Home / Journals / CMC / Vol.65, No.1, 2020
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    The Optimization Study about Fault Self-Healing Restoration of Power Distribution Network Based on Multi-Agent Technology

    Fuquan Huang1, Zijun Liu1, Tinghuang Wang1, Haitai Zhang2, *, Tony Yip3
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 865-878, 2020, DOI:10.32604/cmc.2020.010724
    Abstract In order to quickly and accurately locate the fault location of the distribution network and increase the stability of the distribution network, a fault recovery method based on multi-objective optimization algorithm is proposed. The optimization of the power distribution network fault system based on multiagent technology realizes fast recovery of multi-objective fault, solve the problem of network learning and parameter adjustment in the later stage of particle swarm optimization algorithm falling into the local extreme value dilemma, and realize the multi-dimensional nonlinear optimization of the main grid and the auxiliary grid. The system proposed in this study takes power distribution… More >

  • Open AccessOpen Access

    ARTICLE

    Device-Independent Quantum Key Distribution Protocol Based on Hyper-Entanglement

    Yan Chang1, *, Shibin Zhang1, Lili Yan1, Xueyang Li1, Tian Cao1, Qirun Wang2
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 879-896, 2020, DOI:10.32604/cmc.2020.010042
    Abstract The secure key rate of quantum key distribution (QKD) is greatly reduced because of the untrusted devices. In this paper, to raise the secure key rate of QKD, a device-independent quantum key distribution (DIQKD) protocol is proposed based on hyper-entangled states and Bell inequalities. The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition. Based on the formalization of Clauser-Horne Shimony-Holt (CHSH) violation measurement on local correlation, the probability of a secure secret bit is obtained, which is produced by a pair of hyper-entangled particles. By analyzing the secure secret… More >

  • Open AccessOpen Access

    ARTICLE

    Design and Implementation of PLC-Based Autonomous Construction System of Unmanned Vibratory Roller

    Weizu Huang1, Dong Wang1, *, Zuodong Xiao1, Qiang Yao2, Danjie Du3
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 897-912, 2020, DOI:10.32604/cmc.2020.09728
    Abstract The vibratory roller is a piece of vital construction machinery in the field of road construction. The unmanned vibratory roller efficiently utilizes the automated driving technology in the vehicle engineering field, which is innovative for the unmanned road construction. This paper develops and implements the autonomous construction system for the unmanned vibratory roller. Not only does the roller have the function of remote-controlled driving, but it also has the capability of autonomous road construction. The overall system design uses the Programmable Logic Controller (PLC) as the kernel controller. It establishes the communication network through multiple Input/Output (I/O) modules, Recommended Standard… More >

  • Open AccessOpen Access

    ARTICLE

    Robust Core Tensor Dictionary Learning with Modified Gaussian Mixture Model for Multispectral Image Restoration

    Leilei Geng1, Chaoran Cui1, Qiang Guo1, Sijie Niu2, Guoqing Zhang3, Peng Fu4, *
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 913-928, 2020, DOI:10.32604/cmc.2020.09975
    Abstract The multispectral remote sensing image (MS-RSI) is degraded existing multispectral camera due to various hardware limitations. In this paper, we propose a novel core tensor dictionary learning approach with the robust modified Gaussian mixture model for MS-RSI restoration. First, the multispectral patch is modeled by three-order tensor and high-order singular value decomposition is applied to the tensor. Then the task of MS-RSI restoration is formulated as a minimum sparse core tensor estimation problem. To improve the accuracy of core tensor coding, the core tensor estimation based on the robust modified Gaussian mixture model is introduced into the proposed model by… More >

  • Open AccessOpen Access

    ARTICLE

    Median Filtering Detection Based on Quaternion Convolutional Neural Network

    Jinwei Wang1, 2, 3, 4, Qiye Ni3, Yang Zhang3, Xiangyang Luo2, *, Yunqing Shi5, Jiangtao Zhai3, Sunil Kr Jha3
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 929-943, 2020, DOI:10.32604/cmc.2020.06569
    Abstract Median filtering is a nonlinear signal processing technique and has an advantage in the field of image anti-forensics. Therefore, more attention has been paid to the forensics research of median filtering. In this paper, a median filtering forensics method based on quaternion convolutional neural network (QCNN) is proposed. The median filtering residuals (MFR) are used to preprocess the images. Then the output of MFR is expanded to four channels and used as the input of QCNN. In QCNN, quaternion convolution is designed that can better mix the information of different channels than traditional methods. The quaternion pooling layer is designed… More >

  • Open AccessOpen Access

    ARTICLE

    Research on Clothing Simulation Design Based on Three-Dimensional Image Analysis

    Wenyao Zhu1, 2, Xue Li3, Young-Mi Shon4, *
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 945-962, 2020, DOI:10.32604/cmc.2020.010089
    Abstract Traditional clothing design models based on adaptive meshes cannot reflect. To solve this problem, a clothing simulation design model based on 3D image analysis technology is established. The model uses feature extraction and description of image evaluation parameters, and establishes the mapping relationship between image features and simulation results by using the optimal parameter values, thereby obtaining a three-dimensional image simulation analysis environment. On the basis of this model, by obtaining the response results of clothing collision detection and the results of local adaptive processing of clothing meshes, the cutting form and actual cutting effect of clothing are determined to… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel GLS Consensus Algorithm for Alliance Chain in Edge Computing Environment

    Huijuan Wang1, *, Jiang Yong1, Qingwei Liu2, Alan Yang3
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 963-976, 2020, DOI:10.32604/cmc.2020.09803
    Abstract Edge computing devices are widely deployed. An important issue that arises is in that these devices suffer from security attacks. To deal with it, we turn to the blockchain technologies. The note in the alliance chain need rules to limit write permissions. Alliance chain can provide security management functions, using these functions to meet the management between the members, certification, authorization, monitoring and auditing. This article mainly analyzes some requirements realization which applies to the alliance chain, and introduces a new consensus algorithm, generalized Legendre sequence (GLS) consensus algorithm, for alliance chain. GLS algorithms inherit the recognition and verification efficiency… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved DV-Hop Localization Algorithm Based on Selected Anchors

    Jing Wang1, *, Anqi Hou1, Yuanfei Tu1, Hong Yu2
    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 977-991, 2020, DOI:10.32604/cmc.2020.011003
    Abstract Wireless Sensor Network (WSN) based applications has been extraordinarily helpful in monitoring interested area. Only information of surrounding environment with meaningful geometric information is useful. How to design the localization algorithm that can effectively extract unknown node position has been a challenge in WSN. Among all localization technologies, the Distance Vector-Hop (DV-Hop) algorithm has been most popular because it simply utilizes the hop counts as connectivity measurements. This paper proposes an improved DV-Hop based algorithm, a centroid DV-hop localization with selected anchors and inverse distance weighting schemes (SIC-DV-Hop). We adopt an inverse distance weighting method for average distance amelioration to… More >

Per Page:

Share Link