Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,336)
  • Open Access

    ARTICLE

    A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT

    Liang Kou1, Yiqi Shi2, Liguo Zhang1, Duo Liu1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 545-565, 2019, DOI:10.32604/cmc.2019.03760

    Abstract With the development of computer hardware technology and network technology, the Internet of Things as the extension and expansion of traditional computing network has played an increasingly important role in all professions and trades and has had a tremendous impact on people lifestyle. The information perception of the Internet of Things plays a key role as a link between the computer world and the real world. However, there are potential security threats in the Perceptual Layer Network applied for information perception because Perceptual Layer Network consists of a large number of sensor nodes with weak computing power, limited power supply,… More >

  • Open Access

    ARTICLE

    Differentially Private Real-Time Streaming Data Publication Based on Sliding Window Under Exponential Decay

    Lan Sun1, Chen Ge1, Xin Huang1, Yingjie Wu1,*, Yan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 61-78, 2019, DOI:10.32604/cmc.2019.03744

    Abstract Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure. The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy, but pay less attention to query efficiency, and ignore the effect of timeliness on data weight. In this paper, we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode. Firstly, by introducing the Fenwick tree to divide and reorganize data items in the stream, we achieve a constant time complexity for inserting a new item… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

  • Open Access

    ARTICLE

    Communication Mechanism and Algorithm of Composite Location Analysis of Emergency Communication based on Rail

    Yong Jiang1, Xiaolin Zhong1,*, Yong Guo1, Meixia Duan2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 321-340, 2018, DOI:10.32604/cmc.2018.03796

    Abstract The emergency communication system based on rail is an unconventional emergency communication mode, it is a complement equipment for that conventional communication system can’t work while tunnel mine accident occurs. Medium of transmission channel is the widely existing rail in the tunnel. In this paper we analyzed the characteristics of the rail transmission channel, verified the feasibility that information is transmitted by vibration signal in rail, we proposed the realization plan of the system. Communication protocol and processing mechanism suitable for rail transmission are designed according to the characteristics of channel bandwidth and low data transmission. Information communication with low… More >

  • Open Access

    ARTICLE

    Research on Operation of UAVs in Non-isolated Airspace

    Zhaoyue Zhang1, *, Jing Zhang2, Peng Wang1, Lei Chen3

    CMC-Computers, Materials & Continua, Vol.57, No.1, pp. 151-166, 2018, DOI:10.32604/cmc.2018.02890

    Abstract In order to explore the safe operation of UAVs in non-segregated airspace, a collision risk model for cylindrical UAVs based on conflict areas was constructed and the risk of conflict between manned and unmanned aerial vehicles was researched. According to the results of risk analysis, a strategy for solving the conflict of aircraft is proposed, and the risk assessment experiment of unmanned aerial vehicle (UAV) in non-isolated airspace conflict is carried out. The results show that under the experimental conditions, large unmanned aerial vehicles equipped with ADS-B, TCAS and other airborne sensing systems will indeed interfere with other aircraft in… More >

  • Open Access

    ARTICLE

    On Special Curves According to Darboux Frame in the Three Dimensional Lorentz Space

    H. S. Abdel-Aziz1, M. Khalifa Saad1,2,*

    CMC-Computers, Materials & Continua, Vol.54, No.3, pp. 229-249, 2018, DOI:10.3970/cmc.2018.054.229

    Abstract In the light of great importance of curves and their frames in many different branches of science, especially differential geometry as well as geometric properties and the uses in various fields, we are interested here to study a special kind of curves called Smarandache curves in Lorentz 3-space. Then, we present some characterizations for these curves and calculate their Darboux invariants. Moreover, we classify TP, TU, PU and TPU-Smarandache curves of a spacelike curve according to the causal character of the vector, curve and surface used in the study. Besides, we give some of differential geometric properties and important relations… More >

  • Open Access

    ARTICLE

    Joint Bearing Mechanism of Coal Pillar and Backfilling Body in Roadway Backfilling Mining Technology

    Zhengzheng Cao1, Ping Xu1,*, Zhenhua Li2, Minxia Zhang1, Yu Zhao1, Wenlong Shen2

    CMC-Computers, Materials & Continua, Vol.54, No.2, pp. 137-159, 2018, DOI:10.3970/cmc.2018.054.137

    Abstract In the traditional mining technology, the coal resources trapped beneath surface buildings, railways, and water bodies cannot be mined massively, thereby causing the lower coal recovery and dynamic disasters. In order to solve the aforementioned problems, the roadway backfilling mining technology is developed and the joint bearing mechanism of coal pillar and backfilling body is presented in this paper. The mechanical model of bearing system of coal pillar and backfilling body is established, by analyzing the basic characteristics of overlying strata deformation in roadway backfilling mining technology. According to the Ritz method in energy variation principle, the elastic solution expression… More >

  • Open Access

    ARTICLE

    Low Velocity Impact Response and Failure Assessment of Textile Reinforced Concrete Slabs

    Subashini I1, a, Smitha Gopinath2, *, Aahrthy R3, b

    CMC-Computers, Materials & Continua, Vol.53, No.4, pp. 291-306, 2017, DOI:10.3970/cmc.2017.053.291

    Abstract Present paper proposes a methodology by combining finite element method with smoothed particle hydrodynamics to simulate the response of textile reinforced concrete (TRC) slabs under low velocity impact loading. For the constitutive modelling in the finite element method, the concrete damaged plasticity model was employed to the cementitious binder of TRC and Von-Mises criterion was used for the textile reinforcement. Strain dependent smoothed particle hydrodynamics (SPH) was used to assess the damage and failure pattern of TRC slabs. Numerical simulation was carried out on TRC slabs with two different volume fraction of glass textile reinforcement to predict the energy absorption… More >

  • Open Access

    ARTICLE

    Control Mechanism of Surface Subsidence and Overburden Movement in Backfilling Mining based on Laminated Plate Theory

    Zhengzheng Cao1, Feng Du2,3,4, Ping Xu1, Haixiao Lin1, Yi Xue3, Yuejin Zhou3

    CMC-Computers, Materials & Continua, Vol.53, No.3, pp. 175-186, 2017, DOI:10.3970/cmc.2017.053.187

    Abstract The backfilling mining technology is a type of high-efficiency coal mining technology that is used to address the environmental issues caused by the caving mining technology. In this paper, the mechanical model of symmetrical laminated plate representing the overburden movement caused by the backfilling mining technology is established, and the governing differential equation of the motion of the overburden is derived. The boundary conditions of the mechanical model are put forward, and the analytical solution of the overburden movement and surface subsidence is obtained. The numerical model of the overburden movement and surface subsidence, under mining with backfilling, is established… More >

  • Open Access

    ARTICLE

    Small-Scale Effect on the Static Deflection of a Clamped Graphene Sheet

    G. Q. Xie1, J. P. Wang2, Q. L. Zhang1

    CMC-Computers, Materials & Continua, Vol.48, No.2, pp. 103-117, 2015, DOI:10.3970/cmc.2015.048.103

    Abstract Small-scale effect on the static deflection of a clamped graphene sheet and influence of the helical angle of the clamped graphene sheet on its static deflection are investigated. Static equilibrium equations of the graphene sheet are formulated based on the concept of nonlocal elastic theory. Galerkin method is used to obtain the classical and the nonlocal static deflection from Static equilibrium equations , respectively. The numerical results show that the static deflection and small-scale effect of a clamped graphene sheet is affected by its small size and helical angle. Small-scale effect will decrease with increase of the length and width… More >

Displaying 2301-2310 on page 231 of 2336. Per Page