Home / Journals / CMC / Vol.57, No.2, 2018
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    A Dual-spline Approach to Load Error Repair in a HEMS Sensor Network

    Xiaodong Liu1, Qi Liu1,*
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 179-194, 2018, DOI:10.32604/cmc.2018.04025
    Abstract In a home energy management system (HEMS), appliances are becoming diversified and intelligent, so that certain simple maintenance work can be completed by appliances themselves. During the measurement, collection and transmission of electricity load data in a HEMS sensor network, however, problems can be caused on the data due to faulty sensing processes and/or lost links, etc. In order to ensure the quality of retrieved load data, different solutions have been presented, but suffered from low recognition rates and high complexity. In this paper, a validation and repair method is presented to detect potential failures and errors in a domestic… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Time-aware Frame Adjustment Strategy for RFID Anti-collision

    Haipeng Chen1, Kexiong Liu2, Chunyang Ma3, Yu Han4, Jian Su5,*
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 195-204, 2018, DOI:10.32604/cmc.2018.03592
    Abstract Recently, object identification with radio frequency identification (RFID) technology is becoming increasingly popular. Identification time is a key performance metric to evaluate the RFID system. The present paper analyzes the deficiencies of the state-of-the-arts algorithms and proposes a novel sub-frame-based algorithm with adaptive frame breaking policy to lower the tag identification time for EPC global C1 Gen2 UHF RFID standard. Through the observation of slot statistics in a sub-frame, the reader estimates the tag quantity and efficiently calculates an optimal frame size to fit the unread tags. Only when the expected average identification time in the calculated frame size is… More >

  • Open AccessOpen Access

    ARTICLE

    A MPTCP Scheduler for Web Transfer

    Wenjun Yang1, Pingping Dong1,2,*, Wensheng Tang1, Xiaoping Lou1, Hangjun Zhou3, Kai Gao4, Haodong Wang5
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 205-222, 2018, DOI:10.32604/cmc.2018.03726
    Abstract Multipath TCP (MPTCP) is the most significant extension of TCP that enables transmission via multiple paths concurrently to improve the resource usage and throughput of long flows. However, due to the concurrent multiple transfer (CMT) in short flow trans-mission, the congestion window (cwnd) of each MPTCP subflow is too small and it may lead to timeout when a single lost packet cannot be recovered through fast retransmission. As a result, MPTCP has even worse performance for short flows compared to regular TCP. In this paper, we take the first step to analyze the main reason why MPTCP has the diminished… More >

  • Open AccessOpen Access

    ARTICLE

    Fault Diagnosis of Motor in Frequency Domain Signal by Stacked De-noising Auto-encoder

    Xiaoping Zhao1, Jiaxin Wu1,*, Yonghong Zhang2, Yunqing Shi3, Lihua Wang2
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 223-242, 2018, DOI:10.32604/cmc.2018.02490
    Abstract With the rapid development of mechanical equipment, mechanical health monitoring field has entered the era of big data. Deep learning has made a great achievement in the processing of large data of image and speech due to the powerful modeling capabilities, this also brings influence to the mechanical fault diagnosis field. Therefore, according to the characteristics of motor vibration signals (nonstationary and difficult to deal with) and mechanical ‘big data’, combined with deep learning, a motor fault diagnosis method based on stacked de-noising auto-encoder is proposed. The frequency domain signals obtained by the Fourier transform are used as input to… More >

  • Open AccessOpen Access

    ARTICLE

    Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks

    Daofu Gong1,2, Yan Chen1,2, Haoyu Lu1,*, Zhenyu Li3, Yibing Han1
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 243-260, 2018, DOI:10.32604/cmc.2018.03781
    Abstract To detect and recover random tampering areas, a combined-decision-based self-embedding watermarking scheme is proposed herein. In this scheme, the image is first partitioned into 2×2 size blocks. Next, the high 5 bits of a block’s average value is embedded into its offset block. The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks. The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering. More >

  • Open AccessOpen Access

    ARTICLE

    Band Selection Method of Absorption Peak Perturbance for the FTIR/ATR Spectrum Analysis

    Jun Xie1, Chong Wang1, Jiaxiang Cai2, Fuhong Cai1,*
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 261-268, 2018, DOI:10.32604/cmc.2018.03669
    Abstract The rapid quantification method of human serum glucose was established by using the Fourier transform infrared spectroscopy (FTIR) and attenuated total reflection (ATR). By the subtracted spectra between glucose aqueous solution and de-ionized water, absorption peaks are calculated in fingerprint area. Based on these absorption peaks and multiple linear regression (MLR) model, discrete band selection method of absorption peaks disturbance model (APDM) was developed. 5 absorption peaks 1150 cm-1, 1103 cm-1, 1078 cm-1, 1034 cm-1, 991 cm-1 were found in fingerprint area. Used these absorption peaks to establish absorption peaks disturbance model, the optimal wavelength combinations are 1140 cm-1, 1096… More >

  • Open AccessOpen Access

    ARTICLE

    An Evidence Combination Method based on DBSCAN Clustering

    Kehua Yang1,2,*, Tian Tan1, Wei Zhang1
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 269-281, 2018, DOI:10.32604/cmc.2018.03696
    Abstract Dempster-Shafer (D-S) evidence theory is a key technology for integrating uncertain information from multiple sources. However, the combination rules can be paradoxical when the evidence seriously conflict with each other. In the paper, we propose a novel combination algorithm based on unsupervised Density-Based Spatial Clustering of Applications with Noise (DBSCAN) density clustering. In the proposed mechanism, firstly, the original evidence sets are preprocessed by DBSCAN density clustering, and a successfully focal element similarity criteria is used to mine the potential information between the evidence, and make a correct measure of the conflict evidence. Then, two different discount factors are adopted… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Hybrid Model of Garlic Short-term Price Forecasting based on Big Data

    Baojia Wang1, Pingzeng Liu1,*, Zhang Chao1, Wang Junmei1, Weijie Chen1, Ning Cao2, Gregory M.P. O’Hare3, Fujiang Wen1
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 283-296, 2018, DOI:10.32604/cmc.2018.03791
    Abstract Garlic prices fluctuate dramatically in recent years and it is very difficult to predict garlic prices. The autoregressive integrated moving average (ARIMA) model is currently the most important method for predicting garlic prices. However, the ARIMA model can only predict the linear part of the garlic prices, and cannot predict its nonlinear part. Therefore, it is urgent to adopt a method to analyze the nonlinear characteristics of garlic prices. After comparing the advantages and disadvantages of several major prediction models which used to forecast nonlinear time series, using support vector machine (SVM) model to predict the nonlinear part of garlic… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

    Chak Fong Cheang1,*, Yiqin Wang1, Zhiping Cai2, Gen Xu1
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 297-306, 2018, DOI:10.32604/cmc.2018.03808
    Abstract Cloud computing provides easy and on-demand access to computing resources in a configurable pool. The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines (VMs), instead of being restricted on a single physical server. When more and more network services are deployed on the cloud, the detection of the intrusion likes Distributed Denial-of-Service (DDoS) attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system. In this paper, we… More >

  • Open AccessOpen Access

    ARTICLE

    A Memory-efficient Simulation Method of Grover's Search Algorithm

    Xuwei Tang1, Juan Xu1,2,3,*, Bojia Duan1
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 307-319, 2018, DOI:10.32604/cmc.2018.03693
    Abstract Grover's search algorithm is one of the most significant quantum algorithms, which can obtain quadratic speedup of the extensive search problems. Since Grover's search algorithm cannot be implemented on a real quantum computer at present, its quantum simulation is regarded as an effective method to study the search performance. When simulating the Grover's algorithm, the storage space required is exponential, which makes it difficult to simulate the high-qubit Grover's algorithm. To this end, we deeply study the storage problem of probability amplitude, which is the core of the Grover simulation algorithm. We propose a novel memory-efficient method via amplitudes compression,… More >

  • Open AccessOpen Access

    ARTICLE

    Communication Mechanism and Algorithm of Composite Location Analysis of Emergency Communication based on Rail

    Yong Jiang1, Xiaolin Zhong1,*, Yong Guo1, Meixia Duan2
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 321-340, 2018, DOI:10.32604/cmc.2018.03796
    Abstract The emergency communication system based on rail is an unconventional emergency communication mode, it is a complement equipment for that conventional communication system can’t work while tunnel mine accident occurs. Medium of transmission channel is the widely existing rail in the tunnel. In this paper we analyzed the characteristics of the rail transmission channel, verified the feasibility that information is transmitted by vibration signal in rail, we proposed the realization plan of the system. Communication protocol and processing mechanism suitable for rail transmission are designed according to the characteristics of channel bandwidth and low data transmission. Information communication with low… More >

  • Open AccessOpen Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2
    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006
    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

Per Page:

Share Link