Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,230)
  • Open Access

    ARTICLE

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    Dae-Young Kim1, Se Dong Min2, †, Seokhoon Kim3, †, *

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06102

    Abstract The importance of Blockchain and IoT technology have been highlighted in various fields. These are not unaccustomed words anymore in our lives. Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet. The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues. Consequently, we propose… More >

  • Open Access

    ARTICLE

    A Quantum Authorization Management Protocol Based on EPR-Pairs

    Yan Chang1,*, Shibin Zhang1, Lili Yan1, Guihua Han1, Haiquan Song1, Yan Zhang1, Xueyang Li1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1005-1014, 2019, DOI:10.32604/cmc.2019.06297

    Abstract Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed More >

  • Open Access

    ARTICLE

    A Reliable Stochastic Numerical Analysis for Typhoid Fever Incorporating With Protection Against Infection

    Muhammad Shoaib Arif1,*, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Rabia Fayyaz3, Mehvish Naz3, Umer Javed4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 787-804, 2019, DOI:10.32604/cmc.2019.04655

    Abstract In this paper, a reliable stochastic numerical analysis for typhoid fever incorporating with protection against infection has been considered. We have compared the solutions of stochastic and deterministic typhoid fever model. It has been shown that the stochastic typhoid fever model is more realistic as compared to the deterministic typhoid fever model. The effect of threshold number T* hold in stochastic typhoid fever model. The proposed framework of the stochastic non-standard finite difference scheme (SNSFD) preserves all dynamical properties like positivity, bounded-ness and dynamical consistency defined by Mickens, R. E. The stochastic numerical simulation of More >

  • Open Access

    ARTICLE

    The Algorithm of Chemical Species Analysis for Ab Intio Molecular Dynamics Simulations and Its Application

    Zhiyi Han1, Yugai Huang2,3, Xiaoqiang Xie1, Ying Mei1, Bin Gu1,*

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 995-1003, 2019, DOI:10.32604/cmc.2019.02181

    Abstract In ab initio molecular dynamics (AIMD) simulations of chemical reactions, it is important but difficult to identify the chemical species in the trajectory automatically and quickly. In this paper, based on the chemical graph theory, an algorithm for molecular species identification, according to the molecular coordinates and empirical bond length database, is presented. As an example, the chemical species in condensed glycine at room temperature are investigated with our algorithm in detail. The chemical species, including canonical and zwitterionic glycine, their protonated and de-protonated states, and the free protons, are all identified, counted and recorded correctly. More >

  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) More >

  • Open Access

    ARTICLE

    Dynamic Response Solution of Multi-Layered Pavement Structure Under FWD Load Appling the Precise Integration Algorithm

    Zejun Han1, Hongyuan Fang2,3,4,*, Juan Zhang5, Fuming Wang2,3,4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 853-871, 2019, DOI:10.32604/cmc.2019.03839

    Abstract The pavement layered structures are composed of surface layer, road base and multi-layered soil foundation. They can be undermined over time by repeated vehicle loads. In this study, a hybrid numerical method which can evaluate the displacement responses of pavement structures under dynamic falling weight deflectometer (FWD) loads. The proposed method consists of two parts: (a) the dynamic stiffness matrices of the points at the surface in the frequency domain which is based on the domain-transformation and dual vector form equation, and (b) interpolates the dynamic stiffness matrices by a continues rational function of frequency. More >

  • Open Access

    ARTICLE

    Defense Against Poisoning Attack via Evaluating Training Samples Using Multiple Spectral Clustering Aggregation Method

    Wentao Zhao1, Pan Li1,*, Chengzhang Zhu1,2, Dan Liu1, Xiao Liu1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 817-832, 2019, DOI:10.32604/cmc.2019.05957

    Abstract The defense techniques for machine learning are critical yet challenging due to the number and type of attacks for widely applied machine learning algorithms are significantly increasing. Among these attacks, the poisoning attack, which disturbs machine learning algorithms by injecting poisoning samples, is an attack with the greatest threat. In this paper, we focus on analyzing the characteristics of positioning samples and propose a novel sample evaluation method to defend against the poisoning attack catering for the characteristics of poisoning samples. To capture the intrinsic data characteristics from heterogeneous aspects, we first evaluate training data More >

  • Open Access

    ARTICLE

    A Learning Based Brain Tumor Detection System

    Sultan Noman Qasem1,2, Amar Nazar3, Attia Qamar4, Shahaboddin Shamshirband5,6,*, Ahmad Karim4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 713-727, 2019, DOI:10.32604/cmc.2019.05617

    Abstract Brain tumor is one of the most dangerous disease that causes due to uncontrollable and abnormal cell partition. In this paper, we have used MRI brain scan in comparison with CT brain scan as it is less harmful to detect brain tumor. We considered watershed segmentation technique for brain tumor detection. The proposed methodology is divided as follows: pre-processing, computing foreground applying watershed, extract and supply features to machine learning algorithms. Consequently, this study is tested on big data set of images and we achieved acceptable accuracy from K-NN classification algorithm in detection of brain More >

  • Open Access

    ARTICLE

    Development of Cloud Based Air Pollution Information System Using Visualization

    SangWook Han1, JungYeon Seo1, Dae-Young Kim2, SeokHoon Kim3, HwaMin Lee3,*

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 697-711, 2019, DOI:10.32604/cmc.2019.06071

    Abstract Air pollution caused by fine dust is a big problem all over the world and fine dust has a fatal impact on human health. But there are too few fine dust measuring stations and the installation cost of fine dust measuring station is very expensive. In this paper, we propose Cloud-based air pollution information system using R. To measure fine dust, we have developed an inexpensive measuring device and studied the technique to accurately measure the concentration of fine dust at the user’s location. And we have developed the smartphone application to provide air pollution More >

  • Open Access

    ARTICLE

    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813

    Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse More >

Displaying 4001-4010 on page 401 of 5230. Per Page