Home / Journals / CMC / Vol.60, No.1, 2019
Table of Content
  • Open Access

    ARTICLE

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    Dae-Young Kim1, Se Dong Min2, †, Seokhoon Kim3, †, *
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06102
    Abstract The importance of Blockchain and IoT technology have been highlighted in various fields. These are not unaccustomed words anymore in our lives. Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet. The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues. Consequently, we propose a new data transmission scheme… More >

  • Open Access

    ARTICLE

    A Hybrid Model for Anomalies Detection in AMI System Combining K-means Clustering and Deep Neural Network

    Assia Maamar1,*, Khelifa Benahmed2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 15-39, 2019, DOI:10.32604/cmc.2019.06497
    Abstract Recently, the radical digital transformation has deeply affected the traditional electricity grid and transformed it into an intelligent network (smart grid). This mutation is based on the progressive development of advanced technologies: advanced metering infrastructure (AMI) and smart meter which play a crucial role in the development of smart grid. AMI technologies have a promising potential in terms of improvement in energy efficiency, better demand management, and reduction in electricity costs. However the possibility of hacking smart meters and electricity theft is still among the most significant challenges facing electricity companies. In this regard, we propose a hybrid approach to… More >

  • Open Access

    ARTICLE

    Topological Characterization of Book Graph and Stacked Book Graph

    Raghisa Khalid1, Nazeran Idrees1,*, Muhammad Jawwad Saif2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 41-54, 2019, DOI:10.32604/cmc.2019.06554
    Abstract Degree based topological indices are being widely used in computer-aided modeling, structural activity relations, and drug designing to predict the underlying topological properties of networks and graphs. In this work, we compute the certain important degree based topological indices like Randic index, sum connectivity index, ABC index, ABC4 index, GA index and GA5 index of Book graph Bn and Stacked book graph Bm,n. The results are analyzed by using edge partition, and the general formulas are derived for the above-mentioned families of graphs. More >

  • Open Access

    ARTICLE

    Efficient Analysis of Vertical Projection Histogram to Segment Arabic Handwritten Characters

    Mamouni El Mamoun1,*, Zennaki Mahmoud1, Sadouni Kaddour1
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 55-66, 2019, DOI:10.32604/cmc.2019.06444
    Abstract The paper discusses the segmentation of words into characters, which is an essential task in the development process of character recognition systems, as poorly segmented characters will automatically be unrecognized. The segmentation of offline handwritten Arabic text poses a greater challenge because of its cursive nature and different writing styles. In this article, we propose a new approach to segment handwritten Arabic characters using an efficient analysis of the vertical projection histogram. Our approach was tested using a set of handwritten Arabic words from the IFN/ENIT database, and promising results were obtained. More >

  • Open Access

    ARTICLE

    An Auto-Calibration Approach to Robust and Secure Usage of Accelerometers for Human Motion Analysis in FES Therapies

    Mingxu Sun1,#,*, Yinghang Jiang2,3,#, Qi Liu3,4,*, Xiaodong Liu4
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 67-83, 2019, DOI:10.32604/cmc.2019.06079
    Abstract A Functional Electrical stimulation (FES) therapy is a common rehabilitation intervention after stroke, and finite state machine (FSM) has proven to be an effective and intuitive FES control method. The FSM uses the data information generated by the accelerometer to robustly trigger state transitions. In the medical field, it is necessary to obtain highly safe and accurate acceleration data. In order to ensure the accuracy of the acceleration sensor data without affecting the accuracy of the motion analysis, we need to perform acceleration big data calibration. In this context, we propose a method for robustly calculating the auto-calibration gain using… More >

  • Open Access

    ARTICLE

    Balanced Deep Supervised Hashing

    Hefei Ling1, Yang Fang1, Lei Wu1, Ping Li1,*, Jiazhong Chen1, Fuhao Zou1, Jialie Shen2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 85-100, 2019, DOI:10.32604/cmc.2019.05588
    Abstract Recently, Convolutional Neural Network (CNN) based hashing method has achieved its promising performance for image retrieval task. However, tackling the discrepancy between quantization error minimization and discriminability maximization of network outputs simultaneously still remains unsolved. Motivated by the concern, we propose a novel Balanced Deep Supervised Hashing (BDSH) based on variant posterior probability to learn compact discriminability-preserving binary code for large scale image data. Distinguished from the previous works, BDSH can search an equilibrium point within the discrepancy. Towards the goal, a delicate objective function is utilized to maximize the discriminability of the output space with the variant posterior probability… More >

  • Open Access

    ARTICLE

    A Novel Reversible Data Hiding Scheme Based on Lesion Extraction and with Contrast Enhancement for Medical Images

    Xingxing Xiao1, Yang1,*, Rui Li2, Weiming Zhang3
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 101-115, 2019, DOI:10.32604/cmc.2019.05293
    Abstract The medical industry develops rapidly as science and technology advance. People benefit from medical resource sharing, but suffer from privacy leaks at the same time. In order to protect patients’ privacy and improve quality of medical images, a novel reversible data hiding (RDH) scheme based on lesion extraction and with contrast enhancement is proposed. Furthermore, the proposed scheme can enhance the contrast of medial image's lesion area directly and embed high-capacity privacy data reversibly. Different from previous segmentation methods, this scheme first adopts distance regularized level set evolution (DRLSE) to extract lesion and targets at the lesion area accurately for… More >

  • Open Access

    ARTICLE

    A Scalable Method of Maintaining Order Statistics for Big Data Stream

    Zhaohui Zhang*,1,2,3, Jian Chen1, Ligong Chen1, Qiuwen Liu1, Lijun Yang1, Pengwei Wang1,2,3, Yongjun Zheng4
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 117-132, 2019, DOI:10.32604/cmc.2019.05325
    Abstract Recently, there are some online quantile algorithms that work on how to analyze the order statistics about the high-volume and high-velocity data stream, but the drawback of these algorithms is not scalable because they take the GK algorithm as the subroutine, which is not known to be mergeable. Another drawback is that they can’t maintain the correctness, which means the error will increase during the process of the window sliding. In this paper, we use a novel data structure to store the sketch that maintains the order statistics over sliding windows. Therefore three algorithms have been proposed based on the… More >

  • Open Access

    ARTICLE

    A High Gain, Noise Cancelling 3.1-10.6 GHz CMOS LNA for UWB Application

    Xiaorong Zhao1, Hongjin Zhu1, Peizhong Shi1, Chunpeng Ge2, Xiufang Qian1,*, Honghui Fan1, Zhongjun Fu1
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 133-145, 2019, DOI:10.32604/cmc.2019.05661
    Abstract With the rapid development of ultra-wideband communications, the design requirements of CMOS radio frequency integrated circuits have become increasingly high. Ultra-wideband (UWB) low noise amplifiers are a key component of the receiver front end. The paper designs a high power gain (S21) and low noise figure (NF) common gate (CG) CMOS UWB low noise amplifier (LNA) with an operating frequency range between 3.1 GHz and 10.6 GHz. The circuit is designed by TSMC 0.13 μm RF CMOS technology. In order to achieve high gain and flat gain as well as low noise figure, the circuit uses many technologies. To improve… More >

  • Open Access

    ARTICLE

    Traffic Sign Recognition Method Integrating Multi-Layer Features and Kernel Extreme Learning Machine Classifier

    Wei Sun1,3,*, Hongji Du1, Shoubai Nie2,3, Xiaozheng He4
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 147-161, 2019, DOI:10.32604/cmc.2019.03581
    Abstract Traffic sign recognition (TSR), as a critical task to automated driving and driver assistance systems, is challenging due to the color fading, motion blur, and occlusion. Traditional methods based on convolutional neural network (CNN) only use an end-layer feature as the input to TSR that requires massive data for network training. The computation-intensive network training process results in an inaccurate or delayed classification. Thereby, the current state-of-the-art methods have limited applications. This paper proposes a new TSR method integrating multi-layer feature and kernel extreme learning machine (ELM) classifier. The proposed method applies CNN to extract the multi-layer features of traffic… More >

  • Open Access

    ARTICLE

    Super-Resolution Reconstruction of Images Based on Microarray Camera

    Jiancheng Zou1,*, Zhengzheng Li1, Zhijun Guo1, Don Hong2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 163-177, 2019, DOI:10.32604/cmc.2019.05795
    Abstract In the field of images and imaging, super-resolution (SR) reconstruction of images is a technique that converts one or more low-resolution (LR) images into a highresolution (HR) image. The classical two types of SR methods are mainly based on applying a single image or multiple images captured by a single camera. Microarray camera has the characteristics of small size, multi views, and the possibility of applying to portable devices. It has become a research hotspot in image processing. In this paper, we propose a SR reconstruction of images based on a microarray camera for sharpening and registration processing of array… More >

  • Open Access

    ARTICLE

    A Scalable Approach for Fraud Detection in Online E-Commerce Transactions with Big Data Analytics

    Hangjun Zhou1,2,*, Guang Sun1,3, Sha Fu1, Wangdong Jiang1, Juan Xue1
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 179-192, 2019, DOI:10.32604/cmc.2019.05214
    Abstract With the rapid development of mobile Internet and finance technology, online e-commerce transactions have been increasing and expanding very fast, which globally brings a lot of convenience and availability to our life, but meanwhile, chances of committing frauds also come in all shapes and sizes. Moreover, fraud detection in online e-commerce transactions is not totally the same to that in the existing areas due to the massive amounts of data generated in e-commerce, which makes the fraudulent transactions more covertly scattered with genuine transactions than before. In this article, a novel scalable and comprehensive approach for fraud detection in online… More >

  • Open Access

    ARTICLE

    Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

    Wen Tian1, Xiaopeng Ji1,*, Weiwei Liu1, Guangjie Liu1, Rong Lin1,2, Jiangtao Zhai3, Yuewei Dai3
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 193-211, 2019, DOI:10.32604/cmc.2019.05290
    Abstract Cyber-physical system (CPS) is an advanced system that integrats physical processes, computation and communication resources. The security of cyber-physical systems has become an active research area in recent years. In this paper, we focus on defensive strategies against network attacks in CPS. We introduce both low- and highinteraction honeypots into CPS as a security management tool deliberately designed to be probed, attacked and compromised. In addition, an analysis resource constraint is introduced for the purpose of optimizing defensive strategies against network attacks in CPS. We study the offensive and defensive interactions of CPS and model the offensive and defensive process… More >

  • Open Access

    ARTICLE

    Online Burst Events Detection Oriented Real-Time Microblog Message Stream

    Guozhong Dong1,2,*, Jun Gao3, Liang Huang4, Chunlei Shi1
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 213-225, 2019, DOI:10.32604/cmc.2019.05601
    Abstract The rapid spread of microblog messages and sensitivity of unexpected events make microblog become the public opinion center of burst events. Online burst events detection oriented real-time microblog message stream has become an important research problem in the field of microblog public opinion. Because of the large amount of real-time microblog message stream and irregular language of microblog message, it is important to process real-time microblog message stream and detect burst events accurately. In this paper, an online burst events detection framework is proposed. In this framework, abnormal messages are detected based on sliding time window and two-level hash table.… More >

  • Open Access

    ARTICLE

    An Improved MDS-MAP Localization Algorithm Based on Weighted Clustering and Heuristic Merging for Anisotropic Wireless Networks with Energy Holes

    Jing Wang1,*, Xiaohe Qiu1, Yuanfei Tu1
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 227-244, 2019, DOI:10.32604/cmc.2019.05281
    Abstract The MDS-MAP (multidimensional scaling-MAP) localization algorithm utilize almost merely connectivity information, and therefore it is easy to implement in practice of wireless sensor networks (WSNs). Anisotropic networks with energy hole, however, has blind communication spots that cause loss of information in the merging phase of MDSMAP. To enhance the positioning accuracy, the authors propose an MDS-MAP (CH) algorithm which can improve the clustering and merging strategy. In order to balance the effect of energy consumption and the network topology stabilization, we present a weighted clustering scheme, which considers the residual energy, the degree of connectivity nodes and node density. As… More >

  • Open Access

    ARTICLE

    Stream-Based Data Sampling Mechanism for Process Object

    Yongzheng Lin1, Hong Liu1, ∗, Zhenxiang Chen2, Kun Zhang2, Kun Ma2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 245-257, 2019, DOI:10.32604/cmc.2019.04322
    Abstract Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find… More >

  • Open Access

    ARTICLE

    New Generation Model of Word Vector Representation Based on CBOW or Skip-Gram

    Zeyu Xiong1,*, Qiangqiang Shen1, Yueshan Xiong1, Yijie Wang1, Weizi Li2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 259-273, 2019, DOI:10.32604/cmc.2019.05155
    Abstract Word vector representation is widely used in natural language processing tasks. Most word vectors are generated based on probability model, its bag-of-words features have two major weaknesses: they lose the ordering of the words and they also ignore semantics of the words. Recently, neural-network language models CBOW and Skip-Gram are developed as continuous-space language models for words representation in high dimensional real-valued vectors. These vector representations have recently demonstrated promising results in various NLP tasks because of their superiority in capturing syntactic and contextual regularities in language. In this paper, we propose a new strategy based on optimization in contiguous… More >

  • Open Access

    ARTICLE

    Relation Extraction for Massive News Texts

    Libo Yin1, Xiang Meng2, Jianxun Li3, Jianguo Sun2,*
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 275-285, 2019, DOI:10.32604/cmc.2019.05556
    Abstract With the development of information technology including Internet technologies, the amount of textual information that people need to process daily is increasing. In order to automatically obtain valuable and user-informed information from massive amounts of textual data, many researchers have conducted in-depth research in the area of entity relation extraction. Based on the existing research of word vector and the method of entity relation extraction, this paper designs and implements an method based on support vector machine (SVM) for extracting English entity relationships from massive news texts. The method converts sentences in natural language into a form of numerical matrix… More >

  • Open Access

    ARTICLE

    Improved Fully Convolutional Network for Digital Image Region Forgery Detection

    Jiwei Zhang1, Yueying Li2, Shaozhang Niu1,*, Zhiyi Cao1, Xinyi Wang1
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 287-303, 2019, DOI:10.32604/cmc.2019.05353
    Abstract With the rapid development of image editing techniques, the image splicing behavior, typically for those that involve copying a portion from one original image into another targeted image, has become one of the most prevalent challenges in our society. The existing algorithms relying on hand-crafted features can be used to detect image splicing but unfortunately lack precise location information of the tampered region. On the basis of changing the classifications of fully convolutional network (FCN), here we proposed an improved FCN that enables locating the spliced region. Specifically, we first insert the original images into the training dataset that contains… More >

  • Open Access

    ARTICLE

    A New NTRU-Type Public-Key Cryptosystem over the Binary Field

    Youyu Gu1, Xiongwei Xie2, Chunsheng Gu3,*
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 305-316, 2019, DOI:10.32604/cmc.2019.04121
    Abstract As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time… More >

  • Open Access

    ARTICLE

    Network Embedding-Based Anomalous Density Searching for Multi-Group Collaborative Fraudsters Detection in Social Media

    Chengzhang Zhu1, 2, Wentao Zhao2, *, Qian Li1, Pan Li2, Qiaobo Da3
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 317-333, 2019, DOI:10.32604/cmc.2019.05677
    Abstract Detecting collaborative fraudsters who manipulate opinions in social media is becoming extremely important in order to provide reliable information, in which, however, the diversity in different groups of collaborative fraudsters presents a significant challenge to existing collaborative fraudsters detection methods. These methods often detect collaborative fraudsters as the largest group of users who have the strongest relation with each other in the social media, consequently overlooking the other groups of fraudsters that are with strong user relation yet small group size. This paper introduces a novel network embedding-based framework NEST and its instance BEST to address this issue. NEST detects… More >

  • Open Access

    ARTICLE

    A Novel Broadband Microstrip Antenna Based on Operation of Multi-Resonant Modes

    Taohua Chen1, Yueyun Chen1,*, Rongling Jian1, Zushen Liu2, Alan Yang3
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 335-349, 2019, DOI:10.32604/cmc.2019.07073
    Abstract A novel broadband microstrip antenna under operation of TM1/2,0, TM10 and TM12 modes through a shorting wall and slots is proposed in this paper. Initially, an inverted U-shaped slot is adopted around the feeding point, which achieves a good impedance matching on TM10 mode and separates the patch into two parts. Additionally, a shorting wall is added underneath the edge of smaller patch to excite another one-quarter resonant mode, i.e., TM1/2,0 mode of smaller patch close to TM10 mode to expand the impedance bandwidth. Further, the antenna width is enlarged and two symmetrical vertical rectangular slots are cut on the… More >

  • Open Access

    ARTICLE

    Fuzzy Search for Multiple Chinese Keywords in Cloud Environment

    Zhongjin Fang1, 2, Jinwei Wang1, *, Baowei Wang1, Jianjun Zhang3, Yunqing Shi4
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 351-363, 2019, DOI:10.32604/cmc.2019.07106
    Abstract With the continuous development of cloud computing and big data technology, the use of cloud storage is more and more extensive, and a large amount of data is outsourced for public cloud servers, and the security problems that follow are gradually emerging. It can not only protect the data privacy of users, but also realize efficient retrieval and use of data, which is an urgent problem for cloud storage. Based on the existing fuzzy search and encrypted data fuzzy search schemes, this paper uses the characteristics of fuzzy sounds and polysemy that are unique to Chinese, and realizes the synonym… More >

  • Open Access

    ARTICLE

    Knowledge Composition and Its Influence on New Product Development Performance in the Big Data Environment

    Chuanrong Wu1,*, Veronika Lee1, Mark E. McMurtrey2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 365-378, 2019, DOI:10.32604/cmc.2019.06949
    Abstract Product innovation is regarded as a primary means for enterprises to maintain their competitive advantage. Knowledge transfer is a major way that enterprises access knowledge from the external environment for new product innovation. Knowledge transfer may face the risk of infringement of the intellectual property rights of other enterprises and the termination of licensing agreements by the knowledge source. Enterprises must develop independent innovation knowledge at the same time they profit from knowledge transfers. Therefore, new product development by an enterprise usually consists of three types of new knowledge: big data knowledge transferred from big data knowledge providers, private knowledge… More >

  • Open Access

    ARTICLE

    Outage Capacity Analysis for Cognitive Non-Orthogonal Multiple Access Downlink Transmissions Systems in the Presence of Channel Estimation Error

    Yinghua Zhang1,2, Yanfang Dong2, Lei Wang1, Jian Liu1,*, Yunfeng Peng1, Jim Feng3
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 379-393, 2019, DOI:10.32604/cmc.2019.05790
    Abstract In this paper, we propose a downlink cognitive non-orthogonal multiple access (NOMA) network, where the secondary users (SUs) operate in underlay mode. In the network, secondary transmitter employs NOMA signaling for downlink transmission, and the primary user (PU) is interfered by the transmission from SU. The expressions for the outage probabilities are derived in closed-form for both primary and secondary users in the presence of channel estimation error. Numerical simulation results show that the channel estimation error and the inter-network interference cause degradation of the downlink outage performance. Also the power allocation and the location have a significant impact on… More >

  • Open Access

    ARTICLE

    A Cross-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1,*, Jinyue Xia2
    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 395-408, 2019, DOI:10.32604/cmc.2019.05627
    Abstract Tenants in the cloud computing environment share various services, including storage, network, computing, and applications. For better use of services in the cloud computing environment, tenants collaborate in tasks, resulting in challenges to the traditional access control. This study proposes a cross-tenant role-based access control (CT-RBAC) model for collaborative cloud services. This model covers the CT-RBAC0, CT-RBAC1, CT-RBAC2, and CT-RBAC3 models. The model not only extends the RBAC model in the multi-tenant cloud computing mode but also includes four types of authorization modes among tenants. Consequently, the role inheritance constraint is increased, and fine-grained authorization access among trusted tenants is… More >

Share Link

WeChat scan