Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,357)
  • Open Access

    ARTICLE

    Readability Assessment of Textbooks in Low Resource Languages

    Zhijuan Wang1,2, Xiaobin Zhao1,2, Wei Song1,*, Antai Wang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 213-225, 2019, DOI:10.32604/cmc.2019.05690

    Abstract Readability is a fundamental problem in textbooks assessment. For low re-sources languages (LRL), however, little investigation has been done on the readability of textbook. In this paper, we proposed a readability assessment method for Tibetan textbook (a low resource language). We extract features based on the information that are gotten by Tibetan segmentation and named entity recognition. Then, we calculate the correlation of different features using Pearson Correlation Coefficient and select some feature sets to design the readability formula. Fit detection, F test and T test are applied on these selected features to generate a new readability assessment formula. Experiment… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve data imbalance. The assessment of… More >

  • Open Access

    ARTICLE

    Smart Security Framework for Educational Institutions Using Internet of Things (IoT)

    Afzal Badshah1, Anwar Ghani1, Muhammad Ahsan Qureshi2, Shahaboddin Shamshirband,3,4,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 81-101, 2019, DOI:10.32604/cmc.2019.06288

    Abstract Educational institutions are soft targets for the terrorist with massive and defenseless people. In the recent past, numbers of such attacks have been executed around the world. Conducting research, in order to provide a secure environment to the educational institutions is a challenging task. This effort is motivated by recent assaults, made at Army Public School Peshawar, following another attack at Charsada University, Khyber Pukhtun Khwa, Pakistan and also the Santa Fe High School Texas, USA massacre. This study uses the basic technologies of edge computing, cloud computing and IoT to design a smart emergency alarm system framework. IoT is… More >

  • Open Access

    ARTICLE

    A DDoS Attack Situation Assessment Method via Optimized Cloud Model Based on Influence Function

    Xiangyan Tang1, Qidong Zheng1,*, Jieren Cheng1,2, Victor S. Sheng3, Rui Cao1, Meizhu Chen1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1263-1281, 2019, DOI:10.32604/cmc.2019.06173

    Abstract The existing network security situation assessment methods cannot effectively assess the Distributed denial-of-service (DDoS) attack situation. In order to solve these problems, we propose a DDoS attack situation assessment method via optimized cloud model based on influence function. Firstly, according to the state change characteristics of the IP addresses which are accessed by new and old user respectively, this paper defines a fusion feature value. Then, based on this value, we establish a V-Support Vector Machines (V-SVM) classification model to analyze network flow for identifying DDoS attacks. Secondly, according to the change of new and old IP addresses, we propose… More >

  • Open Access

    ARTICLE

    Attention-Aware Network with Latent Semantic Analysis for Clothing Invariant Gait Recognition

    Hefei Ling1, Jia Wu1, Ping Li1,*, Jialie Shen2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1041-1054, 2019, DOI:10.32604/cmc.2019.05605

    Abstract Gait recognition is a complicated task due to the existence of co-factors like carrying conditions, clothing, viewpoints, and surfaces which change the appearance of gait more or less. Among those co-factors, clothing analysis is the most challenging one in the area. Conventional methods which are proposed for clothing invariant gait recognition show the body parts and the underlying relationships from them are important for gait recognition. Fortunately, attention mechanism shows dramatic performance for highlighting discriminative regions. Meanwhile, latent semantic analysis is known for the ability of capturing latent semantic variables to represent the underlying attributes and capturing the relationships from… More >

  • Open Access

    ARTICLE

    Non-Contact Real-Time Heart Rate Measurement Algorithm Based on PPG-Standard Deviation

    Jiancheng Zou1,*, Tianshu Chen1, Xin Yang2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1029-1040, 2019, DOI:10.32604/cmc.2019.05793

    Abstract Heart rate is an important physiological parameter for clinical diagnosis, it can infer the health of the human body. Thus, efficient and accurate heart rate measurement is important for disease diagnosis and health monitoring. There are two ways to measure heart rate. One is contact type and the other is non-contact. Contact measurement methods include pulse cutting, electrocardiogram, etc. Because of the inconvenience of this method, a non-contact heart rate method has been proposed. Traditional non-contact measurement method based on image is collecting RGB three-channel signals in continuous video and selecting the average value of the green channel pixels as… More >

  • Open Access

    ARTICLE

    Research on Public Opinion Propagation Model in Social Network Based on Blockchain

    Gengxin Sun1,*, Sheng Bin1, Meng Jiang2, Ning Cao3, Zhiyong Zheng4, Hongyan Zhao5, Dongbo Wang6, Lina Xu7

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1015-1027, 2019, DOI:10.32604/cmc.2019.05644

    Abstract With the emergence and development of blockchain technology, a new type of social networks based on blockchain had emerged. In these social networks high quality content creators, filters and propagators can all be reasonably motivated. Due to the transparency and traceability brought by blockchain technology, the public opinion propagation in such social networks presents new characteristics and laws. Based on the theory of network propagation and blockchain, a new public opinion propagation model for this kind of social network based on blockchain technology is proposed in this paper. The model considers the effect of incentive mechanism produced by reasonably quantifying… More >

  • Open Access

    ARTICLE

    GaiaWorld: A Novel Blockchain System Based on Competitive PoS Consensus Mechanism

    Rui Song1, Yubo Song1,*, Ziming Liu2, Min Tang2, Kan Zhou3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 973-987, 2019, DOI:10.32604/cmc.2019.06035

    Abstract The birth of blockchain has promoted the development of electronic currencies such as Bitcoin and Ethereum. Blockchain builds a financial system based on cryptology instead of credit, which allows parties to complete the transaction on their own without the need for credible third-party intermediaries. So far, the application scenario of blockchain is mainly confined to the peer-to-peer electronic financial system, which obviously does not fully utilize the potential of blockchain.
    In this paper, we introduce GaiaWorld, a new system for decentralized application. To solve the problem of resource waste and mismatch between nodes and computing power in traditional PoW… More >

  • Open Access

    ARTICLE

    Failure Prediction, Lead Time Estimation and Health Degree Assessment for Hard Disk Drives Using Voting Based Decision Trees

    Kamaljit Kaur1, *, Kuljit Kaur2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 913-946, 2019, DOI:10.32604/cmc.2019.07675

    Abstract Hard Disk drives (HDDs) are an essential component of cloud computing and big data, responsible for storing humongous volumes of collected data. However, HDD failures pose a huge challenge to big data servers and cloud service providers. Every year, about 10% disk drives used in servers crash at least twice, lead to data loss, recovery cost and lower reliability. Recently, the researchers have used SMART parameters to develop various prediction techniques, however, these methods need to be improved for reliability and real-world usage due to the following factors: they lack the ability to consider the gradual change/deterioration of HDDs; they… More >

  • Open Access

    ARTICLE

    A Capacity Improving Scheme in Multi-RSUs Deployed V2I

    Yueyun Chen1,*, Zhuo Zeng1, Taohua Chen1, Zushen Liu2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 835-853, 2019, DOI:10.32604/cmc.2019.07080

    Abstract The communication reliability and system capacity are two of the key performance indicators for Internet of Vehicles (IoV). Existing studies have proposed a variety of technologies to improve reliability and other performance, such as channel selection and power allocation in Vehicle-to-Infrastructure (V2I). However, these researches are mostly applied in a single roadside unit (RSU) scenario without considering inter-cell interference (ICI) of multi-RSUs. In this paper, considering the distribution characteristics of multi-RSUs deployment and corresponding ICI, we propose a reliable uplink transmission scheme to maximize the total capacity and decrease the interference of multi-RSUs (mRSU-DI) in condition of the uplink interruption… More >

Displaying 2311-2320 on page 232 of 2357. Per Page