Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (331)
  • Open Access

    ARTICLE

    Street-Level IP Geolocation Algorithm Based on Landmarks Clustering

    Fan Zhang1,2, Fenlin Liu1,2,*, Rui Xu3,4, Xiangyang Luo1,2, Shichang Ding5, Hechan Tian1,2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3345-3361, 2021, DOI:10.32604/cmc.2021.014526

    Abstract Existing IP geolocation algorithms based on delay similarity often rely on the principle that geographically adjacent IPs have similar delays. However, this principle is often invalid in real Internet environment, which leads to unreliable geolocation results. To improve the accuracy and reliability of locating IP in real Internet, a street-level IP geolocation algorithm based on landmarks clustering is proposed. Firstly, we use the probes to measure the known landmarks to obtain their delay vectors, and cluster landmarks using them. Secondly, the landmarks are clustered again by their latitude and longitude, and the intersection of these two clustering results is taken… More >

  • Open Access

    ARTICLE

    Understanding Research Trends in Android Malware Research Using Information Modelling Techniques

    Jaiteg Singh1, Tanya Gera1, Farman Ali2, Deepak Thakur1, Karamjeet Singh3, Kyung-sup Kwak4,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2655-2670, 2021, DOI:10.32604/cmc.2021.014504

    Abstract Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share. Such popularity of Android has drawn the attention of cybercriminals and malware developers. The malicious applications can steal sensitive information like contacts, read personal messages, record calls, send messages to premium-rate numbers, cause financial loss, gain access to the gallery and can access the user’s geographic location. Numerous surveys on Android security have primarily focused on types of malware attack, their propagation, and techniques to mitigate them. To the best of our knowledge, Android malware literature has never… More >

  • Open Access

    ARTICLE

    Trade-Off between Efficiency and Effectiveness: A Late Fusion Multi-View Clustering Algorithm

    Yunping Zhao1, Weixuan Liang1, Jianzhuang Lu1,*, Xiaowen Chen1, Nijiwa Kong2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2709-2722, 2021, DOI:10.32604/cmc.2021.013389

    Abstract Late fusion multi-view clustering (LFMVC) algorithms aim to integrate the base partition of each single view into a consensus partition. Base partitions can be obtained by performing kernel k-means clustering on all views. This type of method is not only computationally efficient, but also more accurate than multiple kernel k-means, and is thus widely used in the multi-view clustering context. LFMVC improves computational efficiency to the extent that the computational complexity of each iteration is reduced from O(n3) to O(n) (where n is the number of samples). However, LFMVC also limits the search space of the optimal solution, meaning that… More >

  • Open Access

    ARTICLE

    Metaheuristic Clustering Protocol for Healthcare Data Collection in Mobile Wireless Multimedia Sensor Networks

    G. Kadiravan1, P. Sujatha1, T. Asvany1, R. Punithavathi2, Mohamed Elhoseny3, Irina V. Pustokhina4, Denis A. Pustokhin5, K. Shankar6,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3215-3231, 2021, DOI:10.32604/cmc.2021.013034

    Abstract Nowadays, healthcare applications necessitate maximum volume of medical data to be fed to help the physicians, academicians, pathologists, doctors and other healthcare professionals. Advancements in the domain of Wireless Sensor Networks (WSN) and Multimedia Wireless Sensor Networks (MWSN) are tremendous. M-WMSN is an advanced form of conventional Wireless Sensor Networks (WSN) to networks that use multimedia devices. When compared with traditional WSN, the quantity of data transmission in M-WMSN is significantly high due to the presence of multimedia content. Hence, clustering techniques are deployed to achieve low amount of energy utilization. The current research work aims at introducing a new… More >

  • Open Access

    ARTICLE

    A Pursuit of Sustainable Privacy Protection in Big Data Environment by an Optimized Clustered-Purpose Based Algorithm

    Norjihan Binti Abdul Ghani1, Muneer Ahmad1, Zahra Mahmoud1, Raja Majid Mehmood2,*

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1217-1231, 2020, DOI:10.32604/iasc.2020.011731

    Abstract Achievement of sustainable privacy preservation is mostly very challenging in a resource shared computer environment. This challenge demands a dedicated focus on the exponential growth of big data. Despite the existence of specific privacy preservation policies at the organizational level, still sustainable protection of a user’s data at various levels, i.e., data collection, utilization, reuse, and disclosure, etc. have not been implemented to its spirit. For every personal data being collected and used, organizations must ensure that they are complying with their defined obligations. We are proposing a new clustered-purpose based access control for users’ sustainable data privacy protection in… More >

  • Open Access

    ARTICLE

    Impact of Distance Measures on the Performance of AIS Data Clustering

    Marta Mieczyńska1,*, Ireneusz Czarnowski2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 69-82, 2021, DOI:10.32604/csse.2021.014327

    Abstract Automatic Identification System (AIS) data stream analysis is based on the AIS data of different vessel’s behaviours, including the vessels’ routes. When the AIS data consists of outliers, noises, or are incomplete, then the analysis of the vessel’s behaviours is not possible or is limited. When the data consists of outliers, it is not possible to automatically assign the AIS data to a particular vessel. In this paper, a clustering method is proposed to support the AIS data analysis, to qualify noises and outliers with respect to their suitability, and finally to aid the reconstruction of the vessel’s trajectory. In… More >

  • Open Access

    ARTICLE

    Application of FCM Algorithm Combined with Articial Neural Network in TBM Operation Data

    Jingyi Fang1, Xueguan Song2, Nianmin Yao3, Maolin Shi2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 397-417, 2021, DOI:10.32604/cmes.2021.012895

    Abstract Fuzzy clustering theory is widely used in data mining of full-face tunnel boring machine. However, the traditional fuzzy clustering algorithm based on objective function is difficult to effectively cluster functional data. We propose a new Fuzzy clustering algorithm, namely FCM–ANN algorithm. The algorithm replaces the clustering prototype of the FCM algorithm with the predicted value of the articial neural network. This makes the algorithm not only satisfy the clustering based on the traditional similarity criterion, but also can effectively cluster the functional data. In this paper, we rst use the t-test as an evaluation index and apply the FCM–ANN algorithm… More >

  • Open Access

    ARTICLE

    A Clustering Method Based on Brain Storm Optimization Algorithm

    Tianyu Wang, Yu Xue, Yan Zhao, Yuxiang Wang*, Yan Zhang, Yuxiang He

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 135-142, 2020, DOI:10.32604/jihpp.2020.010362

    Abstract In the field of data mining and machine learning, clustering is a typical issue which has been widely studied by many researchers, and lots of effective algorithms have been proposed, including K-means, fuzzy c-means (FCM) and DBSCAN. However, the traditional clustering methods are easily trapped into local optimum. Thus, many evolutionary-based clustering methods have been investigated. Considering the effectiveness of brain storm optimization (BSO) in increasing the diversity while the diversity optimization is performed, in this paper, we propose a new clustering model based on BSO to use the global ability of BSO. In our experiment, we apply the novel… More >

  • Open Access

    ARTICLE

    Oversampling Methods Combined Clustering and Data Cleaning for Imbalanced Network Data

    Yang Yang1,*, Qian Zhao1, Linna Ruan2, Zhipeng Gao1, Yonghua Huo3, Xuesong Qiu1

    Intelligent Automation & Soft Computing, Vol.26, No.5, pp. 1139-1155, 2020, DOI:10.32604/iasc.2020.011705

    Abstract In network anomaly detection, network traffic data are often imbalanced, that is, certain classes of network traffic data have a large sample data volume while other classes have few, resulting in reduced overall network traffic anomaly detection on a minority class of samples. For imbalanced data, researchers have proposed the use of oversampling techniques to balance data sets; in particular, an oversampling method called the SMOTE provides a simple and effective solution for balancing data sets. However, current oversampling methods suffer from the generation of noisy samples and poor information quality. Hence, this study proposes an oversampling method for imbalanced… More >

  • Open Access

    ARTICLE

    A Novel Fault Tolerance Energy-Aware Clustering Method via Social Spider Optimization (SSO) and Fuzzy Logic and Mobile Sink in Wireless Sensor Networks (WSNs)

    Shayesteh Tabatabaei1,∗

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 477-494, 2020, DOI:10.32604/csse.2020.35.477

    Abstract In recent years, the application of WSNs has been remarkably increased and notable developments and advances have been achieved in this regard. In particular, thanks to smart, cheaper and smaller nodes, different types of information can be detected and gathered in different environments and under different conditions. As the popularity of WSNs has increased, the problems and issues related to networks are examined and investigated. As a case in point, routing issue is one of the main challenges in this regard which has a direct impact on the performance of sensor networks. In WSN routing, sensor nodes send and receive… More >

Displaying 261-270 on page 27 of 331. Per Page