Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (179)
  • Open Access

    ARTICLE

    Big Data Bot with a Special Reference to Bioinformatics

    Ahmad M. Al-Omari1,*, Shefa M. Tawalbeh1, Yazan H. Akkam2, Mohammad Al-Tawalbeh3, Shima’a Younis1, Abdullah A. Mustafa4, Jonathan Arnold5

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4155-4173, 2023, DOI:10.32604/cmc.2023.036956

    Abstract There are quintillions of data on deoxyribonucleic acid (DNA) and protein in publicly accessible data banks, and that number is expanding at an exponential rate. Many scientific fields, such as bioinformatics and drug discovery, rely on such data; nevertheless, gathering and extracting data from these resources is a tough undertaking. This data should go through several processes, including mining, data processing, analysis, and classification. This study proposes software that extracts data from big data repositories automatically and with the particular ability to repeat data extraction phases as many times as needed without human intervention. This software simulates the extraction of… More >

  • Open Access

    ARTICLE

    Quantum Fuzzy Regression Model for Uncertain Environment

    Tiansu Chen1,2, Shi bin Zhang1,2, Qirun Wang3, Yan Chang1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2759-2773, 2023, DOI:10.32604/cmc.2023.033284

    Abstract In the era of big data, traditional regression models cannot deal with uncertain big data efficiently and accurately. In order to make up for this deficiency, this paper proposes a quantum fuzzy regression model, which uses fuzzy theory to describe the uncertainty in big data sets and uses quantum computing to exponentially improve the efficiency of data set preprocessing and parameter estimation. In this paper, data envelopment analysis (DEA) is used to calculate the degree of importance of each data point. Meanwhile, Harrow, Hassidim and Lloyd (HHL) algorithm and quantum swap circuits are used to improve the efficiency of high-dimensional… More >

  • Open Access

    ARTICLE

    Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model

    R. Sheeba1,*, R. Sharmila2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1415-1429, 2023, DOI:10.32604/csse.2023.034321

    Abstract Lately, the Internet of Things (IoT) application requires millions of structured and unstructured data since it has numerous problems, such as data organization, production, and capturing. To address these shortcomings, big data analytics is the most superior technology that has to be adapted. Even though big data and IoT could make human life more convenient, those benefits come at the expense of security. To manage these kinds of threats, the intrusion detection system has been extensively applied to identify malicious network traffic, particularly once the preventive technique fails at the level of endpoint IoT devices. As cyberattacks targeting IoT have… More >

  • Open Access

    ARTICLE

    Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics

    Manar Mohamed Hafez1,*, Essam Eldin F. Elfakharany1, Amr A. Abohany2, Mostafa Thabet3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 943-958, 2023, DOI:10.32604/cmc.2023.034078

    Abstract Big data is usually unstructured, and many applications require the analysis in real-time. Decision tree (DT) algorithm is widely used to analyze big data. Selecting the optimal depth of DT is time-consuming process as it requires many iterations. In this paper, we have designed a modified version of a (DT). The tree aims to achieve optimal depth by self-tuning running parameters and improving the accuracy. The efficiency of the modified (DT) was verified using two datasets (airport and fire datasets). The airport dataset has 500000 instances and the fire dataset has 600000 instances. A comparison has been made between the… More >

  • Open Access

    ARTICLE

    Enhanced Best Fit Algorithm for Merging Small Files

    Adnan Ali1, Nada Masood Mirza1,2, Mohamad Khairi Ishak1,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 913-928, 2023, DOI:10.32604/csse.2023.036400

    Abstract In the Big Data era, numerous sources and environments generate massive amounts of data. This enormous amount of data necessitates specialized advanced tools and procedures that effectively evaluate the information and anticipate decisions for future changes. Hadoop is used to process this kind of data. It is known to handle vast volumes of data more efficiently than tiny amounts, which results in inefficiency in the framework. This study proposes a novel solution to the problem by applying the Enhanced Best Fit Merging algorithm (EBFM) that merges files depending on predefined parameters (type and size). Implementing this algorithm will ensure that… More >

  • Open Access

    ARTICLE

    Short-Term Mosques Load Forecast Using Machine Learning and Meteorological Data

    Musaed Alrashidi*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 371-387, 2023, DOI:10.32604/csse.2023.034739

    Abstract The tendency toward achieving more sustainable and green buildings turned several passive buildings into more dynamic ones. Mosques are the type of buildings that have a unique energy usage pattern. Nevertheless, these types of buildings have minimal consideration in the ongoing energy efficiency applications. This is due to the unpredictability in the electrical consumption of the mosques affecting the stability of the distribution networks. Therefore, this study addresses this issue by developing a framework for a short-term electricity load forecast for a mosque load located in Riyadh, Saudi Arabia. In this study, and by harvesting the load consumption of the… More >

  • Open Access

    ARTICLE

    Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security

    S. Prince Chelladurai1,*, T. Rajagopalan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 951-960, 2023, DOI:10.32604/csse.2023.034262

    Abstract Cloud computing offers numerous web-based services. The adoption of many Cloud applications has been hindered by concerns about data security and privacy. Cloud service providers’ access to private information raises more security issues. In addition, Cloud computing is incompatible with several industries, including finance and government. Public-key cryptography is frequently cited as a significant advancement in cryptography. In contrast, the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data. This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography. Through strategic design, the hybrid Envelope model adequately… More >

  • Open Access

    ARTICLE

    Efficient Network Selection Using Multi-Depot Routing Problem for Smart Cities

    R. Shanthakumari1, Yun-Cheol Nam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1991-2005, 2023, DOI:10.32604/iasc.2023.033696

    Abstract Smart cities make use of a variety of smart technology to improve societies in better ways. Such intelligent technologies, on the other hand, pose significant concerns in terms of power usage and emission of carbons. The suggested study is focused on technological networks for big data-driven systems. With the support of software-defined technologies, a transportation-aided multicast routing system is suggested. By using public transportation as another communication platform in a smart city, network communication is enhanced. The primary objective is to use as little energy as possible while delivering as much data as possible. The Attribute Decision Making with Capacitated… More >

  • Open Access

    ARTICLE

    Energy Theft Detection in Smart Grids with Genetic Algorithm-Based Feature Selection

    Muhammad Umair1,*, Zafar Saeed1, Faisal Saeed2, Hiba Ishtiaq1, Muhammad Zubair1, Hala Abdel Hameed3,4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5431-5446, 2023, DOI:10.32604/cmc.2023.033884

    Abstract As big data, its technologies, and application continue to advance, the Smart Grid (SG) has become one of the most successful pervasive and fixed computing platforms that efficiently uses a data-driven approach and employs efficient information and communication technology (ICT) and cloud computing. As a result of the complicated architecture of cloud computing, the distinctive working of advanced metering infrastructures (AMI), and the use of sensitive data, it has become challenging to make the SG secure. Faults of the SG are categorized into two main categories, Technical Losses (TLs) and Non-Technical Losses (NTLs). Hardware failure, communication issues, ohmic losses, and… More >

  • Open Access

    ARTICLE

    Sentiment Drift Detection and Analysis in Real Time Twitter Data Streams

    E. Susi*, A. P. Shanthi

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3231-3246, 2023, DOI:10.32604/csse.2023.032104

    Abstract Handling sentiment drifts in real time twitter data streams are a challenging task while performing sentiment classifications, because of the changes that occur in the sentiments of twitter users, with respect to time. The growing volume of tweets with sentiment drifts has led to the need for devising an adaptive approach to detect and handle this drift in real time. This work proposes an adaptive learning algorithm-based framework, Twitter Sentiment Drift Analysis-Bidirectional Encoder Representations from Transformers (TSDA-BERT), which introduces a sentiment drift measure to detect drifts and a domain impact score to adaptively retrain the classification model with domain relevant… More >

Displaying 11-20 on page 2 of 179. Per Page