Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23,336)
  • Open Access

    ARTICLE

    Relation Extraction for Massive News Texts

    Libo Yin1, Xiang Meng2, Jianxun Li3, Jianguo Sun2,*

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 275-285, 2019, DOI:10.32604/cmc.2019.05556

    Abstract With the development of information technology including Internet technologies, the amount of textual information that people need to process daily is increasing. In order to automatically obtain valuable and user-informed information from massive amounts of textual data, many researchers have conducted in-depth research in the area of entity relation extraction. Based on the existing research of word vector and the method of entity relation extraction, this paper designs and implements an method based on support vector machine (SVM) for extracting English entity relationships from massive news texts. The method converts sentences in natural language into More >

  • Open Access

    ARTICLE

    Improved Fully Convolutional Network for Digital Image Region Forgery Detection

    Jiwei Zhang1, Yueying Li2, Shaozhang Niu1,*, Zhiyi Cao1, Xinyi Wang1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 287-303, 2019, DOI:10.32604/cmc.2019.05353

    Abstract With the rapid development of image editing techniques, the image splicing behavior, typically for those that involve copying a portion from one original image into another targeted image, has become one of the most prevalent challenges in our society. The existing algorithms relying on hand-crafted features can be used to detect image splicing but unfortunately lack precise location information of the tampered region. On the basis of changing the classifications of fully convolutional network (FCN), here we proposed an improved FCN that enables locating the spliced region. Specifically, we first insert the original images into… More >

  • Open Access

    ARTICLE

    Network Embedding-Based Anomalous Density Searching for Multi-Group Collaborative Fraudsters Detection in Social Media

    Chengzhang Zhu1, 2, Wentao Zhao2, *, Qian Li1, Pan Li2, Qiaobo Da3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 317-333, 2019, DOI:10.32604/cmc.2019.05677

    Abstract Detecting collaborative fraudsters who manipulate opinions in social media is becoming extremely important in order to provide reliable information, in which, however, the diversity in different groups of collaborative fraudsters presents a significant challenge to existing collaborative fraudsters detection methods. These methods often detect collaborative fraudsters as the largest group of users who have the strongest relation with each other in the social media, consequently overlooking the other groups of fraudsters that are with strong user relation yet small group size. This paper introduces a novel network embedding-based framework NEST and its instance BEST to… More >

  • Open Access

    ARTICLE

    A Novel Broadband Microstrip Antenna Based on Operation of Multi-Resonant Modes

    Taohua Chen1, Yueyun Chen1,*, Rongling Jian1, Zushen Liu2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 335-349, 2019, DOI:10.32604/cmc.2019.07073

    Abstract A novel broadband microstrip antenna under operation of TM1/2,0, TM10 and TM12 modes through a shorting wall and slots is proposed in this paper. Initially, an inverted U-shaped slot is adopted around the feeding point, which achieves a good impedance matching on TM10 mode and separates the patch into two parts. Additionally, a shorting wall is added underneath the edge of smaller patch to excite another one-quarter resonant mode, i.e., TM1/2,0 mode of smaller patch close to TM10 mode to expand the impedance bandwidth. Further, the antenna width is enlarged and two symmetrical vertical rectangular slots are cut More >

  • Open Access

    ARTICLE

    Fuzzy Search for Multiple Chinese Keywords in Cloud Environment

    Zhongjin Fang1, 2, Jinwei Wang1, *, Baowei Wang1, Jianjun Zhang3, Yunqing Shi4

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 351-363, 2019, DOI:10.32604/cmc.2019.07106

    Abstract With the continuous development of cloud computing and big data technology, the use of cloud storage is more and more extensive, and a large amount of data is outsourced for public cloud servers, and the security problems that follow are gradually emerging. It can not only protect the data privacy of users, but also realize efficient retrieval and use of data, which is an urgent problem for cloud storage. Based on the existing fuzzy search and encrypted data fuzzy search schemes, this paper uses the characteristics of fuzzy sounds and polysemy that are unique to More >

  • Open Access

    ARTICLE

    Knowledge Composition and Its Influence on New Product Development Performance in the Big Data Environment

    Chuanrong Wu1,*, Veronika Lee1, Mark E. McMurtrey2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 365-378, 2019, DOI:10.32604/cmc.2019.06949

    Abstract Product innovation is regarded as a primary means for enterprises to maintain their competitive advantage. Knowledge transfer is a major way that enterprises access knowledge from the external environment for new product innovation. Knowledge transfer may face the risk of infringement of the intellectual property rights of other enterprises and the termination of licensing agreements by the knowledge source. Enterprises must develop independent innovation knowledge at the same time they profit from knowledge transfers. Therefore, new product development by an enterprise usually consists of three types of new knowledge: big data knowledge transferred from big… More >

  • Open Access

    ARTICLE

    Outage Capacity Analysis for Cognitive Non-Orthogonal Multiple Access Downlink Transmissions Systems in the Presence of Channel Estimation Error

    Yinghua Zhang1,2, Yanfang Dong2, Lei Wang1, Jian Liu1,*, Yunfeng Peng1, Jim Feng3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 379-393, 2019, DOI:10.32604/cmc.2019.05790

    Abstract In this paper, we propose a downlink cognitive non-orthogonal multiple access (NOMA) network, where the secondary users (SUs) operate in underlay mode. In the network, secondary transmitter employs NOMA signaling for downlink transmission, and the primary user (PU) is interfered by the transmission from SU. The expressions for the outage probabilities are derived in closed-form for both primary and secondary users in the presence of channel estimation error. Numerical simulation results show that the channel estimation error and the inter-network interference cause degradation of the downlink outage performance. Also the power allocation and the location More >

  • Open Access

    ARTICLE

    A Cross-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1,*, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 395-408, 2019, DOI:10.32604/cmc.2019.05627

    Abstract Tenants in the cloud computing environment share various services, including storage, network, computing, and applications. For better use of services in the cloud computing environment, tenants collaborate in tasks, resulting in challenges to the traditional access control. This study proposes a cross-tenant role-based access control (CT-RBAC) model for collaborative cloud services. This model covers the CT-RBAC0, CT-RBAC1, CT-RBAC2, and CT-RBAC3 models. The model not only extends the RBAC model in the multi-tenant cloud computing mode but also includes four types of authorization modes among tenants. Consequently, the role inheritance constraint is increased, and fine-grained authorization More >

  • Open Access

    ARTICLE

    An Auto-Calibration Approach to Robust and Secure Usage of Accelerometers for Human Motion Analysis in FES Therapies

    Mingxu Sun1,#,*, Yinghang Jiang2,3,#, Qi Liu3,4,*, Xiaodong Liu4

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 67-83, 2019, DOI:10.32604/cmc.2019.06079

    Abstract A Functional Electrical stimulation (FES) therapy is a common rehabilitation intervention after stroke, and finite state machine (FSM) has proven to be an effective and intuitive FES control method. The FSM uses the data information generated by the accelerometer to robustly trigger state transitions. In the medical field, it is necessary to obtain highly safe and accurate acceleration data. In order to ensure the accuracy of the acceleration sensor data without affecting the accuracy of the motion analysis, we need to perform acceleration big data calibration. In this context, we propose a method for robustly More >

  • Open Access

    ARTICLE

    Topological Characterization of Book Graph and Stacked Book Graph

    Raghisa Khalid1, Nazeran Idrees1,*, Muhammad Jawwad Saif2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 41-54, 2019, DOI:10.32604/cmc.2019.06554

    Abstract Degree based topological indices are being widely used in computer-aided modeling, structural activity relations, and drug designing to predict the underlying topological properties of networks and graphs. In this work, we compute the certain important degree based topological indices like Randic index, sum connectivity index, ABC index, ABC4 index, GA index and GA5 index of Book graph Bn and Stacked book graph Bm,n. The results are analyzed by using edge partition, and the general formulas are derived for the above-mentioned families of graphs. More >

Displaying 20211-20220 on page 2022 of 23336. Per Page