Journal of Computer Science最新文献

筛选
英文 中文
Features of the Security System Development of a Computer Telecommunication Network 计算机电信网络安全系统开发的特点
Journal of Computer Science Pub Date : 2024-07-22 DOI: 10.3844/jcssp.2024.986.996
Leonid Chervyakov, Tagirbek Aslanov, Dmitry Polezhaev, Viktor Lysenko
{"title":"Features of the Security System Development of a Computer Telecommunication Network","authors":"Leonid Chervyakov, Tagirbek Aslanov, Dmitry Polezhaev, Viktor Lysenko","doi":"10.3844/jcssp.2024.986.996","DOIUrl":"https://doi.org/10.3844/jcssp.2024.986.996","url":null,"abstract":": Global computer networks have enabled ordinary users, companies, organizations and medical institutions to gain virtually unlimited access to data arrays. Therefore, developing systems capable of ensuring the good performance and secure operation of a standard Computer Telecommunication Network (CTN) has become one of the most pressing tasks demanded in the medical industry. Consequently, this study aims to create an ordered chain of operations that can perform information encryption to enhance data transmission and exchange security. This study examines the existing ordered chains of encryption operations and assesses their strengths and weaknesses. In addition, a framework for implementing cryptographic algorithms is proposed. This algorithm structure enables verification of the existence of the correct key along the specified path, thereby enhancing the overall security of the system. The study results indicate that the optimal variant of encryption is the ordered chains of encoding operations that rely on cryptography. The results of the testing demonstrated that the developed ordered chain of operations exhibited several advantages compared to its analogs, with an efficiency that exceeded that of the analogs by more than fourfold. The implementation of the proposed ordered chain of operations would provide a significantly safer operation of a standard CTN in a typical Medical Institution (MI).","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141815628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Assessment of CPU Scheduling Algorithms: A Scenario-Based Approach with FCFS, RR, and SJF CPU 调度算法的性能评估:基于场景的 FCFS、RR 和 SJF 方法
Journal of Computer Science Pub Date : 2024-07-22 DOI: 10.3844/jcssp.2024.972.985
Olaa Hajjar, Escelle Mekhallalati, Nada Annwty, Faisal Alghayadh, Ismail Keshta, Mohammed Algabri
{"title":"Performance Assessment of CPU Scheduling Algorithms: A Scenario-Based Approach with FCFS, RR, and SJF","authors":"Olaa Hajjar, Escelle Mekhallalati, Nada Annwty, Faisal Alghayadh, Ismail Keshta, Mohammed Algabri","doi":"10.3844/jcssp.2024.972.985","DOIUrl":"https://doi.org/10.3844/jcssp.2024.972.985","url":null,"abstract":": This study presents an extensive examination of CPU scheduling algorithms, focusing on the First-Come, First-Served (FCFS), Round-Robin (RR), and Shortest-Job-First (SJF) strategies through a carefully designed scenario-based approach. By deploying a Java-based simulation to dynamically generate random process arrival and burst times, this study simulates a variety of operational conditions to test these scheduling algorithms’ adaptability and performance in environments that closely resemble real-world computing scenarios. The research aims to explore the effects of dynamic quantum size allocation on RR scheduling and assess its impact on system performance metrics such as response time and context switching overhead. Through a detailed analysis, this study seeks to provide new insights into the operational efficiency of the FCFS, RR, and SJF scheduling strategies, highlighting their strengths, limitations, and applicability across different computing environments.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141815904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Patient Consent Management Model for Health Information Exchange Based on Blockchain Technology 基于区块链技术的医疗信息交换智能患者同意管理模型
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.730.741
K. R. Rohini, P. S. Rajakumar, S. Geetha
{"title":"Smart Patient Consent Management Model for Health Information Exchange Based on Blockchain Technology","authors":"K. R. Rohini, P. S. Rajakumar, S. Geetha","doi":"10.3844/jcssp.2024.730.741","DOIUrl":"https://doi.org/10.3844/jcssp.2024.730.741","url":null,"abstract":": Innovation for Electronic Medical Records (EMRs) has been hindered by years of excessive regulation and inefficient bureaucracy. As data science and personalization encourage individuals to take an active role in their healthcare and regain control of their own medical records, there is an urgent need for new approaches. The ability to exchange electronic health records is fundamental in contemporary healthcare systems for facilitating a wider range of health services and delivering high-quality treatment. Despite the requirement for utilizing medical information for various reasons, most patients still authorize paper forms with minimal participation. The present methods of managing patient consent and medical data exchange are laborious, expensive, and prone to failures, even with quality assurance measures in effect. Because of this, there may not be enough patient empowerment, which can lead to inefficiencies in the process and a lack of trust and transparency. A shortage of resources makes it harder to acquire individual consent, which is necessary for health data exchange. Healthcare organizations also grapple with patient consent. Blockchain-based platforms enable data exchange by developing a trusted user network. Users can share their data without relying on health service providers for time and resources. Blockchain-based systems necessitate data governance frameworks to specify and monitor data exchange and use. This research article aims to establish a system that healthcare organizations may use to easily gain patient consent for various objectives, while also giving patients more flexibility in managing their consent. In this study, a novel electronic consent model namely ‘Smart Consent Blockchain Based System (SCBCS)”, is built on the hyper ledger fabric Blockchain that employs a purpose-based access control method. Distributed ledger technology (blockchain) ensures that all metadata pertaining to patient records, permissions, and data access cannot be altered once written. Additionally, Blockchain chain code is developed to handle patient consent-related business logic. A prototype is constructed and verified business logic with the chain code, validating the requestor's data access and patient permission saved in the Blockchain. The proposed SCBCS acts as a consent management system for patients and healthcare organizations. The proposed method is compared with other existing methods 'MedRec’, Consent Management System (CMS). The results demonstrate this system manages medical staff data access requests effectively. The proposed method outperforms other methods compared with low latency, less gas consumption, and low access time. This Blockchain-based proposed SCBCS technology offers great dependability, transparency, and traceability for patient data sharing in hospitals and research.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141709625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Website-Based Educational Application to Help MSMEs in Indonesia Develop 基于网站的教育应用程序帮助印度尼西亚中小微企业发展
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.742.750
David Freggy Dinata, Francka Sakti Lee, Yemima Monica Geasela, Shierly Everlin, Yunianto Purnomo
{"title":"Website-Based Educational Application to Help MSMEs in Indonesia Develop","authors":"David Freggy Dinata, Francka Sakti Lee, Yemima Monica Geasela, Shierly Everlin, Yunianto Purnomo","doi":"10.3844/jcssp.2024.742.750","DOIUrl":"https://doi.org/10.3844/jcssp.2024.742.750","url":null,"abstract":": In the current era, information technology systems have rapidly developed and are commonly utilized to address company requirements. Implementation of this technology significantly impacts business processes. MSME development collaborator company is actively engaged in helping MSMEs to survive and thrive through collaborative initiatives. Currently, the company does not offer educational support to MSMEs. This research aims to develop a web-based educational application to tackle current challenges. The extreme programming application development method, a five-step process including planning, design, coding, testing, and software increment, will be utilized. The study produced a website-based education application designed to provide educational support to MSME actors.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling User Experience in Delivery Applications Using the Design Thinking Method and System Usability Scale 利用设计思维方法和系统可用性量表为交付应用中的用户体验建模
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.722.729
Kevin Christianto, A. Chakir, J. Andry, Fransiskus Adikara, Lydia Liliana, Jennifer Felicia
{"title":"Modeling User Experience in Delivery Applications Using the Design Thinking Method and System Usability Scale","authors":"Kevin Christianto, A. Chakir, J. Andry, Fransiskus Adikara, Lydia Liliana, Jennifer Felicia","doi":"10.3844/jcssp.2024.722.729","DOIUrl":"https://doi.org/10.3844/jcssp.2024.722.729","url":null,"abstract":": Technological developments bring comfort and ease to users in accessing applications. Companies need to design systems that are centered on human needs to create technology that is competitive in the market, especially in the field of expeditions. The problem that arises in the sea cargo expedition company is that master data recording is still done manually, which has an impact on reducing data accuracy. Apart from that, the process of recording shipping transactions and status changes is not updated in real time. Things like this are the reason Sea Cargo Expedition hopes to design a goods delivery application that is centered on user needs. This research aims to design a prototype and test the level of user satisfaction with the goods delivery application. Based on the background of this problem, the research focuses on implementing the design thinking method to develop a goods delivery application because it is able to collect user needs directly. Design thinking is divided into five stages, namely, empathize (understanding the problem), define (analyzing the problem), ideate (creating a wireframe), prototype (designing an application design), and test (trial using System Usability Testing (SUS)). This research produces a prototype goods delivery application based on the user's user experience assessment so that it can provide","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141715097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Classification for Predicting the Post-Translational Modification (PTM) Glycosylation in Sequence O Using an Extreme Gradient Boosting Algorithm 使用极端梯度提升算法预测序列 O 中翻译后修饰 (PTM) 糖基化的模型分类
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.758.767
Damayanti, Sutyarso, Akmal Junaidi, F. R. Lumbanraja
{"title":"Model Classification for Predicting the Post-Translational Modification (PTM) Glycosylation in Sequence O Using an Extreme Gradient Boosting Algorithm","authors":"Damayanti, Sutyarso, Akmal Junaidi, F. R. Lumbanraja","doi":"10.3844/jcssp.2024.758.767","DOIUrl":"https://doi.org/10.3844/jcssp.2024.758.767","url":null,"abstract":": Post Translational Modification (PTM) is an important mechanism involved in regulating protein function. Post-translational modification refers to the addition of covalent and enzymatic modifications of proteins in protein biosynthesis, which has an important role in modifying protein function and regulating gene expression. One of the post-translational modifications is glycosylation. Glycosylation is the addition of a sugar group to a protein structure. One type of glycosylation is glycosylation, which occurs in sequence O. Glycosylation has been linked to several illnesses, including diabetes, cancer, and the flu. Therefore, it is important to anticipate the occurrence of glycosylation by carrying out predicted glycosylated or non-glycosylated data. Glycosylation prediction has been widely done using manual laboratory techniques, which results in the prediction process being long and expensive for lab equipment. To overcome this, computerized data is needed that can predict glycosylation more quickly. The data used is glycosylation data on sequence O obtained from the UniProt website, which can be openly accessed. This study aimed to improve the accuracy of post-translational modification glycosylation in sequence O prediction using the method of extreme gradient boosting as a framework for gradient enhancement that tends to be faster. This accuracy is increased by conducting feature extraction experiments with the following types: AAIndex, hydrophobicity, sable, composition, CTD, and PseAAC. Feature selection uses the MRMR approach. Evaluation using k-fold cross-validation. The results of this study indicate the prediction performance of post-translational modification glycosylation in sequence O with an accuracy value of 100%. The study's findings indicate that the XGBoost algorithm performs better than other research that has been conducted.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141706867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Preference Selection Index and TOPSIS in Product Aspect Extraction and Ranking 偏好选择指数和 TOPSIS 在产品特征提取和排序中的应用
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.793.800
Saif Addeen Alrababah, Nawaf O. Alsrehin
{"title":"Application of Preference Selection Index and TOPSIS in Product Aspect Extraction and Ranking","authors":"Saif Addeen Alrababah, Nawaf O. Alsrehin","doi":"10.3844/jcssp.2024.793.800","DOIUrl":"https://doi.org/10.3844/jcssp.2024.793.800","url":null,"abstract":": Decision-making methodologies can differentiate between several types of criterion weights. The subjective weights of decision-makers are prone to be influenced by various factors, including their level of knowledge, experience and competency. This may result in the wrong evaluation of the criteria due to the inherent ambiguity of human judgments, leading to unavoidable assessment errors. Beyond that, while assessing the decision alternatives, the majority of Multiple Criteria Decision Making (MCDM) take the evaluation criteria into consideration separately. However, in actual application, most of the criteria are not mutually exclusive. In the context of online customer reviews, it is essential to prioritize product aspects in order to facilitate the purchasing process for potential consumers. Selecting the appropriate product aspects is a difficult task due to the vast quantity of product reviews. This research develops an MCDM solution through the integration of the Preference Selection Index (PSI) with The approach for Order Preference by Similarity to an Ideal Solution (TOPSIS) method for decision-making. The contribution of this study is to enhance the TOPSIS ranking technique by incorporating PSI objective weights as an alternative to subjective weights. PSI offers the benefit of focusing on the convergence of the criteria involved rather than their divergence. This approach will improve the ranking process of TOPSIS by taking into account the interconnectedness of the criteria, hence facilitating the prioritization of significant aspects of a product based on online reviews. A dataset comprising four electronic products was utilized as a reference for conducting a statistical analysis. Through the examination of the outcomes utilizing the discount cumulative gain metric, it becomes apparent that the combination of the TOPSIS approach alongside PSI weights facilitates the identification of the suitable product aspects that effectively differentiate the one that aligns with consumer expectations.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141695063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Specialized IT Governance Strategy for Higher Education: A Strategic Model 为高等教育制定专门的 IT 治理战略:战略模型
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.768.782
Chahid Abdelilah, S. Ahriz, Kamal El Guemmat, Khalifa Mansouri
{"title":"Building a Specialized IT Governance Strategy for Higher Education: A Strategic Model","authors":"Chahid Abdelilah, S. Ahriz, Kamal El Guemmat, Khalifa Mansouri","doi":"10.3844/jcssp.2024.768.782","DOIUrl":"https://doi.org/10.3844/jcssp.2024.768.782","url":null,"abstract":": In this research, we delve into the implementation and impact of Information Technology Governance (ITG) in the dynamic landscape of university settings, where information technology is rapidly evolving. The study's primary aim is to investigate the various contingency factors that play a pivotal role in the effectiveness of ITG frameworks in academic environments. Utilizing a comprehensive approach, we conducted a systematic review of 72 scholarly articles sourced from online databases, analyzing the global application of ITG in universities through a blend of qualitative and quantitative research methods. Our findings underscore an increasing focus on ITG within the realm of higher education, a trend that has gained momentum in the aftermath of COVID-19. Notably, significant contributions to this field have emerged from Asia and Europe. Central to our study is the development of a novel ITG model, which is grounded in contingency theory and derived from a detailed case study conducted in five Moroccan universities. This model underscores the necessity for higher education institutions to adopt ITG strategies that are not only flexible but also specifically tailored to meet their individual needs and circumstances.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141703649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CNN-KNN Based Recognition of Online Handwritten Symbols within Physics Expressions Using Contour-Based Bounding Box (CBBS) Segmentation Technique 基于 CNN-KNN 的物理表达式在线手写符号识别(使用基于轮廓的边界框 (CBBS) 分割技术
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.783.792
Ujwala Kolte, Sachin Naik, V. Kumbhar
{"title":"A CNN-KNN Based Recognition of Online Handwritten Symbols within Physics Expressions Using Contour-Based Bounding Box (CBBS) Segmentation Technique","authors":"Ujwala Kolte, Sachin Naik, V. Kumbhar","doi":"10.3844/jcssp.2024.783.792","DOIUrl":"https://doi.org/10.3844/jcssp.2024.783.792","url":null,"abstract":": The task of recognizing symbols poses a significant challenge owing to the wide variability in human handwriting. Complexity in terms of the structural representation of symbols used in physics expressions is a major challenge in the recognition process The emergence of online handwriting, fueled by the widespread adoption of handheld digital devices, particularly in educational contexts, highlights the critical importance of precise symbol recognition, especially in the teaching and learning process. In contemporary literature, there is a notable emphasis on LaTex sequencing, symbol recognition and parsing. However, deep learning continues to yield promising results in this domain. The convenience of user input provides benefits to e-learning applications. In this study, we propose three approaches for the recognition of physics symbols within physics expressions (1) A proposed Java user interface for taking input from the user, as convenience of user input provides benefits to e-learning applications. (2) Contour-based bounding box segmentation algorithm, which deals with broken symbols within physics expressions. (3) For recognition, we propose a Convolution Neural Network-K-Nearest Neighbor (CNN-KNN) recognition model, as CNN plays an important role in extracting features, which are further provided as input to the K-NN classifier using the dropout method. Combining these three approaches into a symbol recognition model provides state-of-arts results. Handwritten physics symbols were collected from 20 different writers and each writer has written 5 types of physics expressions under different categories like electric flux, Maxwell’s equations, inductance and pointing vector and moment of Interia. There were 25 classes identified from the 780 samples collected from the users. The recognition rate is identified using (1) Using CNN model, which shows an accuracy of 91.48 and (2) Using the proposed hybrid CNN-KNN model the accuracy reported is 98.06.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141692430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Split Cross-Strategy for Enhancing Machine Learning Algorithms Prediction Results with Data Generated by Conditional Generative Adversarial Network 利用条件生成对抗网络生成的数据增强机器学习算法预测结果的多分叉交叉策略
Journal of Computer Science Pub Date : 2024-07-01 DOI: 10.3844/jcssp.2024.700.707
Abdelfattah Abassi, Brahim Bakkas, Moustapha El Jai, Ahmed Arid, Hussain Benazza
{"title":"A Multi-Split Cross-Strategy for Enhancing Machine Learning Algorithms Prediction Results with Data Generated by Conditional Generative Adversarial Network","authors":"Abdelfattah Abassi, Brahim Bakkas, Moustapha El Jai, Ahmed Arid, Hussain Benazza","doi":"10.3844/jcssp.2024.700.707","DOIUrl":"https://doi.org/10.3844/jcssp.2024.700.707","url":null,"abstract":": In this study, we present a Multi-Split Cross-Strategy (MSC-Strategy) designed to leverage synthetic tabular data generated by a Conditional Generative Adversarial Network (CGAN). Our study aims to investigate the potential of synthetic data in comparison to real-world data for improving machine learning predictive results. Firstly, we develop a CGAN architecture tailored to generate synthetic tabular data, trained on a comprehensive real-world dataset. Secondly, we validate the synthetic data generated by the CGAN to ensure its statistical fidelity and resemblance to the distribution of real data. Finally, we selectively leverage a subset of the generated data and apply our strategy to create a new combined training set comprising the training set of real data and the chosen subset of generated data. To validate our approach, we employ six diverse regression models: Decision Tree (DT), K-Nearest Neighbors (KNN), Random Forest (RF), XGB Regressor (XGB), and Support Vector Regressor (SVR). Each model is trained and tested using a training set of real data, generated data, combined data (training set of real data and generated data), and data formed by our MSC strategy. Our findings indicate that the training set formed by our MSC strategy demonstrates remarkable predictive performance compared to real-world data and generated data, highlighting its ability to enhance the prediction of machine learning models using only a subset of generated data.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141691020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信