Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding

    Kai Gao1, Chin-Chen Chang1,*, Chia-Chen Lin2,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.038308

    Abstract Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics, which allows us to hide sensitive data in image files. In this paper, we propose a novel high-fidelity reversible data hiding scheme. Based on the advantage of the multipredictor mechanism, we combine two effective prediction schemes to improve prediction accuracy. In addition, the multihistogram technique is utilized to further improve the image quality of the stego image. Moreover, a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram. Experimental results show that the… More >

  • Open Access

    CORRECTION

    Correction: Priority Based Energy Efficient MAC Protocol by Varying Data Rate For Wireless Body Area Network

    R. Sangeetha, Usha Devi Gandhi*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.052487

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Diabetic Retinopathy Diagnosis Using Interval Neutrosophic Segmentation with Deep Learning Model

    V. Thanikachalam1,*, M. G. Kavitha2, V. Sivamurugan1

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.052484

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Multimodal Deep Neural Networks for Digitized Document Classification

    Aigerim Baimakhanova1,*, Ainur Zhumadillayeva2, Bigul Mukhametzhanova3, Natalya Glazyrina2, Rozamgul Niyazova2, Nurseit Zhunissov1, Aizhan Sambetbayeva4

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.043273

    Abstract As digital technologies have advanced more rapidly, the number of paper documents recently converted into a digital format has exponentially increased. To respond to the urgent need to categorize the growing number of digitized documents, the classification of digitized documents in real time has been identified as the primary goal of our study. A paper classification is the first stage in automating document control and efficient knowledge discovery with no or little human involvement. Artificial intelligence methods such as Deep Learning are now combined with segmentation to study and interpret those traits, which were not conceivable ten years ago. Deep… More >

  • Open Access

    CORRECTION

    Correction: Fine-Tuned Extra Tree Classifier for Thermal Comfort Sensation Prediction

    Ahmad Almadhor1, Chitapong Wechtaisong2,*, Usman Tariq3, Natalia Kryvinska4,*, Abdullah Al Hejaili5, Uzma Ghulam Mohammad6, Mohana Alanazi7

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.052412

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A New Malicious Code Classification Method for the Security of Financial Software

    Xiaonan Li1,2, Qiang Wang1, Conglai Fan2,3, Wei Zhan1, Mingliang Zhang4,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.039849

    Abstract The field of finance heavily relies on cybersecurity to safeguard its systems and clients from harmful software. The identification of malevolent code within financial software is vital for protecting both the financial system and individual clients. Nevertheless, present detection models encounter limitations in their ability to identify malevolent code and its variations, all while encompassing a multitude of parameters. To overcome these obstacles, we introduce a lean model for classifying families of malevolent code, formulated on Ghost-DenseNet-SE. This model integrates the Ghost module, DenseNet, and the squeeze-and-excitation (SE) channel domain attention mechanism. It substitutes the standard convolutional layer in DenseNet… More >

  • Open Access

    ARTICLE

    Digital Text Document Watermarking Based Tampering Attack Detection via Internet

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.037305

    Abstract Owing to the rapid increase in the interchange of text information through internet networks, the reliability and security of digital content are becoming a major research problem. Tampering detection, Content authentication, and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies. The authors’ difficulties were tampering detection, authentication, and integrity verification of the digital contents. This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection (ADMDTW-TAD) via the Internet. The DM concept is exploited in the presented ADMDTW-TAD technique to identify the… More >

  • Open Access

    ARTICLE

    Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security

    Chirag Ganguli1, Shishir Kumar Shandilya2, Michal Gregus3, Oleh Basystiuk4,*

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.042607

    Abstract Cyber Defense is becoming a major issue for every organization to keep business continuity intact. The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm (ABC) as an Nature Inspired Cyber Security mechanism to achieve adaptive defense. It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node. Businesses today have adapted their service distribution models to include the use of the Internet, allowing them to effectively manage and interact with their customer data. This shift has created an increased reliance on online services to store vast amounts of confidential customer… More >

  • Open Access

    ARTICLE

    Research on Total Electric Field Prediction Method of Ultra-High Voltage Direct Current Transmission Line Based on Stacking Algorithm

    Yinkong Wei1,2, Mucong Wu1,2,*, Wei Wei3, Paulo R. F. Rocha4, Ziyi Cheng1,2, Weifang Yao5

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.036062

    Abstract Ultra-high voltage (UHV) transmission lines are an important part of China’s power grid and are often surrounded by a complex electromagnetic environment. The ground total electric field is considered a main electromagnetic environment indicator of UHV transmission lines and is currently employed for reliable long-term operation of the power grid. Yet, the accurate prediction of the ground total electric field remains a technical challenge. In this work, we collected the total electric field data from the Ningdong-Zhejiang ±800 kV UHVDC transmission project, as of the Ling Shao line, and perform an outlier analysis of the total electric field data. We… More >

  • Open Access

    CORRECTION

    Correction: An Effective Diagnosis System for Brain Tumor Detection and Classification

    Ahmed A. Alsheikhy1, Ahmad S. Azzahrani1, A. Khuzaim Alzahrani2, Tawfeeq Shawly3

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2024.051630

    Abstract This article has no abstract. More >

Displaying 1-10 on page 1 of 71. Per Page