Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    A Method for Vulnerability Database Quantitative Evaluation

    Tiantian Tan1,*, Baosheng Wang1, Yong Tang1, Xu Zhou1, Jingwen Han2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1129-1144, 2019, DOI:10.32604/cmc.2019.06051

    Abstract During system development, implementation and operation, vulnerability database technique is necessary to system security; there are many vulnerability databases but a lack of quality standardization and general evaluation method are needed. this paper summarized current international popular vulnerability databases, systematically introduced the present situation of current vulnerability databases, and found the problems of vulnerability database technology, extracted common metrics by analyzing vulnerability data of current popular vulnerability databases, introduced 4 measure indexes: the number scale of vulnerabilities, the independence level, the standardization degree and the integrity of vulnerability description, proposed a method for vulnerability database quantitative evaluation using SCAP protocol… More >

  • Open Access

    ARTICLE

    Adaptive Handover Decision Inspired By Biological Mechanism in Vehicle Ad-hoc Networks

    Xuting Duan1,2,3, Jingyi Wei1,2,3, Daxin Tian1,2,3,*, Jianshan Zhou1,2,3,4, Haiying Xia5, Xin Li6, Kunxian Zheng1,2,3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1117-1128, 2019, DOI:10.32604/cmc.2019.05578

    Abstract In vehicle ad-hoc networks (VANETs), the proliferation of wireless communication will give rise to the heterogeneous access environment where network selection becomes significant. Motivated by the self-adaptive paradigm of cellular attractors, this paper regards an individual communication as a cell, so that we can apply the revised attractor selection model to induce each connected vehicle. Aiming at improving the Quality of Service (QoS), we presented the bio-inspired handover decision-making mechanism. In addition, we employ the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) for any vehicle to choose an access network. This paper proposes a novel framework… More >

  • Open Access

    ARTICLE

    MMLUP: Multi-Source & Multi-Task Learning for User Profiles in Social Network

    Dongjie Zhu1, Yuhua Wang1, Chuiju You2,*, Jinming Qiu2,3, Ning Cao2, Chenjing Gong4, Guohua Yang5, Helen Min Zhou6

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1105-1115, 2019, DOI:10.32604/cmc.2019.06041

    Abstract With the rapid development of the mobile Internet, users generate massive data in different forms in social network every day, and different characteristics of users are reflected by these social media data. How to integrate multiple heterogeneous information and establish user profiles from multiple perspectives plays an important role in providing personalized services, marketing, and recommendation systems. In this paper, we propose Multi-source & Multi-task Learning for User Profiles in Social Network which integrates multiple social data sources and contains a multi-task learning framework to simultaneously predict various attributes of a user. Firstly, we design their own feature extraction models… More >

  • Open Access

    ARTICLE

    Research on Flight First Service Model and Algorithms for the Gate Assignment Problem

    Jiarui Zhang1, Gang Wang2,*, Siyuan Tong1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1091-1104, 2019, DOI:10.32604/cmc.2019.05907

    Abstract Aiming at the problem of gate allocation of transit flights, a flight first service model is established. Under the constraints of maximizing the utilization rate of gates and minimizing the transit time, the idea of “first flight serving first” is used to allocate the first time, and then the hybrid algorithm of artificial fish swarm and simulated annealing is used to find the optimal solution. That means the fish swarm algorithm with the swallowing behavior is employed to find the optimal solution quickly, and the simulated annealing algorithm is used to obtain a global optimal allocation scheme for the optimal… More >

  • Open Access

    ARTICLE

    Security Analysis of Smart Speaker: Security Attacks and Mitigation

    Youngseok Park1, Hyunsang Choi1, Sanghyun Cho1, Young-Gab Kim2,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1075-1090, 2019, DOI:10.32604/cmc.2019.08520

    Abstract The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack… More >

  • Open Access

    ARTICLE

    Genetic-Frog-Leaping Algorithm for Text Document Clustering

    Lubna Alhenak1, Manar Hosny1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1045-1074, 2019, DOI:10.32604/cmc.2019.08355

    Abstract In recent years, the volume of information in digital form has increased tremendously owing to the increased popularity of the World Wide Web. As a result, the use of techniques for extracting useful information from large collections of data, and particularly documents, has become more necessary and challenging. Text clustering is such a technique; it consists in dividing a set of text documents into clusters (groups), so that documents within the same cluster are closely related, whereas documents in different clusters are as different as possible. Clustering depends on measuring the content (i.e., words) of a document in terms of… More >

  • Open Access

    ARTICLE

    A Stochastic Numerical Analysis for Computer Virus Model with Vertical Transmission Over the Internet

    Muhammad Shoaib Arif1, Ali Raza1, Wasfi Shatanawi2, 3, *, Muhammad Rafiq4, Mairaj Bibi5

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1025-1043, 2019, DOI:10.32604/cmc.2019.08405

    Abstract We are presenting the numerical analysis for stochastic SLBR model of computer virus over the internet in this manuscript. We are going to present the results of stochastic and deterministic computer virus model. Outcomes of the threshold number C* hold in stochastic computer virus model. If C*<1 then in such a condition virus controlled in the computer population while C*>1 shows virus spread in the computer population. Unfortunately, stochastic numerical techniques fail to cope with large step sizes of time. The suggested structure of the stochastic non-standard finite difference scheme (SNSFD) maintains all diverse characteristics such as dynamical consistency, bounded-ness… More >

  • Open Access

    ARTICLE

    Automated Negotiation in E Commerce: Protocol Relevance and Improvement Techniques

    S. R. Vij1,*, D. Mukhopadhyay2, A. J. Agrawal3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1009-1024, 2019, DOI:10.32604/cmc.2019.08417

    Abstract We all negotiate, formally or informally, in jobs, in day today lives and outcomes of negotiations affect those processes of life. Although negotiation is an intrinsic nature of human psyche, it is very complex phenomenon to implement using computing and internet for the various purposes in E Commerce. Automation of negotiation process poses unique challenges for computer scientists and researchers, so here we study how negotiation can be modeled and analyzed mathematically, what can be different techniques and strategies or set of rules/protocols to be implemented and how they can be relevantly implemented. We are in a quest to find… More >

  • Open Access

    ARTICLE

    SVM Model Selection Using PSO for Learning Handwritten Arabic Characters

    Mamouni El Mamoun1,*, Zennaki Mahmoud1, Sadouni Kaddour1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 995-1008, 2019, DOI:10.32604/cmc.2019.08081

    Abstract Using Support Vector Machine (SVM) requires the selection of several parameters such as multi-class strategy type (one-against-all or one-against-one), the regularization parameter C, kernel function and their parameters. The choice of these parameters has a great influence on the performance of the final classifier. This paper considers the grid search method and the particle swarm optimization (PSO) technique that have allowed to quickly select and scan a large space of SVM parameters. A comparative study of the SVM models is also presented to examine the convergence speed and the results of each model. SVM is applied to handwritten Arabic characters… More >

  • Open Access

    ARTICLE

    Reduced Differential Transform Method for Solving Nonlinear Biomathematics Models

    K. A. Gepreel1,2, A. M. S. Mahdy1,2,*, M. S. Mohamed1,3, A. Al-Amiri4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 979-994, 2019, DOI:10.32604/cmc.2019.07701

    Abstract In this paper, we study the approximate solutions for some of nonlinear Biomathematics models via the e-epidemic SI1I2R model characterizing the spread of viruses in a computer network and SIR childhood disease model. The reduced differential transforms method (RDTM) is one of the interesting methods for finding the approximate solutions for nonlinear problems. We apply the RDTM to discuss the analytic approximate solutions to the SI1I2R model for the spread of virus HCV-subtype and SIR childhood disease model. We discuss the numerical results at some special values of parameters in the approximate solutions. We use the computer software package such… More >

Displaying 16431-16440 on page 1644 of 22113. Per Page