Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,151)
  • Open Access

    ARTICLE

    Machine Learning-Driven Classification for Enhanced Rule Proposal Framework

    B. Gomathi1,*, R. Manimegalai1, Srivatsan Santhanam2, Atreya Biswas3

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1749-1765, 2024, DOI:10.32604/csse.2024.056659 - 22 November 2024

    Abstract In enterprise operations, maintaining manual rules for enterprise processes can be expensive, time-consuming, and dependent on specialized domain knowledge in that enterprise domain. Recently, rule-generation has been automated in enterprises, particularly through Machine Learning, to streamline routine tasks. Typically, these machine models are black boxes where the reasons for the decisions are not always transparent, and the end users need to verify the model proposals as a part of the user acceptance testing to trust it. In such scenarios, rules excel over Machine Learning models as the end-users can verify the rules and have more… More >

  • Open Access

    ARTICLE

    Performance Analysis of Machine Learning-Based Intrusion Detection with Hybrid Feature Selection

    Mohammad Al-Omari1, Qasem Abu Al-Haija2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1537-1555, 2024, DOI:10.32604/csse.2024.056257 - 22 November 2024

    Abstract More businesses are deploying powerful Intrusion Detection Systems (IDS) to secure their data and physical assets. Improved cyber-attack detection and prevention in these systems requires machine learning (ML) approaches. This paper examines a cyber-attack prediction system combining feature selection (FS) and ML. Our technique’s foundation was based on Correlation Analysis (CA), Mutual Information (MI), and recursive feature reduction with cross-validation. To optimize the IDS performance, the security features must be carefully selected from multiple-dimensional datasets, and our hybrid FS technique must be extended to validate our methodology using the improved UNSW-NB 15 and TON_IoT datasets. More >

  • Open Access

    ARTICLE

    An Expert System to Detect Political Arabic Articles Orientation Using CatBoost Classifier Boosted by Multi-Level Features

    Saad M. Darwish1,*, Abdul Rahman M. Sabri2, Dhafar Hamed Abd2, Adel A. Elzoghabi1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1595-1624, 2024, DOI:10.32604/csse.2024.054615 - 22 November 2024

    Abstract The number of blogs and other forms of opinionated online content has increased dramatically in recent years. Many fields, including academia and national security, place an emphasis on automated political article orientation detection. Political articles (especially in the Arab world) are different from other articles due to their subjectivity, in which the author’s beliefs and political affiliation might have a significant influence on a political article. With categories representing the main political ideologies, this problem may be thought of as a subset of the text categorization (classification). In general, the performance of machine learning models… More >

  • Open Access

    REVIEW

    A Survey of Lung Nodules Detection and Classification from CT Scan Images

    Salman Ahmed1, Fazli Subhan2,3, Mazliham Mohd Su’ud3,*, Muhammad Mansoor Alam3,4, Adil Waheed5

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1483-1511, 2024, DOI:10.32604/csse.2024.053997 - 22 November 2024

    Abstract In the contemporary era, the death rate is increasing due to lung cancer. However, technology is continuously enhancing the quality of well-being. To improve the survival rate, radiologists rely on Computed Tomography (CT) scans for early detection and diagnosis of lung nodules. This paper presented a detailed, systematic review of several identification and categorization techniques for lung nodules. The analysis of the report explored the challenges, advancements, and future opinions in computer-aided diagnosis CAD systems for detecting and classifying lung nodules employing the deep learning (DL) algorithm. The findings also highlighted the usefulness of DL… More >

  • Open Access

    REVIEW

    A Systematic Review of Automated Classification for Simple and Complex Query SQL on NoSQL Database

    Nurhadi, Rabiah Abdul Kadir*, Ely Salwana Mat Surin, Mahidur R. Sarker*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1405-1435, 2024, DOI:10.32604/csse.2024.051851 - 22 November 2024

    Abstract A data lake (DL), abbreviated as DL, denotes a vast reservoir or repository of data. It accumulates substantial volumes of data and employs advanced analytics to correlate data from diverse origins containing various forms of semi-structured, structured, and unstructured information. These systems use a flat architecture and run different types of data analytics. NoSQL databases are nontabular and store data in a different manner than the relational table. NoSQL databases come in various forms, including key-value pairs, documents, wide columns, and graphs, each based on its data model. They offer simpler scalability and generally outperform… More >

  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

  • Open Access

    ARTICLE

    HGNN-ETC: Higher-Order Graph Neural Network Based on Chronological Relationships for Encrypted Traffic Classification

    Rongwei Yu, Xiya Guo*, Peihao Zhang, Kaijuan Zhang

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2643-2664, 2024, DOI:10.32604/cmc.2024.056165 - 18 November 2024

    Abstract Encrypted traffic plays a crucial role in safeguarding network security and user privacy. However, encrypting malicious traffic can lead to numerous security issues, making the effective classification of encrypted traffic essential. Existing methods for detecting encrypted traffic face two significant challenges. First, relying solely on the original byte information for classification fails to leverage the rich temporal relationships within network traffic. Second, machine learning and convolutional neural network methods lack sufficient network expression capabilities, hindering the full exploration of traffic’s potential characteristics. To address these limitations, this study introduces a traffic classification method that utilizes… More >

  • Open Access

    ARTICLE

    An Enhanced Integrated Method for Healthcare Data Classification with Incompleteness

    Sonia Goel1,#, Meena Tushir1, Jyoti Arora2, Tripti Sharma2, Deepali Gupta3, Ali Nauman4,#, Ghulam Muhammad5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3125-3145, 2024, DOI:10.32604/cmc.2024.054476 - 18 November 2024

    Abstract In numerous real-world healthcare applications, handling incomplete medical data poses significant challenges for missing value imputation and subsequent clustering or classification tasks. Traditional approaches often rely on statistical methods for imputation, which may yield suboptimal results and be computationally intensive. This paper aims to integrate imputation and clustering techniques to enhance the classification of incomplete medical data with improved accuracy. Conventional classification methods are ill-suited for incomplete medical data. To enhance efficiency without compromising accuracy, this paper introduces a novel approach that combines imputation and clustering for the classification of incomplete data. Initially, the linear More >

  • Open Access

    ARTICLE

    Densely Convolutional BU-NET Framework for Breast Multi-Organ Cancer Nuclei Segmentation through Histopathological Slides and Classification Using Optimized Features

    Amjad Rehman1, Muhammad Mujahid1, Robertas Damasevicius2,*, Faten S Alamri3, Tanzila Saba1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2375-2397, 2024, DOI:10.32604/cmes.2024.056937 - 31 October 2024

    Abstract This study aims to develop a computational pathology approach that can properly detect and distinguish histology nuclei. This is crucial for histopathological image analysis, as it involves segmenting cell nuclei. However, challenges exist, such as determining the boundary region of normal and deformed nuclei and identifying small, irregular nuclei structures. Deep learning approaches are currently dominant in digital pathology for nucleus recognition and classification, but their complex features limit their practical use in clinical settings. The existing studies have limited accuracy, significant processing costs, and a lack of resilience and generalizability across diverse datasets. We… More >

  • Open Access

    ARTICLE

    Improving Generalization for Hyperspectral Image Classification: The Impact of Disjoint Sampling on Deep Models

    Muhammad Ahmad1,*, Manuel Mazzara2, Salvatore Distefano3, Adil Mehmood Khan4, Hamad Ahmed Altuwaijri5

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 503-532, 2024, DOI:10.32604/cmc.2024.056318 - 15 October 2024

    Abstract Disjoint sampling is critical for rigorous and unbiased evaluation of state-of-the-art (SOTA) models e.g., Attention Graph and Vision Transformer. When training, validation, and test sets overlap or share data, it introduces a bias that inflates performance metrics and prevents accurate assessment of a model’s true ability to generalize to new examples. This paper presents an innovative disjoint sampling approach for training SOTA models for the Hyperspectral Image Classification (HSIC). By separating training, validation, and test data without overlap, the proposed method facilitates a fairer evaluation of how well a model can classify pixels it was… More >

Displaying 1-10 on page 1 of 1151. Per Page