Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17,366)
  • Open Access

    ARTICLE

    A Robust Resource Allocation Scheme for Device-to-Device Communications Based on Q-Learning

    Azka Amin1, Xihua Liu2, Imran Khan3, Peerapong Uthansakul4, *, Masoud Forsat5, Seyed Sajad Mirjavadi5

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1487-1505, 2020, DOI:10.32604/cmc.2020.011749 - 20 August 2020

    Abstract One of the most effective technology for the 5G mobile communications is Device-to-device (D2D) communication which is also called terminal pass-through technology. It can directly communicate between devices under the control of a base station and does not require a base station to forward it. The advantages of applying D2D communication technology to cellular networks are: It can increase the communication system capacity, improve the system spectrum efficiency, increase the data transmission rate, and reduce the base station load. Aiming at the problem of co-channel interference between the D2D and cellular users, this paper proposes… More >

  • Open Access

    ARTICLE

    Software Defect Prediction Based on Non-Linear Manifold Learning and Hybrid Deep Learning Techniques

    Kun Zhu1, Nana Zhang1, Qing Zhang2, Shi Ying1, *, Xu Wang3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1467-1486, 2020, DOI:10.32604/cmc.2020.011415 - 20 August 2020

    Abstract Software defect prediction plays a very important role in software quality assurance, which aims to inspect as many potentially defect-prone software modules as possible. However, the performance of the prediction model is susceptible to high dimensionality of the dataset that contains irrelevant and redundant features. In addition, software metrics for software defect prediction are almost entirely traditional features compared to the deep semantic feature representation from deep learning techniques. To address these two issues, we propose the following two solutions in this paper: (1) We leverage a novel non-linear manifold learning method - SOINN Landmark… More >

  • Open Access

    ARTICLE

    Picture-Induced EEG Signal Classification Based on CVC Emotion Recognition System

    Huiping Jiang1, *, Zequn Wang1, Rui Jiao1, Shan Jiang2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1453-1465, 2020, DOI:10.32604/cmc.2020.011793 - 20 August 2020

    Abstract Emotion recognition systems are helpful in human–machine interactions and Intelligence Medical applications. Electroencephalogram (EEG) is closely related to the central nervous system activity of the brain. Compared with other signals, EEG is more closely associated with the emotional activity. It is essential to study emotion recognition based on EEG information. In the research of emotion recognition based on EEG, it is a common problem that the results of individual emotion classification vary greatly under the same scheme of emotion recognition, which affects the engineering application of emotion recognition. In order to improve the overall emotion… More >

  • Open Access

    ARTICLE

    Adversarial Attacks on License Plate Recognition Systems

    Zhaoquan Gu1, Yu Su1, Chenwei Liu1, Yinyu Lyu1, Yunxiang Jian1, Hao Li2, Zhen Cao3, Le Wang1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1437-1452, 2020, DOI:10.32604/cmc.2020.011834 - 20 August 2020

    Abstract The license plate recognition system (LPRS) has been widely adopted in daily life due to its efficiency and high accuracy. Deep neural networks are commonly used in the LPRS to improve the recognition accuracy. However, researchers have found that deep neural networks have their own security problems that may lead to unexpected results. Specifically, they can be easily attacked by the adversarial examples that are generated by adding small perturbations to the original images, resulting in incorrect license plate recognition. There are some classic methods to generate adversarial examples, but they cannot be adopted on More >

  • Open Access

    ARTICLE

    Empirical Analysis of Agricultural Cultural Resources Value Evaluation under DEA Model

    Wei Liang1, 2, Yang Ni3, Tingyi Li1, Xuejiao Lin1, Soo-Jin Chung1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1411-1424, 2020, DOI:10.32604/cmc.2020.011166 - 20 August 2020

    Abstract Agricultural culture is a productive activity about education and management. It aims at high efficiency and high quality, uses technology as its means, and takes nature as its carrier. Agricultural cultural resources are the product of the rapid development of modern economy. It promotes the development of the national economy and profoundly affects people's production and life. DEA model, also known as data envelope analysis method, is an algorithm that uses multiple data decision units for input and output training to obtain the final model. This article explains the concept and basic characteristics of agricultural… More >

  • Open Access

    ARTICLE

    Quantum Hierarchical Agglomerative Clustering Based on One Dimension Discrete Quantum Walk with Single-Point Phase Defects

    Gongde Guo1, Kai Yu1, Hui Wang2, Song Lin1, *, Yongzhen Xu1, Xiaofeng Chen3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1397-1409, 2020, DOI:10.32604/cmc.2020.011399 - 20 August 2020

    Abstract As an important branch of machine learning, clustering analysis is widely used in some fields, e.g., image pattern recognition, social network analysis, information security, and so on. In this paper, we consider the designing of clustering algorithm in quantum scenario, and propose a quantum hierarchical agglomerative clustering algorithm, which is based on one dimension discrete quantum walk with single-point phase defects. In the proposed algorithm, two nonclassical characters of this kind of quantum walk, localization and ballistic effects, are exploited. At first, each data point is viewed as a particle and performed this kind of… More >

  • Open Access

    ARTICLE

    Rate-Energy Tradeoff for Wireless Simultaneous Information and Power Transfer in Full-Duplex and Half-Duplex Systems

    Xiaoye Shi1, *, Jin Sun1, Dongming Li1, Fei Ding2, Zhaowei Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1373-1384, 2020, DOI:10.32604/cmc.2020.011018 - 20 August 2020

    Abstract In this paper, we study the rate-energy tradeoff for wireless simultaneous information and power transfer in full-duplex and half-duplex scenarios. To this end, the weighting function of energy efficiency and transmission rate, as rate-energy tradeoff metric is first introduced and the metric optimization problem is formulated. Applying Karush-Kuhn-Tucker (KKT) conditions for Lagrangian optimality and a series of mathematical approximations, the metric optimization problem can be simplified. The closed-form solution of the power ratio is obtained, building direct relationship between power ratio and the rate-energy tradeoff metric. By choosing power ratio, one can make the tradeoff… More >

  • Open Access

    ARTICLE

    Ensemble Strategy for Insider Threat Detection from User Activity Logs

    Shihong Zou1, Huizhong Sun1, *, Guosheng Xu1, Ruijie Quan2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1321-1334, 2020, DOI:10.32604/cmc.2020.09649 - 20 August 2020

    Abstract In the information era, the core business and confidential information of enterprises/organizations is stored in information systems. However, certain malicious inside network users exist hidden inside the organization; these users intentionally or unintentionally misuse the privileges of the organization to obtain sensitive information from the company. The existing approaches on insider threat detection mostly focus on monitoring, detecting, and preventing any malicious behavior generated by users within an organization’s system while ignoring the imbalanced ground-truth insider threat data impact on security. To this end, to be able to detect insider threats more effectively, a data… More >

  • Open Access

    ARTICLE

    Polynomials of Degree-Based Indices for Three-Dimensional Mesh Network

    Ali N. A. Koam1, Ali Ahmad2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1271-1282, 2020, DOI:10.32604/cmc.2020.011736 - 20 August 2020

    Abstract In order to study the behavior and interconnection of network devices, graphs structures are used to formulate the properties in terms of mathematical models. Mesh network (meshnet) is a LAN topology in which devices are connected either directly or through some intermediate devices. These terminating and intermediate devices are considered as vertices of graph whereas wired or wireless connections among these devices are shown as edges of graph. Topological indices are used to reflect structural property of graphs in form of one real number. This structural invariant has revolutionized the field of chemistry to identify More >

  • Open Access

    ARTICLE

    A New Idea of Fractal-Fractional Derivative with Power Law Kernel for Free Convection Heat Transfer in a Channel Flow between Two Static Upright Parallel Plates

    Dolat Khan1, Gohar Ali1, Arshad Khan2, Ilyas Khan3, *, Yu-Ming Chu4, 5, Kottakkaran Sooppy Nisar6

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1237-1251, 2020, DOI:10.32604/cmc.2020.011492 - 20 August 2020

    Abstract Nowadays some new ideas of fractional derivatives have been used successfully in the present research community to study different types of mathematical models. Amongst them, the significant models of fluids and heat or mass transfer are on priority. Most recently a new idea of fractal-fractional derivative is introduced; however, it is not used for heat transfer in channel flow. In this article, we have studied this new idea of fractal fractional operators with power-law kernel for heat transfer in a fluid flow problem. More exactly, we have considered the free convection heat transfer for a… More >

Displaying 12201-12210 on page 1221 of 17366. Per Page