Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,484)
  • Open Access

    ARTICLE

    Enforcing Boundary Conditions in Micro-Macro Transition for Second Order Continuum

    Łukasz Kaczmarczyk1

    CMC-Computers, Materials & Continua, Vol.4, No.2, pp. 55-62, 2006, DOI:10.3970/cmc.2006.004.055

    Abstract In recent years the multiscale computational homogenisation has been extensively developed. Such micro-macro modelling does not require any constitutive assumptions at the macro-level. The multi-scale computational homogenisation has also been extended for the second order continuum at the macro level Kouznetsova V.G., Geers M.G.D., and Brekelmans V.A.M (2004). The second-order framework is based on incorporation of the gradient of macroscopic deformation in micro to macro multiscale transition. The introduction of the secondorder continuum at macro-scale takes into account the size effect and gives more accurate results in case of insufficient scale separation. The general framework of computational homogenisation has been… More >

  • Open Access

    ARTICLE

    A Heterogeneous Virtual Machines Resource Allocation Scheme in Slices Architecture of 5G Edge Datacenter

    Changming Zhao1,2,*, Tiejun Wang2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 423-437, 2019, DOI:10.32604/cmc.2019.07501

    Abstract In the paper, we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment. In general, the different slices for different task scenarios exist in the same edge layer synchronously. A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity. In the condition, the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment. Based on the slicing and container concept, we propose the resource allocation scheme named Two-Dimension allocation and… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Algorithm Based on Feature Graph

    Xiang Yu1, Zhihong Tian2, Jing Qiu2,*, Shen Su2,*, Xiaoran Yan3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 255-274, 2019, DOI:10.32604/cmc.2019.05821

    Abstract With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve data imbalance. The assessment of… More >

  • Open Access

    ARTICLE

    Modeling and Predicting of News Popularity in Social Media Sources

    Kemal Akyol1,*, Baha Şen2

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 69-80, 2019, DOI:10.32604/cmc.2019.08143

    Abstract The popularity of news, which conveys newsworthy events which occur during day to people, is substantially important for the spectator or audience. People interact with news website and share news links or their opinions. This study uses supervised learning based machine learning techniques in order to predict news popularity in social media sources. These techniques consist of basically two phrases: a) the training data is sent as input to the classifier algorithm, b) the performance of pre-learned algorithm is tested on the testing data. And so, a knowledge discovery from the data is performed. In this context, firstly, twelve datasets… More >

  • Open Access

    ARTICLE

    Failure Prediction, Lead Time Estimation and Health Degree Assessment for Hard Disk Drives Using Voting Based Decision Trees

    Kamaljit Kaur1, *, Kuljit Kaur2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 913-946, 2019, DOI:10.32604/cmc.2019.07675

    Abstract Hard Disk drives (HDDs) are an essential component of cloud computing and big data, responsible for storing humongous volumes of collected data. However, HDD failures pose a huge challenge to big data servers and cloud service providers. Every year, about 10% disk drives used in servers crash at least twice, lead to data loss, recovery cost and lower reliability. Recently, the researchers have used SMART parameters to develop various prediction techniques, however, these methods need to be improved for reliability and real-world usage due to the following factors: they lack the ability to consider the gradual change/deterioration of HDDs; they… More >

  • Open Access

    ARTICLE

    Retinal Vessel Extraction Framework Using Modified Adaboost Extreme Learning Machine

    B. V. Santhosh Krishna1, *, T. Gnanasekaran2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 855-869, 2019, DOI:10.32604/cmc.2019.07585

    Abstract An explicit extraction of the retinal vessel is a standout amongst the most significant errands in the field of medical imaging to analyze both the ophthalmological infections, for example, Glaucoma, Diabetic Retinopathy (DR), Retinopathy of Prematurity (ROP), Age-Related Macular Degeneration (AMD) as well as non retinal sickness such as stroke, hypertension and cardiovascular diseases. The state of the retinal vasculature is a significant indicative element in the field of ophthalmology. Retinal vessel extraction in fundus imaging is a difficult task because of varying size vessels, moderately low distinction, and presence of pathologies such as hemorrhages, microaneurysms etc. Manual vessel extraction… More >

  • Open Access

    ARTICLE

    Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets

    M. Sivaram1,*, D. Yuvaraj2, Amin Salih Mohammed3, V. Manikandan4, V. Porkodi4, N. Yuvaraj5

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 435-454, 2019, DOI:10.32604/cmc.2019.06295

    Abstract DBTMA relies entirely on RTS/CTS dialogue for un-collided transmission of data. The purpose is to improve the QoS at MAC layer by developing it over 802.11e standard. However, DBTMA does not guarantee real-time constraints without efficient method for controlling the network loads. The main challenges in MANETs include prediction of the available bandwidth, establishing communication with neighboring nodes and predicting the consumption of bandwidth flow. These challenges are provided with solutions using Contention-Aware Admission Control (CACP) protocol. In this paper, the EDBTMA protocol is combined with CACP protocol that introduces bandwidth calculation using admission control strategy. The calculation includes certain… More >

  • Open Access

    ARTICLE

    Multi-Rate Polling: Improve the Performance of Energy Harvesting Backscatter Wireless Networks

    Yu Han1,*, Wenxian Zheng2, Guangjun Wen1, Chu Chu1, Jian Su3, Yibo Zhang4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 795-812, 2019, DOI:10.32604/cmc.2019.05719

    Abstract In recent years, Researchers have proposed the concept of Energy Harvesting Backscatter Wireless Networks (EHBWN). EHBWN usually consists of one sink and several backscatter nodes. Backscatter nodes harvest energy from their environment and communicate with sink through backscattering the carrier wave transmitted by sink. Although a certain amount of access protocols for Energy Harvesting Wireless Networks have been present, they usually do not take the sink’s receiver sensitivity into account, which makes those protocols unsuitable in practice. In this paper, we first give an analysis of the backscatter channel link budget and the relationship between the effective communication range and… More >

  • Open Access

    ARTICLE

    Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition

    Wentao Ma1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Yuanjing Luo1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 665-677, 2019, DOI:10.32604/cmc.2019.05683

    Abstract As the first barrier to protect cyberspace, the CAPTCHA has made significant contributions to maintaining Internet security and preventing malicious attacks. By researching the CAPTCHA, we can find its vulnerability and improve the security of CAPTCHA. Recently, many studies have shown that improving the image preprocessing effect of the CAPTCHA, which can achieve a better recognition rate by the state-of-the-art machine learning algorithms. There are many kinds of noise and distortion in the CAPTCHA images of this experiment. We propose an adaptive median filtering algorithm based on divide and conquer in this paper. Firstly, the filtering window data quickly sorted… More >

Displaying 1461-1470 on page 147 of 1484. Per Page