Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,485)
  • Open Access

    ARTICLE

    Non-Deterministic Outlier Detection Method Based on the Variable Precision Rough Set Model

    Alberto Fernández Oliva1, Francisco Maciá Pérez2, José Vicente Berná-Martinez2,*, Miguel Abreu Ortega3

    Computer Systems Science and Engineering, Vol.34, No.3, pp. 131-144, 2019, DOI:10.32604/csse.2019.34.131

    Abstract This study presents a method for the detection of outliers based on the Variable Precision Rough Set Model (VPRSM). The basis of this model is the generalisation of the standard concept of a set inclusion relation on which the Rough Set Basic Model (RSBM) is based. The primary contribution of this study is the improvement in detection quality, which is achieved due to the generalisation allowed by the classification system that allows a certain degree of uncertainty. From this method, a computationally efficient algorithm is proposed. The experiments performed with a real scenario and a More >

  • Open Access

    ARTICLE

    A Novel Fuzzy Rough Sets Theory Based CF Recommendation System

    C. Raja Kumar1, VE. Jayanthi2

    Computer Systems Science and Engineering, Vol.34, No.3, pp. 123-129, 2019, DOI:10.32604/csse.2019.34.123

    Abstract Collaborative Filtering (CF) is one of the popular methodology in recommender systems. It suffers from the data sparsity problem, recommendation inaccuracy and big-error in predictions. In this paper, the efficient advisory tool is implemented for the younger generation to choose their right career based on their knowledge. It acquires the notions of indiscernible relation from Fuzzy Rough Sets Theory (FRST) and propose a novel algorithm named as Fuzzy Rough Set Theory Based Collaborative Filtering Algorithm (FRSTBCF). To evaluate the model, data is prepared using the cross validation method. Based on that, ratings are evaluated by… More >

  • Open Access

    ARTICLE

    A Two-Level Morphological Description of Bashkir Turkish

    Can Eyupoglu

    Computer Systems Science and Engineering, Vol.34, No.3, pp. 113-121, 2019, DOI:10.32604/csse.2019.34.113

    Abstract In recent years, the topic of Natural Language Processing (NLP) has attracted increasing interest. Many NLP applications including machine translation, machine learning, speech recognition, sentiment analysis, semantic search and natural language generation have been developed for most of the existing languages. Besides, two-level morphological description of the language to be used is required for these applications. However, there is no comprehensive study of Bashkir Turkish in the literature. In this paper, a two-level description of Bashkir Turkish morphology is described. The description based on a root word lexicon of Bashkir Turkish is implemented using Extensible More >

  • Open Access

    ARTICLE

    The Implementation of Optimization Methods for Contrast Enhancement

    Ahmet Elbir1,∗, Hamza Osman Ilhan1, Nizamettin Aydin1

    Computer Systems Science and Engineering, Vol.34, No.2, pp. 101-107, 2019, DOI:10.32604/csse.2019.34.101

    Abstract The performances of the multivariate techniques are directly related to the variable selection process, which is time consuming and requires resources for testing each possible parameter to achieve the best results. Therefore, optimization methods for variable selection process have been proposed in the literature to find the optimal solution in short time by using less system resources. Contrast enhancement is the one of the most important and the parameter dependent image enhancement technique. In this study, two optimization methods are employed for the variable selection for the contrast enhancement technique. Particle swarm optimization (PSO) and More >

  • Open Access

    ARTICLE

    A New Enhanced Learning Approach to Automatic Image Classification Based on Salp Swarm Algorithm

    Mohammad Behrouzian Nejad1, Mohammad Ebrahim Shiri1,2,*

    Computer Systems Science and Engineering, Vol.34, No.2, pp. 91-100, 2019, DOI:10.32604/csse.2019.34.091

    Abstract In this paper we propose a new image classification technique. According to this note that most research focuses on extraction of features in the frequency domain, location, and reduction of feature dimensions, in this research we focused on learning step in image classification. The main aim is to use the heuristic methods to increase the function of the estimator of the learning algorithm and continue to achieve the desired state, as well as categorization without user interference and automatically performed by the model produced from the above steps. So, in this paper, a new learning… More >

  • Open Access

    ARTICLE

    A Load Balanced Task Scheduling Heuristic for Large-Scale Computing Systems

    Sardar Khaliq uz Zaman1, Tahir Maqsood1, Mazhar Ali1, Kashif Bilal1, Sajjad A. Madani1, Atta ur Rehman Khan2,*

    Computer Systems Science and Engineering, Vol.34, No.2, pp. 79-90, 2019, DOI:10.32604/csse.2019.34.079

    Abstract Optimal task allocation in Large-Scale Computing Systems (LSCSs) that endeavors to balance the load across limited computing resources is considered an NP-hard problem. MinMin algorithm is one of the most widely used heuristic for scheduling tasks on limited computing resources. The MinMin minimizes makespan compared to other algorithms, such as Heterogeneous Earliest Finish Time (HEFT), duplication based algorithms, and clustering algorithms. However, MinMin results in unbalanced utilization of resources especially when majority of tasks have lower computational requirements. In this work we consider a computational model where each machine has certain bounded capacity to execute… More >

  • Open Access

    ARTICLE

    Incorporating Stress Status in Suicide Detection through Microblog

    Yuanyuan Xue1,2, Qi Li1, TongWu1, LingFeng1, Liang Zhao3, FengYu3

    Computer Systems Science and Engineering, Vol.34, No.2, pp. 65-78, 2019, DOI:10.32604/csse.2019.34.065

    Abstract Suicide has been a perplexing social problem around the world for a long time. Timely sensing hidden suicide risk and offering effective intervention are highly desirable and valuable for individuals and their families. Psychological studies prove that stress status, suicide-related expressions, and social engagement are reliable predictors of suicide risk. However, existing clinical diagnosis can only provide effective treatments to a restricted number of people because of its limited capacity. With the popular usage of social media like microblogs, a new channel to touch the inner world of many potential suicides arises. In this paper,… More >

  • Open Access

    ARTICLE

    Core – An Optimal Data Placement Strategy in Hadoop for Data Intentitive Applications Based on Cohesion Relation

    Vengadeswaran, Balasundaram

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 47-60, 2019, DOI:10.32604/csse.2019.34.047

    Abstract The tremendous growth of data being generated today is making storage and computing a mammoth task. With its distributed processing capability Hadoop gives an efficient solution for such large data. Hadoop’s default data placement strategy places the data blocks randomly across the nodes without considering the execution parameters resulting in several lacunas such as increased execution time, query latency etc., Also, most of the data required for a task execution may not be locally available which creates data-locality problem. Hence we propose an innovative data placement strategy based on dependency of data blocks across the More >

  • Open Access

    ARTICLE

    Modeling and Analysis of Leftover Issues and Release Time Planning in Multi-Release Open Source Software Using Entropy Based Measure

    Meera Sharma1, H. Pham2, V.B. Singh3

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 33-46, 2019, DOI:10.32604/csse.2019.34.033

    Abstract In Open Source Software (OSS), users report different issues on issues tracking systems. Due to time constraint, it is not possible for developers to resolve all the issues in the current release. The leftover issues which are not addressed in the current release are added in the next release issue content. Fixing of issues result in code changes that can be quantified with a measure known as complexity of code changes or entropy. We have developed a 2-dimensional entropy based mathematical model to determine the leftover issues of different releases of five Apache open source More >

  • Open Access

    ARTICLE

    A Novel Approach to Steganography: Enhanced Least Significant Bit Substitution Algorithm Integrated with Self-Determining Encryption Feature

    Resul Das1,∗, Muhammet Baykara1, Gurkan Tuna2

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 23-32, 2019, DOI:10.32604/csse.2019.34.023

    Abstract One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to notice… More >

Displaying 1431-1440 on page 144 of 1485. Per Page