Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (966)
  • Open Access

    ARTICLE

    Collaborative Filtering Recommendation Algorithm Based on Multi-Relationship Social Network

    Sheng Bin1,*, Gengxin Sun1, Ning Cao2, Jinming Qiu2, Zhiyong Zheng3, Guohua Yang4, Hongyan Zhao5, Meng Jiang6, Lina Xu7

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 659-674, 2019, DOI:10.32604/cmc.2019.05858

    Abstract Recommendation system is one of the most common applications in the field of big data. The traditional collaborative filtering recommendation algorithm is directly based on user-item rating matrix. However, when there are huge amounts of user and commodities data, the efficiency of the algorithm will be significantly reduced. Aiming at the problem, a collaborative filtering recommendation algorithm based on multi-relational social networks is proposed. The algorithm divides the multi-relational social networks based on the multi-subnet complex network model into communities by using information dissemination method, which divides the users with similar degree into a community. Then the user-item rating matrix… More >

  • Open Access

    ARTICLE

    A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem

    Qi He1, Shui Yu2, Huifang Xu3,*, Jia Liu4, Dongmei Huang5, Guohua Liu6, Fangqin Xu3, Yanling Du1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 349-361, 2019, DOI:10.32604/cmc.2019.03703

    Abstract The recent advances in remote sensing and computer techniques give birth to the explosive growth of remote sensing images. The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost savings. However, the openness of cloud brings challenges for image data security. In this paper, we propose a weighted image sharing scheme to ensure the security of remote sensing in cloud environment, which takes the weights of participants (i.e., cloud service providers) into consideration. An extended Mignotte sequence is constructed according to the weights of participants, and… More >

  • Open Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856

    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily support dynamic data operation. By… More >

  • Open Access

    ARTICLE

    An Entity-Association-Based Matrix Factorization Recommendation Algorithm

    Gongshen Liu1, Kui Meng1,*, Jiachen Ding1, Jan P. Nees1, Hongyi Guo1, Xuewen Zhang1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 101-120, 2019, DOI:10.32604/cmc.2019.03898

    Abstract Collaborative filtering is the most popular approach when building recommender systems, but the large scale and sparse data of the user-item matrix seriously affect the recommendation results. Recent research shows the user’s social relations information can improve the quality of recommendation. However, most of the current social recommendation algorithms only consider the user's direct social relations, while ignoring potential users’ interest preference and group clustering information. Moreover, project attribute is also important in item rating. We propose a recommendation algorithm which using matrix factorization technology to fuse user information and project information together. We first detect the community structure using… More >

  • Open Access

    ARTICLE

    Spatial Quantitative Analysis of Garlic Price Data Based on ArcGIS Technology

    Guojing Wu1, Chao Zhang1,*, Pingzeng Liu1, Wanming Ren2, Yong Zheng2, Feng Guo1, Xiaowei Chen3, Russell Higgs4

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 183-195, 2019, DOI:10.32604/cmc.2019.03792

    Abstract In order to solve the hidden regional relationship among garlic prices, this paper carries out spatial quantitative analysis of garlic price data based on ArcGIS technology. The specific analysis process is to collect prices of garlic market from 2015 to 2017 in different regions of Shandong Province, using the Moran's Index to obtain monthly Moran indicators are positive, so as to analyze the overall positive relationship between garlic prices; then using the geostatistical analysis tool in ArcGIS to draw a spatial distribution Grid diagram, it was found that the price of garlic has a significant geographical agglomeration phenomenon and showed… More >

  • Open Access

    ARTICLE

    GFCache: A Greedy Failure Cache Considering Failure Recency and Failure Frequency for an Erasure-Coded Storage System

    Mingzhu Deng1, Fang Liu2,*, Ming Zhao3, Zhiguang Chen2, Nong Xiao2,1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 153-167, 2019, DOI:10.32604/cmc.2019.03585

    Abstract In the big data era, data unavailability, either temporary or permanent, becomes a normal occurrence on a daily basis. Unlike the permanent data failure, which is fixed through a background job, temporarily unavailable data is recovered on-the-fly to serve the ongoing read request. However, those newly revived data is discarded after serving the request, due to the assumption that data experiencing temporary failures could come back alive later. Such disposal of failure data prevents the sharing of failure information among clients, and leads to many unnecessary data recovery processes, (e.g. caused by either recurring unavailability of a data or multiple… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

    Zhiliang Deng1,2, Yongjun Ren3,4, Yepeng Liu3,4, Xiang Yin5, Zixuan Shen3,4, Hye-Jin Kim6,*

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 135-151, 2019, DOI:10.32604/cmc.2019.02967

    Abstract Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However, in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management. Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the… More >

  • Open Access

    ARTICLE

    Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM

    Jian Xu1,2,*, Zhihao Jiang1, Andi Wang1, Chen Wang1, Fucai Zhou1

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 589-602, 2018, DOI:10.32604/cmc.2018.03820

    Abstract With the development of cloud storage, the problem of efficiently checking and proving data integrity needs more consideration. Therefore, much of growing interest has been pursed in the context of the integrity verification of cloud storage. Provable data possession (PDP) and Proofs of retrievablity (POR) are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments. The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not have. Unfortunately, most of POR… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

  • Open Access

    ARTICLE

    Modification of Nano Tourmaline Surface Treatment Agent and Its Performance on Negative Ion Release

    Guorui Huang1, Zhongkai Cui2, Pengfei Zhu1, Xiaoyun Liu1,*

    CMC-Computers, Materials & Continua, Vol.57, No.1, pp. 145-150, 2018, DOI:10.32604/cmc.2018.02947

    Abstract In this paper, a kind of wall fabric’s surface treatment agent modified with nonionic surfactant was reported. This surface treatment agent was prepared by using nano tourmaline powder dispersion in water with surfactant as dispersants by sand milling. Under the influence of different dispersants, the negative ions releasing amount of functional wall fabrics, the milling process and the storage stability of nano tourmaline powder dispersion were discussed. The results showed that nano tourmaline powder dispersion achieved the smallest average diameter of 44 nm and had best storage stability that the average diameter maintained below 200 nm in 17 days when… More >

Displaying 951-960 on page 96 of 966. Per Page