Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to keep the system in the… More >

  • Open Access

    ARTICLE

    Street-Level IP Geolocation Algorithm Based on Landmarks Clustering

    Fan Zhang1,2, Fenlin Liu1,2,*, Rui Xu3,4, Xiangyang Luo1,2, Shichang Ding5, Hechan Tian1,2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3345-3361, 2021, DOI:10.32604/cmc.2021.014526

    Abstract Existing IP geolocation algorithms based on delay similarity often rely on the principle that geographically adjacent IPs have similar delays. However, this principle is often invalid in real Internet environment, which leads to unreliable geolocation results. To improve the accuracy and reliability of locating IP in real Internet, a street-level IP geolocation algorithm based on landmarks clustering is proposed. Firstly, we use the probes to measure the known landmarks to obtain their delay vectors, and cluster landmarks using them. Secondly, the landmarks are clustered again by their latitude and longitude, and the intersection of these two clustering results is taken… More >

  • Open Access

    ARTICLE

    Estimating Loss Given Default Based on Beta Regression

    Jamil J. Jaber1,2, Noriszura Ismail2, Siti Norafidah Mohd Ramli2, Baker Albadareen2, Nawaf N. Hamadneh3,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3329-3344, 2021, DOI:10.32604/cmc.2021.014509

    Abstract Loss given default (LGD) is a key parameter in credit risk management to calculate the required regulatory minimum capital. The internal ratings-based (IRB) approach under the Basel II allows institutions to determine the loss given default (LGD) on their own. In this study, we have estimated LGD for a credit portfolio data by using beta regression with precision parameter (∅) and mean parameter (μ). The credit portfolio data was obtained from a banking institution in Jordan; for the period of January 2010 until December 2014. In the first stage, we have used the “outstanding amount” and “amount of borrowing” to… More >

  • Open Access

    ARTICLE

    Understanding Research Trends in Android Malware Research Using Information Modelling Techniques

    Jaiteg Singh1, Tanya Gera1, Farman Ali2, Deepak Thakur1, Karamjeet Singh3, Kyung-sup Kwak4,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2655-2670, 2021, DOI:10.32604/cmc.2021.014504

    Abstract Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share. Such popularity of Android has drawn the attention of cybercriminals and malware developers. The malicious applications can steal sensitive information like contacts, read personal messages, record calls, send messages to premium-rate numbers, cause financial loss, gain access to the gallery and can access the user’s geographic location. Numerous surveys on Android security have primarily focused on types of malware attack, their propagation, and techniques to mitigate them. To the best of our knowledge, Android malware literature has never… More >

  • Open Access

    ARTICLE

    Analytic Hierarchy Process for Evaluating Flipped Classroom Learning

    Husam Jasim Mohammed1,*, Hajem Ati Daham2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2229-2239, 2021, DOI:10.32604/cmc.2021.014445

    Abstract In reality, the flipped classroom has gained popularity as a modern way of structuring teaching, where lectures move from in-class procedures to digitally-based assignments, freeing up the debate, and practice exercises class time. Therefore, it is essential to implement and analyze a way of teaching that will improve student performance. The paper aims to develop a model of the method of teaching science in Iraqi schools, and to assess whether teaching flipped classroom affects the achievement, motivation, and creative thinking of students by using the methodology of Multi-Criteria Decision Making (MCDM) in the Analytic Hierarchy Process (AHP). The AHP approach… More >

  • Open Access

    ARTICLE

    Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks

    Khairol Amali bin Ahmad1, Mohammad Nazmul Hasan2, Md. Sharif Hossen2,*, Khaleel Ahmad3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3075-3087, 2021, DOI:10.32604/cmc.2021.014436

    Abstract Pocket Switched Networks (PSN) represent a particular remittent network for direct communication between the handheld mobile devices. Compared to traditional networks, there is no stable topology structure for PSN where the nodes observe the mobility model of human society. It is a kind of Delay Tolerant Networks (DTNs) that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another. Considering its inception, there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.… More >

  • Open Access

    ARTICLE

    Brainwave Classification for Character-Writing Application Using EMD-Based GMM and KELM Approaches

    Khomdet Phapatanaburi1, Kasidit kokkhunthod2, Longbiao Wang3, Talit Jumphoo2, Monthippa Uthansakul2, Anyaporn Boonmahitthisud4, Peerapong Uthansakul2,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3029-3044, 2021, DOI:10.32604/cmc.2021.014433

    Abstract A brainwave classification, which does not involve any limb movement and stimulus for character-writing applications, benefits impaired people, in terms of practical communication, because it allows users to command a device/computer directly via electroencephalogram signals. In this paper, we propose a new framework based on Empirical Mode Decomposition (EMD) features along with the Gaussian Mixture Model (GMM) and Kernel Extreme Learning Machine (KELM)-based classifiers. For this purpose, firstly, we introduce EMD to decompose EEG signals into Intrinsic Mode Functions (IMFs), which actually are used as the input features of the brainwave classification for the character-writing application. We hypothesize that EMD… More >

  • Open Access

    ARTICLE

    A Knowledge-Based Pilot Study on Assessing the Music Influence

    Sabin C. Buraga1, Octavian Dospinescu2,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2857-2873, 2021, DOI:10.32604/cmc.2021.014429

    Abstract A knowledge-driven approach is proposed for assessing the music influence on university students. The proposed method of modeling and conducting the interactive pilot study can be useful to convey other surveys, interviews, and experiments created in various phases of the user interface (UI) design processes, as part of a general human-computer interaction (HCI) methodology. Benefiting from existing semantic Web and linked data standards, best practices, and tools, a microservice-oriented system is developed as a testbed platform able to generate playlists in a smart way according to users’ music preferences. This novel approach could bring also benefits for user interface adaptation… More >

  • Open Access

    ARTICLE

    Improving Reconstructed Image Quality via Hybrid Compression Techniques

    Nancy Awadallah Awad1,*, Amena Mahmoud2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3151-3160, 2021, DOI:10.32604/cmc.2021.014426

    Abstract Data compression is one of the core fields of study for applications of image and video processing. The raw data to be transmitted consumes large bandwidth and requires huge storage space as a result, it is desirable to represent the information in the data with considerably fewer bits by the mean of data compression techniques, the data must be reconstituted very similarly to the initial form. In this paper, a hybrid compression based on Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) is used to enhance the quality of the reconstructed image. These techniques are followed by entropy encoding such… More >

  • Open Access

    ARTICLE

    A Hybrid Virtual Cloud Learning Model during the COVID-19 Pandemic

    Shaymaa E. Sorour1,*, Tamer M. Kamel2, Hanan E. Abdelkader3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2671-2689, 2021, DOI:10.32604/cmc.2021.014395

    Abstract The COVID-19 pandemic has affected the educational systems worldwide, leading to the near-total closures of schools, universities, and colleges. Universities need to adapt to changes to face this crisis without negatively affecting students’ performance. Accordingly, the purpose of this study is to identify and help solve to critical challenges and factors that influence the e-learning system for Computer Maintenance courses during the COVID-19 pandemic. The paper examines the effect of a hybrid modeling approach that uses Cloud Computing Services (CCS) and Virtual Reality (VR) in a Virtual Cloud Learning Environment (VCLE) system. The VCLE system provides students with various utilities… More >

Displaying 13211-13220 on page 1322 of 22248. Per Page