Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Classification and Research of Skin Lesions Based on Machine Learning

    Jian Liu1, Wantao Wang1, Jie Chen2, *, Guozhong Sun3, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1187-1200, 2020, DOI:10.32604/cmc.2020.05883

    Abstract Classification of skin lesions is a complex identification challenge. Due to the wide variety of skin lesions, doctors need to spend a lot of time and effort to judge the lesion image which zoomed through the dermatoscopy. The diagnosis which the algorithm of identifying pathological images assists doctors gets more and more attention. With the development of deep learning, the field of image recognition has made longterm progress. The effect of recognizing images through convolutional neural network models is better than traditional image recognition technology. In this work, we try to classify seven kinds of lesion images by various models… More >

  • Open Access

    ARTICLE

    A Performance Fault Diagnosis Method for SaaS Software Based on GBDT Algorithm

    Kun Zhu1, Shi Ying1, *, Nana Zhang1, Rui Wang1, Yutong Wu1, Gongjin Lan2, Xu Wang2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1161-1185, 2020, DOI:10.32604/cmc.2020.05247

    Abstract SaaS software that provides services through cloud platform has been more widely used nowadays. However, when SaaS software is running, it will suffer from performance fault due to factors such as the software structural design or complex environments. It is a major challenge that how to diagnose software quickly and accurately when the performance fault occurs. For this challenge, we propose a novel performance fault diagnosis method for SaaS software based on GBDT (Gradient Boosting Decision Tree) algorithm. In particular, we leverage the monitoring mean to obtain the performance log and warning log when the SaaS software system runs, and… More >

  • Open Access

    ARTICLE

    Access Control Policy Based on Friend Circle

    Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1143-1159, 2020, DOI:10.32604/cmc.2020.04949

    Abstract Nowadays, the scale of the user’s personal social network (personal network, a network of the user and their friends, where the user we call “center user”) is becoming larger and more complex. It is difficult to find a suitable way to manage them automatically. In order to solve this problem, we propose an access control model for social network to protect the privacy of the central users, which achieves the access control accurately and automatically. Based on the hybrid friend circle detection algorithm, we consider the aspects of direct judgment, indirect trust judgment and malicious users, a set of multi-angle… More >

  • Open Access

    ARTICLE

    Stochastic Numerical Analysis for Impact of Heavy Alcohol Consumption on Transmission Dynamics of Gonorrhoea Epidemic

    Kamaleldin Abodayeh1, Ali Raza2, *, Muhammad Shoaib Arif2, Muhammad Rafiq3, Mairaj Bibi4, Muhammad Mohsin5

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1125-1142, 2020, DOI:10.32604/cmc.2020.08885

    Abstract This paper aims to perform a comparison of deterministic and stochastic models. The stochastic modelling is a more realistic way to study the dynamics of gonorrhoea infection as compared to its corresponding deterministic model. Also, the deterministic solution is itself mean of the stochastic solution of the model. For numerical analysis, first, we developed some explicit stochastic methods, but unfortunately, they do not remain consistent in certain situations. Then we proposed an implicitly driven explicit method for stochastic heavy alcohol epidemic model. The proposed method is independent of the choice of parameters and behaves well in all scenarios. So, some… More >

  • Open Access

    ARTICLE

    Stabilization for Equal-Order Polygonal Finite Element Method for High Fluid Velocity and Pressure Gradient

    T. Vu-Huu1, 2, C. Le-Thanh3, H. Nguyen-Xuan4, M. Abdel-Wahab5, 6, *

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1109-1123, 2020, DOI:10.32604/cmc.2020.07989

    Abstract This paper presents an adapted stabilisation method for the equal-order mixed scheme of finite elements on convex polygonal meshes to analyse the high velocity and pressure gradient of incompressible fluid flows that are governed by Stokes equations system. This technique is constructed by a local pressure projection which is extremely simple, yet effective, to eliminate the poor or even non-convergence as well as the instability of equal-order mixed polygonal technique. In this research, some numerical examples of incompressible Stokes fluid flow that is coded and programmed by MATLAB will be presented to examine the effectiveness of the proposed stabilised method. More >

  • Open Access

    ARTICLE

    High Speed Network Intrusion Detection System (NIDS) Using Low Power Precomputation Based Content Addressable Memory

    R. Mythili1, *, P. Kalpana2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1097-1107, 2020, DOI:10.32604/cmc.2020.08396

    Abstract NIDS (Network Intrusion Detection Systems) plays a vital role in security threats to computers and networks. With the onset of gigabit networks, hardware-based Intrusion Detection System gains popularity because of its high performance when compared to the software-based NIDS. The software-based system limits parallel execution, which in turn confines the performance of a modern network. This paper presents a signature-based lookup technique using reconfigurable hardware. Content Addressable Memory (CAM) is used as a lookup table architecture to improve the speed instead of search algorithms. To minimize the power and to increase the speed, precomputation based CAM (PBCAM) can be used,… More >

  • Open Access

    ARTICLE

    Ameliorate Security by Introducing Security Server in Software Defined Network

    J. Vijila1, *, A. Albert Raj2

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1077-1096, 2020, DOI:10.32604/cmc.2020.08534

    Abstract Software Defined Network (SDN) deals with huge data processing units which possess network management. However, due to centralization behavior ensuring security in SDN is the major concern. In this work to ensure security, a security server has been at its aid to check the vulnerability of the networks and to keep an eye on the packet according to the screening policies. A Secure Shell Connection (SSH) is established by the security server which does a frequent inspection of the network’s logs. Malware detection and the Intrusion Detection System policies are also incorporated in the server for the effective scanning of… More >

  • Open Access

    ARTICLE

    A Review of Data Cleaning Methods for Web Information System

    Jinlin Wang1, Xing Wang1, *, Yuchen Yang1, Hongli Zhang1, Binxing Fang1

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1053-1075, 2020, DOI:10.32604/cmc.2020.08675

    Abstract Web information system (WIS) is frequently-used and indispensable in daily social life. WIS provides information services in many scenarios, such as electronic commerce, communities, and edutainment. Data cleaning plays an essential role in various WIS scenarios to improve the quality of data service. In this paper, we present a review of the state-of-the-art methods for data cleaning in WIS. According to the characteristics of data cleaning, we extract the critical elements of WIS, such as interactive objects, application scenarios, and core technology, to classify the existing works. Then, after elaborating and analyzing each category, we summarize the descriptions and challenges… More >

  • Open Access

    ARTICLE

    Hybrid Clustering Algorithms with GRASP to Construct an Initial Solution for the MVPPDP

    Abeer I. Alhujaylan1, 2, *, Manar I. Hosny1

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1025-1051, 2020, DOI:10.32604/cmc.2020.08742

    Abstract Mobile commerce (m-commerce) contributes to increasing the popularity of electronic commerce (e-commerce), allowing anybody to sell or buy goods using a mobile device or tablet anywhere and at any time. As demand for e-commerce increases tremendously, the pressure on delivery companies increases to organise their transportation plans to achieve profits and customer satisfaction. One important planning problem in this domain is the multi-vehicle profitable pickup and delivery problem (MVPPDP), where a selected set of pickup and delivery customers need to be served within certain allowed trip time. In this paper, we proposed hybrid clustering algorithms with the greedy randomised adaptive… More >

  • Open Access

    ARTICLE

    Free Vibration Analysis of FG-CNTRC Cylindrical Pressure Vessels Resting on Pasternak Foundation with Various Boundary Conditions

    Mohammad Arefi1, Masoud Mohammadi1, Ali Tabatabaeian1, Timon Rabczuk2, *

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1001-1023, 2020, DOI:10.32604/cmc.2020.08052

    Abstract This study focuses on vibration analysis of cylindrical pressure vessels constructed by functionally graded carbon nanotube reinforced composites (FG-CNTRC). The vessel is under internal pressure and surrounded by a Pasternak foundation. This investigation was founded based on two-dimensional elastic analysis and used Hamilton’s principle to drive the governing equations. The deformations and effectivemechanical properties of the reinforced structure were elicited from the first-order shear theory (FSDT) and rule of mixture, respectively. The main goal of this study is to show the effects of various design parameters such as boundary conditions, reinforcement distribution, foundation parameters, and aspect ratio on the free… More >

Displaying 4221-4230 on page 423 of 5350. Per Page