Journal of Computer Science最新文献

筛选
英文 中文
A Model of Cyber Extremists' Rhetorical Structure Towards Protecting Critical Infrastructure 网络极端分子保护关键基础设施的修辞结构模型
Journal of Computer Science Pub Date : 2024-06-01 DOI: 10.3844/jcssp.2024.610.627
Osman Khairunnisa, J. Zanariah, Ahmad Rabiah
{"title":"A Model of Cyber Extremists' Rhetorical Structure Towards Protecting Critical Infrastructure","authors":"Osman Khairunnisa, J. Zanariah, Ahmad Rabiah","doi":"10.3844/jcssp.2024.610.627","DOIUrl":"https://doi.org/10.3844/jcssp.2024.610.627","url":null,"abstract":": Much research at present focuses on the ways in which organizations secure their networks and information in the supply chain, ignoring the ways in which organizations construct and understand the core of the cybersecurity risks. Cybersecurity focuses more on defense mechanisms such as anti-virus software, malware protection, firewall and more on securing network and application. More research to understand extremist activity should be conducted by exploring the extremist corpus. It is a good strategy since the web is overloaded with multiple conversations or information since the dependency to the technology has been skyrocketing by people including by the extremist itself. The objectives of this study were to identify the types of rhetoric in cyber extremist’s communication, analyze how the cyber extremists utilized the rhetoric in appealing to the audience, identify the stylistic devices used by the extremists and produce a model of cyber extremists’ rhetorical structure. Therefore, new approaches to study the rhetoric of cyber extremists have been designed. It is the combination of Norreklit’s methodology, Neo-Aristotelian criticism ideologist criticism which were deemed able to pry out the hidden literacy of the extremists. In this study the type of rhetoric that dominated the cyber extremists’ communication was pathos. The category of pathos in the extremists’ postings was more on negative feelings such as sad, anger and hatred. Using the Neo-Aristotle criticism, the stylistic devices used by the extremists were identified such as the metonymy, simile metaphor. The metonymy used was like ‘Jihad’, ‘Mujahidin’, ‘Ansar’ and ‘Muhajirin’. The metonymy ‘Penyembah’ which referred to the opponents’ obsessive materialistic behavior was seen multiplicatively in the extremists’ postings. The simile stylistic devices such as the word ‘Thagut’ and ‘terrorist’ were used by the extremists as direct comparison. As a direct comparison, Meanwhile, the metaphor of death was used consistently by the extremist which can be seen as a scary technique for the opponents. Meanwhile, by using the ideologist criticism, the appearance that was used by most of the extremists was the desire to be seen as a peace ideologist and kind rhetor through the use of cold color such as blue and green with the nature design as the background of the blog. All the phrases were gathered, analyzed and integrated to ascertain the pattern based on the research methodologies to develop a model. A model of cyber extremists' rhetorical structure was developed and established towards protecting the critical infrastructure to ease any parties including the authority, expert and public to identify the possible extremists’ styles as red flags during cyber communication such as social media communication","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Holistic Approach to Security, Availability and Reliability in Fog Computing 实现雾计算安全性、可用性和可靠性的整体方法
Journal of Computer Science Pub Date : 2024-06-01 DOI: 10.3844/jcssp.2024.641.648
Abdulrahman Alshehri, H. Alshareef, Samah Alhazmi, M. Almasri, Maha Helal
{"title":"A Holistic Approach to Security, Availability and Reliability in Fog Computing","authors":"Abdulrahman Alshehri, H. Alshareef, Samah Alhazmi, M. Almasri, Maha Helal","doi":"10.3844/jcssp.2024.641.648","DOIUrl":"https://doi.org/10.3844/jcssp.2024.641.648","url":null,"abstract":": Cloud computing has become popular in recent years due to the considerable flexibility it provides in terms of its availability and affordability and the reliability of different software and services for remote users. Fog computing has also gained considerable attention in recent years from the research fraternity. Fog computing is an additional layer between the users of the cloud and the cloud infrastructure as a place that stores frequently used data in order to reduce latency, which might occur as a consequence of using cloud computing. It also provides easy access and management mechanisms to the devices located at the edge of the cloud, which leads to better performance when compared with cloud computing. Fog computing does, however, pose certain challenges, related to security, such as data breaches; availability, such as dealing with connectivity interruptions; and the reliability of fog resources and services. This study proposes a lightweight system that adopts the fog computing paradigm and addresses several of its challenges by, for instance, enhancing the security aspects of the whole system by validating nodes that join the fog layer before serving the end user. In addition, the proposed system provides better availability and reliability for fog computing and its associated services by capturing and tracking the progress of tasks and being able to resume once an interruption is detected. Experimental results validate the feasibility of the proposed system in terms of its enhanced security capabilities and time cost. This is achieved by using several security techniques which result in allowing only approved devices to join the fog layer. The results also demonstrate the capability to execute tasks even if an interruption is detected by resuming the remainder of the task through another fog node. The proposed solution is unique in the sense that it provides a simple mechanism for implementation in real-world applications, especially in crowded places or when the mobility of users is high. It can also be enhanced further in several ways to address other predicaments related to fog computing.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141233649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Semantic Web Retrieval Through Ontology-Driven Feature Extraction: A Novel Proposition 通过本体驱动的特征提取增强语义网检索:一个新命题
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.487.494
Meer Hazar Khan, Muhammad Imran Sharif, Mehwish Mehmood, Fernaz Narin Nur, Md Palash Uddin, Zahid Akhtar, Kamran Siddique, Sadia Waheed Awan
{"title":"Enhancing Semantic Web Retrieval Through Ontology-Driven Feature Extraction: A Novel Proposition","authors":"Meer Hazar Khan, Muhammad Imran Sharif, Mehwish Mehmood, Fernaz Narin Nur, Md Palash Uddin, Zahid Akhtar, Kamran Siddique, Sadia Waheed Awan","doi":"10.3844/jcssp.2024.487.494","DOIUrl":"https://doi.org/10.3844/jcssp.2024.487.494","url":null,"abstract":": Web images represent unstructured data sets which often lead to challenges when users try to locate distinct images via text-based searches on the web. Such difficulties stem from different factors, e","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141027461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Approaches for the Prediction of Gas Turbine Transients 预测燃气轮机瞬态的机器学习方法
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.495.510
Arnaud Nguembang Fadja, Giuseppe Cota, Francesco Bertasi, Fabrizio Riguzzi, E. Losi, L. Manservigi, M. Venturini, G. Bechini
{"title":"Machine Learning Approaches for the Prediction of Gas Turbine Transients","authors":"Arnaud Nguembang Fadja, Giuseppe Cota, Francesco Bertasi, Fabrizio Riguzzi, E. Losi, L. Manservigi, M. Venturini, G. Bechini","doi":"10.3844/jcssp.2024.495.510","DOIUrl":"https://doi.org/10.3844/jcssp.2024.495.510","url":null,"abstract":": Gas Turbine (GT) emergency shutdowns can lead to energy production interruption and may also reduce the lifespan of a turbine. In order to remain competitive in the market, it is necessary to improve the reliability and availability of GTs by developing predictive maintenance systems that are able to predict future conditions of GTs within a certain time. Predicting such situations not only helps to take corrective measures to avoid service unavailability but also eases the process of maintenance and considerably reduces maintenance costs. Huge amounts of sensor data are collected from (GTs) making monitoring impossible for human operators even with the help of computers. Machine learning techniques could provide support for handling large amounts of sensor data and building decision models for predicting GT future conditions. The paper presents an application of machine learning based on decision trees and k-nearest neighbors for predicting the rotational speed of gas turbines. The aim is to distinguish steady states (e.g., GT operation at normal conditions) from transients (e.g., GT trip or shutdown). The different steps of a machine learning pipeline, starting from data extraction to model testing are implemented and analyzed. Experiments are performed by applying decision trees, extremely randomized trees, and k-nearest neighbors to sensor data collected from GTs located in different countries. The trained models were able to predict steady state and transient with more than 93% accuracy. This research advances predictive maintenance methods and suggests exploring advanced machine learning algorithms, real-time data integration, and explainable AI techniques to enhance gas turbine behavior understanding and develop more adaptable maintenance systems for industrial applications.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141026970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for the Adaptive Learning of Higher Education Students in Virtual Classes in Peru Using CRISP-DM and Machine Learning 利用 CRISP-DM 和机器学习为秘鲁虚拟课堂中的高校学生提供自适应学习框架
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.522.534
Maryori Bautista, Sebastian Alfaro, Lenis Wong
{"title":"Framework for the Adaptive Learning of Higher Education Students in Virtual Classes in Peru Using CRISP-DM and Machine Learning","authors":"Maryori Bautista, Sebastian Alfaro, Lenis Wong","doi":"10.3844/jcssp.2024.522.534","DOIUrl":"https://doi.org/10.3844/jcssp.2024.522.534","url":null,"abstract":": During the COVID-19 pandemic, virtual education played a significant role around the world. In post-pandemic Peru, higher education institutions did not entirely dismiss the online education modality. However, this virtual education system maintains a traditional teaching-learning model, where all students receive the same content material and are expected to learn in the same way; as a result, it has not been effective in meeting the individual needs of students, causing poor performance in many cases. For this reason, a framework is proposed for the adaptive learning of higher education students in virtual classes using the Cross-Industry Standard Process for Data Mining (CRISP-DM) and Machine Learning (ML) methodology in order to recommend individualized learning materials. This framework is made up of four stages: (i) Analysis of student aspects, (ii) Analysis of Learning Methodology (LM), (iii) ML development and (iv) Integration of LM and ML models. (i) evaluates the student-related factors to be considered in adapting their learning content material. (ii) Evaluate which LM is more effective in a virtual environment. In (iii), Four ML algorithms based on the CRISP-DM methodology are implemented. In (iv), The best ML model is integrated with the LM in a virtual class. Two experiments were carried out to compare the traditional teaching methodology (experiment I) and the proposed framework (experiment 2) with a sample of 68 students. The results showed that the framework was more effective in promoting progress and academic performance, obtaining an Improvement Percentage (IP) of 39.72%. This percentage was calculated by subtracting the grade average of the tests taken at the beginning and end of each experiment.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141043923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Papers Mentioning Things Board: A Systematic Mapping Study 提及事物局的论文:系统绘图研究
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.574.584
Paolino Di Felice, Gaetanino Paolone
{"title":"Papers Mentioning Things Board: A Systematic Mapping Study","authors":"Paolino Di Felice, Gaetanino Paolone","doi":"10.3844/jcssp.2024.574.584","DOIUrl":"https://doi.org/10.3844/jcssp.2024.574.584","url":null,"abstract":".","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141025618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Postoperative Brain MRI Segmentation with Automated Skull Removal and Resection Cavity Analysis 通过自动颅骨切除和切除腔分析增强术后脑磁共振成像分割功能
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.585.593
Sobha Xavier P., Sathish P. K., Raju G.
{"title":"Enhanced Postoperative Brain MRI Segmentation with Automated Skull Removal and Resection Cavity Analysis","authors":"Sobha Xavier P., Sathish P. K., Raju G.","doi":"10.3844/jcssp.2024.585.593","DOIUrl":"https://doi.org/10.3844/jcssp.2024.585.593","url":null,"abstract":": Brain tumors present a significant medical challenge, often necessitating surgical intervention for treatment. In the context of postoperative brain MRI, the primary focus is on the resection cavity, the void that remains in the brain following tumor removal surgery. Precise segmentation of this resection cavity is crucial for a comprehensive assessment of surgical efficacy, aiding healthcare professionals in evaluating the success of tumor removal. Automatically segmenting surgical cavities in post-operative brain MRI images is a complex task due to challenges such as image artifacts, tissue reorganization, and variations in appearance. Existing state-of-the-art techniques, mainly based on Convolutional Neural Networks (CNNs), particularly U-Net models, encounter difficulties when handling these complexities. The intricate nature of these images, coupled with limited annotated data, highlights the need for advanced automated segmentation models to accurately assess resection cavities and improve patient care. In this context, this study introduces a two-stage architecture for resection cavity segmentation, featuring two innovative models. The first is an automatic skull removal model that separates brain tissue from the skull image before input into the cavity segmentation model. The second is an automated postoperative resection cavity segmentation model customized for resected brain areas. The proposed resection cavity segmentation model is an enhanced U-Net model with a pre-trained VGG16 backbone. Trained on publicly available post-operative datasets, it undergoes preprocessing by the proposed skull removal model to enhance precision and accuracy. This segmentation model achieves a Dice coefficient value of 0.96, surpassing state-of-the-art techniques like ResUNet, Attention U-Net, U-Net++, and U-Net.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141032862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Hodgkin Lymphoma Risk Grading Through the Pathological Data by Using the Optimized Convolutional Lymphnet Model 利用优化卷积淋巴网模型通过病理数据进行非霍奇金淋巴瘤风险分级
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.511.521
Sivaranjini Nagarajan, Gomathi Muthuswamy
{"title":"Non-Hodgkin Lymphoma Risk Grading Through the Pathological Data by Using the Optimized Convolutional Lymphnet Model","authors":"Sivaranjini Nagarajan, Gomathi Muthuswamy","doi":"10.3844/jcssp.2024.511.521","DOIUrl":"https://doi.org/10.3844/jcssp.2024.511.521","url":null,"abstract":": Diagnosing Non-Hodgkin Lymphoma (NHL) is difficult and often requires specialised training and expertise as well as extensive morphological investigation and, in certain cases, costly immunohistological and genetic techniques. Computational approaches enabling morphological-based decision making are necessary for bridging the existing gaps. Histopathological images can be accurately classified using deep learning approaches, however data on NHL subtyping is limited. However, there is a lack of data about the categorization of lymph nodes affected by Non-Hodgkin Lymphoma. Here in this study, initially image preprocessing was done using the maximal Kalman filter which helps in removing the noise, data augmentation was done to improve the dataset, then the lymph nodal area was segmented using the sequential fuzzy YOLACT algorithm. Finally we trained and optimized an Convolutional Lymphnet model to classify and grade tumor level from tumor-free reference lymph nodes using the grey wolf optimized model by selecting the fitness parameters and optimize it for identifying the patient risk score. The overall experimentation was carried out under python framework. The findings demonstrate that the recommended strategy works better than the state-of-the-art techniques by having excellent detection and risk score prediction accuracy","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141024894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Unimodular Hill Cipher and RSA Methods to Text Encryption Algorithms Using Python 使用 Python 将单模希尔密码和 RSA 方法应用于文本加密算法
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.548.563
Samsul Arifin, Dwi Wijonarko, Suwarno, Edwin K Sijabat
{"title":"Application of Unimodular Hill Cipher and RSA Methods to Text Encryption Algorithms Using Python","authors":"Samsul Arifin, Dwi Wijonarko, Suwarno, Edwin K Sijabat","doi":"10.3844/jcssp.2024.548.563","DOIUrl":"https://doi.org/10.3844/jcssp.2024.548.563","url":null,"abstract":": Text encryption is one of the techniques used to maintain the confidentiality of information in digital communications. In this study, we propose to apply a combination of the Unimodular Hill Cipher and RSA methods to a text encryption algorithm using the Python programming language. The Unimodular Hill Cipher method uses an unimodular matrix to replace text characters with encrypted characters, while RSA (Rivest-Shamir-Adleman) is a public key encryption algorithm that relies on modulo arithmetic properties. The purpose of this research is to combine the strengths of the two methods and produce a more secure text encryption system. Unimodular Hill Cipher provides the advantage of randomizing text characters by using matrix modulo operations, while RSA provides a high level of security through the use of public and private key pairs. In this study, we explain in detail the basic theory and algorithms of the Unimodular Hill Cipher and RSA. We also describe the implementation steps of both methods in the Python programming language. The text data used in this study went through a preprocessing stage before being encrypted. We also analyze the results of the encryption using several statistical methods to measure how close the relationship between the original text and the result of the encryption is. In a comparative analysis with the previous paper, in this study, the use of the Unimodular Hill Cipher and RSA methods in the context of Python provides additional insight into the performance and level of security of both. The experimental results show that the combination of the Unimodular Hill Cipher and RSA methods can produce a higher level of security in text encryption. It is hoped that this research can contribute to the development of a more effective and secure text encryption algorithm.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141050681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentence Classification Using Attention Model for E-Commerce Product Review 利用注意力模型为电子商务产品评论进行句子分类
Journal of Computer Science Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.535.547
Nagendra N, Chandra J
{"title":"Sentence Classification Using Attention Model for E-Commerce Product Review","authors":"Nagendra N, Chandra J","doi":"10.3844/jcssp.2024.535.547","DOIUrl":"https://doi.org/10.3844/jcssp.2024.535.547","url":null,"abstract":": The importance of aspect extraction in text classification, particularly in the e-commerce sector. E-commerce platforms generate vast amounts of textual data, such as comments, product descriptions, and customer reviews, which contain valuable information about various aspects of products or services. Aspect extraction involves identifying and classifying individual traits or aspects mentioned in textual reviews to understand customer opinions, improve products, and enhance the customer experience. The role of product reviews in e-commerce is discussed, emphasizing their value in aiding customers' purchase decisions and guiding businesses in product stocking and marketing strategies. Reviews are essential for boosting sales potential, maintaining a good reputation, and promoting brand recognition. Customers extensively research product reviews from different sources before purchasing, making them vital user-generated content for e-commerce businesses. The current work provided an efficient and novel classification model for sentence classification using the ABNAM model. The automated text classification models available cannot categorize the data into sixteen distinct classes. The technologies applied for the mentioned work contain TF-IDF, N-gram, CNN, linear SVM, random forest, Naïve bays, and ABNAM with significant results. The best-performing ML method for the successful classification of a given sentence into one of the sixteen categories is achieved with the proposed model named the based Neural Attention Model (ABNAM), which has the highest accuracy at 97%. The research acclaimed ABNAM as a novel classification model with the highest-class categorizations.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141031297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信