Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (190)
  • Open Access

    ARTICLE

    A Support Vector Machine (SVM) Model for Privacy Recommending Data Processing Model (PRDPM) in Internet of Vehicles

    Ali Alqarni*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 389-406, 2025, DOI:10.32604/cmc.2024.059238 - 03 January 2025

    Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacy-preserving measures. The model analyzes data based on user demands and interactions with service More >

  • Open Access

    ARTICLE

    Loss Aware Feature Attention Mechanism for Class and Feature Imbalance Issue

    Yuewei Wu1, Ruiling Fu1, Tongtong Xing1, Fulian Yin1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 751-775, 2025, DOI:10.32604/cmc.2024.057606 - 03 January 2025

    Abstract In the Internet era, recommendation systems play a crucial role in helping users find relevant information from large datasets. Class imbalance is known to severely affect data quality, and therefore reduce the performance of recommendation systems. Due to the imbalance, machine learning algorithms tend to classify inputs into the positive (majority) class every time to achieve high prediction accuracy. Imbalance can be categorized such as by features and classes, but most studies consider only class imbalance. In this paper, we propose a recommendation system that can integrate multiple networks to adapt to a large number… More >

  • Open Access

    ARTICLE

    A Hybrid WSVM-Levy Approach for Energy-Efficient Manufacturing Using Big Data and IoT

    Surbhi Bhatia Khan1,2,*, Mohammad Alojail3, Mahesh Thyluru Ramakrishna4, Hemant Sharma5

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4895-4914, 2024, DOI:10.32604/cmc.2024.057585 - 19 December 2024

    Abstract In Intelligent Manufacturing, Big Data and industrial information enable enterprises to closely monitor and respond to precise changes in both internal processes and external environmental factors, ensuring more informed decision-making and adaptive system management. It also promotes decision making and provides scientific analysis to enhance the efficiency of the operation, cost reduction, maximizing the process of production and so on. Various methods are employed to enhance productivity, yet achieving sustainable manufacturing remains a complex challenge that requires careful consideration. This study aims to develop a methodology for effective manufacturing sustainability by proposing a novel Hybrid… More >

  • Open Access

    PROCEEDINGS

    Multi-Modality In-Situ Monitoring Big Data Mining for Enhanced Insight into the Laser Powder Bed Fusion Process, Structure, and Properties

    Xiayun Zhao1,*, Haolin Zhang1, Md Jahangir Alam1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.2, pp. 1-2, 2024, DOI:10.32604/icces.2024.011479

    Abstract Laser powder bed fusion (LPBF) is one predominant additive manufacturing (AM) technology for producing metallic parts with sophisticated designs that can find numerous applications in critical industries such as aerospace. To achieve precise, resilient, and intelligent LPBF, a comprehensive understanding of the dynamic processes and material responses within the actual conditions of LPBF-based AM is essential. However, obtaining such insights is challenging due to the intricate interactions among the laser, powder, part layers, and gas flow, among other factors. Multimodal in-situ monitoring is desired to visualize diverse process signatures, allowing for the direct and thorough… More >

  • Open Access

    ARTICLE

    Research on Tensor Multi-Clustering Distributed Incremental Updating Method for Big Data

    Hongjun Zhang1,2, Zeyu Zhang3, Yilong Ruan4, Hao Ye5,6, Peng Li1,*, Desheng Shi1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1409-1432, 2024, DOI:10.32604/cmc.2024.055406 - 15 October 2024

    Abstract The scale and complexity of big data are growing continuously, posing severe challenges to traditional data processing methods, especially in the field of clustering analysis. To address this issue, this paper introduces a new method named Big Data Tensor Multi-Cluster Distributed Incremental Update (BDTMCDIncreUpdate), which combines distributed computing, storage technology, and incremental update techniques to provide an efficient and effective means for clustering analysis. Firstly, the original dataset is divided into multiple sub-blocks, and distributed computing resources are utilized to process the sub-blocks in parallel, enhancing efficiency. Then, initial clustering is performed on each sub-block… More >

  • Open Access

    ARTICLE

    Data-Driven Decision-Making for Bank Target Marketing Using Supervised Learning Classifiers on Imbalanced Big Data

    Fahim Nasir1, Abdulghani Ali Ahmed1,*, Mehmet Sabir Kiraz1, Iryna Yevseyeva1, Mubarak Saif2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1703-1728, 2024, DOI:10.32604/cmc.2024.055192 - 15 October 2024

    Abstract Integrating machine learning and data mining is crucial for processing big data and extracting valuable insights to enhance decision-making. However, imbalanced target variables within big data present technical challenges that hinder the performance of supervised learning classifiers on key evaluation metrics, limiting their overall effectiveness. This study presents a comprehensive review of both common and recently developed Supervised Learning Classifiers (SLCs) and evaluates their performance in data-driven decision-making. The evaluation uses various metrics, with a particular focus on the Harmonic Mean Score (F-1 score) on an imbalanced real-world bank target marketing dataset. The findings indicate… More >

  • Open Access

    ARTICLE

    A Quarterly High RFM Mining Algorithm for Big Data Management

    Cuiwei Peng1, Jiahui Chen2,*, Shicheng Wan3, Guotao Xu4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4341-4360, 2024, DOI:10.32604/cmc.2024.054109 - 12 September 2024

    Abstract In today’s highly competitive retail industry, offline stores face increasing pressure on profitability. They hope to improve their ability in shelf management with the help of big data technology. For this, on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior. RFM (recency, frequency, and monetary) pattern mining is a powerful tool to evaluate the value of customer behavior. However, the existing RFM pattern mining algorithms do not consider the quarterly nature of goods, resulting in unreasonable shelf availability and difficulty in profit-making. To solve this problem, we… More >

  • Open Access

    ARTICLE

    Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System

    Farhan Amin, Gyu Sang Choi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3507-3521, 2024, DOI:10.32604/cmc.2024.053183 - 12 September 2024

    Abstract Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community. The call detail records (CDR) of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior. It is evident from the recent literature that cyber-physical systems (CPS) were used in the analytics and modeling of telecom data. In addition, CPS is used to provide valuable services in smart cities. In general, a typical telecom company has millions of subscribers and thus generates massive amounts of data. From this aspect, data storage, analysis, and processing… More >

  • Open Access

    ARTICLE

    Data-Oriented Operating System for Big Data and Cloud

    Selwyn Darryl Kessler, Kok-Why Ng*, Su-Cheng Haw*

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 633-647, 2024, DOI:10.32604/iasc.2024.054154 - 06 September 2024

    Abstract Operating System (OS) is a critical piece of software that manages a computer’s hardware and resources, acting as the intermediary between the computer and the user. The existing OS is not designed for Big Data and Cloud Computing, resulting in data processing and management inefficiency. This paper proposes a simplified and improved kernel on an x86 system designed for Big Data and Cloud Computing purposes. The proposed algorithm utilizes the performance benefits from the improved Input/Output (I/O) performance. The performance engineering runs the data-oriented design on traditional data management to improve data processing speed by… More >

  • Open Access

    ARTICLE

    Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure

    Aodi Liu, Na Wang*, Xuehui Du, Dibin Shan, Xiangyu Wu, Wenjuan Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1705-1726, 2024, DOI:10.32604/cmc.2024.049011 - 25 April 2024

    Abstract Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access control mechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy management efficiency and difficulty in accurately describing the access control policy. To overcome these problems, this paper proposes a big data access control mechanism based on a two-layer permission decision structure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes are introduced in the ABAC model as business constraints between entities. The proposed mechanism implements a two-layer permission decision structure composed… More >

Displaying 1-10 on page 1 of 190. Per Page