Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices

    En Zhang1,2, Xintao Duan1,2, Siuming Yiu3, Junbin Fang4, Zoe L. Jiang5,*, Tsz HonYuen6, Jie Peng1

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 401-414, 2018, DOI: 10.3970/cmc.2018.03733

    Abstract In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret, and fewer than t parties learn nothing about the secret. However, to achieve fairness, the existing secret sharing schemes either assume a trusted party exists or require running multi-round, which is not practical in a real application. In addition, the cost of verification grows dramatically with the number of participants and the communication complexity is O(t), if there is not a trusted combiner in the reconstruction phase. In this work, we propose a fair server-aided multi-secret sharing scheme for weak computational devices. The… More >

  • Open Access

    ARTICLE

    An Improved Memory Cache Management Study Based on Spark

    Suzhen Wang1, Yanpiao Zhang1, Lu Zhang1, Ning Cao2, *, Chaoyi Pang3

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 415-431, 2018, DOI: 10.3970/cmc.2018.03716

    Abstract Spark is a fast unified analysis engine for big data and machine learning, in which the memory is a crucial resource. Resilient Distribution Datasets (RDDs) are parallel data structures that allow users explicitly persist intermediate results in memory or on disk, and each one can be divided into several partitions. During task execution, Spark automatically monitors cache usage on each node. And when there is a RDD that needs to be stored in the cache where the space is insufficient, the system would drop out old data partitions in a least recently used (LRU) fashion to release more space. However,… More >

  • Open Access

    ARTICLE

    Investigation in the Effects of Configuration Parameters on the Thermal Behavior of Novel Conical Friction Plate in Continuously Sliding Condition

    Yanzhong Wang1, Xiangyu Wu1,*

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 353-363, 2018, DOI: 10.3970/cmc.2018.03714

    Abstract To investigate the effects of configuration parameters and operation condition on the thermal behavior of novel conical friction plate, a three-dimensional finite element model of conical friction plate is established for numerical simulation. The conical surface configuration and friction heat generation of novel conical friction surfaces are discussed. The results indicate that the thermal behavior of the conical friction plate during continuously sliding period is influenced by the conical surface configuration. Maximum temperature occurs in the conical friction plate with cone angle of 24°. The maximum temperature value of friction plate is increased 7.4°C, when cone depth increases from 3… More >

  • Open Access

    ARTICLE

    Provably Secure APK Redevelopment Authorization Scheme in the Standard Model

    Daofeng Li1,3,*, Mingxing Luo2, Bowen Zhao1,3, Xiangdong Che4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 447-465, 2018, DOI: 10.3970/cmc.2018.03692

    Abstract The secure issues of APK are very important in Android applications. In order to solve potential secure problems and copyrights issues in redevelopment of APK files, in this paper we propose a new APK redevelopment mechanism (APK-SAN). By exploring sanitizable signature technology, APK-SAN allows the original developer to authorize specified modifier who can redevelop the designated source code of APK files. Our scheme does not require interactions between the developer and modifiers. It can reduce the communication overhead and computational overhead for developers. Especially, the signature of redeveloped APK files is valid and maintains the copyrights. The proposed APK-SAN signature… More >

  • Open Access

    ARTICLE

    RETRACTED: Mitigating Content Caching Attack in NDN

    Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 483-499, 2018, DOI: 10.3970/cmc.2018.03687

    Abstract Content caching is a core component in Named Data Networking (NDN), where content is cached in routers and served for future requests. However, the adversary can launch verification attack by placing poisoned data into the network with a legitimate name and allow the routers in the delivery path to frequently identify the content. Since NDN employs digital signature on each piece of content, verifying all content will exhaust routers’ computational resources due to the massive data in the network. In this paper, we propose a selective verification scheme upon the contents that are hit in the content store and allow… More >

  • Open Access

    ARTICLE

    In Situ Synthesis of Cuprous Oxide/Cellulose Nanofibers Gel and Antibacterial Properties

    Ying Hu1,2, Qinfei Ke1, Zhe Li2, Wanli Han3, Zhiyong Yan2,*

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 517-527, 2018, DOI: 10.3970/cmc.2018.03608

    Abstract Cellulose nanofibers were synthesized by acetobacter xylinum (xylinum 1.1812). The cellulose nanofibers with 30-90 nm width constructed three-dimension network gel, which could be used as a wound dressing since it can provide moist environment to a wound. However, cellulose nanofibers have no antimicrobial activity to prevent wound infection. To achieve antimicrobial activity, the cellulose nanofibers can load cuprous oxide (Cu2O) particles on the surface. The cuprous oxide is a kind of safe antibacterial material. The copper ions can be reduced into cuprous oxides by reducing agents such as glucose, N2H4 and sodium hypophosphite. The cellulose nanofibers network gel was soaked… More >

  • Open Access

    ARTICLE

    Perceptual Gradient Similarity Deviation for Full Reference Image Quality Assessment

    Manyu Jin1, Tao Wang1, Zexuan Ji1,*, Xiaobo Shen2

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 501-515, 2018, DOI: 10.3970/cmc.2018.02371

    Abstract Perceptual image quality assessment (IQA) is one of the most indispensable yet challenging problems in image processing and computer vision. It is quite necessary to develop automatic and efficient approaches that can accurately predict perceptual image quality consistently with human subjective evaluation. To further improve the prediction accuracy for the distortion of color images, in this paper, we propose a novel effective and efficient IQA model, called perceptual gradient similarity deviation (PGSD). Based on the gradient magnitude similarity, we proposed a gradient direction selection method to automatically determine the pixel-wise perceptual gradient. The luminance and chrominance channels are both took… More >

  • Open Access

    ARTICLE

    Feature Relationships Learning Incorporated Age Estimation Assisted by Cumulative Attribute Encoding

    Qing Tian1,2,3,*, Meng Cao1,2, Tinghuai Ma1,2

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 467-482, 2018, DOI: 10.3970/cmc.2018.02197

    Abstract The research of human facial age estimation (AE) has attracted increasing attention for its wide applications. Up to date, a number of models have been constructed or employed to perform AE. Although the goal of AE can be achieved by either classification or regression, the latter based methods generally yield more promising results because the continuity and gradualness of human aging can naturally be preserved in age regression. However, the neighbor-similarity and ordinality of age labels are not taken into account yet. To overcome this issue, the cumulative attribute (CA) coding was introduced. Although such age label relationships can be… More >

  • Open Access

    ARTICLE

    SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data

    Bo Xiao1, Zhen Wang2, Qi Liu3,*, Xiaodong Liu3

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 365-379, 2018, DOI: 10.3970/cmc.2018.01830

    Abstract In recent years, the rapid development of big data technology has also been favored by more and more scholars. Massive data storage and calculation problems have also been solved. At the same time, outlier detection problems in mass data have also come along with it. Therefore, more research work has been devoted to the problem of outlier detection in big data. However, the existing available methods have high computation time, the improved algorithm of outlier detection is presented, which has higher performance to detect outlier. In this paper, an improved algorithm is proposed. The SMK-means is a fusion algorithm which… More >

  • Open Access

    ARTICLE

    Machine Learning Based Resource Allocation of Cloud Computing in Auction

    Jixian Zhang1, Ning Xie1, Xuejie Zhang1, Kun Yue1, Weidong Li2,*, Deepesh Kumar3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 123-135, 2018, DOI: 10.3970/cmc.2018.03728

    Abstract Resource allocation in auctions is a challenging problem for cloud computing. However, the resource allocation problem is NP-hard and cannot be solved in polynomial time. The existing studies mainly use approximate algorithms such as PTAS or heuristic algorithms to determine a feasible solution; however, these algorithms have the disadvantages of low computational efficiency or low allocate accuracy. In this paper, we use the classification of machine learning to model and analyze the multi-dimensional cloud resource allocation problem and propose two resource allocation prediction algorithms based on linear and logistic regressions. By learning a small-scale training set, the prediction model can… More >

Displaying 4671-4680 on page 468 of 5427. Per Page