Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network

    Gundala Swathi*

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 335-345, 2020, DOI:10.32604/csse.2020.35.335

    Abstract Researches in wireless mobile ad hoc networks have an inherent challenge of vulnerable diagnosis due to the diverse behaviour pattern of the vulnerable nodes causing heterogeneous vtype1, vtype2, vtupe3 and vtype4 faults. This paper proposes a protocol for the diagnosis of vulnerability nodes with threephases of clustering, vulnerable detection and vulnerable fault classification in wireless networks. This protocol employs the technique of probabilistic neural network for classification of vulnerable nodes and detects vulnerable nodes through timeout mechanism and vtype3, vtype4, vtype1, vtype2 nodes through the method of analysis variance. Network simulator NS-2.3.35 is employed for performance evaluation of the protocol. More >

  • Open Access

    ARTICLE

    A Survey and Systematic Categorization of Parallel K-Means and Fuzzy-C-Means Algorithms

    Ahmed A. M. Jamel1,∗, Bahriye Akay2,†

    Computer Systems Science and Engineering, Vol.34, No.5, pp. 259-281, 2019, DOI:10.32604/csse.2019.34.259

    Abstract Parallel processing has turned into one of the emerging fields of machine learning due to providing consistent work by performing several tasks simultaneously, enhancing reliability (the presence of more than one device ensures the workflow even if some devices disrupted), saving processing time and introducing low cost and high-performance computation units. This research study presents a survey of parallel K-means and Fuzzy-c-means clustering algorithms based on their implementations in parallel environments such as Hadoop, MapReduce, Graphical Processing Units, and multi-core systems. Additionally, the enhancement in parallel clustering algorithms is investigated as hybrid approaches in which K-means and Fuzzy-c-means clustering algorithms… More >

  • Open Access

    ARTICLE

    Friends Classification of Ego Network Based on Combined Features

    Jing Jiaa, Tinghuai Mab, Fan Xinga, William Faraha, Donghai Guana,c

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 819-827, 2018, DOI:10.1080/10798587.2017.1355656

    Abstract Ego networks consist of a user and his/her friends and depending on the number of friends a user has, makes them cumbersome to deal with. Social Networks allow users to manually categorize their “circle of friends”, but in today’s social networks due to the unlimited number of friends a user has, it is imperative to find a suitable method to automatically administrate these friends. Manually categorizing friends means that the user has to regularly check and update his circle of friends whenever the friends list grows. This may be time consuming for users and the results may not be accurate… More >

  • Open Access

    ARTICLE

    A Complex Networked Method of Sorting Negotiation Demand Based on Answer Set Programs

    Hui Wang, Liang Li, Long-yun Gao, Wu Chen

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 35-40, 2018, DOI:10.1080/10798587.2016.1267238

    Abstract With the development of big data science, handling intensive knowledge in the complex network becomes more and more important. Knowledge representation of multi-agent negotiation in the complex network plays an important role in big data science. As a modern approach to declarative programming, answer set programming is widely applied in representing the multi-agent negotiation knowledge in recent years. But almost all the relevant negotiation models are based on complete rational agents, which make the negotiation process complex and low efficient. Sorting negotiation demands is the most key step in creating an efficient negotiation model to improve the negotiation ability of… More >

  • Open Access

    REVIEW

    Review of extinction risk in African Cycads

    Bamigboye SO, PM Tshisikhawe, PJ Taylor

    Phyton-International Journal of Experimental Botany, Vol.85, pp. 333-336, 2016, DOI:10.32604/phyton.2016.85.333

    Abstract Over a long period of time, cycads endemic to Africa have been facing high risk of extinction. Several conservation efforts have been made to reduce the risk of losing these highly endangered species. In this study we review the current risk of extinction of all African cycads species. We calculated the percentages of each category of species found in African cycads using the IUCN (International Union of Conservation of Nature) red list of threatened species 2014 version. We compared our result with that of Donaldson (2003) on percentages of different categories of IUCN for cycads in Africa which was carried… More >

  • Open Access

    ARTICLE

    The realigment of the orchid flora in the mountain range of Guamuahaya, Cienfuegos, Cuba

    Alomá Moreno O1 y MJ Freuler2

    Phyton-International Journal of Experimental Botany, Vol.84, No.2, pp. 466-472, 2015, DOI:10.32604/phyton.2015.84.466

    Abstract The present study of the Orchidaceae family was carried out in Guamuahaya’s mountain range, from 2000 to March 2013. Fifteen districts were explored after 33 expeditions in the Province of Cienfuegos. Ninety two plant species were identified in the studied area, taking into account the ecological parameters of the mountainous areas of Cienfuegos and Cumanayagua municipalities. More >

  • Open Access

    ARTICLE

    Automated Negotiation in E Commerce: Protocol Relevance and Improvement Techniques

    S. R. Vij1,*, D. Mukhopadhyay2, A. J. Agrawal3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1009-1024, 2019, DOI:10.32604/cmc.2019.08417

    Abstract We all negotiate, formally or informally, in jobs, in day today lives and outcomes of negotiations affect those processes of life. Although negotiation is an intrinsic nature of human psyche, it is very complex phenomenon to implement using computing and internet for the various purposes in E Commerce. Automation of negotiation process poses unique challenges for computer scientists and researchers, so here we study how negotiation can be modeled and analyzed mathematically, what can be different techniques and strategies or set of rules/protocols to be implemented and how they can be relevantly implemented. We are in a quest to find… More >

  • Open Access

    ARTICLE

    A Novel Image Categorization Strategy Based on Salp Swarm Algorithm to Enhance Efficiency of MRI Images

    Mohammad Behrouzian Nejad1, Mohammad Ebrahim Shiri Ahmadabadi1, 2, *

    CMES-Computer Modeling in Engineering & Sciences, Vol.119, No.1, pp. 185-205, 2019, DOI:10.32604/cmes.2019.01838

    Abstract The main target of this paper is presentation of an efficient method for MRI images classification so that it can be used to diagnose patients and non-patients. Image classification is one of the prominent subset topics of machine learning and data mining that the most important image technique is the auto-categorization of images. MRI images with high resolution and appropriate accuracy allow physicians to decide on the diagnosis of various diseases and treat them. The auto categorization of MRI images toward diagnosing brain diseases has been being used to accurately diagnose hospitals, clinics, physicians and medical research centers. In this… More >

  • Open Access

    ARTICLE

    Multi-Label Chinese Comments Categorization: Comparison of Multi-Label Learning Algorithms

    Jiahui He1, Chaozhi Wang1, Hongyu Wu1, Leiming Yan1,*, Christian Lu2

    Journal of New Media, Vol.1, No.2, pp. 51-61, 2019, DOI:10.32604/jnm.2019.06238

    Abstract Multi-label text categorization refers to the problem of categorizing text through a multi-label learning algorithm. Text classification for Asian languages such as Chinese is different from work for other languages such as English which use spaces to separate words. Before classifying text, it is necessary to perform a word segmentation operation to convert a continuous language into a list of separate words and then convert it into a vector of a certain dimension. Generally, multi-label learning algorithms can be divided into two categories, problem transformation methods and adapted algorithms. This work will use customer's comments about some hotels as a… More >

  • Open Access

    ARTICLE

    A Novel Quantum Stegonagraphy Based on Brown States

    Zhiguo Qu1,*, Tiancheng Zhu2, Jinwei Wang1, Xiaojun Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 47-59, 2018, DOI: 10.3970/cmc.2018.02215

    Abstract In this paper, a novel quantum steganography protocol based on Brown entangled states is proposed. The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states. Comparing with the previous quantum steganography algorithms, the new protocol focuses on its anti-noise capability for the phase-flip noise, which proved its good security resisting on quantum noise. Furthermore, the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility. If the number of… More >

Displaying 41-50 on page 5 of 51. Per Page