Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    A Quarterly High RFM Mining Algorithm for Big Data Management

    Cuiwei Peng1, Jiahui Chen2,*, Shicheng Wan3, Guotao Xu4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4341-4360, 2024, DOI:10.32604/cmc.2024.054109 - 12 September 2024

    Abstract In today’s highly competitive retail industry, offline stores face increasing pressure on profitability. They hope to improve their ability in shelf management with the help of big data technology. For this, on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior. RFM (recency, frequency, and monetary) pattern mining is a powerful tool to evaluate the value of customer behavior. However, the existing RFM pattern mining algorithms do not consider the quarterly nature of goods, resulting in unreasonable shelf availability and difficulty in profit-making. To solve this problem, we… More >

  • Open Access

    ARTICLE

    Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System

    Farhan Amin, Gyu Sang Choi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3507-3521, 2024, DOI:10.32604/cmc.2024.053183 - 12 September 2024

    Abstract Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community. The call detail records (CDR) of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior. It is evident from the recent literature that cyber-physical systems (CPS) were used in the analytics and modeling of telecom data. In addition, CPS is used to provide valuable services in smart cities. In general, a typical telecom company has millions of subscribers and thus generates massive amounts of data. From this aspect, data storage, analysis, and processing… More >

  • Open Access

    ARTICLE

    A Trailblazing Framework of Security Assessment for Traffic Data Management

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Neha Yadav4, Syed Anas Ansar5,*, Pawan Kumar Chaurasia4, Alka Agrawal4

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1853-1875, 2023, DOI:10.32604/iasc.2023.039761 - 21 June 2023

    Abstract Connected and autonomous vehicles are seeing their dawn at this moment. They provide numerous benefits to vehicle owners, manufacturers, vehicle service providers, insurance companies, etc. These vehicles generate a large amount of data, which makes privacy and security a major challenge to their success. The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors. This could have a negative impact on how well-liked CAVs are with… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Trust Model for Supporting Collaborative Healthcare Data Management

    Jiwon Jeon, Junho Kim, Mincheol Shin, Mucheol Kim*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3403-3421, 2023, DOI:10.32604/csse.2023.036658 - 03 April 2023

    Abstract The development of information technology allows the collaborative business process to be run across multiple enterprises in a larger market environment. However, while collaborative business expands the realm of businesses, it also causes various hazards in collaborative Interaction, such as data falsification, inconstancy, and misuse. To solve these issues, a blockchain-based collaborative business modeling approach was proposed and analyzed. However, the existing studies lack the blockchain risk problem-solving specification, and there is no verification technique to examine the process. Consequently, it is difficult to confirm the appropriateness of the approach. Thus, here, we propose and… More >

  • Open Access

    ARTICLE

    Data Utilization-Based Adaptive Data Management Method for Distributed Storage System in WAN Environment

    Sanghyuck Nam1, Jaehwan Lee2, Kyoungchan Kim3, Mingyu Jo1, Sangoh Park1,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3457-3469, 2023, DOI:10.32604/csse.2023.035428 - 03 April 2023

    Abstract Recently, research on a distributed storage system that efficiently manages a large amount of data has been actively conducted following data production and demand increase. Physical expansion limits exist for traditional standalone storage systems, such as I/O and file system capacity. However, the existing distributed storage system does not consider where data is consumed and is more focused on data dissemination and optimizing the lookup cost of data location. And this leads to system performance degradation due to low locality occurring in a Wide Area Network (WAN) environment with high network latency. This problem hinders… More >

  • Open Access

    ARTICLE

    Privacy Data Management Mechanism Based on Blockchain and Federated Learning

    Mingsen Mo1, Shan Ji2, Xiaowan Wang3,*, Ghulam Mohiuddin4, Yongjun Ren1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 37-53, 2023, DOI:10.32604/cmc.2023.028843 - 22 September 2022

    Abstract Due to the extensive use of various intelligent terminals and the popularity of network social tools, a large amount of data in the field of medical emerged. How to manage these massive data safely and reliably has become an important challenge for the medical network community. This paper proposes a data management framework of medical network community based on Consortium Blockchain (CB) and Federated learning (FL), which realizes the data security sharing between medical institutions and research institutions. Under this framework, the data security sharing mechanism of medical network community based on smart contract and the… More >

  • Open Access

    ARTICLE

    Proof of Activity Protocol for IoMT Data Security

    R. Rajadevi1, K. Venkatachalam2, Mehedi Masud3, Mohammed A. AlZain4, Mohamed Abouhawwash5,6,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 339-350, 2023, DOI:10.32604/csse.2023.024537 - 01 June 2022

    Abstract The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT systems, blockchain is used due to its numerous blocks for secure data storage. In… More >

  • Open Access

    ARTICLE

    Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique

    Asif Irshad Khan1,*, Abdullah Saad Al-Malaise ALGhamdi2, Fawaz Jaber Alsolami1, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Abdullah Marish Ali1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2835-2860, 2022, DOI:10.32604/cmc.2022.020342 - 27 September 2021

    Abstract The blockchain technology plays a significant role in the present era of information technology. In the last few years, this technology has been used effectively in several domains. It has already made significant differences in human life, as well as is intended to have noticeable impact in many other domains in the forthcoming years. The rapid growth in blockchain technology has created numerous new possibilities for use, especially for healthcare applications. The digital healthcare services require highly effective security methodologies that can integrate data security with the available management strategies. To test and understand this… More >

  • Open Access

    ARTICLE

    An Intelligent Graph Edit Distance-Based Approach for Finding Business Process Similarities

    Abid Sohail1, Ammar Haseeb1, Mobashar Rehman2,*, Dhanapal Durai Dominic3, Muhammad Arif Butt4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3603-3618, 2021, DOI:10.32604/cmc.2021.017795 - 24 August 2021

    Abstract There are numerous application areas of computing similarity between process models. It includes finding similar models from a repository, controlling redundancy of process models, and finding corresponding activities between a pair of process models. The similarity between two process models is computed based on their similarity between labels, structures, and execution behaviors. Several attempts have been made to develop similarity techniques between activity labels, as well as their execution behavior. However, a notable problem with the process model similarity is that two process models can also be similar if there is a structural variation between More >

Displaying 1-10 on page 1 of 9. Per Page