Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23,336)
  • Open Access

    ARTICLE

    Estimating Loss Given Default Based on Beta Regression

    Jamil J. Jaber1,2, Noriszura Ismail2, Siti Norafidah Mohd Ramli2, Baker Albadareen2, Nawaf N. Hamadneh3,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3329-3344, 2021, DOI:10.32604/cmc.2021.014509

    Abstract Loss given default (LGD) is a key parameter in credit risk management to calculate the required regulatory minimum capital. The internal ratings-based (IRB) approach under the Basel II allows institutions to determine the loss given default (LGD) on their own. In this study, we have estimated LGD for a credit portfolio data by using beta regression with precision parameter (∅) and mean parameter (μ). The credit portfolio data was obtained from a banking institution in Jordan; for the period of January 2010 until December 2014. In the first stage, we have used the “outstanding amount”… More >

  • Open Access

    ARTICLE

    Understanding Research Trends in Android Malware Research Using Information Modelling Techniques

    Jaiteg Singh1, Tanya Gera1, Farman Ali2, Deepak Thakur1, Karamjeet Singh3, Kyung-sup Kwak4,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2655-2670, 2021, DOI:10.32604/cmc.2021.014504

    Abstract Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share. Such popularity of Android has drawn the attention of cybercriminals and malware developers. The malicious applications can steal sensitive information like contacts, read personal messages, record calls, send messages to premium-rate numbers, cause financial loss, gain access to the gallery and can access the user’s geographic location. Numerous surveys on Android security have primarily focused on types of malware attack, their propagation, and techniques to mitigate them. To the best of our knowledge,… More >

  • Open Access

    ARTICLE

    Analytic Hierarchy Process for Evaluating Flipped Classroom Learning

    Husam Jasim Mohammed1,*, Hajem Ati Daham2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2229-2239, 2021, DOI:10.32604/cmc.2021.014445

    Abstract In reality, the flipped classroom has gained popularity as a modern way of structuring teaching, where lectures move from in-class procedures to digitally-based assignments, freeing up the debate, and practice exercises class time. Therefore, it is essential to implement and analyze a way of teaching that will improve student performance. The paper aims to develop a model of the method of teaching science in Iraqi schools, and to assess whether teaching flipped classroom affects the achievement, motivation, and creative thinking of students by using the methodology of Multi-Criteria Decision Making (MCDM) in the Analytic Hierarchy… More >

  • Open Access

    ARTICLE

    Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks

    Khairol Amali bin Ahmad1, Mohammad Nazmul Hasan2, Md. Sharif Hossen2,*, Khaleel Ahmad3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3075-3087, 2021, DOI:10.32604/cmc.2021.014436

    Abstract Pocket Switched Networks (PSN) represent a particular remittent network for direct communication between the handheld mobile devices. Compared to traditional networks, there is no stable topology structure for PSN where the nodes observe the mobility model of human society. It is a kind of Delay Tolerant Networks (DTNs) that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another. Considering its inception, there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the… More >

  • Open Access

    ARTICLE

    Brainwave Classification for Character-Writing Application Using EMD-Based GMM and KELM Approaches

    Khomdet Phapatanaburi1, Kasidit kokkhunthod2, Longbiao Wang3, Talit Jumphoo2, Monthippa Uthansakul2, Anyaporn Boonmahitthisud4, Peerapong Uthansakul2,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3029-3044, 2021, DOI:10.32604/cmc.2021.014433

    Abstract A brainwave classification, which does not involve any limb movement and stimulus for character-writing applications, benefits impaired people, in terms of practical communication, because it allows users to command a device/computer directly via electroencephalogram signals. In this paper, we propose a new framework based on Empirical Mode Decomposition (EMD) features along with the Gaussian Mixture Model (GMM) and Kernel Extreme Learning Machine (KELM)-based classifiers. For this purpose, firstly, we introduce EMD to decompose EEG signals into Intrinsic Mode Functions (IMFs), which actually are used as the input features of the brainwave classification for the character-writing… More >

  • Open Access

    ARTICLE

    A Knowledge-Based Pilot Study on Assessing the Music Influence

    Sabin C. Buraga1, Octavian Dospinescu2,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2857-2873, 2021, DOI:10.32604/cmc.2021.014429

    Abstract A knowledge-driven approach is proposed for assessing the music influence on university students. The proposed method of modeling and conducting the interactive pilot study can be useful to convey other surveys, interviews, and experiments created in various phases of the user interface (UI) design processes, as part of a general human-computer interaction (HCI) methodology. Benefiting from existing semantic Web and linked data standards, best practices, and tools, a microservice-oriented system is developed as a testbed platform able to generate playlists in a smart way according to users’ music preferences. This novel approach could bring also More >

  • Open Access

    ARTICLE

    Improving Reconstructed Image Quality via Hybrid Compression Techniques

    Nancy Awadallah Awad1,*, Amena Mahmoud2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3151-3160, 2021, DOI:10.32604/cmc.2021.014426

    Abstract Data compression is one of the core fields of study for applications of image and video processing. The raw data to be transmitted consumes large bandwidth and requires huge storage space as a result, it is desirable to represent the information in the data with considerably fewer bits by the mean of data compression techniques, the data must be reconstituted very similarly to the initial form. In this paper, a hybrid compression based on Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) is used to enhance the quality of the reconstructed image. These techniques are… More >

  • Open Access

    ARTICLE

    A Hybrid Virtual Cloud Learning Model during the COVID-19 Pandemic

    Shaymaa E. Sorour1,*, Tamer M. Kamel2, Hanan E. Abdelkader3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2671-2689, 2021, DOI:10.32604/cmc.2021.014395

    Abstract The COVID-19 pandemic has affected the educational systems worldwide, leading to the near-total closures of schools, universities, and colleges. Universities need to adapt to changes to face this crisis without negatively affecting students’ performance. Accordingly, the purpose of this study is to identify and help solve to critical challenges and factors that influence the e-learning system for Computer Maintenance courses during the COVID-19 pandemic. The paper examines the effect of a hybrid modeling approach that uses Cloud Computing Services (CCS) and Virtual Reality (VR) in a Virtual Cloud Learning Environment (VCLE) system. The VCLE system… More >

  • Open Access

    ARTICLE

    Research on Electronic Document Management System Based on Cloud Computing

    Jin Han1, Cheng Wang2, Jie Miao3, Mingxin Lu3, Yingchun Wang4, Jin Shi3,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2645-2654, 2021, DOI:10.32604/cmc.2021.014371

    Abstract With the development of information technology, cloud computing technology has brought many conveniences to all aspects of work and life. With the continuous promotion, popularization and vigorous development of e-government and e-commerce, the number of documents in electronic form is getting larger and larger. Electronic document is an indispensable main tool and real record of e-government and business activities. How to scientifically and effectively manage electronic documents? This is an important issue faced by governments and enterprises in improving management efficiency, protecting state secrets or business secrets, and reducing management costs. This paper discusses the… More >

  • Open Access

    ARTICLE

    An Abstractive Summarization Technique with Variable Length Keywords as per Document Diversity

    Muhammad Yahya Saeed1, Muhammad Awais1, Muhammad Younas1, Muhammad Arif Shah2,*, Atif Khan3, M. Irfan Uddin4, Marwan Mahmoud5

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2409-2423, 2021, DOI:10.32604/cmc.2021.014330

    Abstract Text Summarization is an essential area in text mining, which has procedures for text extraction. In natural language processing, text summarization maps the documents to a representative set of descriptive words. Therefore, the objective of text extraction is to attain reduced expressive contents from the text documents. Text summarization has two main areas such as abstractive, and extractive summarization. Extractive text summarization has further two approaches, in which the first approach applies the sentence score algorithm, and the second approach follows the word embedding principles. All such text extractions have limitations in providing the basic… More >

Displaying 14301-14310 on page 1431 of 23336. Per Page