Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Twitter Media Sentiment Analysis to Convert Non-Informative to Informative Using QER

    C. P. Thamil Selvi1,*, P. Muneeshwari2, K. Selvasheela3, D. Prasanna4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3545-3555, 2023, DOI:10.32604/iasc.2023.031097

    Abstract The term sentiment analysis deals with sentiment classification based on the review made by the user in a social network. The sentiment classification accuracy is evaluated using various selection methods, especially those that deal with algorithm selection. In this work, every sentiment received through user expressions is ranked in order to categorise sentiments as informative and non-informative. In order to do so, the work focus on Query Expansion Ranking (QER) algorithm that takes user text as input and process for sentiment analysis and finally produces the results as informative or non-informative. The challenge is to convert non-informative into informative using… More >

  • Open Access

    ARTICLE

    Foundation Treatment in Urban Underground Engineering Using Big Data Analysis for Smart City Applications

    Fei Liu1,2, Yunkai Zhang1,2, Jian Zhang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 153-172, 2022, DOI:10.32604/cmes.2022.017967

    Abstract A core element of the sustainable approach to global living quality improvement can now become the intensive and organized usage of underground space. There is a growing interest in underground building and growth worldwide. The reduced consumption of electricity, effective preservation of green land, sustainable wastewater and sewage treatment, efficient reverse degradation of the urban environment, and reliable critical infrastructure management can improve the quality of life. At the same time, technological innovations such as artificial intelligence (AI), cloud computing (CC), the internet of things (IoT), and big data analytics (BDA) play a significant role in improved quality of life.… More >

  • Open Access

    ARTICLE

    Analyzing the Implications of Healthcare Data Breaches through Computational Technique

    Ahmed H. Almulihi1, Fawaz Alassery2, Asif Irshad Khan3, Sarita Shukla4, Bineet Kumar Gupta4, Rajeev Kumar4,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1763-1779, 2022, DOI:10.32604/iasc.2022.023460

    Abstract The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that… More >

  • Open Access

    ARTICLE

    Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume

    Norjihan Binti Abdul Ghani1,*, Suraya Hamid1, Muneer Ahmad1, Younes Saadi1, N.Z. Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 913-926, 2022, DOI:10.32604/csse.2022.018467

    Abstract The world health organization (WHO) terms dengue as a serious illness that impacts almost half of the world’s population and carries no specific treatment. Early and accurate detection of spread in affected regions can save precious lives. Despite the severity of the disease, a few noticeable works can be found that involve sentiment analysis to mine accurate intuitions from the social media text streams. However, the massive data explosion in recent years has led to difficulties in terms of storing and processing large amounts of data, as reliable mechanisms to gather the data and suitable techniques to extract meaningful insights… More >

  • Open Access

    ARTICLE

    Abnormal Event Correlation and Detection Based on Network Big Data Analysis

    Zhichao Hu1, Xiangzhan Yu1,*, Jiantao Shi1, Lin Ye1,2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 695-711, 2021, DOI:10.32604/cmc.2021.017574

    Abstract With the continuous development of network technology, various large-scale cyber-attacks continue to emerge. These attacks pose a severe threat to the security of systems, networks, and data. Therefore, how to mine attack patterns from massive data and detect attacks are urgent problems. In this paper, an approach for attack mining and detection is proposed that performs tasks of alarm correlation, false-positive elimination, attack mining, and attack prediction. Based on the idea of CluStream, the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering. The context of an alarm in the attack chain… More >

  • Open Access

    ARTICLE

    A Sensor Network Web Platform Based on WoT Technology

    Shun-Yuan Wang1, Yun-Jung Hsu1, Sung-Jung Hsiao2, Wen-Tsai Sung3,*

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 197-214, 2021, DOI:10.32604/csse.2021.015713

    Abstract This study proposes a Web platform, the Web of Things (WoT), whose Internet of Things (IoT) architecture is used to develop the technology behind a new standard Web platform. When a remote sensor passes data to a microcontroller for processing, the protocol is often not known. This study proposes a WoT platform that enables the use of a browser in a mobile device to control a remote hardware device. An optimized code is written using an artificial intelligence-based algorithm in a microcontroller. Digital data convergence technology is adopted to process the packets of different protocols and place them on the… More >

  • Open Access

    ARTICLE

    Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1899-1918, 2021, DOI:10.32604/cmc.2021.015762

    Abstract This paper proposes a method for improving the data security of wireless sensor networks based on blockchain technology. Blockchain technology is applied to data transfer to build a highly secure wireless sensor network. In this network, the relay stations use microcontrollers and embedded devices, and the microcontrollers, such as Raspberry Pi and Arduino Yun, represents mobile databases. The proposed system uses microcontrollers to facilitate the connection of various sensor devices. By adopting blockchain encryption, the security of sensing data can be effectively improved. A blockchain is a concatenated transaction record that is protected by cryptography. Each section contains the encrypted… More >

  • Open Access

    ARTICLE

    Computing the User Experience via Big Data Analysis: A Case of Uber Services

    Jang Hyun Kim1,2, Dongyan Nan1,*, Yerin Kim2, Min Hyung Park2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2819-2829, 2021, DOI:10.32604/cmc.2021.014922

    Abstract As of 2020, the issue of user satisfaction has generated a significant amount of interest. Therefore, we employ a big data approach for exploring user satisfaction among Uber users. We develop a research model of user satisfaction by expanding the list of user experience (UX) elements (i.e., pragmatic, expectation confirmation, hedonic, and burden) by including more elements, namely: risk, cost, promotion, anxiety, sadness, and anger. Subsequently, we collect 125,768 comments from online reviews of Uber services and perform a sentiment analysis to extract the UX elements. The results of a regression analysis reveal the following: hedonic, promotion, and pragmatic significantly… More >

  • Open Access

    ARTICLE

    The Big Data Analysis on the Camera-based Face Image in Surveillance Cameras*

    Zhiguo Yan, Zheng Xu, Jie Dai

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 123-132, 2018, DOI:10.1080/10798587.2016.1267251

    Abstract In the Big-Data era, currently how to automatically realize acquisition, refining and fast retrieval of the target information in a surveillance video has become an urgent demand in the public security video surveillance field. This paper proposes a new gun-dome camera cooperative system, which solves the above problem partly. The system adopts a master-slave static panorama-variable view dualcamera cooperative video-monitoring system. In this dual-camera system the gun camera static camera) with a wide viewing -angle lenses is in charge of the pedestrian detection and the dome camera can maneuver its focus and cradle orientation to get the clear and enlarged… More >

  • Open Access

    ARTICLE

    Research on the Association of Mobile Social Network Users Privacy Information Based on Big Data Analysis

    Pingshui Wang1,*, Zecheng Wang1, Qinjuan Ma1

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 35-42, 2019, DOI:10.32604/jihpp.2019.05942

    Abstract The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications. The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control. There is little research on the association of user privacy information, so it is not easy to design personalized privacy protection strategy, but also increase the complexity of user privacy settings. Therefore, this paper concentrates on the association of user privacy information taking big data analysis tools, so as to provide data support for personalized privacy protection strategy design. More >

Displaying 1-10 on page 1 of 12. Per Page