Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394 - 10 June 2020

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in More >

  • Open Access

    ARTICLE

    Prediction of Web Services Reliability Based on Decision Tree Classification Method

    Zhichun Jia1, 2, Qiuyang Han1, Yanyan Li1, Yuqiang Yang1, Xing Xing1, 2, *

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1221-1235, 2020, DOI:10.32604/cmc.2020.09722 - 30 April 2020

    Abstract With the development of the service-oriented computing (SOC), web service has an important and popular solution for the design of the application system to various enterprises. Nowadays, the numerous web services are provided by the service providers on the network, it becomes difficult for users to select the best reliable one from a large number of services with the same function. So it is necessary to design feasible selection strategies to provide users with the reliable services. Most existing methods attempt to select services according to accurate predictions for the quality of service (QoS) values.… More >

  • Open Access

    ARTICLE

    A Temporal Multi-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1, *, Yi Ying1, Yaqin Peng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 861-871, 2020, DOI:10.32604/cmc.2020.07142 - 01 May 2020

    Abstract Multi-tenant collaboration brings the challenge to access control in cloud computing environment. Based on the multi-tenant role-based access control (MTRBAC) model, a Temporal MT-RBAC (TMT-RBAC) model for collaborative cloud services is proposed. It adds the time constraint between trusted tenants, including usable role time constraint based on both calendar and interval time. Analysis shows that the new model strengthens the presentation ability of MT-RBAC model, achieves the finergrained access control, reduces the management costs and enhances the security of multitenant collaboration in cloud computing environment. More >

  • Open Access

    ARTICLE

    Intuitionistic Fuzzy Petri Nets Model Based on Back Propagation Algorithm for Information Services

    Junhua Xi1, *, Kouquan Zheng1, Jianfeng Ma1, Jungang Yang1, Zhiyao Liang2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 605-619, 2020, DOI:10.32604/cmc.2020.06343 - 01 May 2020

    Abstract Intuitionistic fuzzy Petri net is an important class of Petri nets, which can be used to model the knowledge base system based on intuitionistic fuzzy production rules. In order to solve the problem of poor self-learning ability of intuitionistic fuzzy systems, a new Petri net modeling method is proposed by introducing BP (Error Back Propagation) algorithm in neural networks. By judging whether the transition is ignited by continuous function, the intuitionistic fuzziness of classical BP algorithm is extended to the parameter learning and training, which makes Petri network have stronger generalization ability and adaptive function, More >

  • Open Access

    ARTICLE

    Analyser la structure de dispositifs de mise à disposition de données géographiques

    Application aux enjeux de suivi et de gestion du trait de côte en France

    Johan Desbonnet1 , Françoise Gourmelon1, Christophe Claramunt2

    Revue Internationale de Géomatique, Vol.29, No.1, pp. 57-80, 2019, DOI:10.3166/rig.2019.00079

    Abstract Dans le cadre des enjeux de suivi et de gestion du trait de côte, le besoin d’informations et de connaissances sur le milieu côtier accessibles sur le Web est décrit comme un enjeu majeur. Néanmoins sur cette thématique, la stratégie des promoteurs de dispositifs mettant à disposition de l’information géographique numérique reste encore peu connue. Cet article décrit une approche méthodologique en vue d’étudier le volet technique des possibilités de consultation de l’information géographique sur des dispositifs en ligne susceptibles d’être mobilisés dans le suivi et la gestion du trait de côte en France. L’accès More >

  • Open Access

    ARTICLE

    Building an Open Cloud Virtual Dataspace Model for Materials Scientific Data

    Yang Li1, Jianjiang Li1, Peng Shi2, Xiaoning Qin3

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 615-624, 2019, DOI:10.31209/2019.100000116

    Abstract The applications to process large amounts of materials scientific data at different scales, have been placed the field of materials science on the verge of a revolution. This domain faces serious challenges, including diversity of format of scientific data, and missing unified platform for sharing. A Virtual DataSpace model and the evolution model is introduced to organize heterogeneous data according to the user requirements and track the variations of data. The open cloud model is embedded in a materials scientific data sharing platform in our experiments to verify its effectiveness. The results show the model More >

  • Open Access

    EDITORIAL

    Advances in Security and Privacy Technologies for Forthcoming Smart Systems, Services, Computing, and Networks

    Ilsun You, Chang Choi, Vishal Sharma, Isaac Woungang, Bharat K. Bhargava

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 117-119, 2019, DOI:10.31209/2018.100000048

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Ancillary referral patterns in infants after initial assessment in a cardiac developmental outcomes clinic

    Sonia A. Monteiro1, Faridis Serrano1, Rocky Tsang1, Eboni Smith Hollier1, Danielle Guffey2, Lisa Noll1, Robert G. Voigt1, Nancy Ghanayem1, Lara Shekerdemian1

    Congenital Heart Disease, Vol.14, No.5, pp. 797-802, 2019, DOI:10.1111/chd.12789

    Abstract Objective: Neurodevelopmental impairment is common after surgery for congeni‐ tal heart disease (CHD) in infancy. While neurodevelopmental follow‐up of high‐risk patients has increased, the referral patterns for ancillary services following initial evaluation have not been reported. The aim of this study is to describe the rates and patterns of referral at the initial visit to our outcomes clinic of patients who under‐ went surgery for CHD during infancy.
    Outcomes Measures: The Cardiac Developmental Outcomes Program clinic at Texas Children’s Hospital provides routine longitudinal follow‐up with developmental pedi‐ atricians and child psychologists for children who required surgery for… More >

  • Open Access

    ARTICLE

    A Cross-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1,*, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 395-408, 2019, DOI:10.32604/cmc.2019.05627

    Abstract Tenants in the cloud computing environment share various services, including storage, network, computing, and applications. For better use of services in the cloud computing environment, tenants collaborate in tasks, resulting in challenges to the traditional access control. This study proposes a cross-tenant role-based access control (CT-RBAC) model for collaborative cloud services. This model covers the CT-RBAC0, CT-RBAC1, CT-RBAC2, and CT-RBAC3 models. The model not only extends the RBAC model in the multi-tenant cloud computing mode but also includes four types of authorization modes among tenants. Consequently, the role inheritance constraint is increased, and fine-grained authorization More >

  • Open Access

    ARTICLE

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    Dae-Young Kim1, Se Dong Min2, †, Seokhoon Kim3, †, *

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06102

    Abstract The importance of Blockchain and IoT technology have been highlighted in various fields. These are not unaccustomed words anymore in our lives. Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet. The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues. Consequently, we propose… More >

Displaying 81-90 on page 9 of 100. Per Page