Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (426)
  • Open Access

    ARTICLE

    Analysis of the Smart Player’s Impact on the Success of a Team Empowered with Machine Learning

    Muhammad Adnan Khan1,*, Mubashar Habib1, Shazia Saqib1, Tahir Alyas1, Khalid Masood Khan1, Mohammed A. Al Ghamdi2, Sultan H. Almotiri2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 691-706, 2021, DOI:10.32604/cmc.2020.012542

    Abstract The innovation and development in data science have an impact in all trades of life. The commercialization of sport has encouraged players, coaches, and other concerns to use technology to be in better position than r their opponents. In the past, the focus was on improved training techniques for better physical performance. These days, sports analytics identify the patterns in the performance and highlight strengths and weaknesses of potential players. Sports analytics not only predict the performance of players in the near future but it also performs predictive modeling for a particular behavior of a player in the past. The… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain stores the index of the… More >

  • Open Access

    ARTICLE

    Design and Analysis of a Water Quality Monitoring Data Service Platform

    Jianjun Zhang1,*, Yifu Sheng1, Weida Chen2, Haijun Lin1, Guang Sun3, Peng Guo4

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 389-405, 2021, DOI:10.32604/cmc.2020.012384

    Abstract Water is one of the basic resources for human survival. Water pollution monitoring and protection have been becoming a major problem for many countries all over the world. Most traditional water quality monitoring systems, however, generally focus only on water quality data collection, ignoring data analysis and data mining. In addition, some dirty data and data loss may occur due to power failures or transmission failures, further affecting data analysis and its application. In order to meet these needs, by using Internet of things, cloud computing, and big data technologies, we designed and implemented a water quality monitoring data intelligent… More >

  • Open Access

    ARTICLE

    Multilayer Self-Defense System to Protect Enterprise Cloud

    Shailendra Mishra, Sunil Kumar Sharma*, Majed A. Alowaidi

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 71-85, 2021, DOI:10.32604/cmc.2020.012475

    Abstract A data breach can seriously impact organizational intellectual property, resources, time, and product value. The risk of system intrusion is augmented by the intrinsic openness of commonly utilized technologies like TCP/IP protocols. As TCP relies on IP addresses, an attacker may easily trace the IP address of the organization. Given that many organizations run the risk of data breach and cyber-attacks at a certain point, a repeatable and well-developed incident response framework is critical to shield them. Enterprise cloud possesses the challenges of security, lack of transparency, trust and loss of controls. Technology eases quickens the processing of information but… More >

  • Open Access

    ARTICLE

    Design and Implementation of Open Source Online Evaluation System Based on Cloud Platform

    Zuwei Tian*, Shubo Tian, Tuo Wang, Zhen Gong, Zhenqin Jiang

    Journal on Big Data, Vol.2, No.3, pp. 117-123, 2020, DOI:10.32604/jbd.2020.011420

    Abstract In order to provide a good practice platform for the program design contestants and algorithm enthusiasts, this paper designs and implements a programming online evaluation system based on cloud platform, which is a web system that can return the test results of the program source codes submitted by users in real time. It realizes the automatic evaluation of the program design training questions. The system is implemented by the way of front-end and backend separation and modular programming. The front-end of the web is implemented by Vue framework, the back-end is implemented by Django framework. The judgment core is written… More >

  • Open Access

    ARTICLE

    An Effective Non-Commutative Encryption Approach with Optimized Genetic Algorithm for Ensuring Data Protection in Cloud Computing

    S. Jerald Nirmal Kumar1,*, S. Ravimaran2, M. M. Gowthul Alam3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 671-697, 2020, DOI:10.32604/cmes.2020.09361

    Abstract Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated using Diffie Hellman (DH) to certify secured key generation at reduced time complexity. Moreover, a non-commutative approach is used, which effectively allows the users to store… More >

  • Open Access

    ARTICLE

    Information Flow Security Models for Cloud Computing

    Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2687-2705, 2020, DOI:10.32604/cmc.2020.011232

    Abstract Cloud computing provides services to users through Internet. This open mode not only facilitates the access by users, but also brings potential security risks. In cloud computing, the risk of data leakage exists between users and virtual machines. Whether direct or indirect data leakage, it can be regarded as illegal information flow. Methods, such as access control models can control the information flow, but not the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture. Typical noninterference models are not suitable to certificate information flow in… More >

  • Open Access

    ARTICLE

    Detection of Precipitation Cloud over the Tibet Based on the Improved U-Net

    Runzhe Tao1, *, Yonghong Zhang1, Lihua Wang1, Pengyan Cai1, Haowen Tan2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2455-2474, 2020, DOI:10.32604/cmc.2020.011526

    Abstract Aiming at the problem of radar base and ground observation stations on the Tibet is sparsely distributed and cannot achieve large-scale precipitation monitoring. UNet, an advanced machine learning (ML) method, is used to develop a robust and rapid algorithm for precipitating cloud detection based on the new-generation geostationary satellite of FengYun-4A (FY-4A). First, in this algorithm, the real-time multi-band infrared brightness temperature from FY-4A combined with the data of Digital Elevation Model (DEM) has been used as predictor variables for our model. Second, the efficiency of the feature was improved by changing the traditional convolution layer serial connection method of… More >

  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance. For remote execution, recent studies… More >

  • Open Access

    ARTICLE

    Image Feature Computation in Encrypted Domain Based on Mean Value

    Xiangshu Ou1, Mingfang Jiang2,*, Shuai Li1, Yao Bai1

    Journal of Cyber Security, Vol.2, No.3, pp. 123-130, 2020, DOI:10.32604/jcs.2020.09703

    Abstract In smart environments, more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus. The outsourcing of massive teaching data can reduce storage burden and computational cost, but causes some privacy concerns because those teaching data (especially personal image data) may contain personal private information. In this paper, a privacy-preserving image feature extraction algorithm is proposed by using mean value features. Clients use block scrambling and chaotic map to encrypt original images before uploading to the remote servers. Cloud servers can directly extract image mean value features from encrypted images. Experiments… More >

Displaying 351-360 on page 36 of 426. Per Page