Open Access
ARTICLE
Bohan Niu1,*, Yongfeng Huang2
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06032
Abstract The goal of research on the topics such as sentiment analysis and cognition is to analyze the opinions, emotions, evaluations and attitudes that people hold about the entities and their attributes from the text. The word level affective cognition becomes an important topic in sentiment analysis. Extracting the (attribute, opinion word) binary relationship by word segmentation and dependency parsing, and labeling those by existing emotional dictionary combined with webpage information and manual annotation, this paper constitutes a binary relationship knowledge base. By using knowledge embedding method, embedding each element in (attribute, opinion, opinion word) as a word vector into the… More >
Open Access
ARTICLE
Manal Hazazi1, Afnan Almousa1, Heba Kurdi1,2,*, Shiroq Al-Megren1, Shada Alsalamah1
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 15-29, 2019, DOI:10.32604/cmc.2019.06221
Abstract The underlying premise of peer-to-peer (P2P) systems is the trading of digital resources among individual peers to facilitate file sharing, distributed computing, storage, collaborative applications and multimedia streaming. So-called free-riders challenge the foundations of this system by consuming resources from other peers without offering any resources in return, hindering resource exchange among peers. Therefore, immense effort has been invested in discouraging free-riding and overcoming the ill effects of such unfair use of the system. However, previous efforts have all fallen short of effectively addressing free-riding behaviour in P2P networks. This paper proposes a novel approach based on utilising a credit… More >
Open Access
ARTICLE
Timon Rabczuk1,2,*, Huilong Ren3, Xiaoying Zhuang4,5
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 31-55, 2019, DOI:10.32604/cmc.2019.04567
Abstract A novel nonlocal operator theory based on the variational principle is proposed for the solution of partial differential equations. Common differential operators as well as the variational forms are defined within the context of nonlocal operators. The present nonlocal formulation allows the assembling of the tangent stiffness matrix with ease and simplicity, which is necessary for the eigenvalue analysis such as the waveguide problem. The present formulation is applied to solve the differential electromagnetic vector wave equations based on electric fields. The governing equations are converted into nonlocal integral form. An hourglass energy functional is introduced for the elimination of… More >
Open Access
ARTICLE
Xiaoying Zhuang1,2,*, Shuai Zhou3,4
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 57-77, 2019, DOI:10.32604/cmc.2019.04589
Abstract Advances in machine learning (ML) methods are important in industrial engineering and attract great attention in recent years. However, a comprehensive comparative study of the most advanced ML algorithms is lacking. Six integrated ML approaches for the crack repairing capacity of the bacteria-based self-healing concrete are proposed and compared. Six ML algorithms, including the Support Vector Regression (SVR), Decision Tree Regression (DTR), Gradient Boosting Regression (GBR), Artificial Neural Network (ANN), Bayesian Ridge Regression (BRR) and Kernel Ridge Regression (KRR), are adopted for the relationship modeling to predict crack closure percentage (CCP). Particle Swarm Optimization (PSO) is used for the hyper-parameters… More >
Open Access
ARTICLE
Khader M. Hamdia2, Hamid Ghasemi3, Xiaoying Zhuang4,5, Naif Alajlan1, Timon Rabczuk1,2,*
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 79-87, 2019, DOI:10.32604/cmc.2019.05882
Abstract In this study, machine learning representation is introduced to evaluate the flexoelectricity effect in truncated pyramid nanostructure under compression. A Non-Uniform Rational B-spline (NURBS) based IGA formulation is employed to model the flexoelectricity. We investigate 2D system with an isotropic linear elastic material under plane strain conditions discretized by 45×30 grid of B-spline elements. Six input parameters are selected to construct a deep neural network (DNN) model. They are the Young's modulus, two dielectric permittivity constants, the longitudinal and transversal flexoelectric coefficients and the order of the shape function. The outputs of interest are the strain in the stress direction… More >
Open Access
ARTICLE
Yifei Wei1,*, Zhaoying Wang1, Da Guo1, F. Richard Yu2
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 89-104, 2019, DOI:10.32604/cmc.2019.04836
Abstract To reduce the transmission latency and mitigate the backhaul burden of the centralized cloud-based network services, the mobile edge computing (MEC) has been drawing increased attention from both industry and academia recently. This paper focuses on mobile users’ computation offloading problem in wireless cellular networks with mobile edge computing for the purpose of optimizing the computation offloading decision making policy. Since wireless network states and computing requests have stochastic properties and the environment’s dynamics are unknown, we use the model-free reinforcement learning (RL) framework to formulate and tackle the computation offloading problem. Each mobile user learns through interactions with the… More >
Open Access
ARTICLE
Qi Wang1,2,*, Changsong Yang1,2, Shaoen Wu3, Yuxiang Wang1,2
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 105-118, 2019, DOI:10.32604/cmc.2019.03739
Abstract Transfer alignment is used to initialize SINS (Strapdown Inertial Navigation System) in motion. Lever-arm effect compensation is studied existing in an AUV (Autonomous Underwater Vehicle) before launched from the mother ship. The AUV is equipped with SINS, Doppler Velocity Log, depth sensor and other navigation sensors. The lever arm will cause large error on the transfer alignment between master inertial navigation system and slave inertial navigation system, especially in big ship situations. This paper presents a novel method that can effectively estimate and compensate the flexural lever arm between the main inertial navigation system mounted on the mother ship and… More >
Open Access
ARTICLE
Qun Mo1, Heng Yao1, Fang Cao2, Zheng Chang3, Chuan Qin1,*
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 119-133, 2019, DOI:10.32604/cmc.2019.05770
Abstract Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information in the most significant bits… More >
Open Access
ARTICLE
Xiaoliang Wang1, *, Wenhua Song1, Bowei Zhang1, Brandon Mausler2, Frank Jiang1, 3
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 135-147, 2019, DOI:10.32604/cmc.2019.05687
Abstract Nowadays, the number of vehicles in China has increased significantly. The increase of the number of vehicles has also led to the increasingly complex traffic situation and the urgent safety measures in need. However, the existing early warning devices such as geomagnetic, ultrasonic and infrared detection have some shortcomings like difficult installation and maintenance. In addition, geomagnetic detection will damage the road surface, while ultrasonic and infrared detection will be greatly affected by the environment. Considering the shortcomings of the existing solutions, this paper puts forward a solution of early warning for vehicle turning meeting based on image acquisition and… More >
Open Access
ARTICLE
Tao Shang1,*, Zhuang Pei2, Ranyiliu Chen3, Jianwei Liu1
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 149-165, 2019, DOI:10.32604/cmc.2019.05360
Abstract In January 2015, the first quantum homomorphic signature scheme was proposed creatively. However, only one verifier is allowed to verify a signature once in this scheme. In order to support repeatable verification for general scenario, we propose a new quantum homomorphic signature scheme with repeatable verification by introducing serial verification model and parallel verification model. Serial verification model solves the problem of signature verification by combining key distribution and Bell measurement. Parallel verification model solves the problem of signature duplication by logically treating one particle of an EPR pair as a quantum signature and physically preparing a new EPR pair.… More >
Open Access
ARTICLE
Weihong Han1, Zhihong Tian1,*, Zizhong Huang2, Lin Zhong3, Yan Jia2
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 167-180, 2019, DOI:10.32604/cmc.2019.05192
Abstract Network Security Situation Awareness System YHSAS acquires, understands and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. YHSAS is developed for national backbone network, large network operators, large enterprises and other large-scale network. This paper describes its architecture and key technologies: Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis, Knowledge Representation and Management of Super Large-Scale Network Security, Multi-Level, Multi-Granularity and Multi-Dimensional Network Security Index Construction Method, Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology, and so on. The performance tests show that YHSAS… More >
Open Access
ARTICLE
Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813
Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis,… More >
Open Access
ARTICLE
Yang Wu1, Weiping Shang2,*, Jiahao Chen3
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 199-214, 2019, DOI:10.32604/cmc.2019.05194
Abstract Robust data hiding techniques attempt to construct covert communication in a lossy public channel. Nowadays, the existing robust JPEG steganographic algorithms cannot overcome the side-information missing situation. Thus, this paper proposes a new robust JPEG steganographic algorithm based on the high tense region location method which needs no side-information of lossy channel. First, a tense region locating method is proposed based on the Harris-Laplacian feature point. Then, robust cover object generating processes are described. Last, the advanced embedding cost function is proposed. A series of experiments are conducted on various JPEG image sets and the results show that the proposed… More >
Open Access
ARTICLE
Yiru Sun1,2, Yuling Chen1,*, Haseeb Ahmad3, Zhanhong Wei4
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 215-227, 2019, DOI:10.32604/cmc.2019.05253
Abstract In this paper, we propose an asymmetric controlled bidirectional transmission protocol. In the protocol, by using the thirteen-qubit entangled state as the quantum channel, Alice can realize the transmission of a two-qubit equatorial state for Bob and Bob can transmit a four-qubit equatorial state for Alice under the control of Charlie. Firstly, we give the construction of the quantum channel, which can be done by performing several H and CNOT operations. Secondly, through implementing the appropriate measurements and the corresponding recovery operations, the desired states can be transmitted simultaneously, securely and deterministically. Finally, we analyze the performance of the protocol,… More >
Open Access
ARTICLE
Hongbin Wang1, Lianke Zhou1, Guodong Zhao1,*, Nianbin Wang1, Jianguo Sun1, Yue Zheng2, Lei Chen3
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 229-237, 2019, DOI:10.32604/cmc.2019.04628
Abstract Borda sorting algorithm is a kind of improvement algorithm based on weighted position sorting algorithm, it is mainly suitable for the high duplication of search results, for the independent search results, the effect is not very good and the computing method of relative score in Borda sorting algorithm is according to the rule of the linear regressive, but position relationship cannot fully represent the correlation changes. aimed at this drawback, the new sorting algorithm is proposed in this paper, named PMS-Sorting algorithm, firstly the position score of the returned results is standardized processing, and the similarity retrieval word string with… More >
Open Access
ARTICLE
Xianyi Chen1,2,*, Haidong Zhong1,2, Zhifeng Bao3
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 239-255, 2019, DOI:10.32604/cmc.2019.03572
Abstract Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret image without any loss. It also has been proved to be very useful in image content protection and reversible data hiding in encrypted images. However, the standard deviation (SD) is selected as the only feature during the matching of the secret and target image blocks in RIT methods, the matching result is not so good and needs to be further improved… More >
Open Access
ARTICLE
Guoquan Nie1, *, Menghe Wang1
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 257-274, 2019, DOI:10.32604/cmc.2019.04498
Abstract Propagation characteristics of Rayleigh-type wave in a piezoelectric layered system are theoretically investigated. The piezoelectric layer is considered as a cubic crystal with finite thickness rotated about Y-axis and is imperfectly bonded onto a semi-infinite dielectric substrate. The imperfect interface between the two constituents is assumed to be mechanically compliant and dielectrically weakly conducting. The exact dispersion relations for electrically open or shorted boundary conditions are obtained. The numerical results show that the phase velocity of Rayleigh-type wave is symmetric with respect to the cut orientation of 45。 and can achieve the maximum propagation speed in this orientation. The mechanical… More >
Open Access
ARTICLE
Zhiliang Wang1,*, Nuocheng Tian2, Jianguo Wang3, Shengqi Yang3, Guang Liu1
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 275-296, 2019, DOI:10.32604/cmc.2019.04247
Abstract The mechanical behaviors and energy dissipation characteristics of heat-treated granite were investigated under repeated impact loading. The granite samples were firstly heat-treated at the temperature of 20°C, 200°C, 400°C, and 600°C, respectively. The thermal damage characteristics of these samples were then observed and measured before impact tests. Dynamic impact compression tests finally were carried out using a modified split-Hopkinson pressure bar under three impact velocities of 12 m/s, 15 m/s, and 18 m/s. These test results show that the mineral composition and the main oxides of the granite do not change with these treatment temperatures. The number of microcracks and… More >
Open Access
ARTICLE
Lili Pan1, Jiaohua Qin1,*, Hao Chen2, Xuyu Xiang1, Cong Li1, Ran Chen1
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 297-313, 2019, DOI:10.32604/cmc.2019.04097
Abstract Image retrieval for food ingredients is important work, tremendously tiring, uninteresting, and expensive. Computer vision systems have extraordinary advancements in image retrieval with CNNs skills. But it is not feasible for small-size food datasets using convolutional neural networks directly. In this study, a novel image retrieval approach is presented for small and medium-scale food datasets, which both augments images utilizing image transformation techniques to enlarge the size of datasets, and promotes the average accuracy of food recognition with state-of-the-art deep learning technologies. First, typical image transformation techniques are used to augment food images. Then transfer learning technology based on deep… More >
Open Access
ARTICLE
Yuhan Kang1, Fenlin Liu1, Chunfang Yang1,*, Xiangyang Luo1, Tingting Zhang2
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 315-329, 2019, DOI:10.32604/cmc.2019.05242
Abstract This study proposes a color image steganalysis algorithm that extracts high-dimensional rich model features from the residuals of channel differences. First, the advantages of features extracted from channel differences are analyzed, and it shown that features extracted in this manner should be able to detect color stego images more effectively. A steganalysis feature extraction method based on channel differences is then proposed, and used to improve two types of typical color image steganalysis features. The improved features are combined with existing color image steganalysis features, and the ensemble classifiers are trained to detect color stego images. The experimental results indicate… More >
Open Access
ARTICLE
Mohan Li1, Yanbin Sun1, *, Shen Su1, Zhihong Tian1, Yuhang Wang1, *, Xianzhi Wang2
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 331-344, 2019, DOI:10.32604/cmc.2019.05379
Abstract Maliciously manufactured user profiles are often generated in batch for shilling attacks. These profiles may bring in a lot of quality problems but not worthy to be repaired. Since repairing data always be expensive, we need to scrutinize the data and pick out the data that really deserves to be repaired. In this paper, we focus on how to distinguish the unintentional data quality problems from the batch generated fake users for shilling attacks. A two-steps framework named DPIF is proposed for the distinguishment. Based on the framework, the metrics of homology and suspicious degree are proposed. The homology can… More >
Open Access
ARTICLE
Cosmin Anitescu1, Elena Atroshchenko2, Naif Alajlan3, Timon Rabczuk3,*
CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 345-359, 2019, DOI:10.32604/cmc.2019.06641
Abstract We present a method for solving partial differential equations using artificial neural networks and an adaptive collocation strategy. In this procedure, a coarse grid of training points is used at the initial training stages, while more points are added at later stages based on the value of the residual at a larger set of evaluation points. This method increases the robustness of the neural network approximation and can result in significant computational savings, particularly when the solution is non-smooth. Numerical results are presented for benchmark problems for scalar-valued PDEs, namely Poisson and Helmholtz equations, as well as for an inverse… More >