Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    ARTICLE

    A Novel Framework for Learning and Classifying the Imbalanced Multi-Label Data

    P. K. A. Chitra1, S. Appavu alias Balamurugan2, S. Geetha3, Seifedine Kadry4,5,6, Jungeun Kim7,*, Keejun Han8

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1367-1385, 2024, DOI:10.32604/csse.2023.034373 - 13 September 2024

    Abstract A generalization of supervised single-label learning based on the assumption that each sample in a dataset may belong to more than one class simultaneously is called multi-label learning. The main objective of this work is to create a novel framework for learning and classifying imbalanced multi-label data. This work proposes a framework of two phases. The imbalanced distribution of the multi-label dataset is addressed through the proposed Borderline MLSMOTE resampling method in phase 1. Later, an adaptive weighted l21 norm regularized (Elastic-net) multi-label logistic regression is used to predict unseen samples in phase 2. The proposed… More >

  • Open Access

    ARTICLE

    Fireworks Optimization with Deep Learning-Based Arabic Handwritten Characters Recognition Model

    Abdelwahed Motwakel1,*, Badriyya B. Al-onazi2, Jaber S. Alzahrani3, Ayman Yafoz4, Mahmoud Othman5, Abu Sarwar Zamani1, Ishfaq Yaseen1, Amgad Atta Abdelmageed1

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1387-1403, 2024, DOI:10.32604/csse.2023.033902 - 13 September 2024

    Abstract Handwritten character recognition becomes one of the challenging research matters. More studies were presented for recognizing letters of various languages. The availability of Arabic handwritten characters databases was confined. Almost a quarter of a billion people worldwide write and speak Arabic. More historical books and files indicate a vital data set for many Arab nations written in Arabic. Recently, Arabic handwritten character recognition (AHCR) has grabbed the attention and has become a difficult topic for pattern recognition and computer vision (CV). Therefore, this study develops fireworks optimization with the deep learning-based AHCR (FWODL-AHCR) technique. The… More >

  • Open Access

    CORRECTION

    Correction: Human Stress Recognition by Correlating Vision and EEG Data

    S. Praveenkumar*, T. Karthick

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1073-1073, 2024, DOI:10.32604/csse.2024.054414 - 17 July 2024

    Abstract This article has no abstract. More >

  • Open Access

    RETRACTION

    Retraction: Deep Belief Network for Lung Nodule Segmentation and Cancer Detection

    Computer Systems Science and Engineering Editorial Office

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1083-1083, 2024, DOI:10.32604/csse.2024.054265 - 17 July 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Applying Customized Convolutional Neural Network to Kidney Image Volumes for Kidney Disease Detection

    Ali Altalbe1,2,*, Abdul Rehman Javed3

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1075-1081, 2024, DOI:10.32604/csse.2024.054179 - 17 July 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Unleashing User Requirements from Social Media Networks by Harnessing the Deep Sentiment Analytics

    Deema Mohammed Alsekait1,*, Asif Nawaz2, Ayman Nabil3, Mehwish Bukhari2, Diaa Salama AbdElminaam3,4,5,6,*

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1031-1054, 2024, DOI:10.32604/csse.2024.051847 - 17 July 2024

    Abstract The article describes a novel method for sentiment analysis and requirement elicitation from social media feedback, leveraging advanced machine learning techniques. This innovative approach automates the extraction and classification of user requirements by analyzing sentiment in data gathered from social media platforms such as Twitter and Facebook. Utilizing APIs (Application Programming Interface) for data collection and Graph-based Neural Networks (GNN) for feature extraction, the proposed model efficiently processes and analyzes large volumes of unstructured user-generated content. The preprocessing pipeline includes data cleaning, normalization, and tokenization, ensuring high-quality input for the sentiment analysis model. By classifying… More >

  • Open Access

    ARTICLE

    A Multivariate Relevance Frequency Analysis Based Feature Selection for Classification of Short Text Data

    Saravanan Arumugam*

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 989-1008, 2024, DOI:10.32604/csse.2024.051770 - 17 July 2024

    Abstract Text mining presents unique challenges in extracting meaningful information from the vast volumes of digital documents. Traditional filter feature selection methods often fall short in handling the complexities of short text data. To address this issue, this paper presents a novel approach to feature selection in text classification, aiming to overcome challenges posed by high dimensionality and reduced accuracy in the face of increasing digital document volumes. Unlike traditional filter feature selection techniques, the proposed method, Multivariate Relevance Frequency Analysis, offers a tailored solution for diverse text data types. By integrating positive, negative, and dependency… More >

  • Open Access

    REVIEW

    Biometric Authentication System on Mobile Environment: A Review

    Qasem Abu Al-Haija1,*, Sara Othman Al-Salameen2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 897-914, 2024, DOI:10.32604/csse.2024.050846 - 17 July 2024

    Abstract The paper discusses the importance of biometric verification systems in mobile environments and highlights the challenges and strategies used to overcome them in order to ensure the security of mobile devices. Emphasis is placed on evaluating the impact of illumination on the performance of biometric verification techniques and how to address this challenge using image processing techniques. The importance of accurate and reliable data collection to ensure the accuracy of verification processes is also discussed. The paper also highlights the importance of improving biometric verification techniques and directing research toward developing models aimed at reducing More >

  • Open Access

    ARTICLE

    A Novel Optimization Approach for Energy-Efficient Multiple Workflow Scheduling in Cloud Environment

    Ambika Aggarwal1, Sunil Kumar2,3, Ashok Bhansali4, Deema Mohammed Alsekait5,*, Diaa Salama AbdElminaam6,7,8

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 953-967, 2024, DOI:10.32604/csse.2024.050406 - 17 July 2024

    Abstract Existing multiple workflow scheduling techniques focus on traditional Quality of Service (QoS) parameters such as cost, deadline, and makespan to find optimal solutions by consuming a large amount of electrical energy. Higher energy consumption decreases system efficiency, increases operational cost, and generates more carbon footprint. These major problems can lead to several problems, such as economic strain, environmental degradation, resource depletion, energy dependence, health impacts, etc. In a cloud computing environment, scheduling multiple workflows is critical in developing a strategy for energy optimization, which is an NP-hard problem. This paper proposes a novel, bi-phase Energy-Efficient… More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026 - 17 July 2024

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

Displaying 51-60 on page 6 of 1494. Per Page