Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,718)
  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve… More >

  • Open Access

    ARTICLE

    YATA: Yet Another Proposal for Traffic Analysis and Anomaly Detection

    Yu Wang1,2,*, Yan Cao2, Liancheng Zhang2, Hongtao Zhang3, Roxana Ohriniuc4, Guodong Wang5, Ruosi Cheng6

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1171-1187, 2019, DOI:10.32604/cmc.2019.05575

    Abstract Network traffic anomaly detection has gained considerable attention over the years in many areas of great importance. Traditional methods used for detecting anomalies produce quantitative results derived from multi-source information. This makes it difficult for administrators to comprehend and deal with the underlying situations. This study proposes another method to yet determine traffic anomaly (YATA), based on the cloud model. YATA adopts forward and backward cloud transformation algorithms to fuse the quantitative value of acquisitions into the qualitative concept of anomaly degree. This method achieves rapid and direct perspective of network traffic. Experimental results with More >

  • Open Access

    ARTICLE

    Data Based Violated Behavior Analysis of Taxi Driver in Metropolis in China

    Jiao Yao1, Yiling Ni1, Jing Zhao2, Huiwei Niu1, Shanyong Liu1, Yuhui Zheng3, Jin Wang4,5,*

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1109-1122, 2019, DOI:10.32604/cmc.2019.06252

    Abstract Violation probability of taxi drivers in metropolis is far more than that of normal drivers because they are labor-intensive, overconfident of self-driving skill, and always searching potential customers, sometimes even picking up or dropping off passengers randomly. In this paper, four types of violated behavior of taxi drivers in metropolis were first summarized, based on which corresponding scale table was initial designed with social statistical method. Furthermore, with certain samples, relative item analysis, exploratory factor analysis, validity analysis and reliability analysis were conducted to verify validity of the initial scale table, based on which some… More >

  • Open Access

    ARTICLE

    Few-Shot Learning with Generative Adversarial Networks Based on WOA13 Data

    Xin Li1,2, Yanchun Liang1,2, Minghao Zhao1,2, Chong Wang1,2,3, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1073-1085, 2019, DOI:10.32604/cmc.2019.05929

    Abstract In recent years, extreme weather events accompanying the global warming have occurred frequently, which brought significant impact on national economic and social development. The ocean is an important member of the climate system and plays an important role in the occurrence of climate anomalies. With continuous improvement of sensor technology, we use sensors to acquire the ocean data for the study on resource detection and disaster prevention, etc. However, the data acquired by the sensor is not enough to be used directly by researchers, so we use the Generative Adversarial Network (GAN) to enhance the… More >

  • Open Access

    ARTICLE

    Failure Prediction, Lead Time Estimation and Health Degree Assessment for Hard Disk Drives Using Voting Based Decision Trees

    Kamaljit Kaur1, *, Kuljit Kaur2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 913-946, 2019, DOI:10.32604/cmc.2019.07675

    Abstract Hard Disk drives (HDDs) are an essential component of cloud computing and big data, responsible for storing humongous volumes of collected data. However, HDD failures pose a huge challenge to big data servers and cloud service providers. Every year, about 10% disk drives used in servers crash at least twice, lead to data loss, recovery cost and lower reliability. Recently, the researchers have used SMART parameters to develop various prediction techniques, however, these methods need to be improved for reliability and real-world usage due to the following factors: they lack the ability to consider the More >

  • Open Access

    ARTICLE

    Multi-Rate Polling: Improve the Performance of Energy Harvesting Backscatter Wireless Networks

    Yu Han1,*, Wenxian Zheng2, Guangjun Wen1, Chu Chu1, Jian Su3, Yibo Zhang4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 795-812, 2019, DOI:10.32604/cmc.2019.05719

    Abstract In recent years, Researchers have proposed the concept of Energy Harvesting Backscatter Wireless Networks (EHBWN). EHBWN usually consists of one sink and several backscatter nodes. Backscatter nodes harvest energy from their environment and communicate with sink through backscattering the carrier wave transmitted by sink. Although a certain amount of access protocols for Energy Harvesting Wireless Networks have been present, they usually do not take the sink’s receiver sensitivity into account, which makes those protocols unsuitable in practice. In this paper, we first give an analysis of the backscatter channel link budget and the relationship between… More >

  • Open Access

    ARTICLE

    Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving

    Lei Xu1, Chungen Xu1,*, Zhongyi Liu1, Yunling Wang2,3, Jianfeng Wang2,3

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 675-690, 2019, DOI:10.32604/cmc.2019.05276

    Abstract With the rapid development of cloud computing and Internet of Things (IoT) technology, massive data raises and shuttles on the network every day. To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party. However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed. Different from traditional encrypted data search scheme, this paper focuses on providing a solution to search the data from one or more IoT device by… More >

  • Open Access

    ARTICLE

    Collaborative Filtering Recommendation Algorithm Based on Multi-Relationship Social Network

    Sheng Bin1,*, Gengxin Sun1, Ning Cao2, Jinming Qiu2, Zhiyong Zheng3, Guohua Yang4, Hongyan Zhao5, Meng Jiang6, Lina Xu7

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 659-674, 2019, DOI:10.32604/cmc.2019.05858

    Abstract Recommendation system is one of the most common applications in the field of big data. The traditional collaborative filtering recommendation algorithm is directly based on user-item rating matrix. However, when there are huge amounts of user and commodities data, the efficiency of the algorithm will be significantly reduced. Aiming at the problem, a collaborative filtering recommendation algorithm based on multi-relational social networks is proposed. The algorithm divides the multi-relational social networks based on the multi-subnet complex network model into communities by using information dissemination method, which divides the users with similar degree into a community. More >

  • Open Access

    ARTICLE

    Key Process Protection of High Dimensional Process Data in Complex Production

    He Shi1,2,3,4, Wenli Shang1,2,3,4,*, Chunyu Chen1,2,3,4, Jianming Zhao1,2,3,4, Long Yin1, 2, 3, 4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 645-658, 2019, DOI:10.32604/cmc.2019.05648

    Abstract In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional More >

  • Open Access

    ARTICLE

    A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

    Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106

    Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only… More >

Displaying 1591-1600 on page 160 of 1718. Per Page