Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (126)
  • Open Access

    ARTICLE

    Automatic Clustering of User Behaviour Profiles for Web Recommendation System

    S. Sadesh1,*, Osamah Ibrahim Khalaf2, Mohammad Shorfuzzaman3, Abdulmajeed Alsufyani3, K. Sangeetha4, Mueen Uddin5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3365-3384, 2023, DOI:10.32604/iasc.2023.030751

    Abstract Web usage mining, content mining, and structure mining comprise the web mining process. Web-Page Recommendation (WPR) development by incorporating Data Mining Techniques (DMT) did not include end-users with improved performance in the obtained filtering results. The cluster user profile-based clustering process is delayed when it has a low precision rate. Markov Chain Monte Carlo-Dynamic Clustering (MC2-DC) is based on the User Behavior Profile (UBP) model group’s similar user behavior on a dynamic update of UBP. The Reversible-Jump Concept (RJC) reviews the history with updated UBP and moves to appropriate clusters. Hamilton’s Filtering Framework (HFF) is designed to filter user data… More >

  • Open Access

    ARTICLE

    Artificial Bee Colony with Cuckoo Search for Solving Service Composition

    Fadl Dahan1,2,*, Abdulelah Alwabel3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3385-3402, 2023, DOI:10.32604/iasc.2023.030651

    Abstract In recent years, cloud computing has provided a Software As A Service (SaaS) platform where the software can be reused and applied to fulfill complicated user demands according to specific Quality of Services (QoS) constraints. The user requirements are formulated as a workflow consisting of a set of tasks. However, many services may satisfy the functionality of each task; thus, searching for the composition of the optimal service while maximizing the QoS is formulated as an NP-hard problem. This work will introduce a hybrid Artificial Bee Colony (ABC) with a Cuckoo Search (CS) algorithm to untangle service composition problem. The… More >

  • Open Access

    ARTICLE

    Web Page Recommendation Using Distributional Recurrent Neural Network

    Chaithra1,*, G. M. Lingaraju2, S. Jagannatha3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 803-817, 2023, DOI:10.32604/csse.2023.028770

    Abstract In the data retrieval process of the Data recommendation system, the matching prediction and similarity identification take place a major role in the ontology. In that, there are several methods to improve the retrieving process with improved accuracy and to reduce the searching time. Since, in the data recommendation system, this type of data searching becomes complex to search for the best matching for given query data and fails in the accuracy of the query recommendation process. To improve the performance of data validation, this paper proposed a novel model of data similarity estimation and clustering method to retrieve the… More >

  • Open Access

    ARTICLE

    Systematic Approach for Web Protection Runtime Tools’ Effectiveness Analysis

    Tomás Sureda Riera1,*, Juan Ramón Bermejo Higuera2, Javier Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, José Javier Martínez Herráiz1

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 579-599, 2022, DOI:10.32604/cmes.2022.020976

    Abstract Web applications represent one of the principal vehicles by which attackers gain access to an organization’s network or resources. Thus, different approaches to protect web applications have been proposed to date. Of them, the two major approaches areWeb Application Firewalls (WAF) and Runtime Application Self Protection (RASP). It is, thus, essential to understand the differences and relative effectiveness of both these approaches for effective decisionmaking regarding the security of web applications. Here we present a comparative study between WAF and RASP simulated settings, with the aim to compare their effectiveness and efficiency against different categories of attacks. For this, we… More >

  • Open Access

    ARTICLE

    Association Rule Analysis-Based Identification of Influential Users in the Social Media

    Saqib Iqbal1, Rehan Khan2, Hikmat Ullah Khan2,*, Fawaz Khaled Alarfaj4, Abdullah Mohammed Alomair3, Muzamil Ahmed2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6479-6493, 2022, DOI:10.32604/cmc.2022.030881

    Abstract The exchange of information is an innate and natural process that assist in content dispersal. Social networking sites emerge to enrich their users by providing the facility for sharing information and social interaction. The extensive adoption of social networking sites also resulted in user content generation. There are diverse research areas explored by the researchers to investigate the influence of social media on users and confirmed that social media sites have a significant impact on markets, politics and social life. Facebook is extensively used platform to share information, thoughts and opinions through posts and comments. The identification of influential users… More >

  • Open Access

    ARTICLE

    Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review

    Maryam Abdulaziz Saad Bubukayr1,*, Mounir Frikha2

    Journal of Cyber Security, Vol.4, No.2, pp. 79-94, 2022, DOI:10.32604/jcs.2022.029020

    Abstract Personal data are strongly linked to web browsing history. By visiting a certain website, a user can share her favorite items, location, employment status, financial information, preferences, gender, medical status, news, etc. Therefore, web tracking is considered as one of the most significant internet privacy threats that can have a serious impact on end-users. Usually, it is used by most websites to track visitors through the internet in order to enhance their services and improve search customization. Moreover, selling users’ data to the advertising companies without their permission. Although there are more research efforts focused on third-party tracking to protect… More >

  • Open Access

    ARTICLE

    Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval

    Anil Sharma1,*, Suresh Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1989-2005, 2022, DOI:10.32604/iasc.2022.026095

    Abstract Information Retrieval (IR) systems are developed to fetch the most relevant content matching the user’s information needs from a pool of information. A user expects to get IR results based on the conceptual contents of the query rather than keywords. But traditional IR approaches index documents based on the terms that they contain and ignore semantic descriptions of document contents. This results in a vocabulary gap when queries and documents use different terms to describe the same concept. As a solution to this problem and to improve the performance of IR systems, we have designed a Shallow Neural Network and… More >

  • Open Access

    ARTICLE

    CWoT-Share: Context-Based Web of Things Resource Sharing in Blockchain Environment

    Yangqun Li1,2,*, Jin Qi1,2, Lijuan Min1,2, Hongzhi Yang1,2, Chenyang Zhou1,2, Bonan Jin3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5079-5098, 2022, DOI:10.32604/cmc.2022.027281

    Abstract Web of Things (WoT) resources are not only numerous, but also have a wide range of applications and deployments. The centralized WoT resource sharing mechanism lacks flexibility and scalability, and hence cannot satisfy requirement of distributed resource sharing in large-scale environment. In response to this problem, a trusted and secure mechanism for WoT resources sharing based on context and blockchain (CWoT-Share) was proposed. Firstly, the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context. Then, the flexible resource charging strategies, which reduced the fees paid by the… More >

  • Open Access

    ARTICLE

    An Intelligent Recommendation System for Real Estate Commodity

    Tsung-Yin Ou1, Guan-Yu Lin2, Hsin-Pin Fu1, Shih-Chia Wei1, Wen-Lung Tsai3,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 881-897, 2022, DOI:10.32604/csse.2022.022637

    Abstract Most real estate agents develop new objects by visiting unfamiliar clients, distributing leaflets, or browsing other real estate trading website platforms, whereas consumers often rely on websites to search and compare prices when purchasing real property. In addition to being time consuming, this search process renders it difficult for agents and consumers to understand the status changes of objects. In this study, Python is used to write web crawler and image recognition programs to capture object information from the web pages of real estate agents; perform data screening, arranging, and cleaning; compare the text of real estate object information; as… More >

  • Open Access

    ARTICLE

    Game Outlier Behavior Detection System Based on Dynamic Time Warp Algorithm

    Shinjin Kang1, Soo Kyun Kim2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 219-237, 2022, DOI:10.32604/cmes.2022.018413

    Abstract This paper proposes a methodology for using multi-modal data in gameplay to detect outlier behavior. The proposed methodology collects, synchronizes, and quantifies time-series data from webcams, mouses, and keyboards. Facial expressions are varied on a one-dimensional pleasure axis, and changes in expression in the mouth and eye areas are detected separately. Furthermore, the keyboard and mouse input frequencies are tracked to determine the interaction intensity of users. Then, we apply a dynamic time warp algorithm to detect outlier behavior. The detected outlier behavior graph patterns were the play patterns that the game designer did not intend or play patterns that… More >

Displaying 41-50 on page 5 of 126. Per Page