Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (212)
  • Open Access

    ARTICLE

    AlertInsight: Mining Multiple Correlation For Alert Reduction

    Mingguang Yu1,2, Xia Zhang1,2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2447-2469, 2023, DOI:10.32604/csse.2023.037506

    Abstract Modern cloud services are monitored by numerous multidomain and multivendor monitoring tools, which generate massive numbers of alerts and events that are not actionable. These alerts usually carry isolated messages that are missing service contexts. Administrators become inundated with tickets caused by such alert events when they are routed directly to incident management systems. Noisy alerts increase the risk of crucial warnings going undetected and leading to service outages. One of the feasible ways to cope with the above problems involves revealing the correlations behind a large number of alerts and then aggregating the related alerts according to their correlations.… More >

  • Open Access

    ARTICLE

    A Novel Metadata Based Multi-Label Document Classification Technique

    Naseer Ahmed Sajid1, Munir Ahmad1, Atta-ur Rahman2,*, Gohar Zaman3, Mohammed Salih Ahmed4, Nehad Ibrahim2, Mohammed Imran B. Ahmed4, Gomathi Krishnasamy6, Reem Alzaher2, Mariam Alkharraa2, Dania AlKhulaifi2, Maryam AlQahtani2, Asiya A. Salam6, Linah Saraireh5, Mohammed Gollapalli6, Rashad Ahmed7

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2195-2214, 2023, DOI:10.32604/csse.2023.033844

    Abstract From the beginning, the process of research and its publication is an ever-growing phenomenon and with the emergence of web technologies, its growth rate is overwhelming. On a rough estimate, more than thirty thousand research journals have been issuing around four million papers annually on average. Search engines, indexing services, and digital libraries have been searching for such publications over the web. Nevertheless, getting the most relevant articles against the user requests is yet a fantasy. It is mainly because the articles are not appropriately indexed based on the hierarchies of granular subject classification. To overcome this issue, researchers are… More >

  • Open Access

    ARTICLE

    A Novel Meta-Heuristic Optimization Algorithm in White Blood Cells Classification

    Khaled A. Fathy, Humam K. Yaseen*, Mohammad T. Abou-Kreisha, Kamal A. ElDahshan

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1527-1545, 2023, DOI:10.32604/cmc.2023.036322

    Abstract Some human diseases are recognized through of each type of White Blood Cell (WBC) count, so detecting and classifying each type is important for human healthcare. The main aim of this paper is to propose a computer-aided WBCs utility analysis tool designed, developed, and evaluated to classify WBCs into five types namely neutrophils, eosinophils, lymphocytes, monocytes, and basophils. Using a computer-artificial model reduces resource and time consumption. Various pre-trained deep learning models have been used to extract features, including AlexNet, Visual Geometry Group (VGG), Residual Network (ResNet), which belong to different taxonomy types of deep learning architectures. Also, Binary Border… More >

  • Open Access

    ARTICLE

    Human Verification over Activity Analysis via Deep Data Mining

    Kumar Abhishek1,*, Sheikh Badar ud din Tahir2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1391-1409, 2023, DOI:10.32604/cmc.2023.035894

    Abstract Human verification and activity analysis (HVAA) are primarily employed to observe, track, and monitor human motion patterns using red-green-blue (RGB) images and videos. Interpreting human interaction using RGB images is one of the most complex machine learning tasks in recent times. Numerous models rely on various parameters, such as the detection rate, position, and direction of human body components in RGB images. This paper presents robust human activity analysis for event recognition via the extraction of contextual intelligence-based features. To use human interaction image sequences as input data, we first perform a few denoising steps. Then, human-to-human analyses are employed… More >

  • Open Access

    ARTICLE

    Optimal Machine Learning Driven Sentiment Analysis on COVID-19 Twitter Data

    Bahjat Fakieh1, Abdullah S. AL-Malaise AL-Ghamdi1,2,3, Farrukh Saleem1, Mahmoud Ragab2,4,5,6,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 81-97, 2023, DOI:10.32604/cmc.2023.033406

    Abstract The outbreak of the pandemic, caused by Coronavirus Disease 2019 (COVID-19), has affected the daily activities of people across the globe. During COVID-19 outbreak and the successive lockdowns, Twitter was heavily used and the number of tweets regarding COVID-19 increased tremendously. Several studies used Sentiment Analysis (SA) to analyze the emotions expressed through tweets upon COVID-19. Therefore, in current study, a new Artificial Bee Colony (ABC) with Machine Learning-driven SA (ABCML-SA) model is developed for conducting Sentiment Analysis of COVID-19 Twitter data. The prime focus of the presented ABCML-SA model is to recognize the sentiments expressed in tweets made upon… More >

  • Open Access

    ARTICLE

    Phishing Scam Detection on Ethereum via Mining Trading Information

    Yanyu Chen1, Zhangjie Fu1,2,*

    Journal of Cyber Security, Vol.4, No.3, pp. 189-200, 2022, DOI:10.32604/jcs.2022.038401

    Abstract As a typical representative of web 2.0, Ethereum has significantly boosted the development of blockchain finance. However, due to the anonymity and financial attributes of Ethereum, the number of phishing scams is increasing rapidly and causing massive losses, which poses a serious threat to blockchain financial security. Phishing scam address identification enables to detect phishing scam addresses and alerts users to reduce losses. However, there are three primary challenges in phishing scam address recognition task: 1) the lack of publicly available large datasets of phishing scam address transactions; 2) the use of multi-order transaction information requires a large number of… More >

  • Open Access

    ARTICLE

    Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework

    Mahdi Sahlabadi, Ravie Chandren Muniyandi, Zarina Shukur, Faizan Qamar*, Syed Hussain Ali Kazmi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5777-5797, 2023, DOI:10.32604/cmc.2023.032504

    Abstract This research recognizes the limitation and challenges of adapting and applying Process Mining as a powerful tool and technique in the Hypothetical Software Architecture (SA) Evaluation Framework with the features and factors of lightweightness. Process mining deals with the large-scale complexity of security and performance analysis, which are the goals of SA evaluation frameworks. As a result of these conjectures, all Process Mining researches in the realm of SA are thoroughly reviewed, and nine challenges for Process Mining Adaption are recognized. Process mining is embedded in the framework and to boost the quality of the SA model for further analysis,… More >

  • Open Access

    ARTICLE

    Fusing Spatio-Temporal Contexts into DeepFM for Taxi Pick-Up Area Recommendation

    Yizhi Liu1,3, Rutian Qing1,3, Yijiang Zhao1,3,*, Xuesong Wang1,3, Zhuhua Liao1,3, Qinghua Li1,2, Buqing Cao1,3

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2505-2519, 2023, DOI:10.32604/csse.2023.021615

    Abstract Short-term GPS data based taxi pick-up area recommendation can improve the efficiency and reduce the overheads. But how to alleviate sparsity and further enhance accuracy is still challenging. Addressing at these issues, we propose to fuse spatio-temporal contexts into deep factorization machine (STC_DeepFM) offline for pick-up area recommendation, and within the area to recommend pick-up points online using factorization machine (FM). Firstly, we divide the urban area into several grids with equal size. Spatio-temporal contexts are destilled from pick-up points or points-of-interest (POIs) belonged to the preceding grids. Secondly, the contexts are integrated into deep factorization machine (DeepFM) to mine… More >

  • Open Access

    ARTICLE

    The Early Emotional Responses and Central Issues of People in the Epicenter of the COVID-19 Pandemic: An Analysis from Twitter Text Mining

    Eun-Joo Choi1, Yun-Jung Choi2,*

    International Journal of Mental Health Promotion, Vol.25, No.1, pp. 21-29, 2023, DOI:10.32604/ijmhp.2022.022641

    Abstract This study aimed to explore citizens’ emotional responses and issues of interest in the context of the coronavirus disease 2019 (COVID-19) pandemic. The dataset comprised 65,313 tweets with the location marked as New York State. The data collection period was four days of tweets when New York City imposed a lockdown order due to an increase in confirmed cases. Data analysis was performed using R Studio. The emotional responses in tweets were analyzed using the Bing and NRC (National Research Council Canada) dictionaries. The tweets’ central issue was identified by Text Network Analysis. When tweets were classified as either positive… More > Graphic Abstract

    The Early Emotional Responses and Central Issues of People in the Epicenter of the COVID-19 Pandemic: An Analysis from Twitter Text Mining

  • Open Access

    ARTICLE

    Heterogeneous Ensemble Feature Selection Model (HEFSM) for Big Data Analytics

    M. Priyadharsini1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2187-2205, 2023, DOI:10.32604/csse.2023.031115

    Abstract Big Data applications face different types of complexities in classifications. Cleaning and purifying data by eliminating irrelevant or redundant data for big data applications becomes a complex operation while attempting to maintain discriminative features in processed data. The existing scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. Recently ensemble methods have made a mark in classification tasks as combine multiple results into a single representation. When comparing to a single model, this technique offers for improved prediction. Ensemble based feature selections parallel multiple expert’s judgments on a… More >

Displaying 31-40 on page 4 of 212. Per Page