Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,267)
  • Open Access

    ARTICLE

    Examining the Impacts of Key Influencers on Community Development

    Di Shang1,*, Mohammed Ghriga1

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 1-10, 2019, DOI:10.32604/cmc.2019.08217

    Abstract In this research, we aim to identify and investigate the impacts of key influencers on community formations and developments. We assess the impacts of key influencers by analyzing the activities and structure of the social media presence of a local community. Results of our analysis show that key influencers play important roles in connecting the community, transferring information, and improving overall sentiment of the community members. Our findings suggest that community practitioners can apply social network analysis to identify value-added influencers and discover strategies for improving the community and keeping leadership roles. More >

  • Open Access

    ARTICLE

    An Improved End-to-End Memory Network for QA Tasks

    Aziguli Wulamu1,2, Zhenqi Sun1,2, Yonghong Xie1,2,*, Cong Xu1,2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1283-1295, 2019, DOI:10.32604/cmc.2019.07722

    Abstract At present, End-to-End trainable Memory Networks (MemN2N) has proven to be promising in many deep learning fields, especially on simple natural language-based reasoning question and answer (QA) tasks. However, when solving some subtasks such as basic induction, path finding or time reasoning tasks, it remains challenging because of limited ability to learn useful information between memory and query. In this paper, we propose a novel gated linear units (GLU) and local-attention based end-to-end memory networks (MemN2N-GL) motivated by the success of attention mechanism theory in the field of neural machine translation, it shows an improved possibility to develop the ability… More >

  • Open Access

    ARTICLE

    An Integrated Suture Simulation System with Deformation Constraint Under A Suture Control Strategy

    Xiaorui Zhang1,2,3,*, Jiali Duan1, Jia Liu2, Norman I. Badler3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1055-1071, 2019, DOI:10.32604/cmc.2019.03915

    Abstract Current research on suture simulation mainly focus on the construction of suture line, and existing suture simulation systems still need to be improved in terms of diversity, soft tissue effects, and stability. This paper presents an integrated liver suture surgery system composed of three consecutive suture circumstances, which is conducive to liver suture surgery training. The physically-based models used in this simulation are based on different mass-spring models regulated by a special constrained algorithm, which can improve the model accuracy, and stability by appropriately restraining the activity sphere of the surrounding mass nodes around the suture points. We also studied… More >

  • Open Access

    ARTICLE

    A DDoS Attack Situation Assessment Method via Optimized Cloud Model Based on Influence Function

    Xiangyan Tang1, Qidong Zheng1,*, Jieren Cheng1,2, Victor S. Sheng3, Rui Cao1, Meizhu Chen1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1263-1281, 2019, DOI:10.32604/cmc.2019.06173

    Abstract The existing network security situation assessment methods cannot effectively assess the Distributed denial-of-service (DDoS) attack situation. In order to solve these problems, we propose a DDoS attack situation assessment method via optimized cloud model based on influence function. Firstly, according to the state change characteristics of the IP addresses which are accessed by new and old user respectively, this paper defines a fusion feature value. Then, based on this value, we establish a V-Support Vector Machines (V-SVM) classification model to analyze network flow for identifying DDoS attacks. Secondly, according to the change of new and old IP addresses, we propose… More >

  • Open Access

    ARTICLE

    Distant Supervised Relation Extraction with Cost-Sensitive Loss

    Daojian Zeng1,2, Yao Xiao1,2, Jin Wang2,*, Yuan Dai1,2, Arun Kumar Sangaiah3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1251-1261, 2019, DOI:10.32604/cmc.2019.06100

    Abstract Recently, many researchers have concentrated on distant supervision relation extraction (DSRE). DSRE has solved the problem of the lack of data for supervised learning, however, the data automatically labeled by DSRE has a serious problem, which is class imbalance. The data from the majority class obviously dominates the dataset, in this case, most neural network classifiers will have a strong bias towards the majority class, so they cannot correctly classify the minority class. Studies have shown that the degree of separability between classes greatly determines the performance of imbalanced data. Therefore, in this paper we propose a novel model, which… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Quantum Two-Party Geometric Intersection

    Wenjie Liu1,2,*, Yong Xu2, James C. N. Yang3, Wenbin Yu1,2, Lianhua Chi4

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1237-1250, 2019, DOI:10.32604/cmc.2019.03551

    Abstract Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry. As an important field, the privacy-preserving geometric intersection (PGI) problem is when each of the multiple parties has a private geometric graph and seeks to determine whether their graphs intersect or not without revealing their private information. In this study, through representing Alice’s (Bob’s) private geometric graph GA (GB) as the set of numbered grids SA (SB), an efficient privacy-preserving quantum two-party geometric intersection (PQGI) protocol is proposed. In the protocol, the oracle operation OA (OB) is firstly utilized… More >

  • Open Access

    ARTICLE

    Tibetan Multi-Dialect Speech and Dialect Identity Recognition

    Yue Zhao1, Jianjian Yue1, Wei Song1,*, Xiaona Xu1, Xiali Li1, Licheng Wu1, Qiang Ji2

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1223-1235, 2019, DOI:10.32604/cmc.2019.05636

    Abstract Tibetan language has very limited resource for conventional automatic speech recognition so far. It lacks of enough data, sub-word unit, lexicons and word inventories for some dialects. And speech content recognition and dialect classification have been treated as two independent tasks and modeled respectively in most prior works. But the two tasks are highly correlated. In this paper, we present a multi-task WaveNet model to perform simultaneous Tibetan multi-dialect speech recognition and dialect identification. It avoids processing the pronunciation dictionary and word segmentation for new dialects, while, in the meantime, allows training speech recognition and dialect identification in a single… More >

  • Open Access

    ARTICLE

    Sentiment Analysis Method Based on Kmeans and Online Transfer Learning

    Shengting Wu1, Yuling Liu1,*, Jingwen Wang2, Qi Li1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1207-1222, 2019, DOI:10.32604/cmc.2019.05835

    Abstract Sentiment analysis is a research hot spot in the field of natural language processing and content security. Traditional methods are often difficult to handle the problems of large difference in sample distribution and the data in the target domain is transmitted in a streaming fashion. This paper proposes a sentiment analysis method based on Kmeans and online transfer learning in the view of fact that most existing sentiment analysis methods are based on transfer learning and offline transfer learning. We first use the Kmeans clustering algorithm to process data from one or multiple source domains and select the data similar… More >

  • Open Access

    ARTICLE

    Three-Dimensional Numerical Analysis of Blast-Induced Damage Characteristics of the Intact and Jointed Rockmass

    Zhiliang Wang1,*, Youpeng Huang1, Feng Xiong1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1189-1206, 2019, DOI:10.32604/cmc.2019.04972

    Abstract This article reports numerical results investigating the damage evolution and spatial distribution characteristics of intact and jointed rockmass subjected to blast loading. The behaviors of rock material are described by the Holmquist- Johnson-Cook (HJC) constitutive model incorporated in the finite element software LS-DYNA. Results indicate that the damage distribution shows a reverse S-shape attenuation with the increase of the distance from borehole, and a better goodness of fit with the Logistic function is observed. In the single-hole blasting of jointed rockmass, there are two types of regions around the intersection of borehole and joint in which the damage degree is… More >

  • Open Access

    ARTICLE

    YATA: Yet Another Proposal for Traffic Analysis and Anomaly Detection

    Yu Wang1,2,*, Yan Cao2, Liancheng Zhang2, Hongtao Zhang3, Roxana Ohriniuc4, Guodong Wang5, Ruosi Cheng6

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1171-1187, 2019, DOI:10.32604/cmc.2019.05575

    Abstract Network traffic anomaly detection has gained considerable attention over the years in many areas of great importance. Traditional methods used for detecting anomalies produce quantitative results derived from multi-source information. This makes it difficult for administrators to comprehend and deal with the underlying situations. This study proposes another method to yet determine traffic anomaly (YATA), based on the cloud model. YATA adopts forward and backward cloud transformation algorithms to fuse the quantitative value of acquisitions into the qualitative concept of anomaly degree. This method achieves rapid and direct perspective of network traffic. Experimental results with standard dataset indicate that using… More >

Displaying 4661-4670 on page 467 of 5267. Per Page