Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,597)
  • Open Access


    A Co-Verification Interface Design for High-Assurance CPS

    Yu Zhang1,2,*, Mengxing Huang1,2,*, Hao Wang3, Wenlong Feng1,2, Jieren Cheng1,2, Hui Zhou1,2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 287-306, 2019, DOI:10.32604/cmc.2019.03736

    Abstract Cyber-Physical Systems (CPS) tightly integrate cyber and physical components and transcend traditional control systems and embedded system. Such systems are often mission-critical; therefore, they must be high-assurance. High-assurance CPS require co-verification which takes a comprehensive view of the whole system to verify the correctness of a cyber and physical components together. Lack of strict multiple semantic definition for interaction between the two domains has been considered as an obstacle to the CPS co-verification. A Cyber/Physical interface model for hierarchical a verification of CPS is proposed. First, we studied the interaction mechanism between computation and physical More >

  • Open Access


    A Fair Blind Signature Scheme to Revoke Malicious Vehicles in VANETs

    Xiaoliang Wang1,*, Jianming Jiang1,2, Shujing Zhao1, Liang Bai1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 249-262, 2019, DOI:10.32604/cmc.2019.04088

    Abstract With the rapid development of IoT (Internet of Things), VANETs (Vehicular Ad-Hoc Networks) have become an attractive ad-hoc network that brings convenience into people’s lives. Vehicles can be informed of the position, direction, speed and other real-time information of nearby vehicles to avoid traffic jams and accidents. However, VANET environments could be dangerous in the absence of security protection. Because of the openness and self-organization of VANETs, there are plenty of malicious pathways. To guarantee vehicle security, the research aims to provide an effective VANET security mechanism that can track malicious vehicles as necessary. Therefore, More >

  • Open Access


    Development and Application of Big Data Platform for Garlic Industry Chain

    Weijie Chen1, Guo Feng1, Chao Zhang1, Pingzeng Liu1,*, Wanming Ren2, Ning Cao3, Jianrui Ding4

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 229-248, 2019, DOI:10.32604/cmc.2019.03743

    Abstract In order to effectively solve the problems which affect the stable and healthy development of garlic industry, such as the uncertainty of the planting scale and production data, the influence factors of price fluctuation is difficult to be accurately analyzed, the difficult to predict the trend of price change, the uncertainty of the market concentration, and the difficulty of the short-term price prediction etc. the big data platform of the garlic industry chain has been developed. Combined with a variety of data acquisition technology, the information collection of influencing factors for garlic industry chain is More >

  • Open Access


    Some Topological Indices Computing Results If Archimedean Lattices L(4,6,12)

    Kang Qiong1,*, Xinting Li2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 121-133, 2019, DOI:10.32604/cmc.2019.03723

    Abstract The introduction of graph-theoretical structure descriptors represents an important step forward in the research of predictive models in chemistry and falls within the lines of the increasing use of mathematical and computational methods in contemporary chemistry. The basis for these models is the study of the quantitative structure-property and structure-activity relationship. In this paper, we investigate Great rhom-bitrihexagonal which is a kind of dodecagon honeycomb net-work covered by quadrangle and hexagon. Many topological indexes of Great rhom-bitrihexagonal have being investigated, such as sum-connectivity index, atom-bond connectivity index, geometric-arithmetic index, fifth, harmonic index, Randić connectivity index, More >

  • Open Access


    Differentially Private Real-Time Streaming Data Publication Based on Sliding Window Under Exponential Decay

    Lan Sun1, Chen Ge1, Xin Huang1, Yingjie Wu1,*, Yan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 61-78, 2019, DOI:10.32604/cmc.2019.03744

    Abstract Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure. The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy, but pay less attention to query efficiency, and ignore the effect of timeliness on data weight. In this paper, we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode. Firstly, by introducing the Fenwick tree to divide and reorganize data items in the stream, we achieve a constant time complexity… More >

  • Open Access


    A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security

    Changting Shi1, *

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 635-652, 2018, DOI:10.32604/cmc.2018.03754

    Abstract In the last decade, IoT has been widely used in smart cities, autonomous driving and Industry 4.0, which lead to improve efficiency, reliability, security and economic benefits. However, with the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the IoT security is being confronted with a series of new threats and challenges. IoT device identification via Radio Frequency Fingerprinting (RFF) extracting from radio signals is a physical-layer method for IoT security. In physical-layer, RFF is a unique characteristic of IoT device themselves, which can difficultly be tampered. More >

  • Open Access


    Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol

    Jifeng Zhong1,*, Zhihao Liu2,3,*, Juan Xu4

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 621-633, 2018, DOI:10.32604/cmc.2018.03706

    Abstract The controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed. It is found that there are some serious security issues in this protocol. An eavesdropper (Eve) can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation (SCNO) attack. By the same attack, Eve can also steal some information of the secret message that the sender transmits. In addition, the receiver can take the same kind of attack to More >

  • Open Access


    Seed Selection for Data Offloading Based on Social and Interest Graphs

    Ying Li1, Jianbo Li1,*, Jianwei Chen1, Minchao Lu1, Caoyuan Li2,3

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 571-587, 2018, DOI:10.32604/cmc.2018.02851

    Abstract The explosive growth of mobile data demand is becoming an increasing burden on current cellular network. To address this issue, we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic. The principle behind it is to select a few important users as seeds for data sharing. The three critical steps are detailed as follows. We first explore individual interests of users by the construction of user profiles, on which an interest graph is built by Gaussian graphical modeling. We then apply the extreme value theory to threshold the encounter duration of user More >

  • Open Access


    A Virtual Puncture Surgery System Based on Multi-Layer Soft Tissue and Force Mesh

    Xiaorui Zhang1,3,*, Jiali Duan1, Lifeng Zhu2, Ladislav Kavan3

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 505-519, 2018, DOI:10.32604/cmc.2018.01842

    Abstract Puncture is a common operation in surgery, which involves all kinds of tissue materials with different geometry and mechanical properties. As a new cross-disciplinary research area, Virtual Surgery (VS) makes simulation of soft tissue in puncture operation possible in virtual environment. In this paper, we introduce a VS-based puncture system composed by three-layer soft tissue, simulated with spherical harmonic function (SHF), which is covered with a force mesh, constructed by mass spring model (MSM). The two models are combined together with a parameter of SHF named surface radius, which provides MSM with real-time deformation data… More >

  • Open Access


    Some Geometric Invariants of Pseudo-Spherical Evolutes in the Hyperbolic 3-Space

    H. S. Abdel-Aziz1, M. Khalifa Saad1,2,*, A. A. Abdel-Salam1

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 389-415, 2018, DOI:10.32604/cmc.2018.02149

    Abstract In this paper, we study the pseudo-spherical evolutes of curves in three dimensional hyperbolic space. We use techniques from singularity theory to investigate the singularities of pseudo-spherical evolutes and establish some relationships between singularities of these curves and geometric invariants of curves under the action of the Lorentz group. Besides, we defray with illustration some computational examples in support our main results. More >

Displaying 7431-7440 on page 744 of 7597. Per Page