Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,887)
  • Open Access

    ARTICLE

    Evaluating and Ranking Mobile Learning Factors Using a Multi-criterion Decision-making (MCDM) Approach

    Quadri Noorulhasan Naveed1, Ali M. Aseere1, AbdulHafeez Muhammad2, Saiful Islam3, Mohamed Rafik N. Qureshi3, Ansar Siddique4,*, Mohammad Rashid Hussain1, Samreen Shahwar5

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 111-129, 2021, DOI:10.32604/iasc.2021.015009

    Abstract The escalating growth in digital technology is setting the stage for changes in university education, as E-learning brings students and faculties outside the contained classroom environment. While mobile learning is considered an emerging technology, there is comprehensive literature on mobile learning and its applications. However, there has been relatively little research on mobile learning recognition and readiness compared to mobile learning studies and implementations. The advent of mobile learning (M-learning) provides additional flexibility in terms of time and location. M-learning lacks an established place in university education. The influence of its critical success factors (CSFs) on the university education system… More >

  • Open Access

    ARTICLE

    Semantic Link Network Based Knowledge Graph Representation and Construction

    Weiyu Guo1,*, Ruixiang Jia1, Ying Zhang2

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 73-79, 2021, DOI:10.32604/jai.2021.018648

    Abstract A knowledge graph consists of a set of interconnected typed entities and their attributes, which shows a better performance to organize, manage and understand knowledge. However, because knowledge graphs contain a lot of knowledge triples, it is difficult to directly display to researchers. Semantic Link Network is an attempt, and it can deal with the construction, representation and reasoning of semantics naturally. Based on the Semantic Link Network, this paper explores the representation and construction of knowledge graph, and develops an academic knowledge graph prototype system to realize the representation, construction and visualization of knowledge graph. More >

  • Open Access

    ARTICLE

    Hybrid Efficient Convolution Operators for Visual Tracking

    Yu Wang*

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 63-72, 2021, DOI:10.32604/jai.2021.010455

    Abstract Visual tracking is a classical computer vision problem with many applications. Efficient convolution operators (ECO) is one of the most outstanding visual tracking algorithms in recent years, it has shown great performance using discriminative correlation filter (DCF) together with HOG, color maps and VGGNet features. Inspired by new deep learning models, this paper propose a hybrid efficient convolution operators integrating fully convolution network (FCN) and residual network (ResNet) for visual tracking, where FCN and ResNet are introduced in our proposed method to segment the objects from backgrounds and extract hierarchical feature maps of objects, respectively. Compared with the traditional VGGNet,… More >

  • Open Access

    ARTICLE

    Evaluation Model of Farmer Training Effect Based on AHP–A Case Study of Hainan Province

    Shengjie Li, Chaosheng Tang*

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 55-62, 2021, DOI:10.32604/jai.2021.017408

    Abstract On the basis of studying the influencing factors of training effect evaluation, this paper constructs an AHP-fuzzy comprehensive evaluation model for farmers’ vocational training activities in Hainan Province to evaluate farmers’ training effect, which overcomes the limitations of traditional methods. Firstly, the content and index system of farmer training effect evaluation are established by analytic hierarchy process, and the weight value of each index is determined. Then, the fuzzy comprehensive evaluation (FCE) of farmer training effect is carried out by using multi-level FCE. The joint use of AHP and FCE improves the reliability and effectiveness of the evaluation process and… More >

  • Open Access

    ARTICLE

    A Generation Method of Letter-Level Adversarial Samples

    Huixuan Xu1, Chunlai Du1, Yanhui Guo2,*, Zhijian Cui1, Haibo Bai1

    Journal on Artificial Intelligence, Vol.3, No.2, pp. 45-53, 2021, DOI:10.32604/jai.2021.016305

    Abstract In recent years, with the rapid development of natural language processing, the security issues related to it have attracted more and more attention. Character perturbation is a common security problem. It can try to completely modify the input classification judgment of the target program without people’s attention by adding, deleting, or replacing several characters, which can reduce the effectiveness of the classifier. Although the current research has provided various methods of perturbation attacks on characters, the success rate of some methods is still not ideal. This paper mainly studies the sample generation of optimal perturbation characters and proposes a characterlevel… More >

  • Open Access

    ARTICLE

    Investigating and Modelling of Task Offloading Latency in Edge-Cloud Environment

    Jaber Almutairi1, Mohammad Aldossary2,*,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4143-4160, 2021, DOI:10.32604/cmc.2021.018145

    Abstract Recently, the number of Internet of Things (IoT) devices connected to the Internet has increased dramatically as well as the data produced by these devices. This would require offloading IoT tasks to release heavy computation and storage to the resource-rich nodes such as Edge Computing and Cloud Computing. However, different service architecture and offloading strategies have a different impact on the service time performance of IoT applications. Therefore, this paper presents an Edge-Cloud system architecture that supports scheduling offloading tasks of IoT applications in order to minimize the enormous amount of transmitting data in the network. Also, it introduces the… More >

  • Open Access

    ARTICLE

    Virtual Reality-Based Random Dot Kinematogram

    Jun Ma1, Hyo-Jung Kim2, Ji-Soo Kim3,4, Eek-Sung Lee5, Min Hong6,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4205-4213, 2021, DOI:10.32604/cmc.2021.018080

    Abstract This research implements a random dot kinematogram (RDK) using virtual reality (VR) and analyzes the results based on normal subjects. Visual motion perception is one of visual functions localized to a specific cortical area, the human motion perception area (human analogue for the middle temporal/middle superior temporal area) located in the parieto–occipito–temporal junction of the human brain. The RDK measures visual motion perception capabilities. The stimuli in conventional RDK methods are presented using a monitor screen, so these devices require a spacious dark room for installation and use. Recently, VR technology has been implemented in different medical domains. The test… More >

  • Open Access

    ARTICLE

    Bit Rate Reduction in Cloud Gaming Using Object Detection Technique

    Daniyal Baig1, Tahir Alyas1, Muhammad Hamid2, Muhammad Saleem3, Saadia Malik4, Nadia Tabassum5,*, Natash Ali Mian6

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3653-3669, 2021, DOI:10.32604/cmc.2021.017948

    Abstract The past two decades witnessed a broad-increase in web technology and on-line gaming. Enhancing the broadband confinements is viewed as one of the most significant variables that prompted new gaming technology. The immense utilization of web applications and games additionally prompted growth in the handled devices and moving the limited gaming experience from user devices to online cloud servers. As internet capabilities are enhanced new ways of gaming are being used to improve the gaming experience. In cloud-based video gaming, game engines are hosted in cloud gaming data centers, and compressed gaming scenes are rendered to the players over the… More >

  • Open Access

    ARTICLE

    A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

    Nojood O. Aljehane*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3915-3929, 2021, DOI:10.32604/cmc.2021.017905

    Abstract Cyber physical systems (CPSs) are a networked system of cyber (computation, communication) and physical (sensors, actuators) elements that interact in a feedback loop with the assistance of human interference. Generally, CPSs authorize critical infrastructures and are considered to be important in the daily lives of humans because they form the basis of future smart devices. Increased utilization of CPSs, however, poses many threats, which may be of major significance for users. Such security issues in CPSs represent a global issue; therefore, developing a robust, secure, and effective CPS is currently a hot research topic. To resolve this issue, an intrusion… More >

  • Open Access

    ARTICLE

    Mobile Memory Management System Based on User’s Application Usage Patterns

    Jaehwan Lee, Sangoh Park*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4031-4050, 2021, DOI:10.32604/cmc.2021.017872

    Abstract Currently, the number of functions to improve user convenience in smartphone applications is increasing. In addition, more mobile applications are being loaded into mobile operating system memory for faster launches, thus increasing the memory requirements for smartphones. The memory used by applications in mobile operating systems is managed using software; allocated memory is freed up by either considering the usage state of the application or terminating the least recently used (LRU) application. As LRU-based memory management schemes do not consider the application launch frequency in a low memory situation, currently used mobile operating systems can lead to the termination of… More >

Displaying 11601-11610 on page 1161 of 21887. Per Page