Open Access
ARTICLE
Pengcheng Liu1, †, Xiaojun Wang1, †, S. R. Chaudhry1, Khalid Javeed2, Yue Ma3, *, Martin Collier1
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 353-363, 2018, DOI:10.32604/cmc.2018.04142
Abstract The combination of traditional processors and Field Programmable Gate Arrays (FPGA) is shaping the future networking platform for intensive computation in resource-constrained networks and devices. These networks present two key challenges of security and resource limitations. Lightweight ciphers are suitable to provide data security in such constrained environments. Implementing the lightweight PRESENT encryption algorithm in a reconfigurable platform (FPGAs) can offer secure communication service and flexibility. This paper presents hardware acceleration of security primitives in SDN using NETFPGA-10G. We implement an efficient design of the PRESENT algorithm for faster, smaller and lower power consumption hardware circuit using Verilog. We evaluate… More >
Open Access
ARTICLE
Rooh ul Amin1, Irum Inayat2, Li Aijun1, Shahaboddin Shamshirband3,4,*, Timon Rabczuk5
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 365-388, 2018, DOI:10.32604/cmc.2018.03757
Abstract A bio-inspired global finite time control using global fast-terminal sliding mode controller and radial basis function network is presented in this article, to address the attitude tracking control problem of the three degree-of-freedom four-rotor hover system. The proposed controller provides convergence of system states in a pre-determined finite time and estimates the unmodeled dynamics of the four-rotor system. Dynamic model of the four-rotor system is derived with Newton’s force equations. The unknown dynamics of four-rotor systems are estimated using Radial basis function. The bio-inspired global fast terminal sliding mode controller is proposed to provide chattering free finite time error convergence… More >
Open Access
ARTICLE
H. S. Abdel-Aziz1, M. Khalifa Saad1,2,*, A. A. Abdel-Salam1
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 389-415, 2018, DOI:10.32604/cmc.2018.02149
Abstract In this paper, we study the pseudo-spherical evolutes of curves in three dimensional hyperbolic space. We use techniques from singularity theory to investigate the singularities of pseudo-spherical evolutes and establish some relationships between singularities of these curves and geometric invariants of curves under the action of the Lorentz group. Besides, we defray with illustration some computational examples in support our main results. More >
Open Access
ARTICLE
Shuai Zhou3,4, Xiaoying Zhuang1,2,*
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 417-446, 2018, DOI:10.32604/cmc.2018.01742
Abstract The microcapsule-enabled cementitious material is an appealing building material and it has been attracting increasing research interest. By considering microcapsules as dissimilar inclusions in the material, this paper employs the discrete element method (DEM) to study the effects of loading rates on the fracturing behavior of cementitious specimens containing the inclusion and the crack. The numerical model was first developed and validated based on experimental results. It is then used to systematically study the initiation, the propagation and the coalescence of cracks in inclusion-enabled cementitious materials. The study reveals that the crack propagation speed, the first crack initiation stress, the… More >
Open Access
ARTICLE
T. D. Tran1, Chien H. Thai2,3,*, H. Nguyen-Xuan4,5,*
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 447-483, 2018, DOI:10.32604/cmc.2018.01738
Abstract A size-dependent computational approach for bending, free vibration and buckling analyses of isotropic and sandwich functionally graded (FG) microplates is in this study presented. We consider both shear deformation and small scale effects through the generalized higher order shear deformation theory and modified couple stress theory (MCST). The present model only retains a single material length scale parameter for capturing properly size effects. A rule of mixture is used to model material properties varying through the thickness of plates. The principle of virtual work is used to derive the discrete system equations which are approximated by moving Kriging interpolation (MKI)… More >
Open Access
ARTICLE
Yugai Huang 1, 2, *
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 485-494, 2018, DOI:10.32604/cmc.2018.03112
Abstract It has been demonstrated that low energy electrons (LEEs) can induce serious DNA damages including bases loss and even single and double strand breaks. Experiments also showed that LEE induced DNA damages will be reduced with the presence of amino acids. For understanding of the protection of amino acids to DNA, the stability of 6 kinds of thymine and glycine (T-g) dimers with planar configurations with an excess electron were studied with density functional theory (DFT) method. The results show that, when the excess electron is vertically attached, all the dimers become more active with higher energy. After re-optimization, 4… More >
Open Access
ARTICLE
Xiaoqing Tan1,*, Xiaochun Li1, Pei Yang1
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 495-503, 2018, DOI:10.32604/cmc.2018.03772
Abstract Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation (QT). QT was proposed to transmit the unknown states, in which EPR pairs, the entangled states, can be used as quantum channels. In this paper, we present two simple schemes for teleporting a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state respectively. Alice and Bob have shared an entangle state. Two Bell states are used as quantum channels. Then after Alice measuring her qubits and informing Bob… More >
Open Access
ARTICLE
Xiaorui Zhang1,3,*, Jiali Duan1, Lifeng Zhu2, Ladislav Kavan3
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 505-519, 2018, DOI:10.32604/cmc.2018.01842
Abstract Puncture is a common operation in surgery, which involves all kinds of tissue materials with different geometry and mechanical properties. As a new cross-disciplinary research area, Virtual Surgery (VS) makes simulation of soft tissue in puncture operation possible in virtual environment. In this paper, we introduce a VS-based puncture system composed by three-layer soft tissue, simulated with spherical harmonic function (SHF), which is covered with a force mesh, constructed by mass spring model (MSM). The two models are combined together with a parameter of SHF named surface radius, which provides MSM with real-time deformation data needed in force calculation. Meanwhile,… More >
Open Access
ARTICLE
Ming He1,2, Hongbin Wang1,*, Lianke Zhou1, Pengming Wang3, Andrew Ju4
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 521-532, 2018, DOI:10.32604/cmc.2018.03710
Abstract An important issue for deep learning models is the acquisition of training of data. Without abundant data from a real production environment for training, deep learning models would not be as widely used as they are today. However, the cost of obtaining abundant real-world environment is high, especially for underwater environments. It is more straightforward to simulate data that is closed to that from real environment. In this paper, a simple and easy symmetric learning data augmentation model (SLDAM) is proposed for underwater target radiate-noise data expansion and generation. The SLDAM, taking the optimal classifier of an initial dataset as… More >
Open Access
ARTICLE
Guoyuan Lin1,2,*, Bowen Liu1, Pengcheng Xiao3, Min Lei4, Wei Bi5,6
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 533-547, 2018, DOI:10.32604/cmc.2018.03720
Abstract Anti-detection is becoming as an emerging challenge for anti-phishing. This paper solves the threats of anti-detection from the threshold setting condition. Enough webpages are considered to complicate threshold setting condition when the threshold is settled. According to the common visual behavior which is easily attracted by the salient region of webpages, image retrieval methods based on texton correlation descriptor (TCD) are improved to obtain enough webpages which have similarity in the salient region for the images of webpages. There are two steps for improving TCD which has advantage of recognizing the salient region of images: (1) This paper proposed Weighted… More >
Open Access
ARTICLE
Lili He1,2, Dantong Ouyang1,2, Meng Wang1,2, Hongtao Bai1,2, Qianlong Yang1,2, Yaqing Liu3,4, Yu Jiang1,2,*
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 549-570, 2018, DOI:10.32604/cmc.2018.03840
Abstract In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method of spectral threshold recognition and… More >
Open Access
ARTICLE
Ying Li1, Jianbo Li1,*, Jianwei Chen1, Minchao Lu1, Caoyuan Li2,3
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 571-587, 2018, DOI:10.32604/cmc.2018.02851
Abstract The explosive growth of mobile data demand is becoming an increasing burden on current cellular network. To address this issue, we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic. The principle behind it is to select a few important users as seeds for data sharing. The three critical steps are detailed as follows. We first explore individual interests of users by the construction of user profiles, on which an interest graph is built by Gaussian graphical modeling. We then apply the extreme value theory to threshold the encounter duration of user pairs. So, a contact graph… More >
Open Access
ARTICLE
Jian Xu1,2,*, Zhihao Jiang1, Andi Wang1, Chen Wang1, Fucai Zhou1
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 589-602, 2018, DOI:10.32604/cmc.2018.03820
Abstract With the development of cloud storage, the problem of efficiently checking and proving data integrity needs more consideration. Therefore, much of growing interest has been pursed in the context of the integrity verification of cloud storage. Provable data possession (PDP) and Proofs of retrievablity (POR) are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments. The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not have. Unfortunately, most of POR… More >
Open Access
ARTICLE
Suzhen Wang1, Lu Zhang1, Yanpiao Zhang1, Jieli Sun1, Chaoyi Pang2, Gang Tian3, Ning Cao4,*
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 603-619, 2018, DOI:10.32604/cmc.2018.03884
Abstract Natural language semantic construction improves natural language comprehension ability and analytical skills of the machine. It is the basis for realizing the information exchange in the intelligent cloud-computing environment. This paper proposes a natural language semantic construction method based on cloud database, mainly including two parts: natural language cloud database construction and natural language semantic construction. Natural Language cloud database is established on the CloudStack cloud-computing environment, which is composed by corpus, thesaurus, word vector library and ontology knowledge base. In this section, we concentrate on the pretreatment of corpus and the presentation of background knowledge ontology, and then put… More >
Open Access
ARTICLE
Jifeng Zhong1,*, Zhihao Liu2,3,*, Juan Xu4
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 621-633, 2018, DOI:10.32604/cmc.2018.03706
Abstract The controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed. It is found that there are some serious security issues in this protocol. An eavesdropper (Eve) can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation (SCNO) attack. By the same attack, Eve can also steal some information of the secret message that the sender transmits. In addition, the receiver can take the same kind of attack to eavesdrop on some information of… More >
Open Access
ARTICLE
Changting Shi1, *
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 635-652, 2018, DOI:10.32604/cmc.2018.03754
Abstract In the last decade, IoT has been widely used in smart cities, autonomous driving and Industry 4.0, which lead to improve efficiency, reliability, security and economic benefits. However, with the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the IoT security is being confronted with a series of new threats and challenges. IoT device identification via Radio Frequency Fingerprinting (RFF) extracting from radio signals is a physical-layer method for IoT security. In physical-layer, RFF is a unique characteristic of IoT device themselves, which can difficultly be tampered. Just as people’s unique fingerprinting,… More >
Open Access
RETRACTION
Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2
CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 653-653, 2018, DOI:10.32604/cmc.2018.00653
Abstract none More >