Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (307)
  • Open Access

    RETRACTION

    Retraction Notice to: Mitigating Content Caching Attack in NDN

    Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 653-653, 2018, DOI:10.32604/cmc.2018.00653

    Abstract none More >

  • Open Access

    ARTICLE

    The Stability of Anionic States of Thymine-Glycine Dimers with Excess Electron

    Yugai Huang 1, 2, *

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 485-494, 2018, DOI:10.32604/cmc.2018.03112

    Abstract It has been demonstrated that low energy electrons (LEEs) can induce serious DNA damages including bases loss and even single and double strand breaks. Experiments also showed that LEE induced DNA damages will be reduced with the presence of amino acids. For understanding of the protection of amino acids to DNA, the stability of 6 kinds of thymine and glycine (T-g) dimers with planar configurations with an excess electron were studied with density functional theory (DFT) method. The results show that, when the excess electron is vertically attached, all the dimers become more active with higher energy. After re-optimization, 4… More >

  • Open Access

    ARTICLE

    Secure Video Streaming with Lightweight Cipher PRESENT in an SDN Testbed

    Pengcheng Liu1, †, Xiaojun Wang1, †, S. R. Chaudhry1, Khalid Javeed2, Yue Ma3, *, Martin Collier1

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 353-363, 2018, DOI:10.32604/cmc.2018.04142

    Abstract The combination of traditional processors and Field Programmable Gate Arrays (FPGA) is shaping the future networking platform for intensive computation in resource-constrained networks and devices. These networks present two key challenges of security and resource limitations. Lightweight ciphers are suitable to provide data security in such constrained environments. Implementing the lightweight PRESENT encryption algorithm in a reconfigurable platform (FPGAs) can offer secure communication service and flexibility. This paper presents hardware acceleration of security primitives in SDN using NETFPGA-10G. We implement an efficient design of the PRESENT algorithm for faster, smaller and lower power consumption hardware circuit using Verilog. We evaluate… More >

  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI: 10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication… More >

  • Open Access

    ARTICLE

    Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs

    Qi Cui1,2,*, Suzanne McIntosh3, Huiyu Sun3

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 229-241, 2018, DOI:10.3970/cmc.2018.01693

    Abstract Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems. The aim of this work is to use a deep neural network to detect photographic images (PI) versus computer generated graphics (CG). In existing approaches, image feature classification is computationally intensive and fails to achieve real-time analysis. This paper presents an effective approach to automatically identify PI and CG based on deep convolutional neural networks (DCNNs). Compared with some existing methods, the proposed method achieves real-time forensic tasks by deepening the network structure. Experimental results… More >

  • Open Access

    ARTICLE

    Computational Homology, Connectedness, and Structure-Property Relations

    Dustin D. Gerrard1, David T. Fullwood1, Denise M. Halverson2, Stephen R. Niezgoda3

    CMC-Computers, Materials & Continua, Vol.15, No.2, pp. 129-152, 2010, DOI:10.3970/cmc.2010.015.129

    Abstract The effective properties of composite materials are often strongly related to the connectivity of the material components. Many structure metrics, and related homogenization theories, do not effectively account for this connectivity. In this paper, relationships between the topology, represented via homology theory, and the effective elastic response of composite plates is investigated. The study is presented in the context of popular structure metrics such as percolation theory and correlation functions. More >

  • Open Access

    ARTICLE

    A Phenomenological Model for Desorption in Polymers

    J.A.Ferreira1,2, P. de Oliveira2, P. da Silva3, D. M. G. Comissiong4

    CMC-Computers, Materials & Continua, Vol.13, No.1, pp. 17-48, 2009, DOI:10.3970/cmc.2009.013.017

    Abstract A phenomenological formulation is adopted to investigate desorption in polymers. The speed of the front is studied and the well-posedness of the general model is analyzed. Numerical simulations illustrating the dynamics of the desorption process described by the proposed model are included. More >

Displaying 301-310 on page 31 of 307. Per Page