Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,103)
  • Open Access

    ARTICLE

    A Data Download Method from RSUs Using Fog Computing in Connected Vehicles

    Dae-Young Kim1, Seokhoon Kim2,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 375-387, 2019, DOI:10.32604/cmc.2019.06077

    Abstract Communication is important for providing intelligent services in connected vehicles. Vehicles must be able to communicate with different places and exchange information while driving. For service operation, connected vehicles frequently attempt to download large amounts of data. They can request data downloading to a road side unit (RSU), which provides infrastructure for connected vehicles. The RSU is a data bottleneck in a transportation system because data traffic is concentrated on the RSU. Therefore, it is not appropriate for a connected vehicle to always attempt a high speed download from the RSU. If the mobile network… More >

  • Open Access

    ARTICLE

    Computational Machine Learning Representation for the Flexoelectricity Effect in Truncated Pyramid Structures

    Khader M. Hamdia2, Hamid Ghasemi3, Xiaoying Zhuang4,5, Naif Alajlan1, Timon Rabczuk1,2,*

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 79-87, 2019, DOI:10.32604/cmc.2019.05882

    Abstract In this study, machine learning representation is introduced to evaluate the flexoelectricity effect in truncated pyramid nanostructure under compression. A Non-Uniform Rational B-spline (NURBS) based IGA formulation is employed to model the flexoelectricity. We investigate 2D system with an isotropic linear elastic material under plane strain conditions discretized by 45×30 grid of B-spline elements. Six input parameters are selected to construct a deep neural network (DNN) model. They are the Young's modulus, two dielectric permittivity constants, the longitudinal and transversal flexoelectric coefficients and the order of the shape function. The outputs of interest are the More >

  • Open Access

    ARTICLE

    The Prediction of Self-Healing Capacity of Bacteria-Based Concrete Using Machine Learning Approaches

    Xiaoying Zhuang1,2,*, Shuai Zhou3,4

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 57-77, 2019, DOI:10.32604/cmc.2019.04589

    Abstract Advances in machine learning (ML) methods are important in industrial engineering and attract great attention in recent years. However, a comprehensive comparative study of the most advanced ML algorithms is lacking. Six integrated ML approaches for the crack repairing capacity of the bacteria-based self-healing concrete are proposed and compared. Six ML algorithms, including the Support Vector Regression (SVR), Decision Tree Regression (DTR), Gradient Boosting Regression (GBR), Artificial Neural Network (ANN), Bayesian Ridge Regression (BRR) and Kernel Ridge Regression (KRR), are adopted for the relationship modeling to predict crack closure percentage (CCP). Particle Swarm Optimization (PSO) More >

  • Open Access

    ARTICLE

    Region-Aware Trace Signal Selection Using Machine Learning Technique for Silicon Validation and Debug

    R. Agalya1, R. Muthaiah2,*, D. Muralidharan3

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.1, pp. 25-43, 2019, DOI:10.32604/cmes.2019.05616

    Abstract In today’s modern design technology, post-silicon validation is an expensive and composite task. The major challenge involved in this method is that it has limited observability and controllability of internal signals. There will be an issue during execution how to address the useful set of signals and store it in the on-chip trace buffer. The existing approaches are restricted to particular debug set-up where all the components have equivalent prominence at all the time. Practically, the verification engineers will emphasis only on useful functional regions or components. Due to some constraints like clock gating, some… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Algorithm Based on Feature Graph

    Xiang Yu1, Zhihong Tian2, Jing Qiu2,*, Shen Su2,*, Xiaoran Yan3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 255-274, 2019, DOI:10.32604/cmc.2019.05821

    Abstract With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches.… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve… More >

  • Open Access

    ARTICLE

    Failure Prediction, Lead Time Estimation and Health Degree Assessment for Hard Disk Drives Using Voting Based Decision Trees

    Kamaljit Kaur1, *, Kuljit Kaur2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 913-946, 2019, DOI:10.32604/cmc.2019.07675

    Abstract Hard Disk drives (HDDs) are an essential component of cloud computing and big data, responsible for storing humongous volumes of collected data. However, HDD failures pose a huge challenge to big data servers and cloud service providers. Every year, about 10% disk drives used in servers crash at least twice, lead to data loss, recovery cost and lower reliability. Recently, the researchers have used SMART parameters to develop various prediction techniques, however, these methods need to be improved for reliability and real-world usage due to the following factors: they lack the ability to consider the More >

  • Open Access

    ARTICLE

    Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition

    Wentao Ma1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Yuanjing Luo1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 665-677, 2019, DOI:10.32604/cmc.2019.05683

    Abstract As the first barrier to protect cyberspace, the CAPTCHA has made significant contributions to maintaining Internet security and preventing malicious attacks. By researching the CAPTCHA, we can find its vulnerability and improve the security of CAPTCHA. Recently, many studies have shown that improving the image preprocessing effect of the CAPTCHA, which can achieve a better recognition rate by the state-of-the-art machine learning algorithms. There are many kinds of noise and distortion in the CAPTCHA images of this experiment. We propose an adaptive median filtering algorithm based on divide and conquer in this paper. Firstly, the More >

  • Open Access

    ARTICLE

    Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection

    Menghua Luo1,2, Ke Wang1, Zhiping Cai1,*, Anfeng Liu3, Yangyang Li4, Chak Fong Cheang5

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 15-26, 2019, DOI:10.32604/cmc.2019.03708

    Abstract The extreme imbalanced data problem is the core issue in anomaly detection. The amount of abnormal data is so small that we cannot get adequate information to analyze it. The mainstream methods focus on taking fully advantages of the normal data, of which the discrimination method is that the data not belonging to normal data distribution is the anomaly. From the view of data science, we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method. In this kind of technologies, Synthetic Minority Over-sampling Technique and its improved algorithms are representative More >

  • Open Access

    ARTICLE

    Sentiment Analysis System in Big Data Environment

    Wint Nyein Chan1, Thandar Thein2

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 187-202, 2018, DOI:10.32604/csse.2018.33.187

    Abstract Nowadays, Big Data, a large volume of both structured and unstructured data, is generated from Social Media. Social Media are powerful marketing tools and social big data can offer the business insights. The major challenge facing social big data is attaining efficient techniques to collect a large volume of social data and extract insights from the huge amount of collected data. Sentiment Analysis of social big data can provide business insights by extracting the public opinions. The traditional analytic platforms need to be scaled up for analyzing a large volume of social big data. Social… More >

Displaying 1081-1090 on page 109 of 1103. Per Page