Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,249)
  • Open Access

    ARTICLE

    A Model for Cross-Domain Opinion Target Extraction in Sentiment Analysis

    Muhammet Yasin PAK*, Serkan GUNAL

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1215-1239, 2022, DOI:10.32604/csse.2022.023051

    Abstract Opinion target extraction is one of the core tasks in sentiment analysis on text data. In recent years, dependency parser–based approaches have been commonly studied for opinion target extraction. However, dependency parsers are limited by language and grammatical constraints. Therefore, in this work, a sequential pattern-based rule mining model, which does not have such constraints, is proposed for cross-domain opinion target extraction from product reviews in unknown domains. Thus, knowing the domain of reviews while extracting opinion targets becomes no longer a requirement. The proposed model also reveals the difference between the concepts of opinion target and aspect, which are… More >

  • Open Access

    ARTICLE

    Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing

    D. Jerusha*, T. Jaya

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1121-1132, 2022, DOI:10.32604/csse.2022.022997

    Abstract Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in… More >

  • Open Access

    ARTICLE

    Soft Computing Based Discriminator Model for Glaucoma Diagnosis

    Anisha Rebinth1,*, S. Mohan Kumar2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 867-880, 2022, DOI:10.32604/csse.2022.022955

    Abstract In this study, a Discriminator Model for Glaucoma Diagnosis (DMGD) using soft computing techniques is presented. As the biomedical images such as fundus images are often acquired in high resolution, the Region of Interest (ROI) for glaucoma diagnosis must be selected at first to reduce the complexity of any system. The DMGD system uses a series of pre-processing; initial cropping by the green channel’s intensity, Spatially Weighted Fuzzy C Means (SWFCM), blood vessel detection and removal by Gaussian Derivative Filters (GDF) and inpainting algorithms. Once the ROI has been selected, the numerical features such as colour, spatial domain features from… More >

  • Open Access

    ARTICLE

    Diagnosing Breast Cancer Accurately Based on Weighting of Heterogeneous Classification Sub-Models

    Majdy Mohamed Eltayeb Eltahir1,*, Tarig Mohammed Ahmed2,3

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1257-1272, 2022, DOI:10.32604/csse.2022.022942

    Abstract In developed and developing countries, breast cancer is one of the leading forms of cancer affecting women alike. As a consequence of growing life expectancy, increasing urbanization and embracing Western lifestyles, the high prevalence of this cancer is noted in the developed world. This paper aims to develop a novel model that diagnoses Breast Cancer by using heterogeneous datasets. The model can work as a strong decision support system to help doctors to make the right decision in diagnosing breast cancer patients. The proposed model is based on three datasets to develop three sub-models. Each sub-model works independently. The final… More >

  • Open Access

    ARTICLE

    An Intelligent Recommendation System for Real Estate Commodity

    Tsung-Yin Ou1, Guan-Yu Lin2, Hsin-Pin Fu1, Shih-Chia Wei1, Wen-Lung Tsai3,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 881-897, 2022, DOI:10.32604/csse.2022.022637

    Abstract Most real estate agents develop new objects by visiting unfamiliar clients, distributing leaflets, or browsing other real estate trading website platforms, whereas consumers often rely on websites to search and compare prices when purchasing real property. In addition to being time consuming, this search process renders it difficult for agents and consumers to understand the status changes of objects. In this study, Python is used to write web crawler and image recognition programs to capture object information from the web pages of real estate agents; perform data screening, arranging, and cleaning; compare the text of real estate object information; as… More >

  • Open Access

    ARTICLE

    Multi-Objective Modified Particle Swarm Optimization for Test Suite Reduction (MOMPSO)

    U. Geetha1,*, Sharmila Sankar2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 899-917, 2022, DOI:10.32604/csse.2022.022621

    Abstract Software testing plays a pivotal role in entire software development lifecycle. It provides researchers with extensive opportunities to develop novel methods for the optimized and cost-effective test suite Although implementation of such a cost-effective test suite with regression testing is being under exploration still it contains lot of challenges and flaws while incorporating with any of the new regression testing algorithm due to irrelevant test cases in the test suite which are not required. These kinds of irrelevant test cases might create certain challenges such as code-coverage in the test suite, fault-tolerance, defects due to uncovered-statements and overall-performance at the… More >

  • Open Access

    ARTICLE

    Binary Multifold Encryption Technique for Complex Cloud Systems

    N. Ansgar Mary1,*, T. Latha2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1199-1213, 2022, DOI:10.32604/csse.2022.022404

    Abstract Data security is a major cloud computing issue due to different user transactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated using a variety of molecular methods. Many security mechanisms including knowledge-based authentication, two-factor authentication, adaptive authentication, multifactor authentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most of them are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique… More >

  • Open Access

    ARTICLE

    Novel Design of UWB Jeans Based Textile Antenna for Body-Centric Communications

    Mohammad Monirujjaman Khan1,*, Bright Yeboah-Akowuah2, Kaisarul Islam1, Eric Tutu Tchao2, Sumanta Bhattacharyya3, Rajesh Dey4, Mehedi Masud5, Fahad Alraddady6

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1079-1093, 2022, DOI:10.32604/csse.2022.022313

    Abstract This research presents an ultra-wideband (UWB) textile antenna design for body-centric applications. The antenna is printed on a 1 mm thick denim substrate with a 1.7 relative permittivity. The jeans substrate is sandwiched between a partial ground plane and a radiating patch with a Q-shaped slot. The slotted radiating patch is placed above the substrate and measures 27.8 mm × 23.8 mm. In free space, the antenna covers the ultra-wideband spectrum designated by the Federal Communication Commission (FCC). Various parameters of the antenna design were changed for further performance evaluation. Depending on the operating frequency, the antenna's realized gain varied from 2.7 to 5 dB. The… More >

  • Open Access

    ARTICLE

    Virtual Nursing Using Deep Belief Networks for Elderly People (DBN-EP)

    S. Rajasekaran1,*, G. Kousalya2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 985-1000, 2022, DOI:10.32604/csse.2022.022234

    Abstract The demand for better health services has resulted in the advancement of remote monitoring health, i.e., virtual nursing systems, to watch and support the elderly with innovative concepts such as being patient-centric, easier to use, and having smarter interactions and more accurate conclusions. While virtual nursing services attempt to provide consumers and medical practitioners with continuous medical and health monitoring services, access to allied healthcare experts such as nurses remains a challenge. In this research, we present Virtual Nursing Using Deep Belief Networks for Elderly People (DBN-EP), a new framework that provides a virtual nurse agent deployed on a senior… More >

  • Open Access

    ARTICLE

    Situation Awareness Data Fusion Method Based on Library Events

    Haixu Xi1,2, Wei Gao2,*, Gyun Yeol Park3

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1047-1061, 2022, DOI:10.32604/csse.2022.022051

    Abstract Microelectronic technology and communication technology are developed in deep manner; the computing mode has been transferred from traditional computer-centered to human centered pervasive. So, the concept of Internet of things (IoT) is gradually put forward, which allows people to access information about their surroundings on demand through different terminals. The library is the major public space for human to read and learn. How to provide a more comfortable library environment to better meet people’s learning requirements is a place where the Internet of things plays its role. The purpose of this paper is to solve the difference between the data… More >

Displaying 9141-9150 on page 915 of 22249. Per Page