Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (139)
  • Open Access

    ARTICLE

    Two-Fold and Symmetric Repeatability Rates for Comparing Keypoint Detectors

    Ibrahim El rube'*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6495-6511, 2022, DOI:10.32604/cmc.2022.031602 - 28 July 2022

    Abstract The repeatability rate is an important measure for evaluating and comparing the performance of keypoint detectors. Several repeatability rate measurements were used in the literature to assess the effectiveness of keypoint detectors. While these repeatability rates are calculated for pairs of images, the general assumption is that the reference image is often known and unchanging compared to other images in the same dataset. So, these rates are asymmetrical as they require calculations in only one direction. In addition, the image domain in which these computations take place substantially affects their values. The presented scatter diagram… More >

  • Open Access

    ARTICLE

    Asymmetric Patch Element Reflectarray with Dual Linear and Dual Circular Polarization

    M. Hashim Dahri1, M. H. Jamaluddin2, M. Inam3, M. R. Kamarudin4, F. C. Seman4, A. Y. I. Ashyap4, Z. A. Shamsan5,*, K. Almuhanna5, F. Alorifi5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6085-6101, 2022, DOI:10.32604/cmc.2022.031532 - 28 July 2022

    Abstract A reflectarray antenna consisting of asymmetrical patch elements is proposed, which is capable of producing dual linear and dual circular polarized operation at 26 GHz frequency. The main purpose of this design is to support four different polarizations using the same patch element. The proposed reflectarray has a single layer configuration with a linearly polarized feed and circular ring slots in the ground plane. Asymmetric patch element is designed from a square patch element by tilting its one vertical side to some optimized inclination. A wide reflection phase range of 600° is obtained with the asymmetric… More >

  • Open Access

    ARTICLE

    An Approximation for the Entropy Measuring in the General Structure of SGSP3

    Kamel Jebreen1,2,3,*, Muhammad Haroon Aftab4, Mohammad Issa Sowaity5, Zeeshan Saleem Mufti4, Muhammad Hussain6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4455-4463, 2022, DOI:10.32604/cmc.2022.030246 - 28 July 2022

    Abstract In this article, we calculate various topological invariants such as symmetric division degree index, redefined Zagreb index, VL index, first and second exponential Zagreb index, first and second multiplicative exponential Zagreb indices, symmetric division degree entropy, redefined Zagreb entropy, VL entropy, first and second exponential Zagreb entropies, multiplicative exponential Zagreb entropy. We take the chemical compound named Proanthocyanidins, which is a very useful polyphenol in human’s diet. They are very beneficial for one’s health. These chemical compounds are extracted from grape seeds. They are tremendously anti-inflammatory. A subdivision form of this compound is presented in More >

  • Open Access

    ARTICLE

    Cold-Start Link Prediction via Weighted Symmetric Nonnegative Matrix Factorization with Graph Regularization

    Minghu Tang1,2,3,*, Wei Yu4, Xiaoming Li4, Xue Chen5, Wenjun Wang3, Zhen Liu6

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1069-1084, 2022, DOI:10.32604/csse.2022.028841 - 09 May 2022

    Abstract Link prediction has attracted wide attention among interdisciplinary researchers as an important issue in complex network. It aims to predict the missing links in current networks and new links that will appear in future networks. Despite the presence of missing links in the target network of link prediction studies, the network it processes remains macroscopically as a large connected graph. However, the complexity of the real world makes the complex networks abstracted from real systems often contain many isolated nodes. This phenomenon leads to existing link prediction methods not to efficiently implement the prediction of… More >

  • Open Access

    ARTICLE

    Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

    Muhammad Akram1, Muhammad Waseem Iqbal2,*, Syed Ashraf Ali3, Muhammad Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6061-6077, 2022, DOI:10.32604/cmc.2022.028272 - 21 April 2022

    Abstract In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext. Each plaintext character is substituted by an alternative message. The mode More >

  • Open Access

    ARTICLE

    Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network

    Yanyan Han1,2, Jiangping Yu3, Guangyu Hu4, Chenglei Pan4, Dingbang Xie5, Chao Guo1,2,6,*, Abdul Waheed7

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4789-4802, 2022, DOI:10.32604/cmc.2022.027496 - 21 April 2022

    Abstract Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control center to each participant and verify the effectiveness of secret shares shown by participants. We use a lot of difficult assumptions based on mathematical problems in the verification stage, such as solving the difficult problem of the discrete logarithm, large integer prime factorization, and so on. Compared with other verifiable secret sharing schemes designed for difficult problems under the same… More >

  • Open Access

    ARTICLE

    Weakly Singular Symmetric Galerkin Boundary Element Method for Fracture Analysis of Three-Dimensional Structures Considering Rotational Inertia and Gravitational Forces

    Shuangxin He1, Chaoyang Wang1, Xuan Zhou1,*, Leiting Dong1,*, Satya N. Atluri2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1857-1882, 2022, DOI:10.32604/cmes.2022.019160 - 19 April 2022

    Abstract The Symmetric Galerkin Boundary Element Method is advantageous for the linear elastic fracture and crackgrowth analysis of solid structures, because only boundary and crack-surface elements are needed. However, for engineering structures subjected to body forces such as rotational inertia and gravitational loads, additional domain integral terms in the Galerkin boundary integral equation will necessitate meshing of the interior of the domain. In this study, weakly-singular SGBEM for fracture analysis of three-dimensional structures considering rotational inertia and gravitational forces are developed. By using divergence theorem or alternatively the radial integration method, the domain integral terms caused More >

  • Open Access

    ARTICLE

    Study on the Mechanical Properties of Ni-Ti-Cu Shape Memory Alloy Considering Different Cu Contents

    Bingfei Liu1,*, Yangjie Hao2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1601-1613, 2022, DOI:10.32604/cmes.2022.019226 - 19 April 2022

    Abstract By adding copper to increase the performance, the Ni-Ti-Cu Shape Memory Alloy (SMA), has been widely used in the field of engineering in recent years. A thermodynamic constitutive model for Ni-Ti-Cu SMA considering different copper contents is established in this work. Numerical results for two different copper contents, as examples, are compared with the experimental results to verify the accuracy of the theoretical work. Based on the verified constitutive model, the effects of different copper content on the mechanical properties of Ni-Ti-Cu SMA and the tensile and compressive asymmetric properties of Ni-Ti-Cu SMA are finally More >

  • Open Access

    ARTICLE

    Skew t Distribution-Based Nonlinear Filter with Asymmetric Measurement Noise Using Variational Bayesian Inference

    Chen Xu1, Yawen Mao2, Hongtian Chen3,*, Hongfeng Tao1, Fei Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 349-364, 2022, DOI:10.32604/cmes.2021.019027 - 24 January 2022

    Abstract This paper is focused on the state estimation problem for nonlinear systems with unknown statistics of measurement noise. Based on the cubature Kalman filter, we propose a new nonlinear filtering algorithm that employs a skew t distribution to characterize the asymmetry of the measurement noise. The system states and the statistics of skew t noise distribution, including the shape matrix, the scale matrix, and the degree of freedom (DOF) are estimated jointly by employing variational Bayesian (VB) inference. The proposed method is validated in a target tracking example. Results of the simulation indicate that the More >

  • Open Access

    ARTICLE

    A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks

    Vivek Kumar Sinha1, Divya Anand1,*, Fahd S. Alharithi2, Ahmed H. Almulihi2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6293-6305, 2022, DOI:10.32604/cmc.2022.024877 - 14 January 2022

    Abstract The 3PAKE (Three-Party Authenticated Key Exchange) protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted server. There have been explored numerous 3PAKE protocols earlier to create a protected meeting code between users employing the trusted server. However, existing modified 3PAKE protocols have numerous drawbacks and are incapable to provide desired secrecy against diverse attacks such as man-in-the-middle, brute-force attacks, and many others in social networks. In this article, the authors proposed an improved as well as safe 3PAKE… More >

Displaying 41-50 on page 5 of 139. Per Page