Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Predicting Simplified Thematic Progression Pattern for Discourse Analysis

    Xuefeng Xi1, Victor S. Sheng1, 2, *, Shuhui Yang3, Baochuan Fu1, Zhiming Cui1

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 163-181, 2020, DOI:10.32604/cmc.2020.06992

    Abstract The pattern of thematic progression, reflecting the semantic relationships between contextual two sentences, is an important subject in discourse analysis. We introduce a new corpus of Chinese news discourses annotated with thematic progression information and explore some computational methods to automatically extracting the discourse structural features of simplified thematic progression pattern (STPP) between contextual sentences in a text. Furthermore, these features are used in a hybrid approach to a major discourse analysis task, Chinese coreference resolution. This novel approach is built up via heuristic sieves and a machine learning method that comprehensively utilizes both the top-down STPP features and the… More >

  • Open Access

    ARTICLE

    Coal Rock Condition Detection Model Using Acoustic Emission and Light Gradient Boosting Machine

    Jing Li1, Yong Yang2, *, Hongmei Ge1, Li Zhao3, Ruxue Guo3, 4

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 151-162, 2020, DOI:10.32604/cmc.2020.05649

    Abstract Coal rock mass instability fracture may result in serious hazards to underground coal mining. Acoustic emissions (AE) stimulated by internal structure fracture should carry lots of favorable information about health condition of rock mass. AE as a sensitive non-destructive test method is gradually utilized to detect anomaly conditions of coal rock. This paper proposes an improved multi-resolution feature to extract AE waveform at different frequency resolutions using Coilflet Wavelet Transform method (CWT). It is further adopt an efficient Light Gradient Boosting Machine (LightGBM) by several cascaded sub weak classifier models to merge AE features at different views of frequency for… More >

  • Open Access

    ARTICLE

    A DDoS Attack Information Fusion Method Based on CNN for Multi-Element Data

    Jieren Cheng1, 2, Canting Cai1, *, Xiangyan Tang1, Victor S. Sheng3, Wei Guo1, Mengyang Li1

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 131-150, 2020, DOI:10.32604/cmc.2020.06175

    Abstract Traditional distributed denial of service (DDoS) detection methods need a lot of computing resource, and many of them which are based on single element have high missing rate and false alarm rate. In order to solve the problems, this paper proposes a DDoS attack information fusion method based on CNN for multi-element data. Firstly, according to the distribution, concentration and high traffic abruptness of DDoS attacks, this paper defines six features which are respectively obtained from the elements of source IP address, destination IP address, source port, destination port, packet size and the number of IP packets. Then, we propose… More >

  • Open Access

    ARTICLE

    Cooperative Relay Selection Mechanism in Multi-Hop Networks

    Jian Liu1, Lei Wang1, Changming Zhao2, 3, *, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 119-130, 2020, DOI:10.32604/cmc.2020.06074

    Abstract In this paper, we consider a three-hop relay system based on interference cancellation technique in Underlay cognitive radio (CR) network. Although underlay CR has been shown as a promising technique to better utilize the source of primary users (PUs), its secondary performance will be severely degraded. On one hand, by adapting the Underlay spectrum sharing pattern, secondary users (SUs) would observe the strict power constraints and be interfered by primary users. On the other hand, limited transmit power results in limited transmission range, which greatly degrade the secondary transmission capacity. To solve the problems above, we propose an interference cancellation… More >

  • Open Access

    ARTICLE

    A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid

    Khelifi Naim1, *, Benahmed Khelifa2, Bounaama Fateh3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 97-117, 2020, DOI:10.32604/cmc.2020.09391

    Abstract In order to strengthen their security issues, electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies integration in smart grid fields. Having been treated earlier by several researchers, various detection schemes adapted from attack models that benefit from the smart grid topologies weaknesses, aiming primarily to the identification of suspicious incoming hazards. Wireless meshes have been extensively used in smart grid communication architectures due to their facility, lightness of conception and low cost installation; however, the communicated packets are still exposed to be intercepted maliciously in order either… More >

  • Open Access

    ARTICLE

    Enhanced Portable LUT Multiplier with Gated Power Optimization for Biomedical Therapeutic Devices

    Praveena R1, *

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 85-95, 2020, DOI:10.32604/cmc.2020.08629

    Abstract Digital design of a digital signal processor involves accurate and high-speed mathematical computation units. DSP units are one of the most power consuming and memory occupying devices. Multipliers are the common building blocks in most of the DSP units which demands low power and area constraints in the field of portable biomedical devices. This research works attempts multiple power reduction technique to limit the power dissipation of the proposed LUT multiplier unit. A lookup table-based multiplier has the advantage of almost constant area requirement’s irrespective to the increase in bit size of multiplier. Clock gating is usually used to reduce… More >

  • Open Access

    ARTICLE

    Numerical Analysis of Stochastic Vector Borne Plant Disease Model

    Kamaledin Abodayeh1, Ali Raza2, Muhammad Shoaib Arif2, *, Muhammad Rafiq3, Mairaj Bibi4, Rabia Fayyaz4

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 65-83, 2020, DOI:10.32604/cmc.2020.08838

    Abstract We are associating the solutions of stochastic and deterministic vector borne plant disease model in this manuscript. The dynamics of plant model depends upon threshold number P. If P <1 then condition helpful to eradicate the disease in plants while P >1 explains the persistence of disease. Inappropriately, standard numerical systems do not behave well in certain scenarios. We have been proposed a structure preserving stochastic non-standard finite difference system to analyze the behavior of model. This system is dynamical consistent, positive and bounded as defined by Mickens. More >

  • Open Access

    ARTICLE

    Agglomeration Effects on Static Stability Analysis of Multi-Scale Hybrid Nanocomposite Plates

    Farzad Ebrahimi1, Ali Dabbagh2, Abbas Rastgoo2, Timon Rabczuk3, *

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 41-64, 2020, DOI:10.32604/cmc.2020.07947

    Abstract We propose a multiscale approach to study the influence of carbon nanotubes’ agglomeration on the stability of hybrid nanocomposite plates. The hybrid nanocomposite consists of both macro- and nano-scale reinforcing fibers dispersed in a polymer matrix. The equivalent material properties are calculated by coupling the Eshelby-Mori-Tanaka model with the rule of mixture accounting for effects of CNTs inside the generated clusters. Furthermore, an energy based approach is implemented to obtain the governing equations of the problem utilizing a refined higher-order plate theorem. Subsequently, the derived equations are solved by Galerkin’s analytical method to predict the critical buckling load. The influence… More >

  • Open Access

    ARTICLE

    A Mobile Cloud-Based eHealth Scheme

    Yihe Liu1, Aaqif Afzaal Abbasi2, Atefeh Aghaei3, Almas Abbasi4, Amir Mosavi5, 6, 7, Shahaboddin Shamshirband8, 9, *, Mohammed A. A. Al-qaness10

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 31-39, 2020, DOI:10.32604/cmc.2020.07708

    Abstract Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace. Similarly, the field of health informatics is also considered as an extremely important field. This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis. The developed system has two front ends, the first dedicated for the user to perform the photographing of the trace report. Once the photographing is complete, mobile computing is used to extract the signal. Once the signal is extracted, it is uploaded into the… More >

  • Open Access

    ARTICLE

    Left or Right Hand Classification from Fingerprint Images Using a Deep Neural Network

    Junseob Kim1, Beanbonyka Rim1, Nak-Jun Sung1, Min Hong2, *

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 17-30, 2020, DOI:10.32604/cmc.2020.09044

    Abstract Fingerprint security technology has attracted a great deal of attention in recent years because of its unique biometric information that does not change over an individual’s lifetime and is a highly reliable and secure way to identify a certain individuals. AFIS (Automated Fingerprint Identification System) is a system used by Korean police for identifying a specific person by fingerprint. The AFIS system, however, only selects a list of possible candidates through fingerprints, the exact individual must be found by fingerprint experts. In this paper, we designed a deep learning system using deep convolution network to categorize fingerprints as coming from… More >

Displaying 4191-4200 on page 420 of 5350. Per Page