Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (951)
  • Open Access

    ARTICLE

    Machine Learning Based Resource Allocation of Cloud Computing in Auction

    Jixian Zhang1, Ning Xie1, Xuejie Zhang1, Kun Yue1, Weidong Li2,*, Deepesh Kumar3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 123-135, 2018, DOI: 10.3970/cmc.2018.03728

    Abstract Resource allocation in auctions is a challenging problem for cloud computing. However, the resource allocation problem is NP-hard and cannot be solved in polynomial time. The existing studies mainly use approximate algorithms such as PTAS or heuristic algorithms to determine a feasible solution; however, these algorithms have the disadvantages of low computational efficiency or low allocate accuracy. In this paper, we use the classification of machine learning to model and analyze the multi-dimensional cloud resource allocation problem and propose two resource allocation prediction algorithms based on linear and logistic regressions. By learning a small-scale training set, the prediction model can… More >

  • Open Access

    ARTICLE

    Region-Aware Trace Signal Selection Using Machine Learning Technique for Silicon Validation and Debug

    R. Agalya1, R. Muthaiah2,*, D. Muralidharan3

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.1, pp. 25-43, 2019, DOI:10.32604/cmes.2019.05616

    Abstract In today’s modern design technology, post-silicon validation is an expensive and composite task. The major challenge involved in this method is that it has limited observability and controllability of internal signals. There will be an issue during execution how to address the useful set of signals and store it in the on-chip trace buffer. The existing approaches are restricted to particular debug set-up where all the components have equivalent prominence at all the time. Practically, the verification engineers will emphasis only on useful functional regions or components. Due to some constraints like clock gating, some of the regions can be… More >

  • Open Access

    ARTICLE

    Data Mining and Machine Learning Methods Applied to 3 A Numerical Clinching Model

    Marco Götz1,*, Ferenc Leichsenring1, Thomas Kropp2, Peter Müller2, Tobias Falk2, Wolfgang Graf1, Michael Kaliske1, Welf-Guntram Drossel2

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 387-423, 2018, DOI:10.31614/cmes.2018.04112

    Abstract Numerical mechanical models used for design of structures and processes are very complex and high-dimensionally parametrised. The understanding of the model characteristics is of interest for engineering tasks and subsequently for an efficient design. Multiple analysis methods are known and available to gain insight into existing models. In this contribution, selected methods from various fields are applied to a real world mechanical engineering example of a currently developed clinching process. The selection of introduced methods comprises techniques of machine learning and data mining, in which the utilization is aiming at a decreased numerical effort. The methods of choice are basically… More >

  • Open Access

    ARTICLE

    Machine Learning Models of Plastic Flow Based on Representation Theory

    R. E. Jones1,*, J. A. Templeton1, C. M. Sanders1, J. T. Ostien1

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.3, pp. 309-342, 2018, DOI:10.31614/cmes.2018.04285

    Abstract We use machine learning (ML) to infer stress and plastic flow rules using data from representative polycrystalline simulations. In particular, we use so-called deep (multilayer) neural networks (NN) to represent the two response functions. The ML process does not choose appropriate inputs or outputs, rather it is trained on selected inputs and output. Likewise, its discrimination of features is crucially connected to the chosen inputoutput map. Hence, we draw upon classical constitutive modeling to select inputs and enforce well-accepted symmetries and other properties. In the context of the results of numerous simulations, we discuss the design, stability and accuracy of… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Algorithm Based on Feature Graph

    Xiang Yu1, Zhihong Tian2, Jing Qiu2,*, Shen Su2,*, Xiaoran Yan3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 255-274, 2019, DOI:10.32604/cmc.2019.05821

    Abstract With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve data imbalance. The assessment of… More >

  • Open Access

    ARTICLE

    Failure Prediction, Lead Time Estimation and Health Degree Assessment for Hard Disk Drives Using Voting Based Decision Trees

    Kamaljit Kaur1, *, Kuljit Kaur2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 913-946, 2019, DOI:10.32604/cmc.2019.07675

    Abstract Hard Disk drives (HDDs) are an essential component of cloud computing and big data, responsible for storing humongous volumes of collected data. However, HDD failures pose a huge challenge to big data servers and cloud service providers. Every year, about 10% disk drives used in servers crash at least twice, lead to data loss, recovery cost and lower reliability. Recently, the researchers have used SMART parameters to develop various prediction techniques, however, these methods need to be improved for reliability and real-world usage due to the following factors: they lack the ability to consider the gradual change/deterioration of HDDs; they… More >

  • Open Access

    ARTICLE

    Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition

    Wentao Ma1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Yuanjing Luo1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 665-677, 2019, DOI:10.32604/cmc.2019.05683

    Abstract As the first barrier to protect cyberspace, the CAPTCHA has made significant contributions to maintaining Internet security and preventing malicious attacks. By researching the CAPTCHA, we can find its vulnerability and improve the security of CAPTCHA. Recently, many studies have shown that improving the image preprocessing effect of the CAPTCHA, which can achieve a better recognition rate by the state-of-the-art machine learning algorithms. There are many kinds of noise and distortion in the CAPTCHA images of this experiment. We propose an adaptive median filtering algorithm based on divide and conquer in this paper. Firstly, the filtering window data quickly sorted… More >

  • Open Access

    ARTICLE

    Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection

    Menghua Luo1,2, Ke Wang1, Zhiping Cai1,*, Anfeng Liu3, Yangyang Li4, Chak Fong Cheang5

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 15-26, 2019, DOI:10.32604/cmc.2019.03708

    Abstract The extreme imbalanced data problem is the core issue in anomaly detection. The amount of abnormal data is so small that we cannot get adequate information to analyze it. The mainstream methods focus on taking fully advantages of the normal data, of which the discrimination method is that the data not belonging to normal data distribution is the anomaly. From the view of data science, we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method. In this kind of technologies, Synthetic Minority Over-sampling Technique and its improved algorithms are representative milestones, which generate synthetic examples… More >

  • Open Access

    ARTICLE

    Research on Hybrid Model of Garlic Short-term Price Forecasting based on Big Data

    Baojia Wang1, Pingzeng Liu1,*, Zhang Chao1, Wang Junmei1, Weijie Chen1, Ning Cao2, Gregory M.P. O’Hare3, Fujiang Wen1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 283-296, 2018, DOI:10.32604/cmc.2018.03791

    Abstract Garlic prices fluctuate dramatically in recent years and it is very difficult to predict garlic prices. The autoregressive integrated moving average (ARIMA) model is currently the most important method for predicting garlic prices. However, the ARIMA model can only predict the linear part of the garlic prices, and cannot predict its nonlinear part. Therefore, it is urgent to adopt a method to analyze the nonlinear characteristics of garlic prices. After comparing the advantages and disadvantages of several major prediction models which used to forecast nonlinear time series, using support vector machine (SVM) model to predict the nonlinear part of garlic… More >

Displaying 941-950 on page 95 of 951. Per Page