Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    Forecasting E-Commerce Adoption Based on Bidirectional Recurrent Neural Networks

    Abdullah Ali Salamai1,*, Ather Abdulrahman Ageeli1, El-Sayed M. El-kenawy2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5091-5106, 2022, DOI:10.32604/cmc.2022.021268

    Abstract E-commerce refers to a system that allows individuals to purchase and sell things online. The primary goal of e-commerce is to offer customers the convenience of not going to a physical store to make a purchase. They will purchase the item online and have it delivered to their home within a few days. The goal of this research was to develop machine learning algorithms that might predict e-commerce platform sales. A case study has been designed in this paper based on a proposed continuous Stochastic Fractal Search (SFS) based on a Guided Whale Optimization Algorithm (WOA) to optimize the parameter… More >

  • Open Access

    ARTICLE

    Automatic Surveillance of Pandemics Using Big Data and Text Mining

    Abdullah Alharbi1,*, Wael Alosaimi1, M. Irfan Uddin2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 303-317, 2021, DOI:10.32604/cmc.2021.016230

    Abstract COVID-19 disease is spreading exponentially due to the rapid transmission of the virus between humans. Different countries have tried different solutions to control the spread of the disease, including lockdowns of countries or cities, quarantines, isolation, sanitization, and masks. Patients with symptoms of COVID-19 are tested using medical testing kits; these tests must be conducted by healthcare professionals. However, the testing process is expensive and time-consuming. There is no surveillance system that can be used as surveillance framework to identify regions of infected individuals and determine the rate of spread so that precautions can be taken. This paper introduces a… More >

  • Open Access

    ARTICLE

    Delay-dependent Stability of Recurrent Neural Networks with Time-varying Delay

    Guobao Zhanga,b, Jing-Jing Xionga,b, Yongming Huanga,b, Yong Lua,b,c, Ling Wanga,b

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 541-551, 2018, DOI:10.31209/2018.100000021

    Abstract This paper investigates the delay-dependent stability problem of recurrent neural networks with time-varying delay. A new and less conservative stability criterion is derived through constructing a new augmented Lyapunov-Krasovskii functional (LKF) and employing the linear matrix inequality method. A new augmented LKF that considers more information of the slope of neuron activation functions is developed for further reducing the conservatism of stability results. To deal with the derivative of the LKF, several commonly used techniques, including the integral inequality, reciprocally convex combination, and free-weighting matrix method, are applied. Moreover, it is found that the obtained stability criterion has a lower… More >

  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in web services with high accuracy.… More >

  • Open Access

    ARTICLE

    3-Dimensional Bag of Visual Words Framework on Action Recognition

    Shiqi Wang1, Yimin Yang1, *, Ruizhong Wei1, Qingming Jonathan Wu2

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1081-1091, 2020, DOI:10.32604/cmc.2020.09648

    Abstract Human motion recognition plays a crucial role in the video analysis framework. However, a given video may contain a variety of noises, such as an unstable background and redundant actions, that are completely different from the key actions. These noises pose a great challenge to human motion recognition. To solve this problem, we propose a new method based on the 3-Dimensional (3D) Bag of Visual Words (BoVW) framework. Our method includes two parts: The first part is the video action feature extractor, which can identify key actions by analyzing action features. In the video action encoder, by analyzing the action… More >

  • Open Access

    ARTICLE

    OTT Messages Modeling and Classification Based on Recurrent Neural Networks

    Guangyong Yang1, Jianqiu Zeng1, Mengke Yang2, *, Yifei Wei3, Xiangqing Wang3, Zulfiqar Hussain Pathan4

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 769-785, 2020, DOI:10.32604/cmc.2020.07528

    Abstract A vast amount of information has been produced in recent years, which brings a huge challenge to information management. The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages. In this paper, we propose a nine-rectangle-grid information model according to the information value and privacy, and then present information use policies based on the rough set theory. Recurrent neural networks were employed to classify OTT messages. The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages, ending with a reliable trained classification model.… More >

  • Open Access

    ARTICLE

    Smartphone User Authentication Based on Holding Position and Touch-Typing Biometrics

    Yu Sun1,2,*, Qiyuan Gao3, Xiaofan Du3, Zhao Gu3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1365-1375, 2019, DOI:10.32604/cmc.2019.06294

    Abstract In this advanced age, when smart phones are the norm, people utilize social networking, online shopping, and even private information storage through smart phones. As a result, identity authentication has become the most critical security activity in this period of the intelligent craze. By analyzing the shortcomings of the existing authentication methods, this paper proposes an identity authentication method based on the behavior of smartphone users. Firstly, the sensor data and touch-screen data of the smart phone users are collected through android programming. Secondly, the eigenvalues of this data are extracted and sent to the server. Thirdly, the Support Vector… More >

Displaying 11-20 on page 2 of 17. Per Page