Search Results

Results (7)

Search Parameters:

Keyword: k-NN
Order results
Results per page
Open AccessArticle
16 Pages, 1,131 KB Download PDF

A Novel Representative k-NN Sampling-based Clustering Approach for an Effective Dimensionality Reduction-based Visualization of Dynamic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 08–23, 2020; DOI: 10.25046/aj050402
Abstract:

Visualization plays a crucial role in the exploratory analysis of Big Data. The direct visualization of Big Data is a challenging task and difficult to analyze. Dimensionality Reduction techniques extract the features in the context of visualization. Due to the unsupervised and non-parametric nature, most of the dimensionality reduction techniques are not evaluated quantitatively and…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 810 KB Download PDF

Textural Analysis of Pap Smears Images for k-NN and SVM Based Cervical Cancer Classification System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 4, Page # 218–223, 2018; DOI: 10.25046/aj030420
Abstract:

Early detection and treatment of cervical cancer is crucial to patients’ recovery with a reported success rate of nearly 100%. Presently, Pap smear test which is a visual inspection of cells collected from the ectocervix is the screening tool mainly used in cancer prevention programs. The Pap smear is relatively easy to handle however, it…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
13 Pages, 3,825 KB Download PDF

Kamphaeng Saen Beef Cattle Identification Approach using Muzzle Print Image

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 110–122, 2021; DOI: 10.25046/aj060413
Abstract:

Identification of Kamphaeng Saen beef cattle is important of the registration and traceability purposes. For a traditional identification methods, Hot Branding, Freeze Branding, Paint Branding, and RFID Systems can be replaced by genius human. This paper proposed a Kamphaeng Saen beef cattle identification approach using muzzle print images as an Animal Biometric approach. There are…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 1,042 KB Download PDF

Procrustes Dynamic Time Wrapping Analysis for Automated Surgical Skill Evaluation

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 912–921, 2021; DOI: 10.25046/aj0601100
Abstract:

Classic surgical skill evaluation is performed by an expert surgeon examining an apprentice in a hospital operating room. This method suffers from being subjective and expensive. As surgery becomes more complex and specialized, there is an increase need for an automated surgical skill evaluation system that is more objective and determines more exactly the skills…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 669 KB Download PDF

Sentiment Analysis in English Texts

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1683–1689, 2020; DOI: 10.25046/aj0506200
Abstract:

The growing popularity of social media sites has generated a massive amount of data that attracted researchers, decision-makers, and companies to investigate people’s opinions and thoughts in various fields. Sentiment analysis is considered an emerging topic recently. Decision-makers, companies, and service providers as well-considered sentiment analysis as a valuable tool for improvement. This research paper…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 827 KB Download PDF

Medical imbalanced data classification

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 116–124, 2017; DOI: 10.25046/aj020316
Abstract:

In general, the imbalanced dataset is a problem often found in health applications. In medical data classification, we often face the imbalanced number of data samples where at least one of the classes constitutes only a very small minority of the data. In the same time, it represent a difficult problem in most of machine…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026