{"title":"Advances in natural language processing for healthcare: A comprehensive review of techniques, applications, and future directions","authors":"Fatmah Alafari , Maha Driss , Asma Cherif","doi":"10.1016/j.cosrev.2025.100725","DOIUrl":"10.1016/j.cosrev.2025.100725","url":null,"abstract":"<div><div>Natural Language Processing (NLP) techniques have gained significant traction within the healthcare domain for analyzing textual healthcare-related datasets, sourced primarily from Electronic Health Records (EHR) and increasingly from social networks. This study delves into applying NLP technologies within the healthcare sector, drawing insights from textual datasets from various sources. It reviews the relevant articles from 2019 to 2023 and compares the pertinent solutions included therein. In addition, it explores the various NLP technologies used for processing healthcare datasets in multiple languages. The review focuses on existing studies related to various medical conditions, including cancer and chronic and infectious diseases. It categorizes these cutting-edge studies into four different NLP task categories: prediction and detection, text analysis and modeling, information processing, and other healthcare applications. Notably, the findings reveal that the most prevalent NLP tasks employed in healthcare revolve around risk prediction and text classification. Moreover, the study identifies a pressing need for more extensive research that encompasses the utilization of non-textual medical datasets from EHR, such as X-rays, computed tomography (CT) scans, and magnetic resonance imaging (MRI) scans. A key observation is that much of the current research studies about NLP related to the healthcare field were primarily using conventional data processing methods, such as ML and DL techniques. Despite their success, these methods frequently have several distinct limitations as they are not able to handle large-scale, complex datasets. In contrast, there is less focus on sophisticated technologies such as big data analytics and transformer-based modeling. Big data analytics can manage massive amounts of unstructured data from sources such as EHRs and social media, providing a more comprehensive insight into healthcare patterns. Transformer models, like BERT and GPT, are designed to detect complex patterns and contextual relationships in text, making them particularly useful for medical text classification, sentiment analysis, and disease prediction. Current research studies have not fully explored the potential of these advanced technologies, which could significantly increase the efficiency and scalability of natural language processing applications in healthcare. This highlights opportunities for further exploration and innovation within the domain of NLP in healthcare.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100725"},"PeriodicalIF":13.3,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143232645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of heuristics for matrix bandwidth reduction","authors":"S.L. Gonzaga de Oliveira","doi":"10.1016/j.cosrev.2025.100724","DOIUrl":"10.1016/j.cosrev.2025.100724","url":null,"abstract":"<div><div>This paper surveys heuristic methods for matrix bandwidth reduction, including low-cost methods and metaheuristics. This optimization min–max problem represents a demanding problem for heuristic methods. This paper poses the graph layout problem with its formal definition. The study also considers the application domains in which practitioners employ the linear graph layout problem on general matrices. Furthermore, this paper focuses on the techniques and procedures that provide excellent results and provides an extensive perspective of approaches to devise heuristics for matrix bandwidth reduction. Thus, this paper surveys the most significant research in the field and examines the current state-of-the-art heuristics for the bandwidth reduction problem.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100724"},"PeriodicalIF":13.3,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143093447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning in automated diagnosis of autism spectrum disorder: a comprehensive review","authors":"Khosro Rezaee","doi":"10.1016/j.cosrev.2025.100730","DOIUrl":"10.1016/j.cosrev.2025.100730","url":null,"abstract":"<div><div>Autism Spectrum Disorder (ASD) is a multifaceted neurodevelopmental condition characterized by social communication challenges, repetitive behaviors, and restricted interests. Early and accurate diagnosis is paramount for effective intervention and treatment, significantly improving the quality of life for individuals with ASD. This comprehensive review aims to elucidate the various methodologies employed in the automated diagnosis of ASD, providing a comparative analysis of their diagnostic accuracy, privacy considerations, non-invasiveness, cost implications, computational complexity, and feasibility for clinical and therapeutic use. The study encompasses a wide range of techniques including neuroimaging, EEG signal analysis, speech and crying signal analysis, eye tracking, facial recognition, and body movement analysis, highlighting their potential and limitations in the context of ASD diagnosis. By exploring these diverse diagnostic approaches, the review seeks to offer insights into the most promising methods and identify areas for future research and development.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100730"},"PeriodicalIF":13.3,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WebAssembly and security: A review","authors":"Gaetano Perrone, Simon Pietro Romano","doi":"10.1016/j.cosrev.2025.100728","DOIUrl":"10.1016/j.cosrev.2025.100728","url":null,"abstract":"<div><div>WebAssembly is revolutionizing the approach to developing modern applications. Although this technology was born to create portable and performant modules in web browsers, currently, its capabilities are extensively exploited in multiple and heterogeneous use-case scenarios. With the extensive effort of the community, new toolkits make the use of this technology more suitable for real-world applications. In this context, it is crucial to study the liaisons between the WebAssembly ecosystem and software security. Indeed, WebAssembly can be a medium for improving the security of a system, but it can also be exploited to evade detection systems or for performing crypto-mining activities. In addition, programs developed in low-level languages such as C can be compiled in WebAssembly binaries, and it is interesting to evaluate the security impacts of executing programs vulnerable to attacks against memory in the WebAssembly sandboxed environment. Also, WebAssembly has been designed to provide a secure and isolated environment, but such capabilities should be assessed in order to analyze their weaknesses and propose new mechanisms for addressing them. Although some research works have provided surveys of the most relevant solutions aimed at discovering WebAssembly vulnerabilities or detecting attacks, at the time of writing there is no comprehensive review of security-related literature in the WebAssembly ecosystem. We aim to fill this gap by proposing a comprehensive review of research works dealing with security in WebAssembly. We analyze 147 papers by identifying seven different security categories.</div><div>We hope that our work will provide insights into the complex landscape of WebAssembly and guide researchers, developers, and security professionals towards novel avenues in the realm of the WebAssembly ecosystem.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100728"},"PeriodicalIF":13.3,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adamu Tafida , Wesam Salah Alaloul , Noor Amila Bt Wan Zawawi , Muhammad Ali Musarat , Adamu Abubakar Sani
{"title":"Advancing smart transportation: A review of computer vision and photogrammetry in learning-based dimensional road pavement defect detection","authors":"Adamu Tafida , Wesam Salah Alaloul , Noor Amila Bt Wan Zawawi , Muhammad Ali Musarat , Adamu Abubakar Sani","doi":"10.1016/j.cosrev.2025.100729","DOIUrl":"10.1016/j.cosrev.2025.100729","url":null,"abstract":"<div><div>Road infrastructure networks are crucial in facilitating smart mobility, as indicated by the emergence of innovative transportation concepts that offer improved efficiency and environmental sustainability. This study seeks to review the literature regarding road pavement condition assessment performance improvement tools which utilize various computer vision and photogrammetry tools aided by machine learning algorithms towards mitigating challenges encountered and promoting smart transportation trends. A comprehensive search of available literature was conducted, and relevant studies were analyzed to identify computer vision and photogrammetry tools used, learning-based algorithms deployed and contribution to the improvement of road infrastructure to aid smart transportation. The review considered emerging challenges of the techniques, identified research gaps and explored the potentials of the techniques as it relates to aiding wider acceptance of the implementation of autonomous vehicles and smart transportation The study found gaps in knowledge relating to the computer vision (CV) and photogrammetry tools standardization of evaluation parameters, the applicability of the models for real-time assessment and implications regarding the adoption of autonomous vehicles and smart transportation which were not sufficiently considered in the previous cited literature. Future research areas were highlighted and its implication regarding the promotion of smart transportation.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100729"},"PeriodicalIF":13.3,"publicationDate":"2025-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143027368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Buddhadev Sasmal , Arunita Das , Krishna Gopal Dhal , Ramesh Saha , Rebika Rai , Totan Bharasa , Essam H. Houssein
{"title":"Artificial hummingbird algorithm: Theory, variants, analysis, applications, and performance evaluation","authors":"Buddhadev Sasmal , Arunita Das , Krishna Gopal Dhal , Ramesh Saha , Rebika Rai , Totan Bharasa , Essam H. Houssein","doi":"10.1016/j.cosrev.2025.100727","DOIUrl":"10.1016/j.cosrev.2025.100727","url":null,"abstract":"<div><div>The Artificial Hummingbird Algorithm (AHA) is a metaheuristic optimization technique inspired by the behaviours and foraging strategies of hummingbirds. Known for their extraordinary agility and accuracy in collecting nectar, hummingbirds provide an exemplary framework for tackling complex optimization problems. Developed by Zhao et al. in 2022, AHA has swiftly attracted interest within the research community because to its exceptional performance and adaptability. This study provides a detailed and comprehensive review of AHA, exploring the diverse versions and modifications published in multiple research papers since its inception in 2022, with 23 % appearing in international conference papers and 75 % in esteemed peer-reviewed journals. The variants of AHA covered in this paper include 55 % of classical AHA, 17 % of improved AHA, 11 % of hybridization, 2 % of binary, 15 % of multi-objective variants, respectively. Furthermore, the applications of AHA illustrate its effectiveness and adaptability across various fields, with 42 % in power and control engineering, 11 % in optimizing deep learning models, 10 % in engineering design challenges, and 8 % in renewable energy sources. The algorithm has been utilized substantially in the domain of IoT, wireless sensor networks, wind energy, and fog computing. Furthermore, we also evaluate the performance of the AHA in the image clustering domain, and the findings revealed that the AHA performs better in comparison to the other tested methods. The main objectives of this study are to deliver a comprehensive review of AHA, emphasizing its novel methodology, and analyzing its various variants and their applications in numerous fields. As nature-inspired optimization methods continue to evolve, this survey paper expected to serves as a valuable resource for researchers aiming to gain a comprehensive understanding of AHA, its progression, and its diverse applications in solving complex optimization problems.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100727"},"PeriodicalIF":13.3,"publicationDate":"2025-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143027371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Harith Noor Azam , Farida Ridzuan , M. Norazizi Sham Mohd Sayuti , A H Azni , Nur Hafiza Zakaria , Vidyasagar Potdar
{"title":"A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements","authors":"Muhammad Harith Noor Azam , Farida Ridzuan , M. Norazizi Sham Mohd Sayuti , A H Azni , Nur Hafiza Zakaria , Vidyasagar Potdar","doi":"10.1016/j.cosrev.2025.100726","DOIUrl":"10.1016/j.cosrev.2025.100726","url":null,"abstract":"<div><div>Cover selection is the process of selecting a suitable cover for steganography. Cover selection is crucial to maintain the steganographic characteristics performances and further avoid detection of hidden messages by eavesdroppers. Numerous existing reviews have focused mainly on the implementation and performance of steganography methods. Existing reviews have demonstrated inadequate depth of analysis and a lack of the number of articles reviewed. Thus, this article systematically reviews 34 cover selection methods for steganography in five databases including Web of Science, IEEE Xplore, ScienceDirect, Scopus, and Springer. The results include a trend analysis concerning existing cover selection algorithms for steganography. This article also establishes four novel classifications for cover selection methods. Recommendations on the implementation and design for cover selection method based on each class are provided. Analysis of the elements including cover types, datasets, searching methods, evaluation metrics for searching methods, cover selection attributes and its performance evaluations are also provided. An in-depth discussion on how cover types, searching method and evaluation metrics for searching method affects the steganography characteristics are also presented. This review offers valuable insights for researchers in developing new methods and enhance steganography systems for secure data communication.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100726"},"PeriodicalIF":13.3,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142988079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in attention mechanisms for medical image segmentation","authors":"Jianpeng Zhang , Xiaomin Chen , Bing Yang , Qingbiao Guan , Qi Chen , Jian Chen , Qi Wu , Yutong Xie , Yong Xia","doi":"10.1016/j.cosrev.2024.100721","DOIUrl":"10.1016/j.cosrev.2024.100721","url":null,"abstract":"<div><div>Medical image segmentation plays an important role in computer-aided diagnosis. Attention mechanisms that distinguish important parts from irrelevant parts have been widely used in medical image segmentation tasks. This paper systematically reviews the basic principles of attention mechanisms and their applications in medical image segmentation. First, we review the basic concepts of attention mechanism and formulation. Second, we surveyed about 200 articles related to medical image segmentation, and divided them into three groups based on their attention mechanisms, Pre-Transformer attention, Transformer attention and Mamba-related attention. In each group, we deeply analyze the attention mechanisms from three aspects based on the current literature work, <span><math><mrow><mi>i</mi><mo>.</mo><mi>e</mi><mo>.</mo></mrow></math></span>, the principle of the mechanism (what to use), implementation methods (how to use), and application tasks (where to use). We also thoroughly analyzed the advantages and limitations of their applications to different tasks. Finally, we summarize the current state of research and shortcomings in the field, and discuss the potential challenges in the future, including task specificity, robustness, standard evaluation, <em>etc</em>. We hope that this review can showcase the overall research context of traditional, Transformer and Mamba attention methods, provide a clear reference for subsequent research, and inspire more advanced attention research, not only in medical image segmentation, but also in other image analysis scenarios. Finally, we maintain the paper list and open-source code at <span><span>here</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100721"},"PeriodicalIF":13.3,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142988285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An inclusive analysis for performance and efficiency of graph neural network models for node classification","authors":"S. Ratna , Sukhdeep Singh , Anuj Sharma","doi":"10.1016/j.cosrev.2024.100722","DOIUrl":"10.1016/j.cosrev.2024.100722","url":null,"abstract":"<div><div>Graph Neural Networks (GNNs) have become a prominent technique for the analysis of graph-based data and knowledge extraction. This data can be either structured or unstructured. GNN approaches are particularly beneficial when it comes to examining non-euclidean data. Graph data formats are well-known for their capability to represent intricate systems and understand their relationships. GNNs have significantly advanced the field of research because of their numerous possible applications in machine learning for tasks involving graph-structured data, where relationships between entities play a crucial role. GNN can carry out numerous tasks, such as classifying nodes, categorizing graphs, predicting links or relationships, and much more. Node classification is a widely used and recognized GNN task that has reached state-of-the-art performance on a number of benchmark datasets. In this study, we have provided a comprehensive insight into GNN, its development, and an extensive review of node classification, along with experimental findings and discussions.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100722"},"PeriodicalIF":13.3,"publicationDate":"2025-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial intelligence based classification for waste management: A survey based on taxonomy, classification & future direction","authors":"Dhanashree Vipul Yevle , Palvinder Singh Mann","doi":"10.1016/j.cosrev.2024.100723","DOIUrl":"10.1016/j.cosrev.2024.100723","url":null,"abstract":"<div><div>Waste management has grown to become one of the leading global challenges due to the massive generation of thousands of tons of waste that is produced daily, leading to severe environmental degradation, the risk of public health, and resource depletion. Despite efforts directed towards solving these problems, traditional methods of sorting and categorizing waste are inefficient and unsustainable, thus requiring the conceptualization of innovative AI-based solutions for more effective waste management. This review presents, a comprehensive review of all the strategies which are critical for AI based techniques, thus improve productivity and sustainability in operations. Diverse datasets used to train AI models along with performance evaluation metrics, and discusses challenges of AI assimilation in waste management systems, most fundamentally the issue of data privacy and concern of bias in the algorithms. Additionally, the role of loss functions and optimizers in enhancing AI model performance and suggests future research opportunities for sustainable resource recovery, recycling, and reuse based on AI.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"56 ","pages":"Article 100723"},"PeriodicalIF":13.3,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142939697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}