Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,407)
  • Open Access

    ARTICLE

    Framework for Effective Utilization of Distributed Scrum in Software Projects

    Basit Shahzad1, Wardah Naeem Awan1,*, Fazal-e-Amin2, Ahsanullah Abro3, Muhammad Shoaib4, Sultan Alyahya4

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 407-422, 2023, DOI:10.32604/csse.2023.022601

    Abstract There is an emerging interest in using agile methodologies in Global Software Development (GSD) to get the mutual benefits of both methods. Scrum is currently admired by many development teams as an agile most known methodology and considered adequate for collocated teams. At the same time, stakeholders in GSD are dispersed by geographical, temporal, and socio-cultural distances. Due to the controversial nature of Scrum and GSD, many significant challenges arise that might restrict the use of Scrum in GSD. We conducted a Systematic Literature Review (SLR) by following Kitchenham guidelines to identify the challenges that limit the use of Scrum… More >

  • Open Access

    ARTICLE

    Skin Lesion Classification System Using Shearlets

    S. Mohan Kumar*, T. Kumanan

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 833-844, 2023, DOI:10.32604/csse.2023.022385

    Abstract The main cause of skin cancer is the ultraviolet radiation of the sun. It spreads quickly to other body parts. Thus, early diagnosis is required to decrease the mortality rate due to skin cancer. In this study, an automatic system for Skin Lesion Classification (SLC) using Non-Subsampled Shearlet Transform (NSST) based energy features and Support Vector Machine (SVM) classifier is proposed. At first, the NSST is used for the decomposition of input skin lesion images with different directions like 2, 4, 8 and 16. From the NSST’s sub-bands, energy features are extracted and stored in the feature database for training.… More >

  • Open Access

    ARTICLE

    Machine Learning and Artificial Neural Network for Predicting Heart Failure Risk

    Polin Rahman1, Ahmed Rifat1, MD. IftehadAmjad Chy1, Mohammad Monirujjaman Khan1,*, Mehedi Masud2, Sultan Aljahdali2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.021469

    Abstract Heart failure is now widely spread throughout the world. Heart disease affects approximately 48% of the population. It is too expensive and also difficult to cure the disease. This research paper represents machine learning models to predict heart failure. The fundamental concept is to compare the correctness of various Machine Learning (ML) algorithms and boost algorithms to improve models’ accuracy for prediction. Some supervised algorithms like K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Decision Trees (DT), Random Forest (RF), Logistic Regression (LR) are considered to achieve the best results. Some boosting algorithms like Extreme Gradient Boosting (XGBoost) and CatBoost are… More >

  • Open Access

    ARTICLE

    Lexicalized Dependency Paths Based Supervised Learning for Relation Extraction

    Huiyu Sun*, Ralph Grishman

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 861-870, 2022, DOI:10.32604/csse.2022.030759

    Abstract Log-linear models and more recently neural network models used for supervised relation extraction requires substantial amounts of training data and time, limiting the portability to new relations and domains. To this end, we propose a training representation based on the dependency paths between entities in a dependency tree which we call lexicalized dependency paths (LDPs). We show that this representation is fast, efficient and transparent. We further propose representations utilizing entity types and its subtypes to refine our model and alleviate the data sparsity problem. We apply lexicalized dependency paths to supervised learning using the ACE corpus and show that… More >

  • Open Access

    ARTICLE

    An Improved Genetic Algorithm for Berth Scheduling at Bulk Terminal

    Xiaona Hu1,2, Shan Ji3, Hao Hua4, Baiqing Zhou1,*, Gang Hu5

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1285-1296, 2022, DOI:10.32604/csse.2022.029230

    Abstract Berth and loading and unloading machinery are not only the main factors that affecting the terminal operation, but also the main starting point of energy saving and emission reduction. In this paper, a genetic Algorithm Framework is designed for the berth allocation with low carbon and high efficiency at bulk terminal. In solving the problem, the scheduler’s experience is transformed into a regular way to obtain the initial solution. The individual is represented as a chromosome, and the sub-chromosomes are encoded as integers, the roulette wheel method is used for selection, the two-point crossing method is used for cross, and… More >

  • Open Access

    ARTICLE

    Cold-Start Link Prediction via Weighted Symmetric Nonnegative Matrix Factorization with Graph Regularization

    Minghu Tang1,2,3,*, Wei Yu4, Xiaoming Li4, Xue Chen5, Wenjun Wang3, Zhen Liu6

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1069-1084, 2022, DOI:10.32604/csse.2022.028841

    Abstract Link prediction has attracted wide attention among interdisciplinary researchers as an important issue in complex network. It aims to predict the missing links in current networks and new links that will appear in future networks. Despite the presence of missing links in the target network of link prediction studies, the network it processes remains macroscopically as a large connected graph. However, the complexity of the real world makes the complex networks abstracted from real systems often contain many isolated nodes. This phenomenon leads to existing link prediction methods not to efficiently implement the prediction of missing edges on isolated nodes.… More >

  • Open Access

    ARTICLE

    Real-time Safety Helmet-wearing Detection Based on Improved YOLOv5

    Yanman Li1, Jun Zhang1, Yang Hu1, Yingnan Zhao2,*, Yi Cao3

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1219-1230, 2022, DOI:10.32604/csse.2022.028224

    Abstract Safety helmet-wearing detection is an essential part of the intelligent monitoring system. To improve the speed and accuracy of detection, especially small targets and occluded objects, it presents a novel and efficient detector model. The underlying core algorithm of this model adopts the YOLOv5 (You Only Look Once version 5) network with the best comprehensive detection performance. It is improved by adding an attention mechanism, a CIoU (Complete Intersection Over Union) Loss function, and the Mish activation function. First, it applies the attention mechanism in the feature extraction. The network can learn the weight of each channel independently and enhance… More >

  • Open Access

    ARTICLE

    Image Inpainting Detection Based on High-Pass Filter Attention Network

    Can Xiao1,2, Feng Li1,2,*, Dengyong Zhang1,2, Pu Huang1,2, Xiangling Ding3, Victor S. Sheng4

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1145-1154, 2022, DOI:10.32604/csse.2022.027249

    Abstract Image inpainting based on deep learning has been greatly improved. The original purpose of image inpainting was to repair some broken photos, such as inpainting artifacts. However, it may also be used for malicious operations, such as destroying evidence. Therefore, detection and localization of image inpainting operations are essential. Recent research shows that high-pass filtering full convolutional network (HPFCN) is applied to image inpainting detection and achieves good results. However, those methods did not consider the spatial location and channel information of the feature map. To solve these shortcomings, we introduce the squeezed excitation blocks (SE) and propose a high-pass… More >

  • Open Access

    ARTICLE

    Improved Density Peaking Algorithm for Community Detection Based on Graph Representation Learning

    Jiaming Wang2, Xiaolan Xie1,2,*, Xiaochun Cheng3, Yuhan Wang2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 997-1008, 2022, DOI:10.32604/csse.2022.027005

    Abstract

    There is a large amount of information in the network data that we can exploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of network data is usually paired with clustering algorithms to solve the community detection problem. Meanwhile, there is always an unpredictable distribution of class clusters output by graph representation learning. Therefore, we propose an improved density peak clustering algorithm (ILDPC) for the community detection problem, which improves the local density mechanism in the original algorithm and can better accommodate class clusters of different shapes. And we study the… More >

  • Open Access

    ARTICLE

    Contextual Text Mining Framework for Unstructured Textual Judicial Corpora through Ontologies

    Zubair Nabi1, Ramzan Talib1,*, Muhammad Kashif Hanif1, Muhammad Awais2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1357-1374, 2022, DOI:10.32604/csse.2022.025712

    Abstract Digitalization has changed the way of information processing, and new techniques of legal data processing are evolving. Text mining helps to analyze and search different court cases available in the form of digital text documents to extract case reasoning and related data. This sort of case processing helps professionals and researchers to refer the previous case with more accuracy in reduced time. The rapid development of judicial ontologies seems to deliver interesting problem solving to legal knowledge formalization. Mining context information through ontologies from corpora is a challenging and interesting field. This research paper presents a three tier contextual text… More >

Displaying 811-820 on page 82 of 1407. Per Page