Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (502)
  • Open Access

    ARTICLE

    Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks

    Khairol Amali bin Ahmad1, Mohammad Nazmul Hasan2, Md. Sharif Hossen2,*, Khaleel Ahmad3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3075-3087, 2021, DOI:10.32604/cmc.2021.014436 - 28 December 2020

    Abstract Pocket Switched Networks (PSN) represent a particular remittent network for direct communication between the handheld mobile devices. Compared to traditional networks, there is no stable topology structure for PSN where the nodes observe the mobility model of human society. It is a kind of Delay Tolerant Networks (DTNs) that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another. Considering its inception, there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the… More >

  • Open Access

    ARTICLE

    Trade-Off between Efficiency and Effectiveness: A Late Fusion Multi-View Clustering Algorithm

    Yunping Zhao1, Weixuan Liang1, Jianzhuang Lu1,*, Xiaowen Chen1, Nijiwa Kong2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2709-2722, 2021, DOI:10.32604/cmc.2021.013389 - 28 December 2020

    Abstract Late fusion multi-view clustering (LFMVC) algorithms aim to integrate the base partition of each single view into a consensus partition. Base partitions can be obtained by performing kernel k-means clustering on all views. This type of method is not only computationally efficient, but also more accurate than multiple kernel k-means, and is thus widely used in the multi-view clustering context. LFMVC improves computational efficiency to the extent that the computational complexity of each iteration is reduced from O(n3) to O(n) (where n is the number of samples). However, LFMVC also limits the search space of the… More >

  • Open Access

    ARTICLE

    Metaheuristic Clustering Protocol for Healthcare Data Collection in Mobile Wireless Multimedia Sensor Networks

    G. Kadiravan1, P. Sujatha1, T. Asvany1, R. Punithavathi2, Mohamed Elhoseny3, Irina V. Pustokhina4, Denis A. Pustokhin5, K. Shankar6,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3215-3231, 2021, DOI:10.32604/cmc.2021.013034 - 28 December 2020

    Abstract Nowadays, healthcare applications necessitate maximum volume of medical data to be fed to help the physicians, academicians, pathologists, doctors and other healthcare professionals. Advancements in the domain of Wireless Sensor Networks (WSN) and Multimedia Wireless Sensor Networks (MWSN) are tremendous. M-WMSN is an advanced form of conventional Wireless Sensor Networks (WSN) to networks that use multimedia devices. When compared with traditional WSN, the quantity of data transmission in M-WMSN is significantly high due to the presence of multimedia content. Hence, clustering techniques are deployed to achieve low amount of energy utilization. The current research work… More >

  • Open Access

    ARTICLE

    Space-Time Cluster Analysis of Accidental Oil Spills in Rivers State, Nigeria, 2011–2019

    Sami Ullah1, Hanita Daud1, Nooraini Zainuddin1, Sarat C. Dass2, Alamgir Khalil3, Hadi Fanaee-T4, Ilyas Khan5,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3065-3074, 2021, DOI:10.32604/cmc.2021.012624 - 28 December 2020

    Abstract Oil spills cause environmental pollution with a serious threat to local communities and sustainable development. Accidental oil spills can be modelled as a stochastic process where each oil spill event is described by its spatial locations and incidence-time and hence allow for space-time cluster analysis. Space-time cluster analysis can detect space-time pattern distribution of oil spills which can be useful for implementing preventive measures and evidence-based decision making. This study aims to detect the space-time clusters of accidental oil spills in Rivers state, Nigeria through the Space-time Scan Statistic. The Space-time Scan Statistic was applied… More >

  • Open Access

    ARTICLE

    Highway Cost Prediction Based on LSSVM Optimized by Intial Parameters

    Xueqing Wang1, Shuang Liu1,*, Lejun Zhang2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 259-269, 2021, DOI:10.32604/csse.2021.014343 - 23 December 2020

    Abstract The cost of highway is affected by many factors. Its composition and calculation are complicated and have great ambiguity. Calculating the cost of highway according to the traditional highway engineering estimation method is a completely tedious task. Constructing a highway cost prediction model can forecast the value promptly and improve the accuracy of highway engineering cost. This work sorts out and collects 60 sets of measured data of highway engineering; establishes an expressway cost index system based on 10 factors, including main route mileage, roadbed width, roadbed earthwork, and number of bridges; and processes the More >

  • Open Access

    ARTICLE

    Impact of Distance Measures on the Performance of AIS Data Clustering

    Marta Mieczyńska1,*, Ireneusz Czarnowski2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 69-82, 2021, DOI:10.32604/csse.2021.014327 - 23 December 2020

    Abstract Automatic Identification System (AIS) data stream analysis is based on the AIS data of different vessel’s behaviours, including the vessels’ routes. When the AIS data consists of outliers, noises, or are incomplete, then the analysis of the vessel’s behaviours is not possible or is limited. When the data consists of outliers, it is not possible to automatically assign the AIS data to a particular vessel. In this paper, a clustering method is proposed to support the AIS data analysis, to qualify noises and outliers with respect to their suitability, and finally to aid the reconstruction… More >

  • Open Access

    ARTICLE

    Application of FCM Algorithm Combined with Articial Neural Network in TBM Operation Data

    Jingyi Fang1, Xueguan Song2, Nianmin Yao3, Maolin Shi2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 397-417, 2021, DOI:10.32604/cmes.2021.012895 - 22 December 2020

    Abstract Fuzzy clustering theory is widely used in data mining of full-face tunnel boring machine. However, the traditional fuzzy clustering algorithm based on objective function is difficult to effectively cluster functional data. We propose a new Fuzzy clustering algorithm, namely FCM–ANN algorithm. The algorithm replaces the clustering prototype of the FCM algorithm with the predicted value of the articial neural network. This makes the algorithm not only satisfy the clustering based on the traditional similarity criterion, but also can effectively cluster the functional data. In this paper, we rst use the t-test as an evaluation index… More >

  • Open Access

    ARTICLE

    A Parallel Approach to Discords Discovery in Massive Time Series Data

    Mikhail Zymbler*, Alexander Grents, Yana Kraeva, Sachin Kumar

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1867-1878, 2021, DOI:10.32604/cmc.2020.014232 - 26 November 2020

    Abstract A discord is a refinement of the concept of an anomalous subsequence of a time series. Being one of the topical issues of time series mining, discords discovery is applied in a wide range of real-world areas (medicine, astronomy, economics, climate modeling, predictive maintenance, energy consumption, etc.). In this article, we propose a novel parallel algorithm for discords discovery on high-performance cluster with nodes based on many-core accelerators in the case when time series cannot fit in the main memory. We assumed that the time series is partitioned across the cluster nodes and achieved parallelization… More >

  • Open Access

    ARTICLE

    A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

    Youseef Alotaibi*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1879-1895, 2021, DOI:10.32604/cmc.2020.013739 - 26 November 2020

    Abstract A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS… More >

  • Open Access

    ARTICLE

    Urdu Ligature Recognition System: An Evolutionary Approach

    Naila Habib Khan1,*, Awais Adnan1, Abdul Waheed2,3, Mahdi Zareei4, Abdallah Aldosary5, Ehab Mahmoud Mohamed6,7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1347-1367, 2021, DOI:10.32604/cmc.2020.013715 - 26 November 2020

    Abstract Cursive text recognition of Arabic script-based languages like Urdu is extremely complicated due to its diverse and complex characteristics. Evolutionary approaches like genetic algorithms have been used in the past for various optimization as well as pattern recognition tasks, reporting exceptional results. The proposed Urdu ligature recognition system uses a genetic algorithm for optimization and recognition. Overall the proposed recognition system observes the processes of pre-processing, segmentation, feature extraction, hierarchical clustering, classification rules and genetic algorithm optimization and recognition. The pre-processing stage removes noise from the sentence images, whereas, in segmentation, the sentences are segmented More >

Displaying 401-410 on page 41 of 502. Per Page