Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,863)
  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI: 10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication… More >

  • Open Access

    ARTICLE

    Rare Bird Sparse Recognition via Part-Based Gist Feature Fusion and Regularized Intraclass Dictionary Learning

    Jixin Liu1,*, Ning Sun1,2, Xiaofei Li1, Guang Han1, Haigen Yang1, Quansen Sun3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 435-446, 2018, DOI: 10.3970/cmc.2018.02177

    Abstract Rare bird has long been considered an important in the field of airport security, biological conservation, environmental monitoring, and so on. With the development and popularization of IOT-based video surveillance, all day and weather unattended bird monitoring becomes possible. However, the current mainstream bird recognition methods are mostly based on deep learning. These will be appropriate for big data applications, but the training sample size for rare bird is usually very short. Therefore, this paper presents a new sparse recognition model via improved part detection and our previous dictionary learning. There are two achievements in our work: (1) after the… More >

  • Open Access

    ARTICLE

    An Optimized Labeling Scheme for Reachability Queries

    Xian Tang1,*, Ziyang Chen2, Haiyan Zhang3, Xiang Liu1, Yunyu Shi1, Asad Shahzadi4

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 267-283, 2018, DOI:10.3970/cmc.2018.01839

    Abstract Answering reachability queries is one of the fundamental graph operations. Existing approaches either accelerate index construction by constructing an index that covers only partial reachability relationship, which may result in performing cost traversing operation when answering a query; or accelerate query answering by constructing an index covering the complete reachability relationship, which may be inefficient due to comparing the complete node labels. We propose a novel labeling scheme, which covers the complete reachability relationship, to accelerate reachability queries processing. The idea is to decompose the given directed acyclic graph (DAG) G into two subgraphs, G1 and G2. For G1, we… More >

  • Open Access

    ARTICLE

    An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment

    Jieren Cheng1,2, Ruomeng Xu1,*, Xiangyan Tang1, Victor S. Sheng3, Canting Cai1

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 95-119, 2018, DOI:10.3970/cmc.2018.055.095

    Abstract Distributed denial-of-service (DDoS) is a rapidly growing problem with the fast development of the Internet. There are multitude DDoS detection approaches, however, three major problems about DDoS attack detection appear in the big data environment. Firstly, to shorten the respond time of the DDoS attack detector; secondly, to reduce the required compute resources; lastly, to achieve a high detection rate with low false alarm rate. In the paper, we propose an abnormal network flow feature sequence prediction approach which could fit to be used as a DDoS attack detector in the big data environment and solve aforementioned problems. We define… More >

  • Open Access

    ARTICLE

    A Fusion Steganographic Algorithm Based on Faster R-CNN

    Ruohan Meng1,2, Steven G. Rice3, Jin Wang4, Xingming Sun1,2,*

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 1-16, 2018, DOI:10.3970/cmc.2018.055.001

    Abstract The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media. The secret message should not be damaged on the process of the cover media. In order to ensure the invisibility of secret message, complex texture objects should be chosen for embedding information. In this paper, an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message. Firstly, complex texture regions are selected based on a kind of… More >

  • Open Access

    ARTICLE

    Joint Bearing Mechanism of Coal Pillar and Backfilling Body in Roadway Backfilling Mining Technology

    Zhengzheng Cao1, Ping Xu1,*, Zhenhua Li2, Minxia Zhang1, Yu Zhao1, Wenlong Shen2

    CMC-Computers, Materials & Continua, Vol.54, No.2, pp. 137-159, 2018, DOI:10.3970/cmc.2018.054.137

    Abstract In the traditional mining technology, the coal resources trapped beneath surface buildings, railways, and water bodies cannot be mined massively, thereby causing the lower coal recovery and dynamic disasters. In order to solve the aforementioned problems, the roadway backfilling mining technology is developed and the joint bearing mechanism of coal pillar and backfilling body is presented in this paper. The mechanical model of bearing system of coal pillar and backfilling body is established, by analyzing the basic characteristics of overlying strata deformation in roadway backfilling mining technology. According to the Ritz method in energy variation principle, the elastic solution expression… More >

  • Open Access

    ARTICLE

    Fingerprint Liveness Detection from Different Fingerprint Materials Using Convolutional Neural Network and Principal Component Analysis

    Chengsheng Yuan1,2,3, Xinting Li3, Q. M. Jonathan Wu3, Jin Li4,5, Xingming Sun1,2

    CMC-Computers, Materials & Continua, Vol.53, No.4, pp. 357-372, 2017, DOI:10.3970/cmc.2017.053.357

    Abstract Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints, which are made of common fingerprint materials, such as silicon, latex, etc. Thus, to protect our privacy, many fingerprint liveness detection methods are put forward to discriminate fake or true fingerprint. Current work on liveness detection for fingerprint images is focused on the construction of complex handcrafted features, but these methods normally destroy or lose spatial information between pixels. Different from existing methods, convolutional neural network (CNN) can generate high-level semantic representations by learning and concatenating low-level edge and shape features from a large amount of labeled… More >

  • Open Access

    ARTICLE

    Higher-Order Line Element Analysis of Potential Field with Slender Heterogeneities

    H.-S. Wang1,2, H. Jiang3,4, B. Yang2

    CMC-Computers, Materials & Continua, Vol.51, No.3, pp. 145-161, 2016, DOI:10.3970/cmc.2016.051.145

    Abstract Potential field due to line sources residing on slender heterogeneities is involved in various areas, such as heat conduction, potential flow, and electrostatics. Often dipolar line sources are either prescribed or induced due to close interaction with other objects. Its calculation requires a higher-order scheme to take into account the dipolar effect as well as net source effect. In the present work, we apply such a higher-order line element method to analyze the potential field with cylindrical slender heterogeneities. In a benchmark example of two parallel rods, we compare the line element solution with the boundary element solution to show… More >

  • Open Access

    ARTICLE

    EvaluatingWater Vapor Permeance Measurement Techniques for Highly Permeable Membranes

    Bui Duc Thuan1,2, Wong Yonghui2, Chua Kian Jon2, Ng Kim Choon2

    CMC-Computers, Materials & Continua, Vol.47, No.2, pp. 89-105, 2015, DOI:10.3970/cmc.2015.047.089

    Abstract The cup method and dynamic moisture permeation cell (DMPC) method are two common techniques used to determine the water vapor permeation properties of a membrane. Often, ignoring the resistance of boundary air layers to the transport of water vapor results in the water vapor permeance of the membrane being underestimated in practical tests. The measurement errors are higher with highly permeable membranes. In this study, the two methods were simulated using COMSOL Multiphysics platform and the extent of the error was evaluated. Initial results showed that the error is equally high in both methods. With the correction for the still… More >

  • Open Access

    ARTICLE

    Numerical Studies on Stratified Rock Failure Based on Digital Image Processing Technique at Mesoscale

    Ang Li1, Guo-jian Shao1,2, Pei-rong Du3, Sheng-yong Ding1, Jing-bo Su4

    CMC-Computers, Materials & Continua, Vol.45, No.1, pp. 17-38, 2015, DOI:10.3970/cmc.2015.045.017

    Abstract This paper investigates the failure behaviors of stratified rocks under uniaxial compression using a digital image processing (DIP) based finite difference method (FDM). The two-dimensional (2D) mesostructure of stratified rocks, represented as the internal spatial distribution of two main rock materials (marble and greenschist), is first identified with the DIP technique. And then the binaryzation image information is used to generate the finite difference grid. Finally, the failure behaviors of stratified rock samples are simulated by FDM considering the inhomogeneity of rock materials. In the DIP, an image segmentation algorithm based on seeded region growing (SRG) is proposed, instead of… More >

Displaying 2841-2850 on page 285 of 2863. Per Page