Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (130)
  • Open Access

    ARTICLE

    Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks

    N. Krishnammal1,*, C. Kalaiarasan2, A. Bharathi3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1531-1549, 2023, DOI:10.32604/csse.2023.024251

    Abstract Link asymmetry in wireless mesh access networks (WMAN) of Mobile ad-hoc Networks (MANETs) is due mesh routers’ transmission range. It is depicted as significant research challenges that pose during the design of network protocol in wireless networks. Based on the extensive review, it is noted that the substantial link percentage is symmetric, i.e., many links are unidirectional. It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message. Therefore, the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asymmetric links. It paves the way to exploit an investigation on asymmetric links… More >

  • Open Access

    ARTICLE

    Main Melody Configuration and Chord Algorithm for Relaxing Music Generation

    Chih-Fang Huang1,*, Ai-Hsien Fan2, Jin-Huang Huang3, Hsing-Cheng Huang3

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 661-673, 2023, DOI:10.32604/iasc.2023.027165

    Abstract This study applies the diatonic chord in music theory, utilization rate, and the close relationship between the main chord system, the dominant chord system, and the subordinate chord system. From the perspective of music theory, the computer can automatically and quickly analyze the music, and establish a set of algorithms for configuring the chord accompaniment for the main melody, called the symmetrical circle of fifths algorithm, SCFA (Symmetrical Circle of Fifths Algorithm). SCFA can immediately confirm the key, perform harmony analysis, configure chord accompaniment for the main melody, and effectively and correctly complete any given melody or interval. It can… More >

  • Open Access

    ARTICLE

    Cold-Start Link Prediction via Weighted Symmetric Nonnegative Matrix Factorization with Graph Regularization

    Minghu Tang1,2,3,*, Wei Yu4, Xiaoming Li4, Xue Chen5, Wenjun Wang3, Zhen Liu6

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1069-1084, 2022, DOI:10.32604/csse.2022.028841

    Abstract Link prediction has attracted wide attention among interdisciplinary researchers as an important issue in complex network. It aims to predict the missing links in current networks and new links that will appear in future networks. Despite the presence of missing links in the target network of link prediction studies, the network it processes remains macroscopically as a large connected graph. However, the complexity of the real world makes the complex networks abstracted from real systems often contain many isolated nodes. This phenomenon leads to existing link prediction methods not to efficiently implement the prediction of missing edges on isolated nodes.… More >

  • Open Access

    ARTICLE

    Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds

    Muhammad Akram1, Muhammad Waseem Iqbal2,*, Syed Ashraf Ali3, Muhammad Usman Ashraf4, Khalid Alsubhi5, Hani Moaiteq Aljahdali6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6061-6077, 2022, DOI:10.32604/cmc.2022.028272

    Abstract In cipher algorithms, the encryption and decryption are based on the same key. There are some limitations in cipher algorithms, for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless. This paper aims to improve the said limitations by designing of Triple key security algorithm (TKS) in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext. Each plaintext character is substituted by an alternative message. The mode of substitution is transformed cyclically… More >

  • Open Access

    ARTICLE

    Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network

    Yanyan Han1,2, Jiangping Yu3, Guangyu Hu4, Chenglei Pan4, Dingbang Xie5, Chao Guo1,2,6,*, Abdul Waheed7

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4789-4802, 2022, DOI:10.32604/cmc.2022.027496

    Abstract Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control center to each participant and verify the effectiveness of secret shares shown by participants. We use a lot of difficult assumptions based on mathematical problems in the verification stage, such as solving the difficult problem of the discrete logarithm, large integer prime factorization, and so on. Compared with other verifiable secret sharing schemes designed for difficult problems under the same security, the verifiable secret sharing… More >

  • Open Access

    ARTICLE

    Weakly Singular Symmetric Galerkin Boundary Element Method for Fracture Analysis of Three-Dimensional Structures Considering Rotational Inertia and Gravitational Forces

    Shuangxin He1, Chaoyang Wang1, Xuan Zhou1,*, Leiting Dong1,*, Satya N. Atluri2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1857-1882, 2022, DOI:10.32604/cmes.2022.019160

    Abstract The Symmetric Galerkin Boundary Element Method is advantageous for the linear elastic fracture and crackgrowth analysis of solid structures, because only boundary and crack-surface elements are needed. However, for engineering structures subjected to body forces such as rotational inertia and gravitational loads, additional domain integral terms in the Galerkin boundary integral equation will necessitate meshing of the interior of the domain. In this study, weakly-singular SGBEM for fracture analysis of three-dimensional structures considering rotational inertia and gravitational forces are developed. By using divergence theorem or alternatively the radial integration method, the domain integral terms caused by body forces are transformed… More >

  • Open Access

    ARTICLE

    Study on the Mechanical Properties of Ni-Ti-Cu Shape Memory Alloy Considering Different Cu Contents

    Bingfei Liu1,*, Yangjie Hao2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1601-1613, 2022, DOI:10.32604/cmes.2022.019226

    Abstract By adding copper to increase the performance, the Ni-Ti-Cu Shape Memory Alloy (SMA), has been widely used in the field of engineering in recent years. A thermodynamic constitutive model for Ni-Ti-Cu SMA considering different copper contents is established in this work. Numerical results for two different copper contents, as examples, are compared with the experimental results to verify the accuracy of the theoretical work. Based on the verified constitutive model, the effects of different copper content on the mechanical properties of Ni-Ti-Cu SMA and the tensile and compressive asymmetric properties of Ni-Ti-Cu SMA are finally discussed, respectively. More >

  • Open Access

    ARTICLE

    Skew t Distribution-Based Nonlinear Filter with Asymmetric Measurement Noise Using Variational Bayesian Inference

    Chen Xu1, Yawen Mao2, Hongtian Chen3,*, Hongfeng Tao1, Fei Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 349-364, 2022, DOI:10.32604/cmes.2021.019027

    Abstract This paper is focused on the state estimation problem for nonlinear systems with unknown statistics of measurement noise. Based on the cubature Kalman filter, we propose a new nonlinear filtering algorithm that employs a skew t distribution to characterize the asymmetry of the measurement noise. The system states and the statistics of skew t noise distribution, including the shape matrix, the scale matrix, and the degree of freedom (DOF) are estimated jointly by employing variational Bayesian (VB) inference. The proposed method is validated in a target tracking example. Results of the simulation indicate that the proposed nonlinear filter can perform… More >

  • Open Access

    ARTICLE

    A Secure Three-Party Authenticated Key Exchange Protocol for Social Networks

    Vivek Kumar Sinha1, Divya Anand1,*, Fahd S. Alharithi2, Ahmed H. Almulihi2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6293-6305, 2022, DOI:10.32604/cmc.2022.024877

    Abstract The 3PAKE (Three-Party Authenticated Key Exchange) protocol is a valuable cryptographic method that offers safe communication and permits two diverse parties to consent to a new safe meeting code using the trusted server. There have been explored numerous 3PAKE protocols earlier to create a protected meeting code between users employing the trusted server. However, existing modified 3PAKE protocols have numerous drawbacks and are incapable to provide desired secrecy against diverse attacks such as man-in-the-middle, brute-force attacks, and many others in social networks. In this article, the authors proposed an improved as well as safe 3PAKE protocol based on the hash… More >

  • Open Access

    ARTICLE

    A Hybrid Modified Sine Cosine Algorithm Using Inverse Filtering and Clipping Methods for Low Autocorrelation Binary Sequences

    Siti Julia Rosli1,2, Hasliza A Rahim1,2,*, Khairul Najmy Abdul Rani1,2, Ruzelita Ngadiran2,3, Wan Azani Mustafa3,4, Muzammil Jusoh1,2, Mohd Najib Mohd Yasin1,2, Thennarasan Sabapathy1,2, Mohamedfareq Abdulmalek5, Wan Suryani Firuz Wan Ariffin2, Ahmed Alkhayyat6

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3533-3556, 2022, DOI:10.32604/cmc.2022.021719

    Abstract The essential purpose of radar is to detect a target of interest and provide information concerning the target's location, motion, size, and other parameters. The knowledge about the pulse trains’ properties shows that a class of signals is mainly well suited to digital processing of increasing practical importance. A low autocorrelation binary sequence (LABS) is a complex combinatorial problem. The main problems of LABS are low Merit Factor (MF) and shorter length sequences. Besides, the maximum possible MF equals 12.3248 as infinity length is unable to be achieved. Therefore, this study implemented two techniques to propose a new metaheuristic algorithm… More >

Displaying 41-50 on page 5 of 130. Per Page