Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    State-Space Based Linear Modeling for Human Activity Recognition in Smart Space

    M. Humayun Kabir1, Keshav Thapa2, Jae-Young Yang2, Sung-HyunYang2

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 673-681, 2019, DOI:10.31209/2018.100000035

    Abstract Recognition of human activity is a key element for building intelligent and pervasive environments. Inhabitants interact with several objects and devices while performing any activity. Interactive objects and devices convey information that can be essential factors for activity recognition. Using embedded sensors with devices or objects, it is possible to get object-use sequencing data. This approach does not create discomfort to the user than wearable sensors and has no impact or issue in terms of user privacy than image sensors. In this paper, we propose a linear model for activity recognition based on the state-space method. The activities and sensor… More >

  • Open Access

    ARTICLE

    Unsupervised Anomaly Detection via DBSCAN for KPIs Jitters in Network Managements

    Haiwen Chen1, Guang Yu1, Fang Liu2, Zhiping Cai1, *, Anfeng Liu3, Shuhui Chen1, Hongbin Huang1, Chak Fong Cheang4

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 917-927, 2020, DOI:10.32604/cmc.2020.05981

    Abstract For many Internet companies, a huge amount of KPIs (e.g., server CPU usage, network usage, business monitoring data) will be generated every day. How to closely monitor various KPIs, and then quickly and accurately detect anomalies in such huge data for troubleshooting and recovering business is a great challenge, especially for unlabeled data. The generated KPIs can be detected by supervised learning with labeled data, but the current problem is that most KPIs are unlabeled. That is a time-consuming and laborious work to label anomaly for company engineers. Build an unsupervised model to detect unlabeled data is an urgent need… More >

  • Open Access

    ARTICLE

    Strategy Selection for Moving Target Defense in Incomplete Information Game

    Huan Zhang1, Kangfeng Zheng1, *, Xiujuan Wang2, Shoushan Luo1, Bin Wu1

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 763-786, 2020, DOI:10.32604/cmc.2020.06553

    Abstract As a core component of the network, web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers. Although the moving target defense (MTD) has been proposed to increase the attack difficulty for the attackers, there is no solo approach can cope with different attacks; in addition, it is impossible to implement all these approaches simultaneously due to the resource limitation. Thus, the selection of an optimal defense strategy based on MTD has become the focus of research. In general, the confrontation of two players in… More >

  • Open Access

    ARTICLE

    Modeling the Spike Response for Adaptive Fuzzy Spiking Neurons with Application to a Fuzzy XOR

    A. M. E. Ramírez-Mendoza1

    CMES-Computer Modeling in Engineering & Sciences, Vol.115, No.3, pp. 295-311, 2018, DOI: 10.3970/cmes.2018.00239

    Abstract A spike response model (SRM) based on the spikes generator circuit (SGC) of adaptive fuzzy spiking neurons (AFSNs) is developed. The SRM is simulated in MatlabTM environment. The proposed model is applied to a configuration of a fuzzy exclusive or (fuzzy XOR) operator, as an illustrative example. A description of the comparison of AFSNs with other similar methods is given. The novel method of the AFSNs is used to determine the value of the weights or parameters of the fuzzy XOR, first with dynamic weights or self-tuning parameters that adapt continuously, then with fixed weights obtained after training, finally with… More >

  • Open Access

    ARTICLE

    A Survey on Machine Learning Algorithms in Little-Labeled Data for Motor Imagery-Based Brain-Computer Interfaces

    Yuxi Jia1, Feng Li1,2, Fei Wang1,2,*, Yan Gui1,2,3

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 11-21, 2019, DOI:10.32604/jihpp.2019.05979

    Abstract The Brain-Computer Interfaces (BCIs) had been proposed and used in therapeutics for decades. However, the need of time-consuming calibration phase and the lack of robustness, which are caused by little-labeled data, are restricting the advance and application of BCI, especially for the BCI based on motor imagery (MI). In this paper, we reviewed the recent development in the machine learning algorithm used in the MI-based BCI, which may provide potential solutions for addressing the issue. We classified these algorithms into two categories, namely, and enhancing the representation and expanding the training set. Specifically, these methods of enhancing the representation of… More >

  • Open Access

    ARTICLE

    Multi-Label Chinese Comments Categorization: Comparison of Multi-Label Learning Algorithms

    Jiahui He1, Chaozhi Wang1, Hongyu Wu1, Leiming Yan1,*, Christian Lu2

    Journal of New Media, Vol.1, No.2, pp. 51-61, 2019, DOI:10.32604/jnm.2019.06238

    Abstract Multi-label text categorization refers to the problem of categorizing text through a multi-label learning algorithm. Text classification for Asian languages such as Chinese is different from work for other languages such as English which use spaces to separate words. Before classifying text, it is necessary to perform a word segmentation operation to convert a continuous language into a list of separate words and then convert it into a vector of a certain dimension. Generally, multi-label learning algorithms can be divided into two categories, problem transformation methods and adapted algorithms. This work will use customer's comments about some hotels as a… More >

  • Open Access

    ARTICLE

    Crack Detection and Localization on Wind Turbine Blade Using Machine Learning Algorithms: A Data Mining Approach

    A. Joshuva1, V. Sugumaran2

    Structural Durability & Health Monitoring, Vol.13, No.2, pp. 181-203, 2019, DOI:10.32604/sdhm.2019.00287

    Abstract Wind turbine blades are generally manufactured using fiber type material because of their cost effectiveness and light weight property however, blade get damaged due to wind gusts, bad weather conditions, unpredictable aerodynamic forces, lightning strikes and gravitational loads which causes crack on the surface of wind turbine blade. It is very much essential to identify the damage on blade before it crashes catastrophically which might possibly destroy the complete wind turbine. In this paper, a fifteen tree classification based machine learning algorithms were modelled for identifying and detecting the crack on wind turbine blades. The models are built based on… More >

  • Open Access

    ARTICLE

    A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security

    Changting Shi1, *

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 635-652, 2018, DOI:10.32604/cmc.2018.03754

    Abstract In the last decade, IoT has been widely used in smart cities, autonomous driving and Industry 4.0, which lead to improve efficiency, reliability, security and economic benefits. However, with the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the IoT security is being confronted with a series of new threats and challenges. IoT device identification via Radio Frequency Fingerprinting (RFF) extracting from radio signals is a physical-layer method for IoT security. In physical-layer, RFF is a unique characteristic of IoT device themselves, which can difficultly be tampered. Just as people’s unique fingerprinting,… More >

Displaying 71-80 on page 8 of 78. Per Page