Business information systems have extensive databases that are mainly managed in relational databases. What is often missing are automated procedures to analyze these inventories without major restructuring. Based on this, we develop the Fuzzy Classification Query Language, FCQL, which enables fuzzy queries to the extended database schema using linguistic variables and converts them into SQL...
Schizophrenia is a common psychotic disorder which affects a substantial amount of the population, where the paranoid variant is viewed as the most common form of the disorder. This form of psychosis has been seen to affect both adults and adolescents; where in the case of adolescents, it is increasingly challenging to diagnose with traditional...
Mohammad Kazim Hooshmand, Manjaiah Doddaghatta Huchaiah
25-34
Article ID: 64 232 (Abstract)56 (Download)
Computer network assets expose to various cyber threats in today’s digital era. Network Anomaly Detection Systems (NADS) play a vital role in protecting digital assets in the purview of network security. Intrusion detection systems data are imbalanced and high dimensioned, affecting models’ performance in classifying malicious traffic. This paper uses a denoising autoencoder (DAE) for...
Seizures are a widespread condition affecting 50~65 million people in the world, and newborns are also susceptible to them. EEG is used to monitor the brain activity of newborns with suspected brain injuries, followed by a qualitative waveform interpretation by a group of clinical experts, where the means towards detection of seizures include a set...
The performance of computer programs (or the hardware that can be programmed such as IoTs, embedded computers, and PLCs) is generally based on the complexity of the particular program development technique. High complexity often uses more execution times and system resources. For this reason, the computer program is less computational complexity to be desired. The...