Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (108)
  • Open Access


    Ordering Method and Empirical Study on Multiple Factor Sensitivity of Group Social Attitudes Based on Entropy Theory

    Qin He1, Shuang Dong1,*, Yaxin Cheng1

    Computer Systems Science and Engineering, Vol.34, No.4, pp. 225-230, 2019, DOI:10.32604/csse.2019.34.225

    Abstract When studying the various factors affecting a group’s social attitudes, minor changes in a factor will easily cause changes to other factors due to their association and relevance to each other; therefore, such a factor is more sensitive, although there is a difference between sensitivity and importance. In order to comprehensively learn about the influence of multiple factors, explorations based on entropy theory have been conducted to determine the sensitivity of each factor, to specify the difference between the frequency and sensitivity priority of entropy theory, and to provide a method, a way of thinking, and a detailed basis for… More >

  • Open Access


    Modeling and Analysis of Leftover Issues and Release Time Planning in Multi-Release Open Source Software Using Entropy Based Measure

    Meera Sharma1, H. Pham2, V.B. Singh3

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 33-46, 2019, DOI:10.32604/csse.2019.34.033

    Abstract In Open Source Software (OSS), users report different issues on issues tracking systems. Due to time constraint, it is not possible for developers to resolve all the issues in the current release. The leftover issues which are not addressed in the current release are added in the next release issue content. Fixing of issues result in code changes that can be quantified with a measure known as complexity of code changes or entropy. We have developed a 2-dimensional entropy based mathematical model to determine the leftover issues of different releases of five Apache open source products. A model for release… More >

  • Open Access


    Design of Intelligent English Translation Algorithms Based on a Fuzzy Semantic Network

    Ping Wang1 HongGuo Cai2,*, LuKun Wang3

    Intelligent Automation & Soft Computing, Vol.26, No.3, pp. 519-529, 2020, DOI:10.32604/iasc.2020.013929

    Abstract In order to improve the quality of intelligent English translation, an intelligent English translation algorithm based on the fuzzy semantic network is designed. By calculating the distance of fuzzy semantic network, classifying and ordering the English semantics to determine the optimal similarity and outputting the optimal translation results, the experiments show the average BLEU and NIST of the three test sets are 25.85 and 5.8925 respectively. The translation accuracy is higher than 95%. The algorithm can translate 246 Chinese sentences per second. This shows it is a high-performance intelligent translation algorithm and can be applied to practical intelligent translation software. More >

  • Open Access


    Second Law Analysis and Optimization of Elliptical Pin Fin Heat Sinks Using Firefly Algorithm

    Nawaf N. Hamadneh1, Waqar A. Khan2, Ilyas Khan3, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1015-1032, 2020, DOI:10.32604/cmc.2020.011476

    Abstract One of the most significant considerations in the design of a heat sink is thermal management due to increasing thermal flux and miniature in size. These heat sinks utilize plate or pin fins depending upon the required heat dissipation rate. They are designed to optimize overall performance. Elliptical pin fin heat sinks enhance heat transfer rates and reduce the pumping power. In this study, the Firefly Algorithm is implemented to optimize heat sinks with elliptical pin-fins. The pin-fins are arranged in an inline fashion. The natureinspired metaheuristic algorithm performs powerfully and efficiently in solving numerical global optimization problems. Based on… More >

  • Open Access


    C5.0 Decision Tree Model Using Tsallis Entropy and Association Function for General and Medical Dataset

    Uma K.V1,*, Appavu alias Balamurugan S2

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 61-70, 2020, DOI:10.31209/2019.100000153

    Abstract Real world data consists of lot of impurities. Entropy measure will help to handle impurities in a better way. Here, data selection is done by using Naïve Bayes’ theorem. The sample which has posterior probability value greater than that of the threshold value is selected. C5.0 decision tree classifier is taken as base and modified the Gain calculation function using Tsallis entropy and Association function. The proposed classifier model provides more accuracy and smaller tree for general and Medical dataset. Precision value obtained for Medical dataset is more than that of existing method. More >

  • Open Access


    Active Detecting DDoS Attack Approach Based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones

    Hsing‐Chung Chen1,2, Shyi‐Shiun Kuo1,3

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 217-228, 2019, DOI:10.31209/2018.100000057

    Abstract Nowadays, more and more smartphones communicate to each other’s by using some popular Next Generation Instant Messaging (NGIM) applications (Apps) which are based on the blockchain (BC) technologies, such as XChat, via IPv4/IPv6 dual stack network environments. Owing to XChat addresses are soon to be implemented as stealth addresses, any DoS attack activated form malicious XChat node will be treated as a kind of DDoS attack. Therefore, the huge NGIM usages with stealth addresses in IPv4/IPv6 dual stack mobile networks, mobile devices will suffer the Distributed Denial of Service (DDoS) attack from Internet. The probing method is deployed in this… More >

  • Open Access


    An Entropy-Based Model for Recommendation of Taxis’ Cruising Route

    Yizhi Liu1, 2, Xuesong Wang1, 2, Jianxun Liu1, 2, *, Zhuhua Liao1, 2, Yijiang Zhao1, 2, Jianjun Wang1, 2

    Journal on Artificial Intelligence, Vol.2, No.3, pp. 137-148, 2020, DOI:10.32604/jai.2020.010620

    Abstract Cruising route recommendation based on trajectory mining can improve taxidrivers' income and reduce energy consumption. However, existing methods mostly recommend pick-up points for taxis only. Moreover, their performance is not good enough since there lacks a good evaluation model for the pick-up points. Therefore, we propose an entropy-based model for recommendation of taxis' cruising route. Firstly, we select more positional attributes from historical pick-up points in order to obtain accurate spatial-temporal features. Secondly, the information entropy of spatial-temporal features is integrated in the evaluation model. Then it is applied for getting the next pick-up points and further recommending a series… More >

  • Open Access


    Research on Detection Method of Interest Flooding Attack on Content Centric Network

    Yabin Xu1, 2, 3, *, Ting Xu3, Xiaowei Xu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1075-1089, 2020, DOI:10.32604/cmc.2020.09849

    Abstract To improve the attack detection capability of content centric network (CCN), we propose a detection method of interest flooding attack (IFA) making use of the feature of self-similarity of traffic and the information entropy of content name of interest packet. On the one hand, taking advantage of the characteristics of self-similarity is very sensitive to traffic changes, calculating the Hurst index of the traffic, to identify initial IFA attacks. On the other hand, according to the randomness of user requests, calculating the information entropy of content name of the interest packets, to detect the severity of the IFA attack, is.… More >

  • Open Access


    δ-Calculus: A New Approach to Quantifying Location Privacy☆

    Lihua Yin1, Ran Li1, 2, *, Jingquan Ding3, 4, 5, *, Xiao Li3, 4, 5, Yunchuan Guo2, Huibing Zhang6, Ang Li7

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1323-1342, 2020, DOI:10.32604/cmc.2020.09667

    Abstract With the rapid development of mobile wireless Internet and high-precision localization devices, location-based services (LBS) bring more convenience for people over recent years. In LBS, if the original location data are directly provided, serious privacy problems raise. As a response to these problems, a large number of location-privacy protection mechanisms (LPPMs) (including formal LPPMs, FLPPMs, etc.) and their evaluation metrics have been proposed to prevent personal location information from being leakage and quantify privacy leakage. However, existing schemes independently consider FLPPMs and evaluation metrics, without synergizing them into a unifying framework. In this paper, a unified model is proposed to… More >

  • Open Access


    Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs

    Alireza Poordavoodi1, Mohammad Reza Moazami Goudarzi2,*, Hamid Haj Seyyed Javadi3, Amir Masoud Rahmani4, Mohammad Izadikhah5

    CMES-Computer Modeling in Engineering & Sciences, Vol.123, No.2, pp. 525-570, 2020, DOI:10.32604/cmes.2020.08854

    Abstract With the growing number of Web services on the internet, there is a challenge to select the best Web service which can offer more quality-of-service (QoS) values at the lowest price. Another challenge is the uncertainty of QoS values over time due to the unpredictable nature of the internet. In this paper, we modify the interval data envelopment analysis (DEA) models [Wang, Greatbanks and Yang (2005)] for QoS-aware Web service selection considering the uncertainty of QoS attributes in the presence of desirable and undesirable factors. We conduct a set of experiments using a synthesized dataset to show the capabilities of… More >

Displaying 91-100 on page 10 of 108. Per Page