Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Pashto Characters Recognition Using Multi-Class Enabled Support Vector Machine

    Sulaiman Khan1, Shah Nazir1, Habib Ullah Khan2,*, Anwar Hussain1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2831-2844, 2021, DOI:10.32604/cmc.2021.015054

    Abstract During the last two decades significant work has been reported in the field of cursive language’s recognition especially, in the Arabic, the Urdu and the Persian languages. The unavailability of such work in the Pashto language is because of: the absence of a standard database and of significant research work that ultimately acts as a big barrier for the research community. The slight change in the Pashto characters’ shape is an additional challenge for researchers. This paper presents an efficient OCR system for the handwritten Pashto characters based on multi-class enabled support vector machine using manifold feature extraction techniques. These… More >

  • Open Access

    ARTICLE

    A Storage Optimization Scheme for Blockchain Transaction Databases

    Jingyu Zhang1,2, Siqi Zhong1, Jin Wang1,3, Xiaofeng Yu4,*, Osama Alfarraj5

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 521-535, 2021, DOI:10.32604/csse.2021.014530

    Abstract As the typical peer-to-peer distributed networks, blockchain systems require each node to copy a complete transaction database, so as to ensure new transactions can by verified independently. In a blockchain system (e.g., bitcoin system), the node does not rely on any central organization, and every node keeps an entire copy of the transaction database. However, this feature determines that the size of blockchain transaction database is growing rapidly. Therefore, with the continuous system operations, the node memory also needs to be expanded to support the system running. Especially in the big data era, the increasing network traffic will lead to… More >

  • Open Access

    ARTICLE

    A Database-Driven Algorithm for Building Top-k Service-Based Systems

    Dandan Peng, Le Sun*

    Journal of Quantum Computing, Vol.2, No.4, pp. 171-179, 2020, DOI:10.32604/jqc.2020.015402

    Abstract The purpose of this work aims is to automatically build top-k (the number of suggested results) light weight service based systems (LitSBSs) on the basis of user-given keywords. Compared with our previous work, we use a score (oscore) to evaluate the keyword matching degree and QoS performance of a service so that we could find top-k LitSBSs with both high keyword matching degree and great QoS performance at the same time. In addition, to guarantee the quality of found top-k LitSBSs and improve the time efficiency, we redesign the database-driven algorithm (LitDB). We add the step of referential services selecting… More >

  • Open Access

    ARTICLE

    A Holistic, Proactive and Novel Approach for Pre, During and Post Migration Validation from Subversion to Git

    Vinay Singh1, Mohammed Alshehri2,*, Alok Aggarwal3, Osama Alfarraj4, Purushottam Sharma5, K. R. Pardasani6

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2359-2371, 2021, DOI:10.32604/cmc.2021.013272

    Abstract Software development is getting a transition from centralized version control systems (CVCSs) like Subversion to decentralized version control systems (DVCDs) like Git due to lesser efficiency of former in terms of branching, fusion, time, space, merging, offline commits & builds and repository, etc. Git is having a share of 77% of total VCS, followed by Subversion with a share of 13.5%. The majority of software industries are getting a migration from Subversion to Git. Only a few migration tools are available in the software industry. Still, these too lack in many features like lack of identifying the empty directories as… More >

  • Open Access

    ARTICLE

    Pediatric Cardiac Surgical Patterns of Practice and Outcomes in Europe and China: An Analysis of the European Congenital Heart Surgeons Association Congenital Heart Surgery Database

    Claudia Herbst1,*, Haibo Zhang2, Renjie Hu2, Jürgen Hörer3, Masamichi Ono3, Vladimiro Vida4, Tjark Ebels5,6, Andrzej Kansy7, Jeffrey P. Jacobs8, Zdzislaw Tobota7, Bohdan Maruszewski7

    Congenital Heart Disease, Vol.16, No.1, pp. 17-25, 2021, DOI:10.32604/CHD.2021.012982

    Abstract Background: The European Congenital Heart Surgeons Association (ECHSA) Congenital Heart Surgery Database (CHSD) was founded in 1999 and is open for worldwide participation. The current dataset includes a large amount of surgical data from both Europe and China. The purpose of this analysis is to compare patterns of practice and outcomes among pediatric congenital heart defect surgeries in Europe and China using the ECHSA-CHSD. Methods: We examined all European (125 centers, 58,261 operations) and Chinese (13 centers, 23,920 operations) data in the ECHSA-CHSD from 2006-2018. Operative mortality, postoperative length of stay, median patient age and weight were calculated for the… More >

  • Open Access

    ARTICLE

    A Model Transformation Approach for Detecting Distancing Violations in Weighted Graphs

    Ahmad F. Subahi*

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 13-39, 2021, DOI:10.32604/csse.2021.014376

    Abstract This work presents the design of an Internet of Things (IoT) edge-based system based on model transformation and complete weighted graph to detect violations of social distancing measures in indoor public places. A wireless sensor network based on Bluetooth Low Energy is introduced as the infrastructure of the proposed design. A hybrid model transformation strategy for generating a graph database to represent groups of people is presented as a core middleware layer of the detecting system’s proposed architectural design. A Neo4j graph database is used as a target implementation generated from the proposed transformational system to store all captured real-time… More >

  • Open Access

    ARTICLE

    A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

    Youseef Alotaibi*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1879-1895, 2021, DOI:10.32604/cmc.2020.013739

    Abstract A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS will stop query execution or… More >

  • Open Access

    ARTICLE

    Enhanced Schemes for Data Fragmentation, Allocation, and Replication in Distributed Database Systems

    Masood Niazi Torshiz1,∗, Azadeh Salehi Esfaji1,†, Haleh Amintoosi2,‡

    Computer Systems Science and Engineering, Vol.35, No.2, pp. 99-112, 2020, DOI:10.32604/csse.2020.35.099

    Abstract With the growth of information technology and computer networks, there is a vital need for optimal design of distributed databases with the aim of performance improvement in terms of minimizing the round-trip response time and query transmission and processing costs. To address this issue, new fragmentation, data allocation, and replication techniques are required. In this paper, we propose enhanced vertical fragmentation, allocation, and replication schemes to improve the performance of distributed database systems. The proposed fragmentation scheme clusters highly-bonded attributes (i.e., normally accessed together) into a single fragment in order to minimize the query processing cost. The allocation scheme is… More >

  • Open Access

    ARTICLE

    Dynamic Horizontal and Vertical Scaling for Multi-tier Web Applications

    Abid Nisar1, Waheed Iqbal1,*, Fawaz Bokhari1, Faisal Bukhari1, Khaled Almustafa2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 353-365, 2020, DOI:10.31209/2019.100000159

    Abstract The adaptive resource provisioning of cloud-hosted applications is enabled to provide a better quality of services to the users of applications. Most of the cloud-hosted applications follow the multi-tier architecture model. However, it is challenging to adaptively provision the resources of multi-tier applications. In this paper, we propose an auto-scaling method to dynamically scale resources for multi-tier web applications. The proposed method exploits the horizontal scaling at the web server tier and vertical scaling at the database tier dynamically to maintain response time guarantees. We evaluated our proposed method on Amazon Web Services using a real web application. The extensive… More >

  • Open Access

    ARTICLE

    A Novel Knowledge-Based Battery Drain Reducer for Smart Meters

    Isma Farah Siddiqui1, Scott Uk-Jin Lee2,*, Asad Abbas3

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 107-119, 2020, DOI:10.31209/2019.100000132

    Abstract The issue of battery drainage in the gigantic smart meters network such as semantic-aware IoT-enabled smart meter has become a serious concern in the smart grid framework. The grid core migrates existing tabular datasets i.e., Relational data to semantic-aware tuples in its Resource Description Framework (RDF) format, for effective integration among multiple components to work aligned with IoT. For this purpose, WWW Consortium (W3C) recommends two specifications as mapping languages. However, both specifications use entire RDB schema to generate data transformation mapping patterns and results large quantity of unnecessary transformation. As a result, smart meters use huge computing resources, maximum… More >

Displaying 41-50 on page 5 of 65. Per Page