Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Optimized Deep Learning Methods for Crop Yield Prediction

    K. Vignesh1,*, A. Askarunisa2, A. M. Abirami3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1051-1067, 2023, DOI:10.32604/csse.2023.024475

    Abstract Crop yield has been predicted using environmental, land, water, and crop characteristics in a prospective research design. When it comes to predicting crop production, there are a number of factors to consider, including weather conditions, soil qualities, water levels and the location of the farm. A broad variety of algorithms based on deep learning are used to extract useful crops for forecasting. The combination of data mining and deep learning creates a whole crop yield prediction system that is able to connect raw data to predicted crop yields. The suggested study uses a Discrete Deep belief network with Visual Geometry… More >

  • Open Access

    ARTICLE

    Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks

    Hani Al-Mimi1,*, Yousef Alrabanah2, Mosleh M. Abualhaj3, Sumaya N. Al-khatib3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1039-1049, 2023, DOI:10.32604/csse.2023.024338

    Abstract The demand for the telecommunication services, such as IP telephony, has increased dramatically during the COVID-19 pandemic lockdown. IP telephony should be enhanced to provide the expected quality. One of the issues that should be investigated in IP telephony is bandwidth utilization. IP telephony produces very small speech samples attached to a large packet header. The header of the IP telephony consumes a considerable share of the bandwidth allotted to the IP telephony. This wastes the network's bandwidth and influences the IP telephony quality. This paper proposes a mechanism (called Smallerize) that reduces the bandwidth consumed by both the speech… More >

  • Open Access

    ARTICLE

    Logistic Regression Trust–A Trust Model for Internet-of-Things Using Regression Analysis

    Feslin Anish Mon Solomon1,*, Godfrey Winster Sathianesan2, R. Ramesh3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1125-1142, 2023, DOI:10.32604/csse.2023.024292

    Abstract Internet of Things (IoT) is a popular social network in which devices are virtually connected for communicating and sharing information. This is applied greatly in business enterprises and government sectors for delivering the services to their customers, clients and citizens. But, the interaction is successful only based on the trust that each device has on another. Thus trust is very much essential for a social network. As Internet of Things have access over sensitive information, it urges to many threats that lead data management to risk. This issue is addressed by trust management that help to take decision about trustworthiness… More >

  • Open Access

    ARTICLE

    An Imbalanced Dataset and Class Overlapping Classification Model for Big Data

    Mini Prince1,*, P. M. Joe Prathap2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1009-1024, 2023, DOI:10.32604/csse.2023.024277

    Abstract Most modern technologies, such as social media, smart cities, and the internet of things (IoT), rely on big data. When big data is used in the real-world applications, two data challenges such as class overlap and class imbalance arises. When dealing with large datasets, most traditional classifiers are stuck in the local optimum problem. As a result, it’s necessary to look into new methods for dealing with large data collections. Several solutions have been proposed for overcoming this issue. The rapid growth of the available data threatens to limit the usefulness of many traditional methods. Methods such as oversampling and… More >

  • Open Access

    ARTICLE

    Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks

    N. Krishnammal1,*, C. Kalaiarasan2, A. Bharathi3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1531-1549, 2023, DOI:10.32604/csse.2023.024251

    Abstract Link asymmetry in wireless mesh access networks (WMAN) of Mobile ad-hoc Networks (MANETs) is due mesh routers’ transmission range. It is depicted as significant research challenges that pose during the design of network protocol in wireless networks. Based on the extensive review, it is noted that the substantial link percentage is symmetric, i.e., many links are unidirectional. It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message. Therefore, the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asymmetric links. It paves the way to exploit an investigation on asymmetric links… More >

  • Open Access

    ARTICLE

    Hybrid Recommender System Using Systolic Tree for Pattern Mining

    S. Rajalakshmi1,*, K. R. Santha2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1251-1262, 2023, DOI:10.32604/csse.2023.024036

    Abstract A recommender system is an approach performed by e-commerce for increasing smooth users’ experience. Sequential pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the order of transactions. This work will present the implementation of sequence pattern mining for recommender systems within the domain of e-commerce. This work will execute the Systolic tree algorithm for mining the frequent patterns to yield feasible rules for the recommender system. The feature selection's objective is to pick a feature subset having the least feature similarity as well as highest relevancy with the target class.… More >

  • Open Access

    ARTICLE

    Disaster Monitoring of Satellite Image Processing Using Progressive Image Classification

    Romany F. Mansour1,*, Eatedal Alabdulkreem2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1161-1169, 2023, DOI:10.32604/csse.2023.023307

    Abstract The analysis of remote sensing image areas is needed for climate detection and management, especially for monitoring flood disasters in critical environments and applications. Satellites are mostly used to detect disasters on Earth, and they have advantages in capturing Earth images. Using the control technique, Earth images can be used to obtain detailed terrain information. Since the acquisition of satellite and aerial imagery, this system has been able to detect floods, and with increasing convenience, flood detection has become more desirable in the last few years. In this paper, a Big Data Set-based Progressive Image Classification Algorithm (PICA) system is… More >

  • Open Access

    ARTICLE

    Music Genre Classification Using African Buffalo Optimization

    B. Jaishankar1,*, Raghunathan Anitha2, Finney Daniel Shadrach1, M. Sivarathinabala3, V. Balamurugan4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1823-1836, 2023, DOI:10.32604/csse.2023.022938

    Abstract In the discipline of Music Information Retrieval (MIR), categorizing music files according to their genre is a difficult process. Music genre classification is an important multimedia research domain for classification of music databases. In the proposed method music genre classification using features obtained from audio data is proposed. The classification is done using features extracted from the audio data of popular online repository namely GTZAN, ISMIR 2004 and Latin Music Dataset (LMD). The features highlight the differences between different musical styles. In the proposed method, feature selection is performed using an African Buffalo Optimization (ABO), and the resulting features are… More >

  • Open Access

    ARTICLE

    Cervical Cancer Detection Based on Novel Decision Tree Approach

    S. R. Sylaja Vallee Narayan1,*, R. Jemila Rose2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1025-1038, 2023, DOI:10.32604/csse.2023.022564

    Abstract Cervical cancer is a disease that develops in the cervix’s tissue. Cervical cancer mortality is being reduced due to the growth of screening programmers. Cervical cancer screening is a big issue because the majority of cervical cancer screening treatments are invasive. Hence, there is apprehension about standard screening procedures, as well as the time it takes to learn the results. There are different methods for detecting problems in the cervix using Pap (Papanicolaou-stained) test, colposcopy, Computed Tomography (CT), Magnetic Resonance Image (MRI) and ultrasound. To obtain a clear sketch of the infected regions, using a decision tree approach, the captured… More >

  • Open Access

    ARTICLE

    Designing Bayesian Two-Sided Group Chain Sampling Plan for Gamma Prior Distribution

    Waqar Hafeez1, Nazrina Aziz1,2,*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1069-1079, 2023, DOI:10.32604/csse.2023.022047

    Abstract Acceptance sampling is used to decide either the whole lot will be accepted or rejected, based on inspection of randomly sampled items from the same lot. As an alternative to traditional sampling plans, it is possible to use Bayesian approaches using previous knowledge on process variation. This study presents a Bayesian two-sided group chain sampling plan (BTSGChSP) by using various combinations of design parameters. In BTSGChSP, inspection is based on preceding as well as succeeding lots. Poisson function is used to derive the probability of lot acceptance based on defective and non-defective products. Gamma distribution is considered as a suitable… More >

Displaying 7621-7630 on page 763 of 22225. Per Page