Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Twitter Media Sentiment Analysis to Convert Non-Informative to Informative Using QER

    C. P. Thamil Selvi1,*, P. Muneeshwari2, K. Selvasheela3, D. Prasanna4

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3545-3555, 2023, DOI:10.32604/iasc.2023.031097 - 17 August 2022

    Abstract The term sentiment analysis deals with sentiment classification based on the review made by the user in a social network. The sentiment classification accuracy is evaluated using various selection methods, especially those that deal with algorithm selection. In this work, every sentiment received through user expressions is ranked in order to categorise sentiments as informative and non-informative. In order to do so, the work focus on Query Expansion Ranking (QER) algorithm that takes user text as input and process for sentiment analysis and finally produces the results as informative or non-informative. The challenge is to More >

  • Open Access

    ARTICLE

    Foundation Treatment in Urban Underground Engineering Using Big Data Analysis for Smart City Applications

    Fei Liu1,2, Yunkai Zhang1,2, Jian Zhang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 153-172, 2022, DOI:10.32604/cmes.2022.017967 - 02 June 2022

    Abstract A core element of the sustainable approach to global living quality improvement can now become the intensive and organized usage of underground space. There is a growing interest in underground building and growth worldwide. The reduced consumption of electricity, effective preservation of green land, sustainable wastewater and sewage treatment, efficient reverse degradation of the urban environment, and reliable critical infrastructure management can improve the quality of life. At the same time, technological innovations such as artificial intelligence (AI), cloud computing (CC), the internet of things (IoT), and big data analytics (BDA) play a significant role… More >

  • Open Access

    ARTICLE

    Analyzing the Implications of Healthcare Data Breaches through Computational Technique

    Ahmed H. Almulihi1, Fawaz Alassery2, Asif Irshad Khan3, Sarita Shukla4, Bineet Kumar Gupta4, Rajeev Kumar4,*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1763-1779, 2022, DOI:10.32604/iasc.2022.023460 - 09 December 2021

    Abstract The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories… More >

  • Open Access

    ARTICLE

    Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume

    Norjihan Binti Abdul Ghani1,*, Suraya Hamid1, Muneer Ahmad1, Younes Saadi1, N.Z. Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 913-926, 2022, DOI:10.32604/csse.2022.018467 - 24 September 2021

    Abstract The world health organization (WHO) terms dengue as a serious illness that impacts almost half of the world’s population and carries no specific treatment. Early and accurate detection of spread in affected regions can save precious lives. Despite the severity of the disease, a few noticeable works can be found that involve sentiment analysis to mine accurate intuitions from the social media text streams. However, the massive data explosion in recent years has led to difficulties in terms of storing and processing large amounts of data, as reliable mechanisms to gather the data and suitable… More >

  • Open Access

    ARTICLE

    Abnormal Event Correlation and Detection Based on Network Big Data Analysis

    Zhichao Hu1, Xiangzhan Yu1,*, Jiantao Shi1, Lin Ye1,2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 695-711, 2021, DOI:10.32604/cmc.2021.017574 - 04 June 2021

    Abstract With the continuous development of network technology, various large-scale cyber-attacks continue to emerge. These attacks pose a severe threat to the security of systems, networks, and data. Therefore, how to mine attack patterns from massive data and detect attacks are urgent problems. In this paper, an approach for attack mining and detection is proposed that performs tasks of alarm correlation, false-positive elimination, attack mining, and attack prediction. Based on the idea of CluStream, the proposed approach implements a flow clustering method and a two-step algorithm that guarantees efficient streaming and clustering. The context of an… More >

  • Open Access

    ARTICLE

    A Sensor Network Web Platform Based on WoT Technology

    Shun-Yuan Wang1, Yun-Jung Hsu1, Sung-Jung Hsiao2, Wen-Tsai Sung3,*

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 197-214, 2021, DOI:10.32604/csse.2021.015713 - 23 April 2021

    Abstract This study proposes a Web platform, the Web of Things (WoT), whose Internet of Things (IoT) architecture is used to develop the technology behind a new standard Web platform. When a remote sensor passes data to a microcontroller for processing, the protocol is often not known. This study proposes a WoT platform that enables the use of a browser in a mobile device to control a remote hardware device. An optimized code is written using an artificial intelligence-based algorithm in a microcontroller. Digital data convergence technology is adopted to process the packets of different protocols… More >

  • Open Access

    ARTICLE

    Utilizing Blockchain Technology to Improve WSN Security for Sensor Data Transmission

    Sung-Jung Hsiao1, Wen-Tsai Sung2,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1899-1918, 2021, DOI:10.32604/cmc.2021.015762 - 13 April 2021

    Abstract This paper proposes a method for improving the data security of wireless sensor networks based on blockchain technology. Blockchain technology is applied to data transfer to build a highly secure wireless sensor network. In this network, the relay stations use microcontrollers and embedded devices, and the microcontrollers, such as Raspberry Pi and Arduino Yun, represents mobile databases. The proposed system uses microcontrollers to facilitate the connection of various sensor devices. By adopting blockchain encryption, the security of sensing data can be effectively improved. A blockchain is a concatenated transaction record that is protected by cryptography.… More >

  • Open Access

    ARTICLE

    Computing the User Experience via Big Data Analysis: A Case of Uber Services

    Jang Hyun Kim1,2, Dongyan Nan1,*, Yerin Kim2, Min Hyung Park2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2819-2829, 2021, DOI:10.32604/cmc.2021.014922 - 01 March 2021

    Abstract As of 2020, the issue of user satisfaction has generated a significant amount of interest. Therefore, we employ a big data approach for exploring user satisfaction among Uber users. We develop a research model of user satisfaction by expanding the list of user experience (UX) elements (i.e., pragmatic, expectation confirmation, hedonic, and burden) by including more elements, namely: risk, cost, promotion, anxiety, sadness, and anger. Subsequently, we collect 125,768 comments from online reviews of Uber services and perform a sentiment analysis to extract the UX elements. The results of a regression analysis reveal the following:… More >

  • Open Access

    ARTICLE

    Research on the Association of Mobile Social Network Users Privacy Information Based on Big Data Analysis

    Pingshui Wang1,*, Zecheng Wang1, Qinjuan Ma1

    Journal of Information Hiding and Privacy Protection, Vol.1, No.1, pp. 35-42, 2019, DOI:10.32604/jihpp.2019.05942

    Abstract The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications. The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control. There is little research on the association of user privacy information, so it is not easy to design personalized privacy protection strategy, but also increase the complexity of user privacy settings. Therefore, this paper concentrates on the association of user privacy information taking big data analysis tools, so as to provide data support for More >

  • Open Access

    ARTICLE

    Semantics Analytics of Origin-Destination Flows from Crowd Sensed Big Data

    Ning Cao1,2, Shengfang Li1, Keyong Shen1, Sheng Bin3, Gengxin Sun3,*, Dongjie Zhu4, Xiuli Han5, Guangsheng Cao5, Abraham Campbell6

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 227-241, 2019, DOI:10.32604/cmc.2019.06125

    Abstract Monitoring, understanding and predicting Origin-destination (OD) flows in a city is an important problem for city planning and human activity. Taxi-GPS traces, acted as one kind of typical crowd sensed data, it can be used to mine the semantics of OD flows. In this paper, we firstly construct and analyze a complex network of OD flows based on large-scale GPS taxi traces of a city in China. The spatiotemporal analysis for the OD flows complex network showed that there were distinctive patterns in OD flows. Then based on a novel complex network model, a semantics More >

Displaying 1-10 on page 1 of 12. Per Page