Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,087)
  • Open Access

    ARTICLE

    Who Will Come: Predicting Freshman Registration Based on Decision Tree

    Lei Yang1, Li Feng1, *, Liwei Tian1, Hongning Dai1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1825-1836, 2020, DOI:10.32604/cmc.2020.010011 - 20 August 2020

    Abstract The registration rate of freshmen has been a great concern at many colleges and universities, particularly private institutions. Traditionally, there are two inquiry methods: telephone and tuition-payment-status. Unfortunately, the former is not only time-consuming but also suffers from the fact that many students tend to keep their choices secret. On the other hand, the latter is not always feasible because only few students are willing to pay their university tuition fees in advance. It is often believed that it is impossible to predict incoming freshmen’s choice of university due to the large amount of subjectivity.… More >

  • Open Access

    ARTICLE

    Computational Analysis of the Effect of Nano Particle Material Motion on Mixed Convection Flow in the Presence of Heat Generation and Absorption

    Muhammad Ashraf1, Amir Abbas1, Saqib Zia2, Yu-Ming Chu3, 4, Ilyas Khan5, *, Kottakkaran Sooppy Nisar6

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1809-1823, 2020, DOI:10.32604/cmc.2020.011404 - 20 August 2020

    Abstract The present study is concerned with the physical behavior of the combined effect of nano particle material motion and heat generation/absorption due to the effect of different parameters involved in prescribed flow model. The formulation of the flow model is based on basic universal equations of conservation of momentum, energy and mass. The prescribed flow model is converted to non-dimensional form by using suitable scaling. The obtained transformed equations are solved numerically by using finite difference scheme. For the analysis of above said behavior the computed numerical data for fluid velocity, temperature profile, and mass… More >

  • Open Access

    ARTICLE

    A Middleware for Polyglot Persistence and Data Portability of Big Data PaaS Cloud Applications

    Kiranbir Kaur1, *, Sandeep Sharma1, Karanjeet Singh Kahlon2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1625-1647, 2020, DOI:10.32604/cmc.2020.011535 - 20 August 2020

    Abstract Vendor lock-in can occur at any layer of the cloud stack-Infrastructure, Platform, and Software-as-a-service. This paper covers the vendor lock-in issue at Platform as a Service (PaaS) level where applications can be created, deployed, and managed without worrying about the underlying infrastructure. These applications and their persisted data on one PaaS provider are not easy to port to another provider. To overcome this issue, we propose a middleware to abstract and make the database services as cloud-agnostic. The middleware supports several SQL and NoSQL data stores that can be hosted and ported among disparate PaaS… More >

  • Open Access

    ARTICLE

    A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies

    Ning Liu1, Fan Yang1, *, Xi Xiong1, 2, Yan Chang1, Shibin Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1559-1570, 2020, DOI:10.32604/cmc.2020.010562 - 20 August 2020

    Abstract Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system. The trust management system evaluates, manages, and shares users’ trust values. The service provider (SP) members of the federation system rely on users’ trust values to determine which type and quality of service will be provided to the users. While identity federation systems have the potential to help federated users save time and energy and improve service experience, the benefits also come with significant privacy risks. So far, there has been little discussion about the privacy protection of… More >

  • Open Access

    ARTICLE

    A Two-Dimension Time-Domain Comparator for Low Power SAR ADCs

    Liangbo Xie1, *, Sheng Li1, Yan Ren1, Zhengwen Huang2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1519-1529, 2020, DOI:10.32604/cmc.2020.011701 - 20 August 2020

    Abstract This paper presents a two-dimension time-domain comparator suitable for low power successive-approximation register (SAR) analog-to-digital converters (ADCs). The proposed two-dimension time-domain comparator consists of a ring oscillator collapsebased comparator and a counter. The propagation delay of a voltage controlled ring oscillator depends on the input. Thus, the comparator can automatically change the comparison time according to its input difference, which can adjust the power consumption of the comparator dynamically without any control logic. And a counter is utilized to count the cycle needed to finish a comparison when the input difference is small. Thus, the More >

  • Open Access

    ARTICLE

    Quantum Hierarchical Agglomerative Clustering Based on One Dimension Discrete Quantum Walk with Single-Point Phase Defects

    Gongde Guo1, Kai Yu1, Hui Wang2, Song Lin1, *, Yongzhen Xu1, Xiaofeng Chen3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1397-1409, 2020, DOI:10.32604/cmc.2020.011399 - 20 August 2020

    Abstract As an important branch of machine learning, clustering analysis is widely used in some fields, e.g., image pattern recognition, social network analysis, information security, and so on. In this paper, we consider the designing of clustering algorithm in quantum scenario, and propose a quantum hierarchical agglomerative clustering algorithm, which is based on one dimension discrete quantum walk with single-point phase defects. In the proposed algorithm, two nonclassical characters of this kind of quantum walk, localization and ballistic effects, are exploited. At first, each data point is viewed as a particle and performed this kind of… More >

  • Open Access

    ARTICLE

    Rate-Energy Tradeoff for Wireless Simultaneous Information and Power Transfer in Full-Duplex and Half-Duplex Systems

    Xiaoye Shi1, *, Jin Sun1, Dongming Li1, Fei Ding2, Zhaowei Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1373-1384, 2020, DOI:10.32604/cmc.2020.011018 - 20 August 2020

    Abstract In this paper, we study the rate-energy tradeoff for wireless simultaneous information and power transfer in full-duplex and half-duplex scenarios. To this end, the weighting function of energy efficiency and transmission rate, as rate-energy tradeoff metric is first introduced and the metric optimization problem is formulated. Applying Karush-Kuhn-Tucker (KKT) conditions for Lagrangian optimality and a series of mathematical approximations, the metric optimization problem can be simplified. The closed-form solution of the power ratio is obtained, building direct relationship between power ratio and the rate-energy tradeoff metric. By choosing power ratio, one can make the tradeoff… More >

  • Open Access

    ARTICLE

    Ensemble Strategy for Insider Threat Detection from User Activity Logs

    Shihong Zou1, Huizhong Sun1, *, Guosheng Xu1, Ruijie Quan2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1321-1334, 2020, DOI:10.32604/cmc.2020.09649 - 20 August 2020

    Abstract In the information era, the core business and confidential information of enterprises/organizations is stored in information systems. However, certain malicious inside network users exist hidden inside the organization; these users intentionally or unintentionally misuse the privileges of the organization to obtain sensitive information from the company. The existing approaches on insider threat detection mostly focus on monitoring, detecting, and preventing any malicious behavior generated by users within an organization’s system while ignoring the imbalanced ground-truth insider threat data impact on security. To this end, to be able to detect insider threats more effectively, a data… More >

  • Open Access

    ARTICLE

    Success Rate Queue-Based Relocation Algorithm of Sensory Network to Overcome Non-Uniformly Distributed Obstacles

    Sooyeon Park1, Moonseong Kim2, Woochan Lee1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1181-1201, 2020, DOI:10.32604/cmc.2020.011245 - 20 August 2020

    Abstract With the recent development of big data technology that collects and analyzes various data, the technology that continuously collects and analyzes the observed data is also drawing attention. Moreover, its importance is growing in data collection in areas where people cannot access. In general, it is not easy to properly deploy IoT wireless devices for data collection in these areas, and it is also inappropriate to use general wheelbased mobile devices for relocation. Recently, researches have been actively carried out on hopping moving models in place of wheel-based movement for the inaccessible regions. The majority… More >

  • Open Access

    ARTICLE

    Mitigating and Monitoring Smart City Using Internet of Things

    Sudan Jha1, Lewis Nkenyereye2, *, Gyanendra Prasad Joshi3, Eunmok Yang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1059-1079, 2020, DOI:10.32604/cmc.2020.011754 - 20 August 2020

    Abstract The present trends in smart world reflects the extensive use of limited resources through information and communication technology. The limited resources like space, mobility, energy, etc., have been consumed rigorously towards creating optimized but smart instances. Thus, a new concept of IoT integrated smart city vision is yet to be proposed which includes a combination of systems like noise and air loss monitoring, web monitoring and fire detection systems, smart waste bin systems, etc., that have not been clearly addressed in the previous researches. This paper focuses on developing an effective system for possible monitoring More >

Displaying 4681-4690 on page 469 of 7087. Per Page