Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    Information Centric Networking Based Cooperative Caching Framework for 5G Communication Systems

    R. Mahaveerakannan1, Thanarajan Tamilvizhi2,*, Sonia Jenifer Rayen3, Osamah Ibrahim Khalaf4, Habib Hamam5,6,7,8

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3945-3966, 2024, DOI:10.32604/cmc.2024.051611 - 12 September 2024

    Abstract The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content. In light of the data-centric aspect of contemporary communication, the information-centric network (ICN) paradigm offers hope for a solution by emphasizing content retrieval by name instead of location. If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things (IoT) devices, then effective caching solutions will be required to maximize network throughput and minimize the use of resources. Hence, an ICN-based Cooperative Caching (ICN-CoC) technique has been used to select… More >

  • Open Access

    ARTICLE

    A Shared Natural Neighbors Based-Hierarchical Clustering Algorithm for Discovering Arbitrary-Shaped Clusters

    Zhongshang Chen, Ji Feng*, Fapeng Cai, Degang Yang

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2031-2048, 2024, DOI:10.32604/cmc.2024.052114 - 15 August 2024

    Abstract In clustering algorithms, the selection of neighbors significantly affects the quality of the final clustering results. While various neighbor relationships exist, such as K-nearest neighbors, natural neighbors, and shared neighbors, most neighbor relationships can only handle single structural relationships, and the identification accuracy is low for datasets with multiple structures. In life, people’s first instinct for complex things is to divide them into multiple parts to complete. Partitioning the dataset into more sub-graphs is a good idea approach to identifying complex structures. Taking inspiration from this, we propose a novel neighbor method: Shared Natural Neighbors (SNaN). More >

  • Open Access

    ARTICLE

    Exploring Motor Imagery EEG: Enhanced EEG Microstate Analysis with GMD-Driven Density Canopy Method

    Xin Xiong1, Jing Zhang1, Sanli Yi1, Chunwu Wang2, Ruixiang Liu3, Jianfeng He1,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4659-4681, 2024, DOI:10.32604/cmc.2024.050528 - 20 June 2024

    Abstract The analysis of microstates in EEG signals is a crucial technique for understanding the spatiotemporal dynamics of brain electrical activity. Traditional methods such as Atomic Agglomerative Hierarchical Clustering (AAHC), K-means clustering, Principal Component Analysis (PCA), and Independent Component Analysis (ICA) are limited by a fixed number of microstate maps and insufficient capability in cross-task feature extraction. Tackling these limitations, this study introduces a Global Map Dissimilarity (GMD)-driven density canopy K-means clustering algorithm. This innovative approach autonomously determines the optimal number of EEG microstate topographies and employs Gaussian kernel density estimation alongside the GMD index for… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Method Based on a Universal Gravitation Clustering Algorithm

    Jian Yu1,2,*, Gaofeng Yu3, Xiangmei Xiao1,2, Zhixing Lin1,2

    Journal of Cyber Security, Vol.6, pp. 41-68, 2024, DOI:10.32604/jcs.2024.049658 - 04 June 2024

    Abstract With the rapid advancement of the Internet, network attack methods are constantly evolving and adapting. To better identify the network attack behavior, a universal gravitation clustering algorithm was proposed by analyzing the dissimilarities and similarities of the clustering algorithms. First, the algorithm designated the cluster set as vacant, with the introduction of a new object. Subsequently, a new cluster based on the given object was constructed. The dissimilarities between it and each existing cluster were calculated using a defined difference measure. The minimum dissimilarity was selected. Through comparing the proposed algorithm with the traditional Back More >

  • Open Access

    ARTICLE

    Path-Based Clustering Algorithm with High Scalability Using the Combined Behavior of Evolutionary Algorithms

    Leila Safari-Monjeghtapeh1, Mansour Esmaeilpour2,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 705-721, 2024, DOI:10.32604/csse.2024.044892 - 20 May 2024

    Abstract Path-based clustering algorithms typically generate clusters by optimizing a benchmark function. Most optimization methods in clustering algorithms often offer solutions close to the general optimal value. This study achieves the global optimum value for the criterion function in a shorter time using the minimax distance, Maximum Spanning Tree “MST”, and meta-heuristic algorithms, including Genetic Algorithm “GA” and Particle Swarm Optimization “PSO”. The Fast Path-based Clustering “FPC” algorithm proposed in this paper can find cluster centers correctly in most datasets and quickly perform clustering operations. The FPC does this operation using MST, the minimax distance, and… More >

  • Open Access

    ARTICLE

    Hyperspectral Image Based Interpretable Feature Clustering Algorithm

    Yaming Kang1,*, Peishun Ye1, Yuxiu Bai1, Shi Qiu2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2151-2168, 2024, DOI:10.32604/cmc.2024.049360 - 15 May 2024

    Abstract Hyperspectral imagery encompasses spectral and spatial dimensions, reflecting the material properties of objects. Its application proves crucial in search and rescue, concealed target identification, and crop growth analysis. Clustering is an important method of hyperspectral analysis. The vast data volume of hyperspectral imagery, coupled with redundant information, poses significant challenges in swiftly and accurately extracting features for subsequent analysis. The current hyperspectral feature clustering methods, which are mostly studied from space or spectrum, do not have strong interpretability, resulting in poor comprehensibility of the algorithm. So, this research introduces a feature clustering algorithm for hyperspectral… More >

  • Open Access

    ARTICLE

    Density Clustering Algorithm Based on KD-Tree and Voting Rules

    Hui Du, Zhiyuan Hu*, Depeng Lu, Jingrui Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3239-3259, 2024, DOI:10.32604/cmc.2024.046314 - 15 May 2024

    Abstract Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets with uneven density. Additionally, they incur substantial computational costs when applied to high-dimensional data due to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset and compute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similarity matrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a vote for the point with the highest density among its KNN. By utilizing the vote counts More >

  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140 - 16 April 2024

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core… More >

  • Open Access

    ARTICLE

    Maximum Correntropy Criterion-Based UKF for Loosely Coupling INS and UWB in Indoor Localization

    Yan Wang*, You Lu, Yuqing Zhou, Zhijian Zhao

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2673-2703, 2024, DOI:10.32604/cmes.2023.046743 - 11 March 2024

    Abstract Indoor positioning is a key technology in today’s intelligent environments, and it plays a crucial role in many application areas. This paper proposed an unscented Kalman filter (UKF) based on the maximum correntropy criterion (MCC) instead of the minimum mean square error criterion (MMSE). This innovative approach is applied to the loose coupling of the Inertial Navigation System (INS) and Ultra-Wideband (UWB). By introducing the maximum correntropy criterion, the MCCUKF algorithm dynamically adjusts the covariance matrices of the system noise and the measurement noise, thus enhancing its adaptability to diverse environmental localization requirements. Particularly in… More >

  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243 - 27 February 2024

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust… More >

Displaying 1-10 on page 1 of 38. Per Page