Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    ARTICLE

    Stock Price Prediction Using Predictive Error Compensation Wavelet Neural Networks

    Ajla Kulaglic1,*, Burak Berk Ustundag2

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3577-3593, 2021, DOI:10.32604/cmc.2021.014768 - 06 May 2021

    Abstract Machine Learning (ML) algorithms have been widely used for financial time series prediction and trading through bots. In this work, we propose a Predictive Error Compensated Wavelet Neural Network (PEC-WNN) ML model that improves the prediction of next day closing prices. In the proposed model we use multiple neural networks where the first one uses the closing stock prices from multiple-scale time-domain inputs. An additional network is used for error estimation to compensate and reduce the prediction error of the main network instead of using recurrence. The performance of the proposed model is evaluated using… More >

  • Open Access

    ARTICLE

    Hydrodynamics and Sensitivity Analysis of a Williamson Fluid in Porous-Walled Wavy Channel

    A. Shahzad1, W. A. Khan2,*, R. Gul1, B. Dayyan1, M. Zubair1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3877-3893, 2021, DOI:10.32604/cmc.2021.012524 - 06 May 2021

    Abstract In this work, a steady, incompressible Williamson fluid model is investigated in a porous wavy channel. This situation arises in the reabsorption of useful substances from the glomerular filtrate in the kidney. After 80% reabsorption, urine is left, which behaves like a thinning fluid. The laws of conservation of mass and momentum are used to model the physical problem. The analytical solution of the problem in terms of stream function is obtained by a regular perturbation expansion method. The asymptotic integration method for small wave amplitudes and the RK-Fehlberg method for pressure distribution has been… More >

  • Open Access

    ARTICLE

    Segmentation of Brain Tumor Magnetic Resonance Images Using a Teaching-Learning Optimization Algorithm

    J. Jayanthi1,*, M. Kavitha2, T. Jayasankar3, A. Sagai Francis Britto4, N. B. Prakash5, Mohamed Yacin Sikkandar6, C. Bharathiraja7

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4191-4203, 2021, DOI:10.32604/cmc.2021.012252 - 06 May 2021

    Abstract Image recognition is considered to be the pre-eminent paradigm for the automatic detection of tumor diseases in this era. Among various cancers identified so far, glioma, a type of brain tumor, is one of the deadliest cancers, and it remains challenging to the medicinal world. The only consoling factor is that the survival rate of the patient is increased by remarkable percentage with the early diagnosis of the disease. Early diagnosis is attempted to be accomplished with the changes observed in the images of suspected parts of the brain captured in specific interval of time.… More >

  • Open Access

    ARTICLE

    IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

    Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3

    Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217 - 30 April 2021

    Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we More >

  • Open Access

    ARTICLE

    Single-Choice Aided Marking System Research Based on Back Propagation Neural Network

    Yunzuo Zhang*, Yi Li, Wei Guo, Lei Huo, Jiayu Zhang, Kaina Guo

    Journal of Cyber Security, Vol.3, No.1, pp. 45-54, 2021, DOI:10.32604/jcs.2021.017071 - 30 April 2021

    Abstract In the field of educational examination, automatic marking technology plays an essential role in improving the efficiency of marking and liberating the labor force. At present, the implementation of the policy of expanding erolments has caused a serious decline in the teacher-student ratio in colleges and universities. The traditional marking system based on Optical Mark Reader technology can no longer meet the requirements of liberating the labor force of teachers in small and medium-sized examinations. With the development of image processing and artificial neural network technology, the recognition of handwritten character in the field of… More >

  • Open Access

    ARTICLE

    A Survey on Security Threats and Solutions of Bitcoin

    Le Lai1,*,Tongqing Zhou1, Zhiping Cai1, Zhiyao Liang2, Hao Bai1

    Journal of Cyber Security, Vol.3, No.1, pp. 29-44, 2021, DOI:10.32604/jcs.2021.016349 - 30 April 2021

    Abstract Bitcoin is known as the first decentralized digital currency around the world. It uses blockchain technology to store transaction data in a distributed public ledger, is a distributed ledger that removes third-party trust institutions. Since its invention, bitcoin has achieved great success, has a market value of about $200 billion. However, while bitcoin has brought a wide and far-reaching impact in the financial field, it has also exposed some security problems, such as selfish mining attacks, Sybil attack, eclipse attacks, routing attacks, EREBUS attacks, and so on. This paper gives a comprehensive overview of various More >

  • Open Access

    ARTICLE

    An LSTM-Based Malware Detection Using Transfer Learning

    Zhangjie Fu1,2,3,*, Yongjie Ding1, Musaazi Godfrey1

    Journal of Cyber Security, Vol.3, No.1, pp. 11-28, 2021, DOI:10.32604/jcs.2021.016632 - 30 April 2021

    Abstract Mobile malware occupies a considerable proportion of cyberattacks. With the update of mobile device operating systems and the development of software technology, more and more new malware keep appearing. The emergence of new malware makes the identification accuracy of existing methods lower and lower. There is an urgent need for more effective malware detection models. In this paper, we propose a new approach to mobile malware detection that is able to detect newly-emerged malware instances. Firstly, we build and train the LSTM-based model on original benign and malware samples investigated by both static and dynamic More >

  • Open Access

    ARTICLE

    The Technical Design and Implementation of Cross-Platform Industrial Product Order System

    Yu Xue1,2,*, Xu Cai1, Shoubao Su2, Junxiang Han1, Romany F. Mansour3

    Journal of Cyber Security, Vol.3, No.1, pp. 1-10, 2021, DOI:10.32604/jcs.2021.016371 - 30 April 2021

    Abstract According to some data in the Industrial Purchasing Trends report released by China in 2017, we can see that e-commerce purchasing channels have ranked first among all industrial products purchasing channels in China compared with European and American countries. In addition, in the whole industrial product purchasing market, we can also see that both manufacturers and suppliers are making active e-commerce transformation, and some other Internet giants are also actively entering the industrial product e-commerce industry. But at present, the revenue of all kinds of subjects is still a lot of room for improvement compared… More >

  • Open Access

    ARTICLE

    Food Insecurity and Depressive Symptoms in Adolescents Aged 12–15 Years from Low- and Middle-Income Countries

    Meng Wang*

    International Journal of Mental Health Promotion, Vol.23, No.2, pp. 177-187, 2021, DOI:10.32604/IJMHP.2021.016466 - 30 April 2021

    Abstract Purpose: Little is known about the role of food insecurity (FIS) on depressive symptoms among adolescents. Thus, this study aimed to explore the association between FIS and depressive symptoms among adolescents aged 12–15 years from low- and middle-income countries across the world. Methods: Data from the Global school-based Student Health Survey were analyzed in 51,702 adolescents [mean (SD) age 13.8 (1.0) years; 49.3% girls). Self-reported measures assessed depressive symptoms during the past 12 months, and food insecurity. Participants reporting yes for depressive symptoms. FIS was categorized into five levels, including ‘never’, ‘rarely’, ‘sometimes’, ‘most of the… More >

  • Open Access

    ARTICLE

    Muscle-Strengthening Exercise Links with Lower Odds for Depression in Adolescents

    Weijun Yu1,2, Jiangang Sun3, Ying Wu1,*, Si-Tong Chen4

    International Journal of Mental Health Promotion, Vol.23, No.2, pp. 277-288, 2021, DOI:10.32604/IJMHP.2021.016153 - 30 April 2021

    Abstract Purpose: Physical activity is a well-recognized protective factor against depression in adolescents. As a component of physical activity, muscle strengthening exercise (MSE) is also viewed as a correlate associated with lower risks of depression in adults. However, little is known about the association in adolescents. This study aimed to explore the association between MSE and depression in a sample of Chinese adolescents. Method: A self-reported questionnaire was used for data collection including variables of MSE, depression (assessed by Children’s Depression Inventory) and selected sociodemographic factors (e.g., sex, grade, height and weight [for body mass index]). Generalized… More >

Displaying 17991-18000 on page 1800 of 31589. Per Page