Forthcoming and Online First Articles

International Journal of Computational Science and Engineering

International Journal of Computational Science and Engineering (IJCSE)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Computational Science and Engineering (45 papers in press)

Regular Issues

  • A novel fertility intention prediction scheme based on naive Bayes   Order a copy of this article
    by Meijiao Zhang, Lan Yang, Weiping Jiang, Gejing Xu, Guoliang Hu 
    Abstract: In today's society, the problem of ageing has developed into a global problem. The ageing of the population is related to the decrease in fertility intention. Therefore, it is meaningful to predict the fertility intention of people. In this paper, we propose a fertility intention prediction scheme based on a polynomial naive Bayesian model, called the FPB scheme. In the proposed scheme, we first extract various features from the data we collected, and we divided the entire dataset into three labels according to the level of fertility intention. Then, we use these data to construct a classifier. Next, we use this classifier to design a perfect prediction algorithm to predict fertility intention. Finally, we conduct extensive experiments to evaluate the performance of the proposed scheme. The experimental results show that the proposed FPB scheme has high accuracy and can help families to make accurate fertility decisions.
    Keywords: fertility intention; polynomial naive Bayes; prediction algorithm.

  • Self-supervised learning with split batch repetition strategy for long-tail recognition   Order a copy of this article
    by Zhangze Liao, Liyan Ma, Xiangfeng Luo, Shaorong Xie 
    Abstract: Deep neural networks cannot be well applied to balance testing when the training data present a long tail distribution. Existing works improve the performance of the model in long tail recognition by changing the model training strategy, data expansion, and model structure optimisation. However, they tend to use supervised approaches when training the model representations, which makes the model difficult to learn the features of the tail classes. In this paper, we use self-supervised representation learning (SSRL) to enhance the model's representations and design a three-branch network to merge SSRL with decoupled learning. Each branch adopts different learning goals to enable the model to learn balanced image features in the long-tail data. In addition, we propose a Split Batch Repetition strategy for long-tailed datasets to improve the model. Our experiments on the Imbalance CIFAR-10, Imbalance CIFAR-100, and ImageNet-LT datasets outperform existing similar methods. The ablation experiments prove that our method performs better on more imbalanced datasets. All experiments demonstrate the effectiveness of incorporating the self-supervised representation learning model and split batch repetition strategy.
    Keywords: long-tail recognition; self-supervised learning; decoupled learning; image classification; deep learning; neural network; computer vision;.

  • Alliance: a makespan delay and bill payment cost saving-based resource orchestration framework for the blockchain and hybrid cloud enhanced 6G serverless computing network   Order a copy of this article
    by Mahfuzul H. Chowdhury 
    Abstract: Serverless computing technology with the function-as-a-service and backend-as-a-service platforms provides on-demand service, high elasticity, automatic scaling, service provider-based server/operating system management, and no idle capacity charges facilities to the users. Owing to limited resources, the traditional research articles on public/private cloud-based serverless computing cannot meet the user's IoT application requirements. The current works are limited only to a single job type and objectives. There is a lack of appropriate resource orchestration schemes for low latency, bill payment, and energy-cost-based serverless computing job execution networks with hybrid cloud and blockchain. To overpower these issues, this paper instigates a low latency, energy-cost, and bill payment-based multiple types of job scheduling, resource orchestration, network, and mathematical model for the blockchain and hybrid cloud-enhanced serverless computing network. The experimental results delineated that up to 70% makespan delay and 30.23% bill payment gain are acquired in the proposed alliance scheme over the baseline scheme.
    Keywords: serverless computing; job scheduling; worker selection; resource orchestration; blockchain; cloud computing; 6G; job execution time; user bill payment.
    DOI: 10.1504/IJCSE.2023.10060388
     
  • A predictive model based on the LSTM technique for the maintenance of railway track system   Order a copy of this article
    by Sharad Nigam, Divya Kumar 
    Abstract: Maintenance is a substantial process to sustain the operations of transportation system. Railway is a major way of transportation, defect and failure in track side equipment and track itself may causes major loss of human lives. So, an effective maintenance technique is needed which saves the passenger lives and maximise the utilisation of railway track equipment, just before it fails, that cause casualty. There are various types of track defects to be inspected, but this paper only deals with surface defects, cross level, and DIP. By examining the track condition and expecting the RUL, Railway industry can schedule maintenance of railway tracks. In this research paper, we have tried to conduct a relative analysis of various machine learning algorithms by comparing their performance for estimation future failure point of railway tracks to inspect the reliability of LSTM technique. Dataset is taken from the trusted source RAS Track geometry analytics (2015).
    Keywords: predictive maintenance; K-nearest neighbour; KNN; machine learning; long short-term memory; LSTM; railway track; support vector machine; SVM.
    DOI: 10.1504/IJCSE.2024.10063100
     
  • A food safety traceability system based on trusted double chain   Order a copy of this article
    by Haoran Chen, Jiafan Wang, Hongwei Tao, Yinghui Hu, Yanan Du 
    Abstract: In recent years, global food safety issues have been increasingly prevalent, posing threats to people’s health and lives. Traditional food traceability systems face significant challenges due to centralised storage, data silos, and the potential for information tampering. This article proposes an improved RAFT consensus algorithm for the first time, applied to trace the production process of food based on private chains. Subsequently, an enhanced PBFT consensus algorithm is introduced for tracing the distribution process of food based on consortium chains. Finally, a reliable dual-chain food quality and safety traceability system based on the Ethereum blockchain platform is presented. This system effectively addresses data reliability issues on the chain by introducing a reliability measurement evaluation module. Moreover, the application of aggregated signature technology enhances the performance of the traceability system, ensuring the authenticity, reliability, and tamper resistance of traceability information. This innovation not only strengthens the privacy protection and data security of food quality and safety tracking but also helps maintain the commercial interests of all parties involved.
    Keywords: food traceability; blockchain; cross-agency traceability system.
    DOI: 10.1504/IJCSE.2024.10063226
     
  • Robust link-assessment-based approach for detection and isolation of blackhole attacker in resource constraint internet of things   Order a copy of this article
    by Himanshu Patel, Devesh Jinwala 
    Abstract: Blackhole is one of the crucial packet-dropping attacks that can be launched on Routing Protocol for Low-power lossy networks (RPL). In this paper, we propose an improved specification-based approach for textit{integrating trust} value in specification-based approach to detect and isolate blackhole attackers, based on a textit{tangible value} of packet-forwarding behaviour of the nodes in the network. To our knowledge, this is the first attempt to integrate packet-forwarding trust with the specification-based approach. In our proposed approach, lightweight-specification data are maintained at each device and shared periodically with the resource-rich edge device. Resource-insensitive computations are carried out at the edge device. The proposed approach uses a robust data collaboration mechanism that ensures detection-data delivery between nodes and edge devices, even in the presence of 10% of attacker nodes. Our simulations on Cooja simulator show that in an environment with 20% data loss, the proposed approach yields more than 80% TPR
    Keywords: internet of things; RPL; blackhole attack; trust.
    DOI: 10.1504/IJCSE.2024.10063354
     
  • Finite element analysis of the liver subjected to non-invasive indirect mechanical loading   Order a copy of this article
    by Samar Shaabeth, Amina Kadhem, Hassanain Ali Lafta 
    Abstract: Injuries from non-invasive abdominal blunt trauma represent 75% of no visible bleeding traumas. As a step for additional faster and more reliable diagnostic tool, simulation was performed of karate kick, punch, and pinpoint loading on the front, back, right, and left sides of the abdomen for 31-and 50-years old females and a 45-year-old male 2D segmented computed tomography images. The organs densities and mechanical properties were applied. Mechanical analysis was performed during 0.5 s, 1 s, 1.5 s and 2 s loading time. The results, compatible with previous literature, indicated the affected regions of liver, spleen, pancreas, kidney, and colon by the trauma.
    Keywords: liver; blunt abdominal trauma; BAT; simulation; finite element; indirect loading; non-invasive.
    DOI: 10.1504/IJCSE.2024.10063606
     
  • Black widow optimisation with deep learning-based feature fusion model for remote sensing image analysis   Order a copy of this article
    by Vaishnavee Rathod, Dipti Rana, Rupa Mehta 
    Abstract: Recently, achieving accurate remote sensing images (RSI) classification has been a primary goal in deep learning, given its extensive applications, including urban planning and disaster management. The performance of existing convolutional neural networks (CNN)-based strategies is primarily influenced by their parameter settings, necessitating automated hyperparameter tuning through metaheuristic methods. The proposed BWODLF-RSI technique integrates black widow optimisation with a deep learning feature fusion model for enhanced RSI analysis. The preliminary processing step to enhance RSI quality using noise reduction through a Gaussian filter (GF), enhancing contrast with the help of contrast limited adaptive histogram equalisation (CLAHE), and data augmentation to prevent overfitting. It is followed by employing Inception v3 and DenseNet201 to extract and fuse potent features. A critical aspect of this strategy is using black widow optimisation to fine-tune the kernel extreme learning machine (KELM) model, attaining a notable RSI classification accuracy of 94.05%. When tested on UCM and AID datasets, the BWODLF-RSI approach demonstrated superior feature selection and RSI analysis performance.
    Keywords: remote sensing; image classification; deep learning; pre-processing; feature fusion.
    DOI: 10.1504/IJCSE.2024.10063761
     
  • Behaviour recognition system of underground drilling operators based on MA-STGCN   Order a copy of this article
    by Cai Meng, Wang Xichao, Baojiang Li, Haiyan Wang, Xiangqing Dong, Chen Guochu 
    Abstract: In the intricate operations of mining rods, precise behavior recognition is paramount for operational safety. Addressing target detection and posture feature extraction challenges, this study proposes a method that integrates attention mechanisms with a Spatial-Temporal Graph Convolutional Network. An efficient channel attention mechanism is introduced during target detection, allocating weights to each channel to adapt to diverse features accurately. Multihead attention modules are incorporated in posture feature extraction, effectively capturing critical behavioral information. Behavior classification is achieved through the SoftMax function. Experimental results demonstrate the method's accuracy of 95.3% and a recall rate of 91.6% on the custom mining dataset. On the NTU-RGB+D public dataset, the method significantly improves accuracy and recognition speed. This research provides an innovative approach to behavior recognition in complex environments, ensuring precise identification of various behaviors in real-world scenarios, safeguarding worker safety, and holding crucial implications for applying behavior recognition technology in industrial fields.
    Keywords: drilling operation; attention mechanism; spatio-temporal graph convolution; behaviour recognition; pose estimation.
    DOI: 10.1504/IJCSE.2024.10064092
     
  • Secure forensic image analysis by optimised iterative model with random consensus approaches   Order a copy of this article
    by S.B. Gurumurthy, Ajit Danti 
    Abstract: Future measurements, software, and scalability testing related to cloud performance are required for forensic image scalability (FIS) optimisations and advancements. An advanced iterative reconstruction model and consensus mechanism must be used to quantitatively evaluate image quality in any blockchain framework since this will have a direct impact on the security and usability of the framework. This work addresses these problems by presenting a fast and efficient forgery detection system based on optimal security, feature extraction, and pre-processing. This will render conventional media security and forensic techniques meaningless. In this work, a random sample consensus (RSC) method is proposed for the analysis of FIS. To ensure that the architecture is as strong and secure as possible, the iterative reconstruction model (IRM) is employed. Initially, one may consider channel processing to be a form of database picture pre-processing. One perspective state that the enhanced chicken swarm optimisation (ECSO) algorithm is used to advance the scaling settings to balance invisibility and power. This RSC’s threshold setting reduces the number of excluded matches as well as the root mean square error (RMSE). Enhancement of scalability as well as picture reconstruction demonstrate the utility of the proposed technology. The simulation findings on multiple retinal image datasets demonstrate that the proposed method further enhances accuracy matching by 10.56% and rate of progress by 30% on average compared with the RSC-IRM strategy.
    Keywords: image reconstruction; scalability; optimisation; image security; forensic image.
    DOI: 10.1504/IJCSE.2024.10064093
     
  • Unlocking the potential of deepfake generation and detection with a hybrid approach   Order a copy of this article
    by Shourya Chambial, Tanisha Pandey, Rishabh Budhia, Balakrushna Tripathy, Anurag Tripathy 
    Abstract: With the use of numerous software programs and cutting-edge AI technologies, a lot of phony movies and photos are produced today, although the modification is rarely obvious The videos can be exploited in a variety of unethical ways to frighten, fight, or threaten individuals People should be careful these days to avoid using such techniques to produce phony videos Deep Fake is the name of an AI-based method for creating synthetic versions of human photographs This research paper proposes a hybrid model of Inception ResNetV2 and Xception for the purpose of deepfake detection With the rise of deepfake technology, detecting altered images and videos has become a crucial task for ensuring authenticity and preventing misinformation The hybrid model developed here is using a dataset of fake and real videos and the images and achieved a classification accuracy of over 96 75%.
    Keywords: fake video; convolutional neural network; CNN; RNN.
    DOI: 10.1504/IJCSE.2024.10064094
     
  • Development of a sorting system for mango fruit varieties using convolutional neural network   Order a copy of this article
    by Adejumobi Philip Oluwaseun, John A. Ojo, Adejumobi Israel Oluwamayowa, Adebisi Oluwadare Adepeju, Ayanlade Oladayo Samson 
    Abstract: Mango is a tropical fruit with numerous varieties, these varieties intermix during harvest and post-harvest procedures thereby causing complications and inability to accurately identify specific varieties at the retail stage. Accuracy of existing sorting techniques does not perfectly fit well to real-world scenarios. This research introduces an enhanced sorting system for mango fruits to address these challenges. Our approach involved building a comprehensive database by photographing six distinct mango fruit varieties prevalent in South-West Nigeria using a digital camera. The captured images underwent quality enhancement through histogram equalization and noise reduction via median filtering. The convolutional neural network framework was used in the creation of a model named AdeNet to facilitate feature extraction and classification within the system. The experimental result achieved 99.0% accuracy and F1-score of 97.6% which is better than the performance of existing mango sorting technique. The work will enhance the efficiency of mango industries.
    Keywords: artificial intelligence; conventional neural network; deep learning; mango fruit; automatic sorting system.
    DOI: 10.1504/IJCSE.2024.10064199
     
  • Privacy-preserving SQL queries on cross-organisation databases   Order a copy of this article
    by Ye Han, Xiaojie Guo, Tong Li, Xiaotao Liu 
    Abstract: In recent years, much industrial interest has been paid to SQL queries on a joint database contributed by several mutually distributed companies or organizations. However, privacy regulations and commercial interest prevent these entities to trivially share their local databases with each other. To enable such SQL queries still, some privacy-preserving technologies should be applied. In this work, we outline a provably secure MPC framework of privacy-preserving SQL queries for industrial applications, such as medical research in hospitals, financial oversight, business cooperation, etc. In particular, this framework is secure against any semi-honest adversary, which is a popular threat model in real-life systems. This framework also models a common efficiency optimization of SQL query plans at the cost of mild leakage.
    Keywords: SQL queries; secure multi-party computation; privacy.
    DOI: 10.1504/IJCSE.2024.10064247
     
  • A transfer learning approach for adverse drug reactions detection in bio-medical domain based on knowledge graph   Order a copy of this article
    by Monika Yadav, Prachi Ahlawat, Vijendra Singh 
    Abstract: Among the top causes of mortality, adverse reactions of drugs (ADRs) are dominant. This imposes severe health risks and a significant financial burden on patients. Consequently, timely prediction of possible ADRs of a drug has become an essential concern in the clinical domain. However, it is challenging to recognise the adverse reactions of all drugs using existing ADR data sources. Recently, a semantic-rich knowledge base and machine learning techniques have shown high accuracy in predicting ADRs in advance. This paper introduces a new framework, knowledge graph slot-filling clinical bi-directional encoder representations from transformers (KG-SF Clinical BERT), which takes triples of knowledge graph as text sequences. It applies transformer-based multi-task learning with slot-filling for ADR classification and fine-tuned on bio-medical domain to detect ADRs. The KG-SF clinical BERT brings remarkable performance gain with AUC of 0.88 on drug bank and SIDER datasets and 0.99 AUC on PubMed dataset.
    Keywords: adverse drug reactions; clinical BERT; knowledge graph; KG; transfer learning.
    DOI: 10.1504/IJCSE.2024.10064638
     
  • Modified glowworm swarm optimisation-based cluster head selection and enhanced energy-efficient clustering protocol for IoT-WSN   Order a copy of this article
    by T. Kanimozhi, S. Belina V.J. Sara 
    Abstract: The maintenance cost of flat-based wireless sensor network-internet of things (WSN-IoT) is high. Clustering is recommended to reduce message overhead, manage congestion, and simplify topology repairs. A clustering protocol enhances energy efficiency, prolongs network lifespan by grouping nodes into clusters, and reduces transmission distance to the base station (BS). Depending on parameters like quality of service (QoS), energy consumption, and network load, a clustering technique organises nodes into clusters. Each cluster is led by one or more cluster heads (CH) that collect and transmit data to the BS directly or through intermediary nodes. To enhance WSN-based IoT longevity, this study presents an enhanced energy-efficient clustering protocol (EEECP). It establishes an optimal number of clusters, utilises the modified fuzzy C means (MFCM) algorithm to stabilise and reduce sensor node energy consumption, and introduces the modified glowworm swarm optimisation (MGSO) algorithm for CH selection. MGSO incorporates a dynamic threshold for balanced CH longevity within clusters. Performance is evaluated using metrics including first node dies (FND), last node dies (LND), half node dies (HND), weighted first node dies (WFND), energy usage, and network lifetime compared to existing protocols.
    Keywords: modified glowworm swarm optimisation; modified fuzzy C-means algorithm; cluster head; quality of service; enhanced energy-efficient clustering protocol.
    DOI: 10.1504/IJCSE.2024.10064839
     
  • Optimisation of quantum circuits using cost effective quantum gates   Order a copy of this article
    by Swathi Mummadi, Bhawana Rudra 
    Abstract: The importance of reversible operations has increased with the emergence of new technologies. Reversible operations are crucial for developing energy-efficient and cost-efficient circuits. The efficiency of a quantum circuit is measured in terms of quantum cost and quantum depth. In this paper, we propose an optimisation algorithm for reversible gates such as the Peres gate, Toffoli gate, and the entanglement purification method. Peres and Toffoli gates play an important role in quantum circuit implementation, and entanglement purification plays a key role in various applications such as quantum teleportation, secure communication, and quantum key distribution. The proposed algorithm optimises the quantum cost and quantum depth to 20% compared with the existing approaches.
    Keywords: reversible computation; quantum computation; quantum csx and sxdg gates; entanglement purification; reversible logic gates.
    DOI: 10.1504/IJCSE.2024.10065245
     
  • A precise deep learning-based ECG arrhythmia classification scheme using deep bidirectional capsule network classifier   Order a copy of this article
    by Soumen Ghosh, Satish Chander 
    Abstract: This paper presents a novel approach for accurate ECG signal classification using a deep bidirectional capsule network classifier. ECGs are vital for diagnosing cardiac arrhythmias, and precise classification is crucial for automated heart disease prediction. Initially, ECG signal data is acquired and artifacts are removed using a quantised wavelet threshold method, followed by spectrogram analysis. Features are extracted using the VGG spectral net algorithm, and arrhythmia classification is performed with the deep bidirectional capsule network approach. The study evaluates this technique using the MIT-BIH arrhythmia database, identifying five types of arrhythmias: NOR, RBBB, PVC, LBBB, and APB. The results demonstrate improved accuracy compared to traditional methods, suggesting this deep learning approach could enhance diagnostic capabilities, streamline healthcare workflows, and improve patient outcomes.
    Keywords: electrocardiogram; ECG; deep bidirectional capsule network; DBCN; VGG spectral net; quantised wavelet threshold method; ECG arrhythmias.
    DOI: 10.1504/IJCSE.2024.10065882
     
  • Deep learning architectures for detection of acute myeloid leukemia   Order a copy of this article
    by Niteesh K. Ramesh, Vijayakumar Kadappa, Rajeshwari Devi D. Veerabhaskar, Divijendranatha Reddy Sirigiri, Pooja T. Sreedhar 
    Abstract: Acute Myeloid Leukaemia (AML) is a malignancy associated with the rapid development of immature blood cells which fail to perform normal immune functions. AML accounts for almost 80% of all blood-related cancers in adults. Despite the availability of various therapeutic options, the prognosis is poor. Early detection and appropriate diagnosis of AML as well as many other cancers remain unmet clinical necessities that need to be addressed. Artificial intelligence-based approaches find utility across all spectrum of sciences including health care and diagnosis. However, most of the existing work uses traditional machine learning algorithms and smaller datasets, resulting in poor generalization ability of the models which leads to lower detection rates. To address these concerns, we propose two deep learning architectures to detect AML by using publicly available larger image datasets of various blood cells. In contrast to other models, the proposed deep networks employ kernels with diversified shapes for identifying complex patterns. These models require lower parameter count (up to the extent of 97%) and computational requirements, yet they demonstrate improved or competitive performance compared with other deep networks.
    Keywords: artificial intelligence; deep learning; artificial neural networks; acute myeloid leukemia; healthcare.
    DOI: 10.1504/IJCSE.2024.10065883
     
  • Image-text multimodal sentiment analysis method integrating multi-themes and multi-labels   Order a copy of this article
    by Shunxiang Zhang, LongHui Hu, ShuYu Li, Wenjie Duan, Xiaolong Wang 
    Abstract: The current image-text sentiment analysis models only focus on the content of text and image, and ignore the synergistic effect of themes and labels information on the semantic features of image and text. Therefore, we propose a multi-modal sentiment analysis method integrating multi-themes and multi-labels. Firstly, the global features and local features of the image are obtained by CNN and Faster-RCNN. Bi-LSTM is used to obtain word-level features and sentence-level features of the text, and the Bert is responsible for extracting the theme-label features. Then, the attention network for feature interaction to generate the word-local correlation features, the text's sentence features are combined with the image's global features to generate the joint features of the image-sentence. Finally, these two features are fused with the theme-label features to obtain the results of the sentiment analysis. The experimental results demonstrate that the proposed method can improve the accuracy of image-text sentiment analysis.
    Keywords: multimodal sentiment analysis; multi-theme labels; modal fusion; target detection; attention network.
    DOI: 10.1504/IJCSE.2024.10065952
     
  • MFA: Web API recommendation based on service multiple feature aggregation   Order a copy of this article
    by Guobing Zou, Chunhua Zeng, Yue Zhu, Pengtao Li, Song Yang, Shengxiang Hu 
    Abstract: As the number of Web services continues to increase, it has become a challenging problem to provide developers with accurate and efficient Web services that meet Mashup requirements. To solve this problem, various methods have been proposed to recommend APIs to match the needs of mashups, and have achieved great success. However, due to the uneven quality of service descriptions, there are some challenges in feature extraction, utilization of service meta-information, and textual requirements understanding. Therefore, we propose a Web API recommendation method (FMA) based on service multiple feature aggregation. FMA uses the attention mechanism model to mine the semantic features of similar services and enhance the features of Mashup services and Web API services. We conduct extensive experiments on a large-scale real-world dataset called ProgrammableWeb, and the results show that FMA outperforms existing baseline methods on multiple evaluation metrics.
    Keywords: Web API; Mashup service; API recommendation; multiple feature aggregation; attention mechanism.
    DOI: 10.1504/IJCSE.2024.10065996
     
  • Agreement window algorithm for user controlled and utility supported personal data privacy   Order a copy of this article
    by Geocey Shejy, Pallavi Chavan 
    Abstract: A good privacy-preserving algorithm must keep the trade-off between privacy preservation and the utility of the data for analysis purposes. As the spectrum of data privacy regulations expands and evolves for fine tuned protection of individual data privacy; both customers and organizations who are the stakeholders of digital services need more supporting research to ensure legal compliance.All existing privacy regulations mention the rights of data users and the responsibilities of data collectors. The work in this article keeps the European Union’s GDPR as a key reference, still, the requirement of the consent of the data owner to release personal data is common in all personal data privacy acts across the globe.The Agreement Window Algorithm (AW Algorithm), helps organizations to do legitimate personal data collection, by ensuring user consent. The agreement window is a conceptual space where the data owner and the service-providing organizations agree to share the data. While sharing
    Keywords: agreement window; differential privacy; set sensitivity; sensitivity factor; personal identifiable information; PII; personal sensitive information; PSI; quasi identifier; QI.
    DOI: 10.1504/IJCSE.2024.10065997
     
  • Solving overhead transmission line engineering problems with elastic catenary equations   Order a copy of this article
    by Hervé Ducloux 
    Abstract: Most methods used to solve overhead line sag-tension problems assume that the conductor is inextensible. This assumption leads to the classical catenary curve. In this article, the conductor is assumed to be extensible, which leads to the more accurate elastic catenary curve. First, an original mathematical approach of establishing the equations of this curve is proposed: it uses the slope to connect the abscissa and the ordinate of each point on the curve. Then, it is used to solve sag-tension problems for perfectly linear elastic conductor or composite conductor with nonlinear inelastic behaviour. In each case, all steps of the algorithms proposed are explained. The numerical examples included in this paper show that the number of iterations needed to solve a sag-tension problem is quite small. Comparisons with previous studies are also made to assess the accuracy of the proposed method.
    Keywords: equations of elastic catenary curves; overhead transmission lines; sag-tension problems.
    DOI: 10.1504/IJCSE.2024.10066037
     
  • A green pattern-based data encryption solution in the cloud   Order a copy of this article
    by Farah Abdmeziem, Saida Boukhedouma, Mourad Chabane Oussalah 
    Abstract: In today's business landscape, there's a growing interest in Cloud computing, particularly for extensive data storage. However, a significant security concern arises from entrusting data to cloud providers and relinquishing control to customers. To address this, data encryption on the customer's side is a viable solution, though it can be resource-intensive, especially for large data volumes. This can lead to performance issues and environmental impacts, including increased server carbon footprints. In this work, we propose a solution based on customized encryption/decryption patterns, categorizing data into three sensitivity levels and considering access/update frequency. We also assess environmental implications and cost metrics to highlight the positive impact of our approach compared to other state-of-the-art methods. Experimental results demonstrate that our approach not only facilitates encryption adoption but also effectively balances data confidentiality with practical resource and energy constraints.
    Keywords: data; security; cloud computing; green encryption; encryption-decryption patterns; cost metrics.
    DOI: 10.1504/IJCSE.2024.10066044
     
  • Design of exercise recommendation model based on clustering collaborative filtering adaptability   Order a copy of this article
    by Chaoyang Shi, Zhen Zhang 
    Abstract: The study explores the issue of insufficient personalised recommendation ability of exercise systems in online teaching. It combines clustering analysis and collaborative filtering algorithms. K-means clustering is used as the basis for clustering analysis. And the collaborative filtering algorithm is optimised from three aspects: the number of learners working together, the difference in exercise scores, and the difficulty of exercise. A clustering collaborative filtering adaptive exercise recommendation model based on similarity improvement is proposed. The study evaluates the application effectiveness of the model through simulation experiments. The experimental results show that the MAE values formed by the designed algorithm under changes of the nearest neighbours are the lowest among the comparison algorithms, proving its superiority. In the comparison of indicators, the accuracy, recall, and F1 values of the algorithm are all the highest among the comparison algorithms, further verifying its effectiveness. Stability analysis shows that in both sets, the accuracy of the research design model reaches above 0.87, indicating that the model has high stability and accuracy. From this, the model designed in the study has advantages in recommendation effectiveness, which can help students improve learning effectiveness and provides a new approach for learning assistance systems.
    Keywords: clustering; collaborative filtering; online learning; exercise; recommendation; similarity.
    DOI: 10.1504/IJCSE.2024.10066045
     
  • Scene text detection using robust masks and cascaded classifiers   Order a copy of this article
    by Houssem Turki, Mohamed Elleuch, Monji Kherallah, Alima Damak 
    Abstract: Detecting text in scenes poses a significant and challenging problem due to the complex character shapes and the diverse degradations present in natural images. It represents the initial and crucial phase that must be successfully completed before the text recognition stage. In this study, we suggest a hybrid approach to tackle this issue, leveraging the maximally stable extremal regions (MSER) algorithm, which gained significant attention in recent research. Despite its popularity, it remains very sensitive to the shape, size, scale and background noise of text characters. To tackle its limits and refine the final result, we focuses on an extended MSER based method. Overall flowchart of the suggested system is divided into three steps: 1) robust masks generation to identify the text candidate regions; 2) feature extraction and selection based on VGG16 deep learning architecture; 3) employing classifiers in a cascaded structure to differentiate between text and non-text areas based on enhanced geometrical pattern characteristics. The effectiveness of the proposed method is demonstrated through an experimental study conducted on various benchmarks, such as ICDAR2013, ICDAR2015, MSRA-TD500, and RRC-MLT.
    Keywords: scene text; text detection; maximally stable extremal regions; MSER; VGG16 deep learning model; random forest; SVM; NCA-based feature selection.
    DOI: 10.1504/IJCSE.2024.10066146
     
  • Constructing stock portfolio with transformer   Order a copy of this article
    by Li Jinyuan, Linkai Luo 
    Abstract: Machine learning methods have been applied to quantitative investing, yet the application of Transformer models remains limited. Stock prices are influenced by both long-term and short-term features. Existing methods usually treat the influencing factors as a whole and do not distinguish them. In this paper, we introduce a Transformer encoder-decoder architecture tailored for the capture of long-term and short-term features. By partitioning historical data into long-term and short-term parts, the encoder module concentrates on extracting long-term features, while the decoder concentrates on short-term features and the integration of long and short-term features. Portfolios are then constructed from the top N predicted stocks. Experimental results show that the proposed Transformer model outperforms the existing state-of-the-art methods, LSTM, RNN, and GRU models, with improvements of 26%, 19%, and 14% in annualised returns for long-short portfolio combinations, respectively. It indicates the benefits of extracting long-term and short-term features separately.
    Keywords: stock portfolio; transformer; factor model.
    DOI: 10.1504/IJCSE.2024.10066373
     
  • Multilingual language classification model for offensive comments categorisation in social media using HAMMC tree search with enhanced optimisation technique   Order a copy of this article
    by B. Aarthi, Balika J. Chelliah 
    Abstract: The exponential rise of social media platforms has led to a surge in offensive content, highlighting the necessity for effectively detecting and managing such comments. This necessitates precise and advanced online social networks (OSN) categorisation and optimisation methods. This study introduces and assesses a novel technique for automatically categorising texts, supporting over 60 languages, without relying on a pre-annotated data set. The technique employs multilingual methods based on the randomised explicit semantic analysis (ESA) strategy. To combat the inherently multilingual nature of social media content, the paper introduces an innovative classification and optimisation strategy named hybrid adaptive Markov chain Monte Carlo tree search (HAMCMTS) with enhanced eagle Aquila optimiser (EEAO). The study uses three publicly available datasets to identify negative or offensive comments in various languages, offering a comprehensive analysis in this field. The proposed approach holds potential for diverse applications, particularly in multilingual categorisation tasks such as monitoring disaster-related communications on social media to improve visibility and trust. Moreover, it incorporates a sophisticated mechanism to bolster the dependability of its recommendations.
    Keywords: negative or offensive comments; multilingual languages; explicit semantic analysis; ESA; enhanced eagle Aquila optimiser; EEAO.
    DOI: 10.1504/IJCSE.2024.10066586
     
  • A verifiable and secure DNN classification model over encrypted data   Order a copy of this article
    by Weixun Li, Guanghui Sun, Yajun Wang, Long Yuan, Minghui Gao, Yan Dong, Chen Wang 
    Abstract: Outsourcing deep neural networks (DNNs) offers relief for client overhead but sparks concerns over sensitive data privacy. Current methods, like homomorphic encryption and federated learning, aim to safeguard privacy but often falter in preserving it and verifying gradient integrity. In response, we introduce DNNCM-ED, a novel verifiable and secure DNN classification model operating on encrypted data. Our approach establishes a jointly trained DNN model between client and server, with the client encrypting local gradients via double masking before aggregation at the server. We also devise secure communication protocols for fundamental operations crucial in constructing the DNN classification model. Additionally, we craft verifiable algorithms tailored to DNNCM-ED, ensuring privacy of local gradients and integrity verification. Extensive property and performance analyses underscore DNNCM-ED's superiority in accuracy, time efficiency, and communication overhead. Through these advancements, DNNCM-ED addresses critical shortcomings in existing privacy-preserving outsourcing methods while providing robust confidentiality and integrity verification.
    Keywords: deep neural networks; encrypted data; homomorphic encryption.
    DOI: 10.1504/IJCSE.2024.10066642
     
  • Enhancing multi-view ensemble learning with zig-zag pattern-based feature set partitioning   Order a copy of this article
    by Aditya Kumar, Jainath Yadav 
    Abstract: This study suggests a novel approach called Zig-Zag Pattern-Based Feature Set Partitioning. The method involves two steps: first, calculating feature correlations using Pearson's coefficient, and second, ranking features based on mean correlation and arranging them in a zig-zag pattern. The zig-zag pattern ensures diverse and balanced feature subsets, improving model generalization and reducing over- fitting. Experimental results on ten high-dimensional datasets show the practical significance of the suggested strategy, which show that it outperforms previous strategies in accuracy and generalization. This approach advances multi-view ensemble learning, offering a practical solution for improving ensemble model performance in complex data analysis tasks.
    Keywords: feature set partitioning; views construction; ensemble learning; zig-zag partitioning; classification; multi-view ensemble learning.
    DOI: 10.1504/IJCSE.2024.10066742
     
  • A new binary tagging-based model integrated with unsupervised tree hierarchy for relational triple extraction   Order a copy of this article
    by Hua Yin, Zhiquan Chen 
    Abstract: In relational triple extraction (RTE),pipeline methods suffer from the error propagation problem. Tagging-based approaches joined the two subtasks by sequence tagging. Among them, cascade binary tagging scheme(CBTS) shows the SOTA performance. However, the long distances between subjects and objects extremely degrade the performance. We introduce the hierarchy parser which producing multi-level tree hierarchy information by an unsupervised way. A weight-transform method, assigning higher weights to the words with nearer hierarchies to subject, is designed to reconstruct the unsupervised deep tree hierarchy. Then we propose a new binary tagging model COnRel. It adds hierarchy parser and weight-transform method into the CBTS to obtain shallow and deep hierarchy information. And a feature fusion method is applied to enhance the semantic representation of the subjects. COnRel including shallow and deep hierarchy shows better performance on WebNLG and NYT datasets.
    Keywords: relational triple extraction; RTE; tree hierarchy; ordered neurons LSTM; BIO-like tagging scheme; cascade binary tagging scheme.
    DOI: 10.1504/IJCSE.2024.10066802
     
  • EIUAPA: an efficient and imperceptible universal adversarial attack on audio classification models   Order a copy of this article
    by Huifeng Li, Pengzhou Jia, Weixun Li, Bin Ma, Bo Li, Dexin Wu, Haoran Li 
    Abstract: The domain of Audio Classification Models is emerging as a significant paradigm, albeit susceptible to universal adversarial attacks. These attacks involve the insertion of a single optimal perturbation into all audio samples, leading to incorrect predictions. Nonetheless, existing attack methodologies are hindered by inefficiencies and imperceptibility challenges. In order to streamline the attack process effectively, we propose a two-step strategy EIUAPA that offers an optimal initiation point for the perturbation optimization process, resulting in a notable decrease in generation time. To maintain imperceptibility, we present a range of metrics focusing on perturbation concealment, serving as benchmarks for optimization. These metrics ensure that perturbations are concealed not only in the frequency and time domains but also remain statistically indistinguishable. Experimental results demonstrate that our method generates UAPs 87.5% and 86.8% faster than baseline methods, with improved Signalto-Noise Ratio (SNR) and Attack Success Rate (ASR) scores.
    Keywords: adversarial attack; artificial intelligence; security and privacy; audio classification; deep learning.
    DOI: 10.1504/IJCSE.2024.10066803
     
  • Using generative adversarial network for music transformation   Order a copy of this article
    by Cheng-Han Wu, Yu-Cheng Lin, Pimpa Cheewaprakobkit, Wan-Chin Ting, Timothy K. Shih 
    Abstract: In this study, we propose a generative adversarial network (GAN) framework for music style transfer. Initially, a dataset of traditional Jiangnan songs is pre-processed into two categories: complete compositions and corresponding musical phrases (starting and ending notes), which are then converted into piano-roll images. The CycleGAN model is then used to train these images until the model converges to establish a music style transfer model. The goal is to allow users to input only the starting and ending notes of each measure as a musical phrase, and the system will convert this phrase into complete musical compositions in the Jiangnan style. Then we use a deep learning framework and music expertise for data processing, enhancing the quality and utility of our conversions. At the same time, we have established music style assessment metrics based on the statistical data of the dataset, providing an effective method for evaluating music styles.
    Keywords: music transformation; generative adversarial network; GAN; automatic music generation; music style transfer.
    DOI: 10.1504/IJCSE.2024.10066865
     
  • Scalable malicious URL detection technique for smishing attacks   Order a copy of this article
    by Razvan Stoleriu, Catalin Negru, Bogdan-Costel Mocanu, Emil-Andrei Constantinescu, Alexandra-Elena Mocanu, Florin Pop 
    Abstract: Nowadays, smartphones are used daily and use sensitive information making people more vulnerable to cyber-security attacks. The easiest way for attackers to access a smartphone is through SMS phishing (smishing) using URL shortening services. In this paper, we propose a scalable technique to detect malicious URLs in smishing attacks based on a Cloud-Edge architecture, using threat intelligence platforms (e.g., VirusTotal, PhishTank), and Machine Learning algorithms that classify the URLs based on their features. We used a public dataset for training and proposed new features to improve it. We evaluated our proposed ML model against JRip, PART, J48, and Random Forest algorithms. Our model has improved performance compared to similar solutions, obtaining an accuracy of approximately 97%. To showcase the effectiveness of our solution, we implement an Android application that detects malicious short URLs in SMS messages and notifies the user concerning their legitimacy.
    Keywords: smishing attacks; malicious URLs; edge-cloud computing; threat intelligence; machine learning.
    DOI: 10.1504/IJCSE.2024.10067011
     
  • Performance analysis and comparison of jellyfish optimisation-based maximum power point tracking controller for partial shading condition   Order a copy of this article
    by Dilip Yadav, Nidhi Singh 
    Abstract: This paper addresses the critical challenge of partial shading conditions (PSC) in photovoltaic systems, which significantly affect the efficiency of PV panels. Conventional methods often fail to optimise output under partial shading condition, prompting the need for innovative approaches. The study proposes the jelly-fish optimisation algorithm for maximum power point tracking, comparing its effectiveness with various existing MPPT controllers including incremental conductance, modified incremental conductance, perturbance and observation, particle swarm optimisation, cuckoo search algorithm, grey wolf optimisation, and whale search optimisation techniques. The study reveals the limitations of conventional techniques in optimising power output under PSC. The findings highlight the superiority of the jellyfish-based MPPT, achieving an impressive efficiency of 99.89% with a minimal tracking time of 0.14 seconds, surpassing other MPPT controllers. This work advances the field by highlighting the jellyfish algorithms effectiveness and guiding future research toward more efficient MPPT methods.
    Keywords: cuckoo search; jellyfish optimisation algorithm; maximum power point tracking; partial shading condition; particle swarm optimisation.
    DOI: 10.1504/IJCSE.2024.10067209
     
  • Hybrid predictive modelling for insurance premium retention: integrating statistical and AI techniques   Order a copy of this article
    by Ahmed A. Khalil, Zaiming Liu 
    Abstract: This research highlights the critical role of forecasting in the insurance industry and emphasises the premium retention ratio (PRR) as a key internal performance indicator for evaluating insurance company operations. Traditional time series models like ARIMA and Exponential Smoothing face limitations in capturing complex data patterns. To address this, the study proposes a hybrid predictive model that combines statistical time series models (ARIMA, EXP) with advanced AI techniques (ANN, SVR) to enhance PRR prediction accuracy in Egypts Fire, Marine, and Aviation insurance sectors. Using 80% of data for training (19892015) and 20% for testing (20162021), the study demonstrates that hybrid models, particularly ARIMA-ANN and EXP-ANN, outperform conventional models. The findings suggest that incorporating ANN into these models significantly improves prediction accuracy. This research offers a novel approach to forecasting in the Egyptian insurance market and provides publicly accessible datasets for further comparative studies across different countries.
    Keywords: artificial neural network; ANN; artificial intelligence; autoregressive integrated moving average; ARIMA; exponential smooth; Egyptian insurance market; statistical time series; support vector machine; SVM; insurance.
    DOI: 10.1504/IJCSE.2024.10067258
     
  • Feature selection using Tasmanian devil optimisation algorithm for software fault prediction   Order a copy of this article
    by Himansu Das, N.A. Muskan, Hrishikesh Kumar 
    Abstract: Software quality is improved through early software flaw identification, which is made possible by software fault prediction (SFP). Early software problem identification reduces the amount of money and work needed to fix those vulnerabilities. The research presented a novel FSTDO model, a feature selection (FS) approach built upon Tasmanian devil optimisation (TDO). The proposed FSTDO helps to select optimal feature subset that yields maximum classification accuracy. The proposed FSTDO algorithm is juxtaposed with four well-known FS algorithms, such as FS using ACO, FS using GA, FS using PSO and FS using DE. Four popular classifiers such as, KNN, NB, DT, and QDA were used with the FSTDO to assess the quality of its outcomes. The experimental outcomes reveal, the proposed FSTDO has more potential in comparison with the competing FS models as it delivers enhanced performance in terms of accuracy and the selection of optimal features is also significantly viable.
    Keywords: software fault prediction; SFP; feature selection; optimisation; Tasmanian devil optimisation; TDO; machine learning; classifiers.
    DOI: 10.1504/IJCSE.2025.10068003
     
  • GraphBiGRU model for anti-money laundering based on preference-based reinforcement learning via the label filtering loop mechanism   Order a copy of this article
    by Meng Li, Xinqiao Su, Lu Jia, Rongbo You 
    Abstract: Anti-Money Laundering (AML) in Bitcoin transactions remains challenging since Bitcoin data has a complex graph structure and sequential nature, with many unknown labels and an imbalanced distribution of licit and illicit transactions. To address these challenging issues, we propose a novel reinforcement learning-based GraphBiGRU model via the label filtering loop mechanism to detect illicit transactions in the Bitcoin blockchain. Specifically, we first constructed the GraphBiGRU network to learn the graph structure and temporal information of Bitcoin data. Then, we introduced the label filtering loop mechanism, which encouraged the GraphBiGRU to select reliable pseudo-labeled samples that reduced data noise interference. In addition, we investigated a preference-based reinforcement learning strategy that enabled the GraphBiGRU to better identify illicit transactions, thereby improving performance on imbalanced datasets. Finally, we conducted experiments on the Elliptic dataset, demonstrating that our method achieved state-of-the-art performance, especially with a limited labelled dataset.
    Keywords: anti-money laundering; illicit transactions; GraphBiGRU; label filtering loop mechanism; pseudo-labeled samples; preference-based reinforcement learning; elliptic dataset.

  • Enhancing e-commerce product recommendations through statistical settings and product-specific insights   Order a copy of this article
    by Onur Dogan 
    Abstract: In the e-commerce industry, effectively guiding customers to select desired products poses a significant challenge, necessitating the utilisation of technology and data-driven solutions. To address the extensive range of product varieties and enhance product recommendations, this study improves upon the conventional association rule mining (ARM) approach by incorporating statistical settings. By examining sales transactions, the study assesses the statistical significance of correlations, taking into account specific product details such as product name, discount rates, and the number of favourites. The findings offer valuable insights with managerial implications. For instance, the study recommends that if a customer adds products with a high discount rate to their basket, the company should suggest products with a lower discount rate. Furthermore, the traditional rules are augmented by incorporating product features. Specifically, when the total number of favourites is below 7,500 and the discount rate is less than 75%, the similarity ratio of the recommended products should be below 0.50. These enhancements contribute significantly to the field, providing actionable recommendations for e-commerce companies to optimise their product recommendation strategies.
    Keywords: association rules; basket analysis; statistical tests; e-commerce.
    DOI: 10.1504/IJCSE.2023.10060975
     
  • An efficient stitching algorithm for aerial images with low-overlap   Order a copy of this article
    by Qingshan Tang, Huang Jiang, Sijie Li 
    Abstract: In fields such as military reconnaissance, the overlap between images captured by UAVs is limited to 15%-30%. To achieve larger perspective panoramic images from low-overlap aerial images, this study proposes an efficient algorithm for image stitching. Specifically, the algorithm utilises the oriented fast and rotated brief (ORB) and grid-based motion statistics (GMS) algorithms. Next, image alignment is achieved by calculating location-dependent homographies based on the grid. For seamless integration, the algorithm combines optimal seam blending and gradient-domain fusion techniques. Experimental results demonstrate that the proposed algorithm outperforms the scale-invariant feature transform (SIFT) and the affine-scale invariant feature transform (ASIFT) algorithms in terms of feature point matching accuracy. Moreover, comparisons with other algorithms, such as the as-projective-as-possible (APAP), adaptive as-natural-as-possible (AANAP), and single-perspective-warps (SPW), it is proved that the proposed algorithm can obtain high-quality stitched images. The problems of slow stitching speed, poor alignment, and ghosting are effectively solved.
    Keywords: aerial image; image stitching; motion grid statistics; optimal stitching; gradient fusion.
    DOI: 10.1504/IJCSE.2023.10061946
     
  • ORNAIC-TDNSI: optimal RetinaNet with artificial immune classification for text detection on natural scene images   Order a copy of this article
    by Sharfuddin Waseem Mohammed, Brindha Murugan 
    Abstract: Text detection and recognition from natural scene images is helpful in many industrial, surveillance, and security applications. Text detection in natural scenes is a vital but challenging issue due to differences in line orientation, text fonts and size. This study introduces an optimal RetinaNet with artificial immune classification for text detection on natural scene images (ORNAIC-TDNSI). The ORNAIC-TDNSI model encompasses two major processes namely textual region detection and text recognition from detected regions. At the initial stage, the RetinaNet object detector is applied for detection of textual regions in the natural scene images. For enhancing the detection efficiency of the RetinaNet model, group teaching optimisation algorithm (GTOA) is utilised. Next, artificial immune classification (AIC) model is applied for accurate text recognition. The experimental validation of the ORNAIC-TDNSI model is tested on ICDAR-2015, ICDAR-2017, and Total-Text datasets. The comparison study reported that the ORNAIC-TRNSI model outperforms the other DL models.
    Keywords: natural scene images; text recognition; deep learning; RetinaNet; artificial immune classification; AIC.
    DOI: 10.1504/IJCSE.2023.10061549
     
  • Value chain for smart grid data: a brief review   Order a copy of this article
    by Feng Chen, Huan Xu, Jigang Zhang, Guiyu Li 
    Abstract: Smart grids are now crucial infrastructures in many countries. They build two-way communication between customers and utility enterprises. Since power and energy are associated with human activities, smart grid data are extremely valuable. At present, these data are currently being used in some areas. As a novel asset, the value of smart grid data needs quantitative measurement for evaluation and pricing. To achieve this, it is essential to analyse the overall process of value creation, which can help calculate costs and discover potential applications. The process can be effectively revealed by building a data value chain for smart grid data, which illustrates the data flow and clarifies the data sources, analytics, utilisation, and monetisation. This article provides a three-step data value chain for smart grid data and expounds on each step. This article also reviews various methods and some challenges with smart grid data.
    Keywords: smart grid; data value chain; data collection; data analysis; data monetisation.
    DOI: 10.1504/IJCSE.2024.10061602
     
  • Integrating rich event-level and schema-level information for script event prediction   Order a copy of this article
    by Wei Qin, Xiangfeng Luo, Hao Wang 
    Abstract: A script is consists of a series of structured event sequences extracted from the texts. Given historical scripts, script event prediction aims to predict the subsequent event. The critical aspect in script event prediction is how to effectively represent events, which plays an important role in making accurate predictions. Most existing methods describe events through verbs and a few core independent arguments (i.e., subject, object, and indirect object), which lack the capability to deal with complex and sparse event data. In this paper, we propose a hierarchical event prediction (HEP) model, which integrates information from both event-level and schema-level. At the event level, HEP enriches the existing event representation with extra arguments (i.e., time and place) and modifiers, which provides in-depth event information. At the schema level, it induces the sparse events into conceptual schema, which improves the model's generalisation ability to make more reasonable predictions. To more effectively integrate these two layers of information, we propose an event multi-layer encoder, which can effectively integrate information between different layers. Experimental results on New York Times and CNN corpora demonstrate the effectiveness and superiority of HEP.
    Keywords: script event prediction; SEP; event-level; schema-level; contrast learning; bimodal cross attention; BCA.
    DOI: 10.1504/IJCSE.2024.10061887
     
  • TSALSHADE: improved LSHADE algorithm with tangent search   Order a copy of this article
    by Abdesslem Layeb 
    Abstract: The differential evolution (DE) algorithm is a widely recognised numerical optimisation technique. However, it exhibits certain limitations, including inadequate exploration and a tendency to get stuck in local minima. Even efficient DE variants like LSHADE encounter challenges when confronted with complex composite functions containing global optima that are hard to attain. In contrast, the Tangent search algorithm (TSA) has proven its efficacy in tackling intricate optimisation problems. TSA achieves this by employing the tangent flight operator, which facilitates escaping local minima while retaining exceptional exploration capabilities. This paper introduces a novel hybrid algorithm known as TSALSHADE. TSALSHADE combines elements from TSA and LSHADE to address the previous issues. In this hybrid paradigm, the tangent flight operator is integrated into the LSHADE framework, complemented by the introduction of a novel differential mutation operator. The primary strength of TSALSHADE lies in its capacity to effectively address intricate composite functions. To validate its performance, comprehensive experimental studies were conducted on the latest CEC 2022 benchmark functions. The results unequivocally demonstrate that TSALSHADE consistently produces promising and competitive outcomes across a spectrum of benchmark functions. This success can be primarily attributed to the algorithm's improved equilibrium between search exploration and exploitation.
    Keywords: numerical optimisation; differential evolution; LSHADE; tangent search algorithm; TSA; exploration and intensification search.
    DOI: 10.1504/IJCSE.2024.10062887
     
  • DMRFO-CD: a discrete manta ray foraging inspired optimisation algorithm for community detection in networks   Order a copy of this article
    by Priyanka Gupta, Shikha Gupta, Naveen Kumar 
    Abstract: There has been considerable interest in using bio-inspired evolutionary algorithms to detect communities in networks. Manta ray foraging optimisation (MRFO), a recently proposed real-valued bio-inspired evolutionary algorithm, has demonstrated superior performance in challenging complex optimisation problems. The present proposal is significant in its adaptation of the MRFO algorithm for the discrete-valued community detection problem. The proposed approach leverages the strengths of the MRFO algorithm for superior results through better exploration of the search space. The proposed approach maximises network modularity, a measure of connection density within a community. Higher modularity community structures find usefulness in uncovering meaningful information in the network. Experiments on real-world and synthetic benchmark networks show that the proposed approach successfully detects community structures with high modularity. We experimented on both real-world and synthetic benchmark networks. In two-thirds of the cases, the proposed algorithm achieved a higher modularity. For the remaining networks, the modularity achieved by the proposed approach was the same as that of the label.
    Keywords: evolutionary algorithms; network modularity; normalised mutual information; metaheuristic; swarm-based; partitioning.
    DOI: 10.1504/IJCSE.2024.10063171
     
  • Multi-label classification and fuzzy similarity-based expert identification techniques for software bug assignment   Order a copy of this article
    by Rama Ranjan Panda, Naresh Kumar Nagwani 
    Abstract: In software development, a bug can occur due to multiple failures in software, and it may require multiple developers to fix it. In machine learning approaches, the bugs are assigned to a developer with a clear-cut outcome based on the agreed level of opinion from the assigner. However, instances of software bugs are textual and fuzzy. In this paper, two fuzzy systems: the fuzzy bug assignment technique for software developers and unique term relationships (FDUR) and the fuzzy bug assignment technique for software developers and category relationships (FDCR) are developed to measure the degree of relationships between developers, bugs, and its categories. The computed degree of relationship is used for handling the bugs with multiple categories and a set of developers involved in the development of software. To measure and compare the performance of both techniques with other existing techniques, the experiments are carried out on the benchmark software repositories.
    Keywords: bug assignment; expert finding; decision making; fuzzy logic; mining bug repositories; machine learning; fuzzy similarity.
    DOI: 10.1504/IJCSE.2024.10063031