Peer-reviewed Articles

24 downloads
60 views

Many of the existing electrocardiogram (ECG) toolboxes focus on the derivation of heart rate variability features from RR-intervals. By doing so, they assume correct detection of the QRS-complexes. However, it is highly likely that not all detections are correct....

["Computational Biology","Algorithms and Analysis of Algorithms","Data Science","Graphics","Visual Analytics"]
doi:10.7717/peerj-cs.226
129 downloads
156 views

Unreasonable public bicycle dispatching area division seriously affects the operational efficiency of the public bicycle system. To solve this problem, this paper innovatively proposes an improved community discovery algorithm based on multi-objective optimization...

["Data Mining and Machine Learning","Software Engineering"]
doi:10.7717/peerj-cs.224
57 downloads
327 views

The availability of large image data sets has been a crucial factor in the success of deep learning-based classification and detection methods. Yet, while data sets for everyday objects are widely available, data for specific industrial use-cases (e.g., identifying...

["Computer Vision","Data Mining and Machine Learning"]
doi:10.7717/peerj-cs.222
89 downloads
228 views

Online review platforms are a popular way for users to post reviews by expressing their opinions towards a product or service, and they are valuable for other users and companies to find out the overall opinions of customers. These reviews tend to be accompanied...

["Artificial Intelligence","Computational Linguistics","Data Science","Natural Language and Speech"]
doi:10.7717/peerj-cs.225
164 downloads
561 views

Recent advances in birdsong detection and classification have approached a limit due to the lack of fully annotated recordings. In this paper, we present NIPS4Bplus, the first richly annotated birdsong audio dataset, that is comprised of recordings containing bird...

["Bioinformatics","Computational Biology","Data Mining and Machine Learning","Databases","Multimedia"]
doi:10.7717/peerj-cs.223
128 downloads
287 views

Designing a robot swarm is challenging due to its self-organized and distributed nature: complex relations exist between the behavior of the individual robots and the collective behavior that results from their interactions. In this paper, we study the concurrent...

["Adaptive and Self-Organizing Systems","Agents and Multi-Agent Systems","Artificial Intelligence","Robotics"]
doi:10.7717/peerj-cs.221
1 citation
118 downloads
314 views

In the last several decades, electronic word of mouth (eWOM) has been widely used by consumers on different digital platforms to gather feedback about products and services from previous customer behavior. However, this useful information is getting blurred by...

["Human\u2013Computer Interaction","Computer Networks and Communications","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.219
198 downloads
403 views

Background With the development of today’s technology, and as humans tend to naturally use hand gestures in their communication process to clarify their intentions, hand gesture recognition is considered to be an important part of Human Computer Interaction (HCI),...

["Human\u2013Computer Interaction"]
doi:10.7717/peerj-cs.218
91 downloads
180 views

The notion of entropic centrality measures how central a node is in terms of how uncertain the destination of a flow starting at this node is: the more uncertain the destination, the more well connected and thus central the node is deemed. This implicitly assumes...

["Data Mining and Machine Learning","Data Science"]
doi:10.7717/peerj-cs.220
99 downloads
262 views

Cloud computing technology has been a game changer in recent years. Cloud computing providers promise cost-effective and on-demand resource computing for their users. Cloud computing providers are running the workloads of users as virtual machines (VMs) in a large-scale...

["Computer Networks and Communications","Optimization Theory and Computation"]
doi:10.7717/peerj-cs.211
273 downloads
428 views

Background Security is an integral aspect of the development of quality software. Furthermore, security durability is even more imperative and in persistent demand due to high investment in recent years. To achieve the desired target of efficacious and viable durability...

["Security and Privacy","Software Engineering"]
doi:10.7717/peerj-cs.215
285 downloads
445 views

Conventional paper currency and modern electronic currency are two important modes of transactions. In several parts of the world, conventional methodology has clear precedence over its electronic counterpart. However, the identification of forged currency paper...

["Data Mining and Machine Learning","Data Science"]
doi:10.7717/peerj-cs.216
222 downloads
276 views

The recent advances in compressive sensing (CS) based solutions make it a promising technique for signal acquisition, image processing and other types of data compression needs. In CS, the most challenging problem is to design an accurate and efficient algorithm...

["Artificial Intelligence","Computer Networks and Communications","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.217
199 downloads
329 views

This paper investigates the performance and scalability of a new update strategy for the particle swarm optimization (PSO) algorithm. The strategy is inspired by the Bak–Sneppen model of co-evolution between interacting species, which is basically a network of...

["Adaptive and Self-Organizing Systems","Algorithms and Analysis of Algorithms","Artificial Intelligence","Distributed and Parallel Computing"]
doi:10.7717/peerj-cs.202
290 downloads
331 views

Background Portable-devices applications (Android applications) are becoming complex software systems that must be developed quickly and continuously evolved to fit new user requirements and execution contexts. Applications must be produced rapidly and advance...

["Software Engineering"]
doi:10.7717/peerj-cs.212

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas