-body and on-body sensors that monitor human physical parameters such as temperature, blood pressure, pulse rate, oxygen level, body motion, and so on. They sense the data and communicate it to the Body Area Network (BAN) Coordinator. The main challenge for the WBAN is energy consumption. These issues can be addressed by implementing an effective Medium Access Control (MAC) protocol that reduces energy consumption and increases network lifetime. The purpose of… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order… More >

  • Open Access

    ARTICLE

    DeepSVDNet: A Deep Learning-Based Approach for Detecting and Classifying Vision-Threatening Diabetic Retinopathy in Retinal Fundus Images

    Anas Bilal1, Azhar Imran2, Talha Imtiaz Baig3,4, Xiaowen Liu1,*, Haixia Long1, Abdulkareem Alzahrani5, Muhammad Shafiq6

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 511-528, 2024, DOI:10.32604/csse.2023.039672

    Abstract Artificial Intelligence (AI) is being increasingly used for diagnosing Vision-Threatening Diabetic Retinopathy (VTDR), which is a leading cause of visual impairment and blindness worldwide. However, previous automated VTDR detection methods have mainly relied on manual feature extraction and classification, leading to errors. This paper proposes a novel VTDR detection and classification model that combines different models through majority voting. Our proposed methodology involves preprocessing, data augmentation, feature extraction, and classification stages. We use a hybrid convolutional neural network-singular value decomposition (CNN-SVD) model for feature extraction and selection and an improved SVM-RBF with a Decision Tree (DT) and K-Nearest Neighbor (KNN)… More >

Displaying 1-10 on page 1 of 1407. Per Page