Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Machine Learning Based Funding Project Evaluation Decision Prediction

    Chuqing Zhang1, Jiangyuan Yao2,*, Guangwu Hu3, Xingcan Cao4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2111-2124, 2023, DOI:10.32604/csse.2023.030516

    Abstract Traditional linear statistical methods cannot provide effective prediction results due to the complexity of human mind. In this paper, we apply machine learning to the field of funding allocation decision making, and try to explore whether personal characteristics of evaluators help predict the outcome of the evaluation decision? and how to improve the accuracy rate of machine learning methods on the imbalanced dataset of grant funding? Since funding data is characterized by imbalanced data distribution, we propose a slacked weighted entropy decision tree (SWE-DT). We assign weight to each class with the help of slacked factor. The experimental results show… More >

  • Open Access

    ARTICLE

    Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique

    Abdulaziz Attaallah1, Raees Ahmad Khan2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5683-5705, 2022, DOI:10.32604/cmc.2022.021643

    Abstract The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to… More >

Displaying 1-10 on page 1 of 2. Per Page