Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,884)
  • Open Access

    ARTICLE

    Study on Multi-Label Classification of Medical Dispute Documents

    Baili Zhang1, 2, 3, *, Shan Zhou1, Le Yang1, Jianhua Lv1, 2, Mingjun Zhong4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1975-1986, 2020, DOI:10.32604/cmc.2020.010914 - 16 September 2020

    Abstract The Internet of Medical Things (IoMT) will come to be of great importance in the mediation of medical disputes, as it is emerging as the core of intelligent medical treatment. First, IoMT can track the entire medical treatment process in order to provide detailed trace data in medical dispute resolution. Second, IoMT can infiltrate the ongoing treatment and provide timely intelligent decision support to medical staff. This information includes recommendation of similar historical cases, guidance for medical treatment, alerting of hired dispute profiteers etc. The multi-label classification of medical dispute documents (MDDs) plays an important… More >

  • Open Access

    ARTICLE

    Heat Transfer in MHD Flow of Maxwell Fluid via Fractional Cattaneo-Friedrich Model: A Finite Difference Approach

    Muhammad Saqib1, Hanifa Hanif1, 2, T. Abdeljawad3, 4, 5, Ilyas Khan6, *, Sharidan Shafie1, Kottakkaran Sooppy Nisar7

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1959-1973, 2020, DOI:10.32604/cmc.2020.011339 - 16 September 2020

    Abstract The idea of fractional derivatives is applied to several problems of viscoelastic fluid. However, most of these problems (fluid problems), were studied analytically using different integral transform techniques, as most of these problems are linear. The idea of the above fractional derivatives is rarely applied to fluid problems governed by nonlinear partial differential equations. Most importantly, in the nonlinear problems, either the fractional models are developed by artificial replacement of the classical derivatives with fractional derivatives or simple classical problems (without developing the fractional model even using artificial replacement) are solved. These problems were mostly… More >

  • Open Access

    ARTICLE

    Awareness as the Most Effective Measure to Mitigate the Spread of COVID-19 in Nigeria

    Isa Abdullahi Baba1, *, Dumitru Baleanu2, 3

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1945-1957, 2020, DOI:10.32604/cmc.2020.011508 - 16 September 2020

    Abstract A mathematical model consisting of a system of four nonlinear ordinary differential equations is constructed. Our aim is to study the dynamics of the spread of COVID-19 in Nigeria and to show the effectiveness of awareness and the need for relevant authorities to engage themselves more in enlightening people on the significance of the available control measures in mitigating the spread of the disease. Two equilibrium solutions; Disease free equilibrium and Endemic equilibrium solutions were calculated and their global stability analysis was carried out. Basic reproduction ratio ( More >

  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505 - 16 September 2020

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance.… More >

  • Open Access

    ARTICLE

    Analysis and Dynamics of Illicit Drug Use Described by Fractional Derivative with Mittag-Leffler Kernel

    Berat Karaagac1, 2, Kolade Matthew Owolabi1, 3, *, Kottakkaran Sooppy Nisar4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1905-1924, 2020, DOI:10.32604/cmc.2020.011623 - 16 September 2020

    Abstract Illicit drug use is a significant problem that causes great material and moral losses and threatens the future of the society. For this reason, illicit drug use and related crimes are the most significant criminal cases examined by scientists. This paper aims at modeling the illegal drug use using the Atangana-Baleanu fractional derivative with Mittag-Leffler kernel. Also, in this work, the existence and uniqueness of solutions of the fractional-order Illicit drug use model are discussed via Picard-Lindelöf theorem which provides successive approximations using a convergent sequence. Then the stability analysis for both disease-free and endemic More >

  • Open Access

    ARTICLE

    Analysis of Feature Importance and Interpretation for Malware Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1891-1904, 2020, DOI:10.32604/cmc.2020.010933 - 16 September 2020

    Abstract This study was conducted to enable prompt classification of malware, which was becoming increasingly sophisticated. To do this, we analyzed the important features of malware and the relative importance of selected features according to a learning model to assess how those important features were identified. Initially, the analysis features were extracted using Cuckoo Sandbox, an open-source malware analysis tool, then the features were divided into five categories using the extracted information. The 804 extracted features were reduced by 70% after selecting only the most suitable ones for malware classification using a learning model-based feature selection More >

  • Open Access

    ARTICLE

    Edge-Computing with Graph Computation: A Novel Mechanism to Handle Network Intrusion and Address Spoofing in SDN

    Rashid Amin1, *, Mudassar Hussain2, Mohammed Alhameed3, Syed Mohsan Raza4, Fathe Jeribi3, Ali Tahir3

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1869-1890, 2020, DOI:10.32604/cmc.2020.011758 - 16 September 2020

    Abstract Software Defined Networking (SDN) being an emerging network control model is widely recognized as a control and management platform. This model provides efficient techniques to control and manage the enterprise network. Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller. This data processing at the edge nodes reduces the latency and bandwidth requirements. In SDN, the controller is a single point of failure. Several security issues related to the traditional network can be solved by using SDN central management and control.… More >

  • Open Access

    ARTICLE

    Guarantee Mechanism of Data Continuity for Electronic Record Based on Linked Data

    Yuyi Huo1, Shi Zhou3, Ruiguo Hu1, Yongjun Ren1,2,*, Jinyue Xia4

    Journal of Cyber Security, Vol.2, No.3, pp. 151-156, 2020, DOI:10.32604/jcs.2020.010963 - 14 September 2020

    Abstract In the field of electronic record management, especially in the current big data environment, data continuity has become a new topic that is as important as security and needs to be studied. This paper decomposes the data continuity guarantee of electronic record into a set of data protection requirements consisting of data relevance, traceability and comprehensibility, and proposes to use the associated data technology to provide an integrated guarantee mechanism to meet the above three requirements. More >

  • Open Access

    ARTICLE

    Efficient Virtual Resource Allocation in Mobile Edge Networks Based on Machine Learning

    Li Li1,*, Yifei Wei1, Lianping Zhang2, Xiaojun Wang3

    Journal of Cyber Security, Vol.2, No.3, pp. 141-150, 2020, DOI:10.32604/jcs.2020.010764 - 14 September 2020

    Abstract The rapid growth of Internet content, applications and services require more computing and storage capacity and higher bandwidth. Traditionally, internet services are provided from the cloud (i.e., from far away) and consumed on increasingly smart devices. Edge computing and caching provides these services from nearby smart devices. Blending both approaches should combine the power of cloud services and the responsiveness of edge networks. This paper investigates how to intelligently use the caching and computing capabilities of edge nodes/cloudlets through the use of artificial intelligence-based policies. We first analyze the scenarios of mobile edge networks with… More >

  • Open Access

    ARTICLE

    Extracting Campus’ Road Network from Walking GPS Trajectories

    Yizhi Liu, Rutian Qing, Jianxun Liu*, Zhuhua Liao, Yijiang Zhao, Hong Ouyang

    Journal of Cyber Security, Vol.2, No.3, pp. 131-140, 2020, DOI:10.32604/jcs.2020.010625 - 14 September 2020

    Abstract Road network extraction is vital to both vehicle navigation and road planning. Existing approaches focus on mining urban trunk roads from GPS trajectories of floating cars. However, path extraction, which plays an important role in earthquake relief and village tour, is always ignored. Addressing this issue, we propose a novel approach of extracting campus’ road network from walking GPS trajectories. It consists of data preprocessing and road centerline generation. The patrolling GPS trajectories, collected at Hunan University of Science and Technology, were used as the experimental data. The experimental evaluation results show that our approach More >

Displaying 20301-20310 on page 2031 of 31884. Per Page