default search action
Computer Systems: Science & Engineering, Volume 45
Volume 45, Number 1, 2023
- Mariem Belhor, Adnen El-Amraoui, Abderrazak Jemai, François Delmotte:
Learning-Based Metaheuristic Approach for Home Healthcare Optimization Problem. 1-19 - Shui-Hua Wang, Muhammad Attique Khan, Ziquan Zhu, Yudong Zhang:
WACPN: A Neural Network for Pneumonia Diagnosis. 21-34 - Zhengshu Zhou, Yutaka Matsubara, Hiroaki Takada:
Developing Reliable Digital Healthcare Service Using Semi-Quantitative Functional Resonance Analysis. 35-50 - Jungsoo Shin, Jaehee Jung:
ASL Recognition by the Layered Learning Model Using Clustered Groups. 51-68 - Ceren Bastemur Kaya, Ebubekir Kaya, Göksel Gökkus:
Training Neuro-Fuzzy by Using Meta-Heuristic Algorithms for MPPT. 69-84 - Shaofan Su, Deyu Yuan, Yuanxin Wang, Meng Ding:
Fine Grained Feature Extraction Model of Riot-related Images Based on YOLOv5. 85-97 - Jae Yong Lee, Byung Chul Kim, Youngmi Kwon, Kimoon Han:
Coupled CUBIC Congestion Control for MPTCP in Broadband Networks. 99-115 - Hasan Alrajhi:
An Adaptive Wireless Power Sharing Control for Multiterminal HVDC. 117-129 - Yi-Ting Mai, Chi-En Li:
Design of Semipersistent Resource Allocation in LTE-V Network. 131-147 - P. Sherubha, S. P. Sasirekha, A. Dinesh Kumar Anguraj, J. Vakula Rani, Raju Anitha, Surapaneni Phani Praveen, R. Hariharan Krishnan:
An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud. 149-166 - Israa Ismail, Mohamed Meselhy Eltoukhy, Ghada Eltaweel:
Super-Resolution Based on Curvelet Transform and Sparse Representation. 167-181 - Yining Qi, Yubo Luo, Yongfeng Huang, Xing Li:
Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation. 183-199 - Keungyeup Ji, Youngmi Kwon:
New Spam Filtering Method with Hadoop Tuning-Based MapReduce Na飗e Bayes. 201-214 - Fatih Aydemir, Aydin Çetin:
Multi-Agent Dynamic Area Coverage Based on Reinforcement Learning with Connected Agents. 215-230 - M. Valavan, S. Rita:
Predictive-Analysis-based Machine Learning Model for Fraud Detection with Boosting Classifiers. 231-245 - R. Punithavathi, S. Thenmozhi, R. Jothilakshmi, V. Ellappan, Islam Md Tahzib Ul:
Suicide Ideation Detection of Covid Patients Using Machine Learning Algorithm. 247-261 - K. Sudhakar, S. Senthilkumar:
A Novel Approach for Network Vulnerability Analysis in IIoT. 263-277 - R. Nandakumar, P. Saranya, Vijayakumar Ponnusamy, Subhashree Hazra, Antara Gupta:
Detection of Diabetic Retinopathy from Retinal Images Using DenseNet Models. 279-292 - Ratnesh Kumar Shukla, Arvind Kumar Tiwari:
Masked Face Recognition Using MobileNet V2 with Transfer Learning. 293-309 - Bhagyalaxmi Behera, Gyana Ranjan Patra, Shailendra Kumar Varshney, Mihir Narayan Mohanty:
Machine Learning-based Inverse Model for Few-Mode Fiber Designs. 311-328 - Nada M. Elfatih, Elmustafa Sayed Ali, Maha S. Abdelhaq, Raed A. Alsaqour, Rashid A. Saeed:
A Double Threshold Energy Detection-Based Neural Network for Cognitive Radio Networks. 329-342 - M. A. A. Younis, Anas Quteishat:
Selection of Wind Turbine Systems for the Sultanate of Oman. 343-359 - Ghada Atteia:
Latent Space Representational Learning of Deep Features for Acute Lymphoblastic Leukemia Diagnosis. 361-376 - P. Sharmila, C. Deisy, S. Parthasarathy:
Ext-ICAS: A Novel Self-Normalized Extractive Intra Cosine Attention Similarity Summarization. 377-393 - Mohamed Ali Rakrouki, Nawaf Alharbe, Mashael Khayyat, Abeer Aljohani:
TG-SMR: A Text Summarization Algorithm Based on Topic and Graph Models. 395-408 - Usama Abdur Rahman, C. Jayakumar, Deepak Dahiya, Chinnanadar Ramachandran Rene Robin:
Genetics Based Compact Fuzzy System for Visual Sensor Network. 409-426 - A. Gautami, J. Shanthini, S. Karthik:
A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network. 427-443 - G. Brindha, P. Ezhilarasi:
Topology Driven Cooperative Self Scheduling for Improved Lifetime Maximization in WSN. 445-458 - Khalid Alhusayni, Raniyah Wazirali, Mousa Alakhras, Marwah Almasri, Samah Alhazmi:
A Multi-Stage Secure IoT Authentication Protocol. 459-481 - B. Chellapraba, D. Manohari, K. Periyakaruppan, M. S. Kavitha:
Oppositional Red Fox Optimization Based Task Scheduling Scheme for Cloud Environment. 483-495 - S. Nithya Roopa, P. Anandababu, Sibi Amaran, Rajesh Verma:
Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks. 497-512 - Anuj Singh, Raman Kumar, Arvind Kumar Tiwari:
Prediction of Alzheimer's Using Random Forest with Radiomic Features. 513-530 - Waleed Albattah, Saleh Albahli:
Big Data Analytics: Deep Content-Based Prediction with Sampling Perspective. 531-544 - A. K. S. Saranya, T. Jaya:
Early Detection of Heartbeat from Multimodal Data Using RPA Learning with KDNN-SAE. 545-562 - Walid El Shafai, Marwa A. Elsayed, Mohsen A. Rashwan, Moawad I. Dessouky, Adel S. El-Fishawy, Naglaa F. Soliman, Amel Ali Alhussan, Fathi E. Abd El-Samie:
Optical Ciphering Scheme for Cancellable Speaker Identification System. 563-578 - S. Prasanna Bharathi, S. Srinivasan, G. Chamundeeswari, B. Ramesh:
Hybrid Deep Learning-Improved BAT Optimization Algorithm for Soil Classification Using Hyperspectral Features. 579-594 - Taweesak Thongsan, Theerayuth Chatchanayuenyong:
Optimal Dynamic Voltage Restorer Using Water Cycle Optimization Algorithm. 595-623 - S. M. Udhaya Sankar, S. Thanga Revathi, R. Thiagarajan:
Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes. 625-640 - G. Uganya, Radhika Baskar:
Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency. 641-658 - V. A. Vijayakumar, J. Shanthini, S. Karthik, Kannan Srihari:
Route Planning for Autonomous Transmission of Large Sport Utility Vehicle. 659-669 - N. Karthikeyan, P. Sivaprakash, S. Karthik:
Classification Model for IDS Using Auto Cryptographic Denoising Technique. 671-685 - Fadwa M. Alrowais, Sami Althahabi, Saud S. Alotaibi, Abdullah Mohamed, Manar Ahmed Hamza, Radwa Marzouk:
Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment. 687-700 - Helen Josephine V. L, Ramchand Vedaiyan, V. M. Arul Xavier, Joy Winston J, A. Jegatheesan, D. Lakshmi, Joshua Samuel Raj:
Hybrid Bacterial Foraging Optimization with Sparse Autoencoder for Energy Systems. 701-714 - Kandasamy Sellamuthu, Vishnu Kumar Kaliappan:
Q-Learning-Based Pesticide Contamination Prediction in Vegetables and Fruits. 715-736 - Saud S. Alotaibi, Eatedal Alabdulkreem, Sami Althahabi, Manar Ahmed Hamza, Mohammed Rizwanullah, Abu Sarwar Zamani, Abdelwahed Motwakel, Radwa Marzouk:
Artificial Fish Swarm Optimization with Deep Learning Enabled Opinion Mining Approach. 737-751 - Mesfer Al Duhayyim, Areej Malibari, Sami Dhahbi, Mohamed K. Nour, Isra Al-Turaiki, Marwa Ismael Obayya, Abdullah Mohamed:
Sailfish Optimization with Deep Learning Based Oral Cancer Classification Model. 753-767 - N. Kanagaraj, Mohammed Al-Ansi:
Maximum Power Extraction Control Algorithm for Hybrid Renewable Energy System. 769-784 - S. Jagir Hussain, M. Roopa:
BE-RPL: Balanced-load and Energy-efficient RPL. 785-801 - Chaithra, G. M. Lingaraju, S. Jagannatha:
Web Page Recommendation Using Distributional Recurrent Neural Network. 803-817 - M. Mythreyee, A. Nalini:
Genetic Algorithm Based Smart Grid System for Distributed Renewable Energy Sources. 819-837 - Wen-Tsai Sung, Guan-Rong Chen, Sung-Jung Hsiao:
Voice Guidance System for Color Recognition Based on IoT. 839-855 - Mohemmed Sha:
A Cloud Based Sentiment Analysis through Logistic Regression in AWS Platform. 857-868 - Sirisati Ranga Swamy, Surapaneni Phani Praveen, Shakeel Ahmed, Parvathaneni Naga Srinivasu, Abdulaziz Alhumam:
Multi-Features Disease Analysis Based Smart Diagnosis for COVID-19. 869-886 - Kavitha Muthukumaran, K. Hariharanath, Vani Haridasan:
Feature Selection with Optimal Variational Auto Encoder for Financial Crisis Prediction. 887-901 - R. Nithya, Roobaea Alroobaea, Ahmed Binmahfoudh, Zairi Ismael Rizman:
Distributed Multi-hop Clustering Approach with Low Energy Consumption in WSN. 903-924 - M. Suresh Kumar, T. Purosothaman:
Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT. 925-938 - Sindhuja Manickavasagam, Poonkuzhali Sugumaran:
Optimal Deep Belief Network Based Lung Cancer Detection and Survival Rate Prediction. 939-953 - Anwer Mustafa Hilal, Jaber S. Alzahrani, Dalia H. Elkamchouchi, Majdy M. Eltahir, Ahmed S. Almasoud, Abdelwahed Motwakel, Abu Sarwar Zamani, Ishfaq Yaseen:
Optimal Deep Learning Enabled Communication System for Unmanned Aerial Vehicles. 955-969 - Eatedal Alabdulkreem, Saud S. Alotaibi, Mohammad Alamgeer, Radwa Marzouk, Anwer Mustafa Hilal, Abdelwahed Motwakel, Abu Sarwar Zamani, Mohammed Rizwanullah:
Intelligent Cybersecurity Classification Using Chaos Game Optimization with Deep Learning Model. 971-983 - V. Krishnakumar, R. Asokan:
Geographic Drone-based Route Optimization Approach for Emergency Area Ad-Hoc Network. 985-1000
Volume 45, Number 2, 2023
- Muhammad Junaid Umer, Muhammad Sharif, Majed Alhaisoni, Usman Tariq, Ye Jin Kim, Byoungchol Chang:
A Framework of Deep Learning and Selection-Based Breast Cancer Detection from Histopathology Images. 1001-1016 - Erkan Akkur, Fuat Türk, Osman Erogul:
Breast Cancer Diagnosis Using Feature Selection Approaches and Bayesian Optimization. 1017-1031 - Tianyu Liu, Pengyu Liu, Xiaowei Jia, Shanji Chen, Ying Ma, Qian Gao:
Sea-Land Segmentation of Remote Sensing Images Based on SDW-UNet. 1033-1045 - Karthick Panneerselvam, K. Mahesh, Helen Josephine V. L, A. Ranjith Kumar:
Effective and Efficient Video Compression by the Deep Learning Techniques. 1047-1061 - Sung-Jung Hsiao, Wen-Tsai Sung:
Intelligent Home Using Fuzzy Control Based on AIoT. 1063-1081 - Chang Zhao, Wei Sun, Xiaorui Zhang, Xiaozheng He, Jun Zuo, Wei Zhao:
Feature Matching Combining Variable Velocity Model with Reverse Optical Flow. 1083-1094 - Wafaa N. Al-Sharu, Majdi K. Qabalin, Muawya Naser, Omar A. Saraerh:
A Secure Framework for Blockchain Transactions Protection. 1095-1111 - Kuldeep Chouhan, Mukesh Yadav, Ranjeet Kumar Rout, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Sultan Aljahdali:
Sentiment Analysis with Tweets Behaviour in Twitter Streaming API. 1113-1128 - Anwer Mustafa Hilal, Eatedal Alabdulkreem, Jaber S. Alzahrani, Majdy M. Eltahir, Mohamed I. Eldesouki, Ishfaq Yaseen, Abdelwahed Motwakel, Radwa Marzouk:
Political Optimizer with Deep Learning-Enabled Tongue Color Image Analysis Model. 1129-1143 - Hoonyong Park, TaeGuen Kim, Daniel Gerbi Duguma, Jiyoon Kim, Ilsun You, Willy Susilo:
An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS. 1145-1165 - Kazim Ali, Adnan N. Qureshi, Muhammad Shahid Bhatti, Abid Sohail, Muhammad Hijji, Atif Saeed:
De-Noising Brain MRI Images by Mixing Concatenation and Residual Learning (MCR). 1167-1186 - Mohammad Alkhawatrah:
Cooperative NOMA Based on OAM Transmission for Beyond 5G Applications. 1187-1197 - Himanshu Sharma, Karthikeyan Rajagopal, G. Gugapriya, Rajneesh Pareek, Arun Kumar, Haya Mesfer Alshahrani, Mohamed K. Nour, Hany Mahgoub, Mohamed Mousa, Anwer Mustafa Hilal:
Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS. 1199-1210 - Vineet Sharma, Mohammad Zubair Khan, Shivani Batra, Abdullah Alsaeedi, Prakash Srivastava:
Optimizing Storage for Energy Conservation in Tracking Wireless Sensor Network Objects. 1211-1231 - S. Sivapurnima, D. Manjula:
Adaptive Deep Learning Model for Software Bug Detection and Classification. 1233-1248 - Anwer Mustafa Hilal, Amal Al-Rasheed, Jaber S. Alzahrani, Majdy M. Eltahir, Mesfer Al Duhayyim, Nermin M. Salem, Ishfaq Yaseen, Abdelwahed Motwakel:
Competitive Multi-Verse Optimization with Deep Learning Based Sleep Stage Classification. 1249-1263 - M. Reji, Christeena Joseph, K. Thaiyalnayaki, R. Lathamanju:
Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection. 1265-1278 - G. Arunachalam, P. Sureshkumar:
Optimized Deep Learning Model for Effective Spectrum Sensing in Dynamic SNR Scenario. 1279-1294 - R. S. Aashmi, T. Jaya:
Intrusion Detection Using Federated Learning for Computing. 1295-1308 - Le Quang Thao, Duong Duc Cuong, Tran Thi Tuong Anh, Tran Duc Luong:
Profiling of Urban Noise Using Artificial Intelligence. 1309-1321 - I. Ambika, Surbhi Bhatia, Shakila Basheer, Pankaj Dadheech:
Optimized Resource Allocation and Queue Management for Traffic Control in MANET. 1323-1342 - Fadl Dahan:
Neighborhood Search Based Improved Bat Algorithm for Web Service Composition. 1343-1356 - Fuat Türk:
Covid-19 Diagnosis Using a Deep Learning Ensemble Model with Chest X-Ray Images. 1357-1373 - A. Venkatesh, S. Asha:
DERNNet: Dual Encoding Recurrent Neural Network Based Secure Optimal Routing in WSN. 1375-1392 - Hanan Abdullah Mengash, Jaber S. Alzahrani, Majdy M. Eltahir, Fahd N. Al-Wesabi, Abdullah Mohamed, Manar Ahmed Hamza, Radwa Marzouk:
Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model. 1393-1407 - Ayesha Heena, Nagashettappa Biradar, Najmuddin M. Maroof, Surbhi Bhatia, Arwa A. Mashat, Shakila Basheer:
Image Enhancement Using Adaptive Fractional Order Filter. 1409-1422 - Anchal Tyagi, Salem Alelyani, Sapna Katiyar, Mohammad Rashid Hussain, Rijwan Khan, Mohammed Saleh Alsaqer:
Radial Basis Approximations Based BEMD for Enhancement of Non-Uniform Illumination Images. 1423-1438 - Sujithra Kanmani, Surendiran Balasubramanian:
Leveraging Readability and Sentiment in Spam Review Filtering Using Transformer Models. 1439-1454 - Sandhyalati Behera, Mihir Narayan Mohanty:
A Machine Learning Approach for Artifact Removal from Brain Signal. 1455-1467 - Doaa Sami Khafaga, Amel Ali Alhussan, Abdelaziz A. Abdelhamid, Abdelhameed Ibrahim, Mohamed Saber, El-Sayed M. El-Kenawy:
Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram. 1469-1482 - A. Jameer Basha, M. Ramya Devi, S. Lokesh, P. Sivaranjani, D. Mansoor Hussain, Venkat Padhy:
PSO-DBNet for Peak-to-Average Power Ratio Reduction Using Deep Belief Network. 1483-1493 - Basant Tomar, Narendra Kumar, Mini Sreejeth:
Real Time Automation and Ratio Control Using PLC & SCADA in Industry 4.0. 1495-1516 - Wisam Hayder Mahdi, Necmi Taspinar:
Resource Allocation Based on SFLA Algorithm for D2D Multicast Communications. 1517-1530 - Mohsen Eid, Tamer Medhat, Manal E. Ali:
Attribute Reduction for Information Systems via Strength of Rules and Similarity Matrix. 1531-1544 - P. Sumathi, V. V. Karthikeyan, Muthu Subash Kavitha, S. Karthik:
Improved Soil Quality Prediction Model Using Deep Learning for Smart Agriculture Systems. 1545-1559 - Riya Kumarasamy Santhanaraj, Surendran Rajendran, Carlos Andrés Tavera Romero, Sadish Sendil Murugaraj:
Internet of Things Enabled Energy Aware Metaheuristic Clustering for Real Time Disaster Management. 1561-1576 - R. Dhanya, R. Kalaiselvi:
Copy Move Forgery Detection Using Novel Quadsort Moth Flame Light Gradient Boosting Machine. 1577-1593 - Ahmad Mohammed Alamri, Ahmad Ali AlZubi:
An Optimized Method for Accounting Information in Logistic Systems. 1595-1609 - Thinakaran Vasantha Chithra, Arulappan Milton:
Energy Proficient Reduced Coverage Set with Particle Swarm Optimization for Distributed Sensor Network. 1611-1623 - B. Yasotha, T. Sasikala, M. Krishnamurthy:
Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT. 1625-1640 - K. Karthikeyan, Liyakathunisa, Eman Aljohani, Thavavel Vaiyapuri:
Improved Metaheuristic Based Failure Prediction with Migration Optimization in Cloud Environment. 1641-1654 - G. Nallasivan, V. Ramachandran, Roobaea Alroobaea, Jasem Almotiri:
Liver Tumors Segmentation Using 3D SegNet Deep Learning Approach. 1655-1677 - Mashael M. Asiri, Heba G. Mohamed, Mohamed K. Nour, Mesfer Al Duhayyim, Amira Sayed A. Aziz, Abdelwahed Motwakel, Abu Sarwar Zamani, Mohamed I. Eldesouki:
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model. 1679-1694 - Xiaorui Zhang, Feng Xu, Wei Sun, Yan Jiang, Yi Cao:
Fast Mesh Reconstruction from Single View Based on GCN and Topology Modification. 1695-1709 - Manar Ahmed Hamza, Aisha Hassan Abdalla Hashim, Dalia H. Elkamchouchi, Nadhem Nemri, Jaber S. Alzahrani, Amira Sayed A. Aziz, Mnahel Ahmed Ibrahim, Abdelwahed Motwakel:
Energy-Efficient Routing Using Novel Optimization with Tabu Techniques for Wireless Sensor Network. 1711-1726 - Jing Wang, Xiangyu Lei, Qisheng Jiang, Osama Alfarraj, Amr Tolba, Gwang-Jun Kim:
DoS Attack Detection Based on Deep Factorization Machine in SDN. 1727-1742 - G. Sharmila, M. K. Kavitha Devi:
Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries. 1743-1758 - Manar Ahmed Hamza, Haya Mesfer Alshahrani, Sami Dhahbi, Mohamed K. Nour, Mesfer Al Duhayyim, Elsayed M. Tag El Din, Ishfaq Yaseen, Abdelwahed Motwakel:
Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol. 1759-1773 - Abdelhamied A. Ateya, Amel Ali Alhussan, Hanaa A. Abdallah, Mona A. Alduailij, Abdukodir Khakimov, Ammar Muthanna:
Edge Computing Platform with Efficient Migration Scheme for 5G/6G Networks. 1775-1787 - S. Arun Mozhi Selvi, Roobaea Alroobaea, Saeed Rubaiee, Abdulkader S. Hanbazazah:
Optimized Resource Allocation for IoT-D2D Communication Using WSN. 1789-1804 - Jin Wang, Wei Ou, Osama Alfarraj, Amr Tolba, Gwang-Jun Kim, Yongjun Ren:
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain. 1805-1819 - K. Madumathi, S. Chandrasekar:
Spotted Hyena-Bat Optimized Extreme Learning Machine for Solar Power Extraction. 1821-1836 - K. Kamaraj, B. Lanitha, S. Karthic, P. N. Senthil Prakash, R. Mahaveerakannan:
A Hybridized Artificial Neural Network for Automated Software Test Oracle. 1837-1850 - V. Harshini, T. Dhanwin, A. Shahina, N. Safiyyah, A. Nayeemulla Khan:
Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals. 1851-1867 - V. Divya, S. Sendil Kumar, V. Gokula Krishnan, Manoj Kumar:
Signal Conducting System with Effective Optimization Using Deep Learning for Schizophrenia Classification. 1869-1886