Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (181)
  • Open Access


    An Auxiliary Monitoring Method for Well Killing Based on Statistical Data

    Shuang Liang1,*, Fangyu Luo2, Huihui Yu3, Jian Gao1, Xiaolin Shu1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2109-2118, 2023, DOI:10.32604/fdmp.2023.025342

    Abstract In the present study, a large set of data related to well killing is considered. Through a complete exploration of the whole process leading to well-killing, various factors affecting such a process are screened and sorted, and a correlation model is built accordingly in order to introduce an auxiliary method for well-killing monitoring based on statistical information. The available data show obvious differences due to the diverse control parameters related to different well-killing methods. Nevertheless, it is shown that a precise three-fold relationship exists between the reservoir parameters, the elapsed time and the effectiveness of More >

  • Open Access


    Spotted Hyena Optimizer Driven Deep Learning-Based Drug-Drug Interaction Prediction in Big Data Environment

    Mohammed Jasim Mohammed Jasim1, Shakir Fattah Kak2, Zainab Salih Ageed3, Subhi R. M. Zeebaree4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3831-3845, 2023, DOI:10.32604/csse.2023.037580

    Abstract Nowadays, smart healthcare and biomedical research have marked a substantial growth rate in terms of their presence in the literature, computational approaches, and discoveries, owing to which a massive quantity of experimental datasets was published and generated (Big Data) for describing and validating such novelties. Drug-drug interaction (DDI) significantly contributed to drug administration and development. It continues as the main obstacle in offering inexpensive and safe healthcare. It normally happens for patients with extensive medication, leading them to take many drugs simultaneously. DDI may cause side effects, either mild or severe health problems. This reduced… More >

  • Open Access


    Big Data Bot with a Special Reference to Bioinformatics

    Ahmad M. Al-Omari1,*, Shefa M. Tawalbeh1, Yazan H. Akkam2, Mohammad Al-Tawalbeh3, Shima’a Younis1, Abdullah A. Mustafa4, Jonathan Arnold5

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4155-4173, 2023, DOI:10.32604/cmc.2023.036956

    Abstract There are quintillions of data on deoxyribonucleic acid (DNA) and protein in publicly accessible data banks, and that number is expanding at an exponential rate. Many scientific fields, such as bioinformatics and drug discovery, rely on such data; nevertheless, gathering and extracting data from these resources is a tough undertaking. This data should go through several processes, including mining, data processing, analysis, and classification. This study proposes software that extracts data from big data repositories automatically and with the particular ability to repeat data extraction phases as many times as needed without human intervention. This… More >

  • Open Access


    Quantum Fuzzy Regression Model for Uncertain Environment

    Tiansu Chen1,2, Shi bin Zhang1,2, Qirun Wang3, Yan Chang1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2759-2773, 2023, DOI:10.32604/cmc.2023.033284

    Abstract In the era of big data, traditional regression models cannot deal with uncertain big data efficiently and accurately. In order to make up for this deficiency, this paper proposes a quantum fuzzy regression model, which uses fuzzy theory to describe the uncertainty in big data sets and uses quantum computing to exponentially improve the efficiency of data set preprocessing and parameter estimation. In this paper, data envelopment analysis (DEA) is used to calculate the degree of importance of each data point. Meanwhile, Harrow, Hassidim and Lloyd (HHL) algorithm and quantum swap circuits are used to… More >

  • Open Access


    Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model

    R. Sheeba1,*, R. Sharmila2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1415-1429, 2023, DOI:10.32604/csse.2023.034321

    Abstract Lately, the Internet of Things (IoT) application requires millions of structured and unstructured data since it has numerous problems, such as data organization, production, and capturing. To address these shortcomings, big data analytics is the most superior technology that has to be adapted. Even though big data and IoT could make human life more convenient, those benefits come at the expense of security. To manage these kinds of threats, the intrusion detection system has been extensively applied to identify malicious network traffic, particularly once the preventive technique fails at the level of endpoint IoT devices.… More >

  • Open Access


    Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics

    Manar Mohamed Hafez1,*, Essam Eldin F. Elfakharany1, Amr A. Abohany2, Mostafa Thabet3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 943-958, 2023, DOI:10.32604/cmc.2023.034078

    Abstract Big data is usually unstructured, and many applications require the analysis in real-time. Decision tree (DT) algorithm is widely used to analyze big data. Selecting the optimal depth of DT is time-consuming process as it requires many iterations. In this paper, we have designed a modified version of a (DT). The tree aims to achieve optimal depth by self-tuning running parameters and improving the accuracy. The efficiency of the modified (DT) was verified using two datasets (airport and fire datasets). The airport dataset has 500000 instances and the fire dataset has 600000 instances. A comparison More >

  • Open Access


    Enhanced Best Fit Algorithm for Merging Small Files

    Adnan Ali1, Nada Masood Mirza1,2, Mohamad Khairi Ishak1,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 913-928, 2023, DOI:10.32604/csse.2023.036400

    Abstract In the Big Data era, numerous sources and environments generate massive amounts of data. This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes. Hadoop is used to process this kind of data. It is known to handle vast volumes of data more efficiently than tiny amounts, which results in inefficiency in the framework. This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm (EBFM) that merges files depending on predefined parameters (type and size). Implementing… More >

  • Open Access


    Short-Term Mosques Load Forecast Using Machine Learning and Meteorological Data

    Musaed Alrashidi*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 371-387, 2023, DOI:10.32604/csse.2023.034739

    Abstract The tendency toward achieving more sustainable and green buildings turned several passive buildings into more dynamic ones. Mosques are the type of buildings that have a unique energy usage pattern. Nevertheless, these types of buildings have minimal consideration in the ongoing energy efficiency applications. This is due to the unpredictability in the electrical consumption of the mosques affecting the stability of the distribution networks. Therefore, this study addresses this issue by developing a framework for a short-term electricity load forecast for a mosque load located in Riyadh, Saudi Arabia. In this study, and by harvesting… More >

  • Open Access


    Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security

    S. Prince Chelladurai1,*, T. Rajagopalan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 951-960, 2023, DOI:10.32604/csse.2023.034262

    Abstract Cloud computing offers numerous web-based services. The adoption of many Cloud applications has been hindered by concerns about data security and privacy. Cloud service providers’ access to private information raises more security issues. In addition, Cloud computing is incompatible with several industries, including finance and government. Public-key cryptography is frequently cited as a significant advancement in cryptography. In contrast, the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data. This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography. Through strategic design, More >

  • Open Access


    Efficient Network Selection Using Multi-Depot Routing Problem for Smart Cities

    R. Shanthakumari1, Yun-Cheol Nam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1991-2005, 2023, DOI:10.32604/iasc.2023.033696

    Abstract Smart cities make use of a variety of smart technology to improve societies in better ways. Such intelligent technologies, on the other hand, pose significant concerns in terms of power usage and emission of carbons. The suggested study is focused on technological networks for big data-driven systems. With the support of software-defined technologies, a transportation-aided multicast routing system is suggested. By using public transportation as another communication platform in a smart city, network communication is enhanced. The primary objective is to use as little energy as possible while delivering as much data as possible. The… More >

Displaying 11-20 on page 2 of 181. Per Page