M. Duhayyim, Heba G. Mohamed, Fadwa M. Alrowais, F. Al-Wesabi, A. Hilal, Abdelwahed Motwakel
{"title":"Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment","authors":"M. Duhayyim, Heba G. Mohamed, Fadwa M. Alrowais, F. Al-Wesabi, A. Hilal, Abdelwahed Motwakel","doi":"10.32604/csse.2023.035589","DOIUrl":"https://doi.org/10.32604/csse.2023.035589","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86376698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Yamin, Sarah B. Basahel, Saleh Bajaba, Mona Abusurrah, E. Lydia
{"title":"Leveraging Retinal Fundus Images with Deep Learning for Diabetic Retinopathy Grading and Classification","authors":"Mohammad Yamin, Sarah B. Basahel, Saleh Bajaba, Mona Abusurrah, E. Lydia","doi":"10.32604/csse.2023.036455","DOIUrl":"https://doi.org/10.32604/csse.2023.036455","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89019370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Babangida Isyaku, K. AbuBakar, W. Nagmeldin, Abdelzahir Abdelmaboud, Faisal Saeed, Fuad A. Ghaleb
{"title":"Reliable Failure Restoration with Bayesian Congestion Aware for Software Defined Networks","authors":"Babangida Isyaku, K. AbuBakar, W. Nagmeldin, Abdelzahir Abdelmaboud, Faisal Saeed, Fuad A. Ghaleb","doi":"10.32604/csse.2023.034509","DOIUrl":"https://doi.org/10.32604/csse.2023.034509","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90506370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazim Ali, Adnan N. Qureshi, Muhammad Shahid Bhatti, A. Sohail, Muhammad Hijji, A. Saeed
{"title":"De-Noising Brain MRI Images by Mixing Concatenation and Residual Learning (MCR)","authors":"Kazim Ali, Adnan N. Qureshi, Muhammad Shahid Bhatti, A. Sohail, Muhammad Hijji, A. Saeed","doi":"10.32604/csse.2023.032508","DOIUrl":"https://doi.org/10.32604/csse.2023.032508","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79204645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hani Al-Mimi, Yousef Alrabanah, Mosleh M. Abu-Alhaj, Sumaya N. Al-Khatib
{"title":"Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks","authors":"Hani Al-Mimi, Yousef Alrabanah, Mosleh M. Abu-Alhaj, Sumaya N. Al-Khatib","doi":"10.32604/csse.2023.024338","DOIUrl":"https://doi.org/10.32604/csse.2023.024338","url":null,"abstract":"The demand for the telecommunication services, such as IP telephony, has increased dramatically during the COVID-19 pandemic lockdown. IP telephony should be enhanced to provide the expected quality. One of the issues that should be investigated in IP telephony is bandwidth utilization. IP telephony produces very small speech samples attached to a large packet header. The header of the IP telephony consumes a considerable share of the bandwidth allotted to the IP telephony. This wastes the network's bandwidth and influences the IP telephony quality. This paper proposes a mechanism (called Smallerize) that reduces the bandwidth consumed by both the speech sample and the header. This is achieved by assembling numerous IP telephony packets in one header and use the header's fields to carry the speech sample. Several metrics have been used to measure the achievement Smallerize mechanism. The number of calls has been increased by 245.1% compared to the typical mechanism. The bandwidth saving has also reached 68% with the G.28 codec. Therefore, Smallerize is a possible mechanism to enhance bandwidth utilization of the IP telephony.","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83352638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving QoS Using Mobility-Based Optimized Multipath Routing Protocol in MANET","authors":"S. J. Sangeetha, T. Rajendran","doi":"10.32604/csse.2023.033392","DOIUrl":"https://doi.org/10.32604/csse.2023.033392","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84678633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Min Hyung Park, Dongyan Nan, Yerin Kim, Jang-Hyun Kim
{"title":"CBOE Volatility Index Forecasting under COVID-19: An Integrated BiLSTM-ARIMA-GARCH Model","authors":"Min Hyung Park, Dongyan Nan, Yerin Kim, Jang-Hyun Kim","doi":"10.32604/csse.2023.033247","DOIUrl":"https://doi.org/10.32604/csse.2023.033247","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87350359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sayyed Mudassar Shah, Tariq Hussain, B. Shah, Farman Ali, Khalid Zaman, K. Kwak
{"title":"CEER: Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters","authors":"Sayyed Mudassar Shah, Tariq Hussain, B. Shah, Farman Ali, Khalid Zaman, K. Kwak","doi":"10.32604/csse.2023.034489","DOIUrl":"https://doi.org/10.32604/csse.2023.034489","url":null,"abstract":"Underwater acoustic sensor networks (UWASNs) aim to find varied offshore ocean monitoring and exploration applications. In most of these applications, the network is composed of several sensor nodes deployed at different depths in the water. Sensor nodes located at depth on the seafloor cannot invariably communicate with nodes close to the surface level; these nodes need multihop communication facilitated by a suitable routing scheme. In this research work, a Cluster-based Cooperative Energy Efficient Routing (CEER) mechanism for UWSNs is proposed to overcome the shortcomings of the Co-UWSN and LEACH mechanisms. The optimal role of clustering and cooperation provides load balancing and improves the network profoundly. The simulation results using MATLAB show better performance of CEER routing protocol in terms of various parameters as compared to Co-UWSN routing protocol, i.e., the average end-to-end delay of CEER was 17.39, Co-UWSN was 55.819 and LEACH was 70.08. In addition, the average total energy consumption of CEER was 9.273, Co-UWSN was 12.198, and LEACH was 45.33. The packet delivery ratio of CEER was 53.955, CO-UWSN was 42.047, and LEACH was 30.31. The stability period CEER was 130.9, CO-UWSN was 129.3, and LEACH was 119.1. The obtained results maximized the lifetime and improved the overall performance of the CEER routing protocol.","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84722278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation","authors":"B. Murugeshwari, S. Rajalakshmi, K. Sudharson","doi":"10.32604/csse.2023.029074","DOIUrl":"https://doi.org/10.32604/csse.2023.029074","url":null,"abstract":"Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results. Furthermore, this paper investigates the use of arbitrary nature with perturbations in privacy preservation. According to the research, arbitrary objects (most notably random matrices) have \"predicted\" frequency patterns. It shows how to recover crucial information from a sample damaged by a random number using an arbitrary lattice spectral selection strategy. This filtration system's conceptual framework posits, and extensive practical findings indicate that sparse data distortions preserve relatively modest privacy protection in various situations. As a result, the research framework is efficient and effective in maintaining data privacy and security.","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82032322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sowjanya Ramisetty, Divya Anand, Kavita, Sahil Verma, Noor Zaman Jhanjhi, Mehedi Masud, M. Baz
{"title":"Energy Efficient Unequal Fault Tolerance Clustering Approach","authors":"Sowjanya Ramisetty, Divya Anand, Kavita, Sahil Verma, Noor Zaman Jhanjhi, Mehedi Masud, M. Baz","doi":"10.32604/csse.2022.021924","DOIUrl":"https://doi.org/10.32604/csse.2022.021924","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90652475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}