Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,494)
  • Open Access

    CORRECTION

    Correction: Diabetic Retinopathy Diagnosis Using Interval Neutrosophic Segmentation with Deep Learning Model

    V. Thanikachalam1,*, M. G. Kavitha2, V. Sivamurugan1

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 857-858, 2024, DOI:10.32604/csse.2024.052484 - 20 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Fine-Tuned Extra Tree Classifier for Thermal Comfort Sensation Prediction

    Ahmad Almadhor1, Chitapong Wechtaisong2,*, Usman Tariq3, Natalia Kryvinska4,*, Abdullah Al Hejaili5, Uzma Ghulam Mohammad6, Mohana Alanazi7

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 855-856, 2024, DOI:10.32604/csse.2024.052412 - 20 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: An Effective Diagnosis System for Brain Tumor Detection and Classification

    Ahmed A. Alsheikhy1, Ahmad S. Azzahrani1, A. Khuzaim Alzahrani2, Tawfeeq Shawly3

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 853-853, 2024, DOI:10.32604/csse.2024.051630 - 20 May 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Gender Classification Accuracy across Varied Geographic Regions through the Application of Deep Learning Algorithms to Speech Signals

    Abhishek Singhal*, Devendra Kumar Sharma

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 609-625, 2024, DOI:10.32604/csse.2023.046730 - 20 May 2024

    Abstract This article presents an exhaustive comparative investigation into the accuracy of gender identification across diverse geographical regions, employing a deep learning classification algorithm for speech signal analysis. In this study, speech samples are categorized for both training and testing purposes based on their geographical origin. Category 1 comprises speech samples from speakers outside of India, whereas Category 2 comprises live-recorded speech samples from Indian speakers. Testing speech samples are likewise classified into four distinct sets, taking into consideration both geographical origin and the language spoken by the speakers. Significantly, the results indicate a noticeable difference… More >

  • Open Access

    ARTICLE

    Analyzing COVID-19 Discourse on Twitter: Text Clustering and Classification Models for Public Health Surveillance

    Pakorn Santakij1, Samai Srisuay2,*, Pongporn Punpeng1

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 665-689, 2024, DOI:10.32604/csse.2024.045066 - 20 May 2024

    Abstract Social media has revolutionized the dissemination of real-life information, serving as a robust platform for sharing life events. Twitter, characterized by its brevity and continuous flow of posts, has emerged as a crucial source for public health surveillance, offering valuable insights into public reactions during the COVID-19 pandemic. This study aims to leverage a range of machine learning techniques to extract pivotal themes and facilitate text classification on a dataset of COVID-19 outbreak-related tweets. Diverse topic modeling approaches have been employed to extract pertinent themes and subsequently form a dataset for training text classification models.… More >

  • Open Access

    ARTICLE

    Path-Based Clustering Algorithm with High Scalability Using the Combined Behavior of Evolutionary Algorithms

    Leila Safari-Monjeghtapeh1, Mansour Esmaeilpour2,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 705-721, 2024, DOI:10.32604/csse.2024.044892 - 20 May 2024

    Abstract Path-based clustering algorithms typically generate clusters by optimizing a benchmark function. Most optimization methods in clustering algorithms often offer solutions close to the general optimal value. This study achieves the global optimum value for the criterion function in a shorter time using the minimax distance, Maximum Spanning Tree “MST”, and meta-heuristic algorithms, including Genetic Algorithm “GA” and Particle Swarm Optimization “PSO”. The Fast Path-based Clustering “FPC” algorithm proposed in this paper can find cluster centers correctly in most datasets and quickly perform clustering operations. The FPC does this operation using MST, the minimax distance, and… More >

  • Open Access

    ARTICLE

    Multimodal Deep Neural Networks for Digitized Document Classification

    Aigerim Baimakhanova1,*, Ainur Zhumadillayeva2, Bigul Mukhametzhanova3, Natalya Glazyrina2, Rozamgul Niyazova2, Nurseit Zhunissov1, Aizhan Sambetbayeva4

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 793-811, 2024, DOI:10.32604/csse.2024.043273 - 20 May 2024

    Abstract As digital technologies have advanced more rapidly, the number of paper documents recently converted into a digital format has exponentially increased. To respond to the urgent need to categorize the growing number of digitized documents, the classification of digitized documents in real time has been identified as the primary goal of our study. A paper classification is the first stage in automating document control and efficient knowledge discovery with no or little human involvement. Artificial intelligence methods such as Deep Learning are now combined with segmentation to study and interpret those traits, which were not… More >

  • Open Access

    REVIEW

    A Systematic Literature Review on Task Allocation and Performance Management Techniques in Cloud Data Center

    Nidhika Chauhan1, Navneet Kaur2, Kamaljit Singh Saini2, Sahil Verma3, Abdulatif Alabdulatif4, Ruba Abu Khurma5,7, Maribel Garcia-Arenas6, Pedro A. Castillo6,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 571-608, 2024, DOI:10.32604/csse.2024.042690 - 20 May 2024

    Abstract As cloud computing usage grows, cloud data centers play an increasingly important role. To maximize resource utilization, ensure service quality, and enhance system performance, it is crucial to allocate tasks and manage performance effectively. The purpose of this study is to provide an extensive analysis of task allocation and performance management techniques employed in cloud data centers. The aim is to systematically categorize and organize previous research by identifying the cloud computing methodologies, categories, and gaps. A literature review was conducted, which included the analysis of 463 task allocations and 480 performance management papers. The… More >

  • Open Access

    ARTICLE

    Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security

    Chirag Ganguli1, Shishir Kumar Shandilya2, Michal Gregus3, Oleh Basystiuk4,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 739-758, 2024, DOI:10.32604/csse.2024.042607 - 20 May 2024

    Abstract Cyber Defense is becoming a major issue for every organization to keep business continuity intact. The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm (ABC) as an Nature Inspired Cyber Security mechanism to achieve adaptive defense. It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node. Businesses today have adapted their service distribution models to include the use of the Internet, allowing them to effectively manage and interact with their customer data. This shift has created an increased reliance on online services to store… More >

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Framework for Security Intrusion Detection

    Fatimah Mudhhi Alanazi*, Bothina Abdelmeneem Elsobky, Shaimaa Aly Elmorsy

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 835-851, 2024, DOI:10.32604/csse.2024.042401 - 20 May 2024

    Abstract Proliferation of technology, coupled with networking growth, has catapulted cybersecurity to the forefront of modern security concerns. In this landscape, the precise detection of cyberattacks and anomalies within networks is crucial, necessitating the development of efficient intrusion detection systems (IDS). This article introduces a framework utilizing the fusion of fuzzy sets with support vector machines (SVM), named FSVM. The core strategy of FSVM lies in calculating the significance of network features to determine their relative importance. Features with minimal significance are prudently disregarded, a method akin to feature selection. This process not only curtails the… More >

Displaying 71-80 on page 8 of 1494. Per Page