Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (127)
  • Open Access

    ARTICLE

    Association Rule Analysis-Based Identification of Influential Users in the Social Media

    Saqib Iqbal1, Rehan Khan2, Hikmat Ullah Khan2,*, Fawaz Khaled Alarfaj4, Abdullah Mohammed Alomair3, Muzamil Ahmed2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6479-6493, 2022, DOI:10.32604/cmc.2022.030881

    Abstract The exchange of information is an innate and natural process that assist in content dispersal. Social networking sites emerge to enrich their users by providing the facility for sharing information and social interaction. The extensive adoption of social networking sites also resulted in user content generation. There are diverse research areas explored by the researchers to investigate the influence of social media on users and confirmed that social media sites have a significant impact on markets, politics and social life. Facebook is extensively used platform to share information, thoughts and opinions through posts and comments.… More >

  • Open Access

    ARTICLE

    Web Tracking Domain and Possible Privacy Defending Tools: A Literature Review

    Maryam Abdulaziz Saad Bubukayr1,*, Mounir Frikha2

    Journal of Cyber Security, Vol.4, No.2, pp. 79-94, 2022, DOI:10.32604/jcs.2022.029020

    Abstract Personal data are strongly linked to web browsing history. By visiting a certain website, a user can share her favorite items, location, employment status, financial information, preferences, gender, medical status, news, etc. Therefore, web tracking is considered as one of the most significant internet privacy threats that can have a serious impact on end-users. Usually, it is used by most websites to track visitors through the internet in order to enhance their services and improve search customization. Moreover, selling users’ data to the advertising companies without their permission. Although there are more research efforts focused More >

  • Open Access

    ARTICLE

    Shallow Neural Network and Ontology-Based Novel Semantic Document Indexing for Information Retrieval

    Anil Sharma1,*, Suresh Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1989-2005, 2022, DOI:10.32604/iasc.2022.026095

    Abstract Information Retrieval (IR) systems are developed to fetch the most relevant content matching the user’s information needs from a pool of information. A user expects to get IR results based on the conceptual contents of the query rather than keywords. But traditional IR approaches index documents based on the terms that they contain and ignore semantic descriptions of document contents. This results in a vocabulary gap when queries and documents use different terms to describe the same concept. As a solution to this problem and to improve the performance of IR systems, we have designed… More >

  • Open Access

    ARTICLE

    CWoT-Share: Context-Based Web of Things Resource Sharing in Blockchain Environment

    Yangqun Li1,2,*, Jin Qi1,2, Lijuan Min1,2, Hongzhi Yang1,2, Chenyang Zhou1,2, Bonan Jin3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5079-5098, 2022, DOI:10.32604/cmc.2022.027281

    Abstract Web of Things (WoT) resources are not only numerous, but also have a wide range of applications and deployments. The centralized WoT resource sharing mechanism lacks flexibility and scalability, and hence cannot satisfy requirement of distributed resource sharing in large-scale environment. In response to this problem, a trusted and secure mechanism for WoT resources sharing based on context and blockchain (CWoT-Share) was proposed. Firstly, the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context. Then, the flexible resource charging strategies, which reduced More >

  • Open Access

    ARTICLE

    An Intelligent Recommendation System for Real Estate Commodity

    Tsung-Yin Ou1, Guan-Yu Lin2, Hsin-Pin Fu1, Shih-Chia Wei1, Wen-Lung Tsai3,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 881-897, 2022, DOI:10.32604/csse.2022.022637

    Abstract Most real estate agents develop new objects by visiting unfamiliar clients, distributing leaflets, or browsing other real estate trading website platforms, whereas consumers often rely on websites to search and compare prices when purchasing real property. In addition to being time consuming, this search process renders it difficult for agents and consumers to understand the status changes of objects. In this study, Python is used to write web crawler and image recognition programs to capture object information from the web pages of real estate agents; perform data screening, arranging, and cleaning; compare the text of… More >

  • Open Access

    ARTICLE

    Game Outlier Behavior Detection System Based on Dynamic Time Warp Algorithm

    Shinjin Kang1, Soo Kyun Kim2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 219-237, 2022, DOI:10.32604/cmes.2022.018413

    Abstract This paper proposes a methodology for using multi-modal data in gameplay to detect outlier behavior. The proposed methodology collects, synchronizes, and quantifies time-series data from webcams, mouses, and keyboards. Facial expressions are varied on a one-dimensional pleasure axis, and changes in expression in the mouth and eye areas are detected separately. Furthermore, the keyboard and mouse input frequencies are tracked to determine the interaction intensity of users. Then, we apply a dynamic time warp algorithm to detect outlier behavior. The detected outlier behavior graph patterns were the play patterns that the game designer did not More >

  • Open Access

    ARTICLE

    Study on the Fire Behavior of Sandwich Wall Panels with GFRP Skins and a Wood-Web Core

    Guangjun Sun, Chuting Wang, Lu Wang*

    Journal of Renewable Materials, Vol.10, No.6, pp. 1537-1553, 2022, DOI:10.32604/jrm.2022.018598

    Abstract To investigate the temperature field and residual bearing capacity of the sandwich wall panels with GFRP skins and a wood-web core under a fire, three sandwich walls were tested. One of them was used for static load test and the other two for the one-side fire tests. Besides, temperature probe points were set on the sandwich walls to obtain the temperature distribution. Meanwhile, the model of the sandwich wall was established in the finite element software by the method of core material stiffness equivalent. The temperature distribution and performance reduction of materials were also considered. More >

  • Open Access

    ARTICLE

    Achieving State Space Reduction in Generated Ajax Web Application State Machine

    Nadeem Fakhar Malik1,*, Aamer Nadeem1, Muddassar Azam Sindhu2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 429-455, 2022, DOI:10.32604/iasc.2022.023423

    Abstract The testing of Ajax (Asynchronous JavaScript and XML) web applications poses novel challenges for testers because Ajax constructs dynamic web applications by using Asynchronous communication and run time Document Object Model (DOM) manipulation. Ajax involves extreme dynamism, which induces novel kind of issues like state explosion, triggering state changes and unreachable states etc. that require more demanding web-testing methods. Model based testing is amongst the effective approaches to detect faults in web applications. However, the state model generated for an Ajax application can be enormous and may be hit by state explosion problem for large… More >

  • Open Access

    ARTICLE

    An Automated Word Embedding with Parameter Tuned Model for Web Crawling

    S. Neelakandan1,*, A. Arun2, Raghu Ram Bhukya3, Bhalchandra M. Hardas4, T. Ch. Anil Kumar5, M. Ashok6

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1617-1632, 2022, DOI:10.32604/iasc.2022.022209

    Abstract In recent years, web crawling has gained a significant attention due to the drastic advancements in the World Wide Web. Web Search Engines have the issue of retrieving massive quantity of web documents. One among the web crawlers is the focused crawler, that intends to selectively gather web pages from the Internet. But the efficiency of the focused crawling can easily be affected by the environment of web pages. In this view, this paper presents an Automated Word Embedding with Parameter Tuned Deep Learning (AWE-PTDL) model for focused web crawling. The proposed model involves different… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Advertisement Banner Identification Technique for Effective Piracy Website Detection Process

    Lelisa Adeba Jilcha1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2883-2899, 2022, DOI:10.32604/cmc.2022.023167

    Abstract In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement. Billions of dollars are lost annually because of this illegal act. The current most effective trend to tackle this problem is believed to be blocking those websites, particularly through affiliated government bodies. To do so, an effective detection mechanism is a necessary first step. Some researchers have used various approaches to analyze the possible common features of suspected piracy websites. For instance, most of these websites serve online advertisement, which is considered as their… More >

Displaying 41-50 on page 5 of 127. Per Page