Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25,702)
  • Open Access

    ARTICLE

    Suggestion Mining from Opinionated Text of Big Social Media Data

    Youseef Alotaibi1,*, Muhammad Noman Malik2, Huma Hayat Khan3, Anab Batool2, Saif ul Islam4, Abdulmajeed Alsufyani5, Saleh Alghamdi6

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3323-3338, 2021, DOI:10.32604/cmc.2021.016727 - 06 May 2021

    Abstract Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and services. The increasing availability of such big data on biased reviews and blogs creates challenges for customers and businesses in reviewing all content in their decision-making process. To overcome this challenge, extracting suggestions from opinionated text is a possible solution. In this study, the characteristics of suggestions are analyzed and a suggestion mining extraction process is presented for classifying suggestive sentences from online customers’ reviews. A classification using a word-embedding approach is used More >

  • Open Access

    ARTICLE

    Distributed Trusted Computing for Blockchain-Based Crowdsourcing

    Yihuai Liang, Yan Li, Byeong-Seok Shin*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2825-2842, 2021, DOI:10.32604/cmc.2021.016682 - 06 May 2021

    Abstract A centralized trusted execution environment (TEE) has been extensively studied to provide secure and trusted computing. However, a TEE might become a throughput bottleneck if it is used to evaluate data quality when collecting large-scale data in a crowdsourcing system. It may also have security problems compromised by attackers. Here, we propose a scheme, named dTEE, for building a platform for providing distributed trusted computing by leveraging TEEs. The platform is used as an infrastructure of trusted computations for blockchain-based crowdsourcing systems, especially to securely evaluate data quality and manage remuneration: these operations are handled… More >

  • Open Access

    ARTICLE

    An Optimal Big Data Analytics with Concept Drift Detection on High-Dimensional Streaming Data

    Romany F. Mansour1,*, Shaha Al-Otaibi2, Amal Al-Rasheed2, Hanan Aljuaid3, Irina V. Pustokhina4, Denis A. Pustokhin5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2843-2858, 2021, DOI:10.32604/cmc.2021.016626 - 06 May 2021

    Abstract Big data streams started becoming ubiquitous in recent years, thanks to rapid generation of massive volumes of data by different applications. It is challenging to apply existing data mining tools and techniques directly in these big data streams. At the same time, streaming data from several applications results in two major problems such as class imbalance and concept drift. The current research paper presents a new Multi-Objective Metaheuristic Optimization-based Big Data Analytics with Concept Drift Detection (MOMBD-CDD) method on High-Dimensional Streaming Data. The presented MOMBD-CDD model has different operational stages such as pre-processing, CDD, and… More >

  • Open Access

    ARTICLE

    Automated Controller Placement for Software-Defined Networks to Resist DDoS Attacks

    Muhammad Reazul Haque1, Saw Chin Tan1, Zulfadzli Yusoff2,*, Kashif Nisar3,5,6, Lee Ching Kwang2,7, Rizaludin Kaspin4, Bhawani Shankar Chowdhry5, Rajkumar Buyya8, Satya Prasad Majumder9, Manoj Gupta10, Shuaib Memon11

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3147-3165, 2021, DOI:10.32604/cmc.2021.016591 - 06 May 2021

    Abstract In software-defined networks (SDNs), controller placement is a critical factor in the design and planning for the future Internet of Things (IoT), telecommunication, and satellite communication systems. Existing research has concentrated largely on factors such as reliability, latency, controller capacity, propagation delay, and energy consumption. However, SDNs are vulnerable to distributed denial of service (DDoS) attacks that interfere with legitimate use of the network. The ever-increasing frequency of DDoS attacks has made it necessary to consider them in network design, especially in critical applications such as military, health care, and financial services networks requiring high… More >

  • Open Access

    ARTICLE

    Unsupervised Domain Adaptation Based on Discriminative Subspace Learning for Cross-Project Defect Prediction

    Ying Sun1, Yanfei Sun1,2,*, Jin Qi1, Fei Wu1, Xiao-Yuan Jing1,3, Yu Xue4, Zixin Shen5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3373-3389, 2021, DOI:10.32604/cmc.2021.016539 - 06 May 2021

    Abstract Cross-project defect prediction (CPDP) aims to predict the defects on target project by using a prediction model built on source projects. The main problem in CPDP is the huge distribution gap between the source project and the target project, which prevents the prediction model from performing well. Most existing methods overlook the class discrimination of the learned features. Seeking an effective transferable model from the source project to the target project for CPDP is challenging. In this paper, we propose an unsupervised domain adaptation based on the discriminative subspace learning (DSL) approach for CPDP. DSL… More >

  • Open Access

    ARTICLE

    Race Classification Using Deep Learning

    Khalil Khan1, Rehan Ullah Khan2, Jehad Ali3, Irfan Uddin4, Sahib Khan5, Byeong-hee Roh3,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3483-3498, 2021, DOI:10.32604/cmc.2021.016535 - 06 May 2021

    Abstract Race classification is a long-standing challenge in the field of face image analysis. The investigation of salient facial features is an important task to avoid processing all face parts. Face segmentation strongly benefits several face analysis tasks, including ethnicity and race classification. We propose a race-classification algorithm using a prior face segmentation framework. A deep convolutional neural network (DCNN) was used to construct a face segmentation model. For training the DCNN, we label face images according to seven different classes, that is, nose, skin, hair, eyes, brows, back, and mouth. The DCNN model developed in More >

  • Open Access

    ARTICLE

    Tibetan Question Generation Based on Sequence to Sequence Model

    Yuan Sun1,2,*, Chaofan Chen1,2, Andong Chen3, Xiaobing Zhao1,2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3203-3213, 2021, DOI:10.32604/cmc.2021.016517 - 06 May 2021

    Abstract As the dual task of question answering, question generation (QG) is a significant and challenging task that aims to generate valid and fluent questions from a given paragraph. The QG task is of great significance to question answering systems, conversational systems, and machine reading comprehension systems. Recent sequence to sequence neural models have achieved outstanding performance in English and Chinese QG tasks. However, the task of Tibetan QG is rarely mentioned. The key factor impeding its development is the lack of a public Tibetan QG dataset. Faced with this challenge, the present paper first collects… More >

  • Open Access

    ARTICLE

    Prediction of Parkinson’s Disease Using Improved Radial Basis Function Neural Network

    Rajalakshmi Shenbaga Moorthy1,*, P. Pabitha2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3101-3119, 2021, DOI:10.32604/cmc.2021.016489 - 06 May 2021

    Abstract Parkinson’s disease is a neurogenerative disorder and it is difficult to diagnose as no therapies may slow down its progression. This paper contributes a novel analytic system for Parkinson’s Disease Prediction mechanism using Improved Radial Basis Function Neural Network (IRBFNN). Particle swarm optimization (PSO) with K-means is used to find the hidden neuron’s centers to improve the accuracy of IRBFNN. The performance of RBFNN is seriously affected by the centers of hidden neurons. Conventionally K-means was used to find the centers of hidden neurons. The problem of sensitiveness to the random initial centroid in K-means… More >

  • Open Access

    ARTICLE

    Image-to-Image Style Transfer Based on the Ghost Module

    Yan Jiang1, Xinrui Jia1, Liguo Zhang1,2,*, Ye Yuan1, Lei Chen3, Guisheng Yin1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4051-4067, 2021, DOI:10.32604/cmc.2021.016481 - 06 May 2021

    Abstract The technology for image-to-image style transfer (a prevalent image processing task) has developed rapidly. The purpose of style transfer is to extract a texture from the source image domain and transfer it to the target image domain using a deep neural network. However, the existing methods typically have a large computational cost. To achieve efficient style transfer, we introduce a novel Ghost module into the GANILLA architecture to produce more feature maps from cheap operations. Then we utilize an attention mechanism to transform images with various styles. We optimize the original generative adversarial network (GAN) More >

  • Open Access

    ARTICLE

    Phase Error Compensation of Three-Dimensional Reconstruction Combined with Hilbert Transform

    Tao Zhang1,*, Jie Shen1, Shaoen Wu2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3121-3131, 2021, DOI:10.32604/cmc.2021.016362 - 06 May 2021

    Abstract Nonlinear response is an important factor affecting the accuracy of three-dimensional image measurement based on the fringe structured light method. A phase compensation algorithm combined with a Hilbert transform is proposed to reduce the phase error caused by the nonlinear response of a digital projector in the three-dimensional measurement system of fringe structured light. According to the analysis of the influence of Gamma distortion on the phase calculation, the algorithm establishes the relationship model between phase error and harmonic coefficient, introduces phase shift to the signal, and keeps the signal amplitude constant while filtering out… More >

Displaying 14221-14230 on page 1423 of 25702. Per Page