Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12,447)
  • Open Access

    ARTICLE

    Improved GNSS Cooperation Positioning Algorithm for Indoor Localization

    Taoyun Zhou1,2, Baowang Lian1, Siqing Yang2,*, Yi Zhang1, Yangyang Liu1,3

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 225-245, 2018, DOI: 10.3970/cmc.2018.02671

    Abstract For situations such as indoor and underground parking lots in which satellite signals are obstructed, GNSS cooperative positioning can be used to achieve high-precision positioning with the assistance of cooperative nodes. Here we study the cooperative positioning of two static nodes, node 1 is placed on the roof of the building and the satellite observation is ideal, node 2 is placed on the indoor windowsill where the occlusion situation is more serious, we mainly study how to locate node 2 with the assistance of node 1. Firstly, the two cooperative nodes are located with pseudo-range single point positioning, and the… More >

  • Open Access

    ARTICLE

    Automatic Mining of Security-Sensitive Functions from Source Code

    Lin Chen1,2, Chunfang Yang1,2,*, Fenlin Liu1,2, Daofu Gong1,2, Shichang Ding3

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 199-210, 2018, DOI: 10.3970/cmc.2018.02574

    Abstract When dealing with the large-scale program, many automatic vulnerability mining techniques encounter such problems as path explosion, state explosion, and low efficiency. Decomposition of large-scale programs based on safety-sensitive functions helps solve the above problems. And manual identification of security-sensitive functions is a tedious task, especially for the large-scale program. This study proposes a method to mine security-sensitive functions the arguments of which need to be checked before they are called. Two argument-checking identification algorithms are proposed based on the analysis of two implementations of argument checking. Based on these algorithms, security-sensitive functions are detected based on the ratio of… More >

  • Open Access

    ARTICLE

    Full-Blind Delegating Private Quantum Computation

    Wenjie Liu1,2,*, Zhenyu Chen2, Jinsuo Liu3, Zhaofeng Su4, Lianhua Chi5

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 211-223, 2018, DOI: 10.3970/cmc.2018.02288

    Abstract The delegating private quantum computation (DQC) protocol with the universal quantum gate set {X,Z,H,P,R,CNOT} was firstly proposed by Broadbent et al. [Broadbent (2015)], and then Tan et al. [Tan and Zhou (2017)] tried to put forward a half-blind DQC protocol (HDQC) with another universal set {H,P,CNOT,T}. However, the decryption circuit of Toffoli gate (i.e. T) is a little redundant, and Tan et al.’s protocol [Tan and Zhou (2017)] exists the information leak. In addition, both of these two protocols just focus on the blindness of data (i.e. the client’s input and output), but do not consider the blindness of computation… More >

  • Open Access

    ARTICLE

    Biodegradation of Medicinal Plants Waste in an Anaerobic Digestion Reactor for Biogas Production

    Kabir Fardad1, Bahman Najafi1, Sina Faizollahzadeh Ardabili1, Amir Mosavi2,3, Shahaboddin Shamshirband,4,5,*, Timon Rabczuk2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 381-392, 2018, DOI: 10.3970/cmc.2018.01803

    Abstract Glycyrrhiza glabra, Mint, Cuminum cyminum, Lavender and Arctium medicinal are considered as edible plants with therapeutic properties and as medicinal plants in Iran. After extraction process of medicinal plants, residual wastes are not suitable for animal feed and are considered as waste and as an environmental threat. At present there is no proper management of waste of these plants and they are burned or buried. The present study discusses the possibility of biogas production from Glycyrrhiza Glabra Waste (GGW), Mentha Waste (MW), Cuminum Cyminum Waste (CCW), Lavender Waste (LW) and Arctium Waste (AW). 250 g of these plants with TS… More >

  • Open Access

    ARTICLE

    Coverless Steganography for Digital Images Based on a Generative Model

    Xintao Duan1,*, Haoxian Song1, Chuan Qin2, Muhammad Khurram Khan3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 483-493, 2018, DOI: 10.3970/cmc.2018.01798

    Abstract In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the secret image. The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image. Thus, we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the transmission of the secret image.… More >

  • Open Access

    ARTICLE

    Molecular Structure and Electronic Spectra of CoS under the Radiation Fields

    Qijun Wu1, Limin Han1, Lingxuan Wang2, Xun Gong3,*

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 393-403, 2018, DOI: 10.3970/cmc.2018.01740

    Abstract We optimized the ground-state stable configuration of CoS molecule in different external radiation fields (0-0.04 atomic units (a.u.)) at the basis set level of 6-311G++ (d, p) using the B3LYP density functional theory. On this basis, the molecular structure, total energy, energy gap, and the intensities of infrared ray (IR) spectra, Raman spectra, and ultraviolet-visible (UV-Vis) absorption spectra of CoS molecule were computed using the same method. The results showed that the molecular structure changed greatly under the effect of the external radiation fields and had significant dependency on the radiation fields. The total energy of CoS molecule grew slightly… More >

  • Open Access

    ARTICLE

    Inverted XML Access Control Model Based on Ontology Semantic Dependency

    Meijuan Wang1,2,*, Jian Wang1, Lihong Guo1,3, Lein Harn4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 465-482, 2018, DOI: 10.3970/cmc.2018.02568

    Abstract In the era of big data, the conflict between data mining and data privacy protection is increasing day by day. Traditional information security focuses on protecting the security of attribute values without semantic association. The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information. Considering the semantic association, reasonable security access for privacy protect is required. Semi-structured and self-descriptive XML (eXtensible Markup Language) has become a common form of data organization for database management in big data environments. Based on the semantic integration nature of XML data, this paper… More >

  • Open Access

    ARTICLE

    Feature Selection Method Based on Class Discriminative Degree for Intelligent Medical Diagnosis

    Shengqun Fang1, Zhiping Cai1,*, Wencheng Sun1, Anfeng Liu2, Fang Liu3, Zhiyao Liang4, Guoyan Wang5

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 419-433, 2018, DOI: 10.3970/cmc.2018.02289

    Abstract By using efficient and timely medical diagnostic decision making, clinicians can positively impact the quality and cost of medical care. However, the high similarity of clinical manifestations between diseases and the limitation of clinicians’ knowledge both bring much difficulty to decision making in diagnosis. Therefore, building a decision support system that can assist medical staff in diagnosing and treating diseases has lately received growing attentions in the medical domain. In this paper, we employ a multi-label classification framework to classify the Chinese electronic medical records to establish corresponding relation between the medical records and disease categories, and compare this method… More >

  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI: 10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication… More >

  • Open Access

    ARTICLE

    Rare Bird Sparse Recognition via Part-Based Gist Feature Fusion and Regularized Intraclass Dictionary Learning

    Jixin Liu1,*, Ning Sun1,2, Xiaofei Li1, Guang Han1, Haigen Yang1, Quansen Sun3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 435-446, 2018, DOI: 10.3970/cmc.2018.02177

    Abstract Rare bird has long been considered an important in the field of airport security, biological conservation, environmental monitoring, and so on. With the development and popularization of IOT-based video surveillance, all day and weather unattended bird monitoring becomes possible. However, the current mainstream bird recognition methods are mostly based on deep learning. These will be appropriate for big data applications, but the training sample size for rare bird is usually very short. Therefore, this paper presents a new sparse recognition model via improved part detection and our previous dictionary learning. There are two achievements in our work: (1) after the… More >

Displaying 12171-12180 on page 1218 of 12447. Per Page