Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Research on Real-Time High Reliable Network File Distribution Technology

    Chenglong Li1, Peipeng Liu1, Hewei Yu1, *, Mengmeng Ge2, Xiangzhan Yu2, Yi Xin2, Yuhang Wang3, Dongyu Zhang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1739-1752, 2020, DOI:10.32604/cmc.2020.09019

    Abstract The rapid development of Internet of Things (IoT) technology has made previously unavailable data available, and applications can take advantage of device data for people to visualize, explore, and build complex analyses. As the size of the network and the number of network users continue to increase, network requests tend to aggregate on a small number of network resources, which results in uneven load on network requests. Real-time, highly reliable network file distribution technology is of great importance in the Internet of Things. This paper studies real-time and highly reliable file distribution technology for large-scale networks. In response to this… More >

  • Open Access

    ARTICLE

    Identifying Honeypots from ICS Devices Using Lightweight Fuzzy Testing

    Yanbin Sun1, Xiaojun Pan1, Chao Xu2, Penggang Sun2, Quanlong Guan3, Mohan Li1, *, Men Han4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1723-1737, 2020, DOI:10.32604/cmc.2020.010593

    Abstract The security issues of industrial control systems (ICSs) have become increasingly prevalent. As an important part of ICS security, honeypots and antihoneypots have become the focus of offensive and defensive confrontation. However, research on ICS honeypots still lacks breakthroughs, and it is difficult to simulate real ICS devices perfectly. In this paper, we studied ICS honeypots to identify and address their weaknesses. First, an intelligent honeypot identification framework is proposed, based on which feature data type requirements and feature data acquisition for honeypot identification is studied. Inspired by vulnerability mining, we propose a feature acquisition approach based on lightweight fuzz… More >

  • Open Access

    ARTICLE

    Paillier-Based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving

    Xiehua Li1,*, Fang Li1, Jie Jiang1, Xiaoyu Mei2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1707-1721, 2020, DOI:10.32604/cmc.2020.011227

    Abstract Efficient multi-keyword fuzzy search over encrypted data is a desirable technology for data outsourcing in cloud storage. However, the current searchable encryption solutions still have deficiencies in search efficiency, accuracy and multiple data owner support. In this paper, we propose an encrypted data searching scheme that can support multiple keywords fuzzy search with order preserving (PMS). First, a new spelling correction algorithm-(Possibility-Levenshtein based Spelling Correction) is proposed to correct user input errors, so that fuzzy keywords input can be supported. Second, Paillier encryption is introduced to calculate encrypted relevance score of multiple keywords for order preserving. Then, a queue-based query… More >

  • Open Access

    ARTICLE

    An Improved Deep Fusion CNN for Image Recognition

    Rongyu Chen1, Lili Pan1, *, Cong Li1, Yan Zhou1, Aibin Chen1, Eric Beckman2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1691-1706, 2020, DOI:10.32604/cmc.2020.011706

    Abstract With the development of Deep Convolutional Neural Networks (DCNNs), the extracted features for image recognition tasks have shifted from low-level features to the high-level semantic features of DCNNs. Previous studies have shown that the deeper the network is, the more abstract the features are. However, the recognition ability of deep features would be limited by insufficient training samples. To address this problem, this paper derives an improved Deep Fusion Convolutional Neural Network (DF-Net) which can make full use of the differences and complementarities during network learning and enhance feature expression under the condition of limited datasets. Specifically, DF-Net organizes two… More >

  • Open Access

    ARTICLE

    Quantum Algorithms and Experiment Implementations Based on IBM Q

    Wenjie Liu1, 2, *, Junxiu Chen2, Yinsong Xu2, Jiahao Tang2, Lian Tong3, Xiaoyu Song4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1671-1689, 2020, DOI:10.32604/cmc.2020.07564

    Abstract With the rapid development of quantum theory and technology in recent years, especially the emergence of some quantum cloud computing platforms, more and more researchers are not satisfied with the theoretical derivation and simulation verification of quantum computation (especially quantum algorithms), experimental verification on real quantum devices has become a new trend. In this paper, three representative quantum algorithms, namely Deutsch-Jozsa, Grover, and Shor algorithms, are briefly depicted, and then their implementation circuits are presented, respectively. We program these circuits on python with QISKit to connect the remote real quantum devices (i.e., ibmqx4, ibmqx5) on IBM Q to verify these… More >

  • Open Access

    ARTICLE

    A Novel Method for Node Connectivity with Adaptive Dragonfly Algorithm and Graph-Based m-Connection Establishment in MANET

    S. B. Manoojkumaar1, *, C. Poongodi2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1649-1670, 2020, DOI:10.32604/cmc.2020.010781

    Abstract Maximizing network lifetime is measured as the primary issue in Mobile Adhoc Networks (MANETs). In geographically routing based models, packet transmission seems to be more appropriate in dense circumstances. The involvement of the Heuristic model directly is not appropriate to offer an effectual solution as it becomes NP-hard issues; therefore investigators concentrate on using Meta-heuristic approaches. Dragonfly Optimization (DFO) is an effective meta-heuristic approach to resolve these problems by providing optimal solutions. Moreover, Meta-heuristic approaches (DFO) turn to be slower in convergence problems and need proper computational time while expanding network size. Thus, DFO is adaptively improved as Adaptive Dragonfly… More >

  • Open Access

    ARTICLE

    A Middleware for Polyglot Persistence and Data Portability of Big Data PaaS Cloud Applications

    Kiranbir Kaur1, *, Sandeep Sharma1, Karanjeet Singh Kahlon2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1625-1647, 2020, DOI:10.32604/cmc.2020.011535

    Abstract Vendor lock-in can occur at any layer of the cloud stack-Infrastructure, Platform, and Software-as-a-service. This paper covers the vendor lock-in issue at Platform as a Service (PaaS) level where applications can be created, deployed, and managed without worrying about the underlying infrastructure. These applications and their persisted data on one PaaS provider are not easy to port to another provider. To overcome this issue, we propose a middleware to abstract and make the database services as cloud-agnostic. The middleware supports several SQL and NoSQL data stores that can be hosted and ported among disparate PaaS providers. It facilitates the developers… More >

  • Open Access

    ARTICLE

    An Adjust Duty Cycle Method for Optimized Congestion Avoidance and Reducing Delay for WSNs

    Ting Xu1, Ming Zhao1, Xin Yao1, *, Kun He2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1605-1624, 2020, DOI:10.32604/cmc.2020.011458

    Abstract With the expansion of the application range and network scale of wireless sensor networks in recent years, WSNs often generate data surges and delay queues during the transmission process, causing network paralysis, even resulting in local or global congestion. In this paper, a dynamically Adjusted Duty Cycle for Optimized Congestion based on a real-time Queue Length (ADCOC) scheme is proposed. In order to improve the resource utilization rate of network nodes, we carried out optimization analysis based on the theory and applied it to the adjustment of the node’s duty cycle strategy. Using this strategy to ensure that the network… More >

  • Open Access

    ARTICLE

    Recommendation Algorithm Based on Probabilistic Matrix Factorization with Adaboost

    Hongtao Bai1, 2, Xuan Li1, 2, Lili He1, 2, Longhai Jin1, 2, Chong Wang1, 2, 3, Yu Jiang1, 2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1591-1603, 2020, DOI:10.32604/cmc.2020.09981

    Abstract A current problem in diet recommendation systems is the matching of food preferences with nutritional requirements, taking into account individual characteristics, such as body weight with individual health conditions, such as diabetes. Current dietary recommendations employ association rules, content-based collaborative filtering, and constraint-based methods, which have several limitations. These limitations are due to the existence of a special user group and an imbalance of non-simple attributes. Making use of traditional dietary recommendation algorithm researches, we combine the Adaboost classifier with probabilistic matrix factorization. We present a personalized diet recommendation algorithm by taking advantage of probabilistic matrix factorization via Adaboost. A… More >

  • Open Access

    ARTICLE

    Proportional Fairness-Based Power Allocation Algorithm for Downlink NOMA 5G Wireless Networks

    Jianzhong Li1, DexiangMei1, Dong Deng1, Imran Khan2, Peerapong Uthansakul3, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1571-1590, 2020, DOI:10.32604/cmc.2020.011822

    Abstract Non-orthogonal multiple access (NOMA) is one of the key 5G technology which can improve spectrum efficiency and increase the number of user connections by utilizing the resources in a non-orthogonal manner. NOMA allows multiple terminals to share the same resource unit at the same time. The receiver usually needs to configure successive interference cancellation (SIC). The receiver eliminates co-channel interference (CCI) between users and it can significantly improve the system throughput. In order to meet the demands of users and improve fairness among them, this paper proposes a new power allocation scheme. The objective is to maximize user fairness by… More >

Displaying 3881-3890 on page 389 of 5350. Per Page