Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,281)
  • Open Access

    ARTICLE

    Fast Near-duplicate Image Detection in Riemannian Space by A Novel Hashing Scheme

    Ligang Zheng1,*, Chao Song2

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 529-539, 2018, DOI:10.3970/cmc.2018.03780

    Abstract There is a steep increase in data encoded as symmetric positive definite (SPD) matrix in the past decade. The set of SPD matrices forms a Riemannian manifold that constitutes a half convex cone in the vector space of matrices, which we sometimes call SPD manifold. One of the fundamental problems in the application of SPD manifold is to find the nearest neighbor of a queried SPD matrix. Hashing is a popular method that can be used for the nearest neighbor search. However, hashing cannot be directly applied to SPD manifold due to its non-Euclidean intrinsic More >

  • Open Access

    ARTICLE

    SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data

    Bo Xiao1, Zhen Wang2, Qi Liu3,*, Xiaodong Liu3

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 365-379, 2018, DOI:10.3970/cmc.2018.01830

    Abstract In recent years, the rapid development of big data technology has also been favored by more and more scholars. Massive data storage and calculation problems have also been solved. At the same time, outlier detection problems in mass data have also come along with it. Therefore, more research work has been devoted to the problem of outlier detection in big data. However, the existing available methods have high computation time, the improved algorithm of outlier detection is presented, which has higher performance to detect outlier. In this paper, an improved algorithm is proposed. The SMK-means More >

  • Open Access

    ARTICLE

    An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection

    Yue Zhang1, Dengpan Ye2, Junjun Gan1, Zhenyu Li3, Qingfeng Cheng1,*

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 151-167, 2018, DOI:10.3970/cmc.2018.02464

    Abstract In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method, this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection. For the spatial image, this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain. Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography, and use the minimum distortion coding to realize the… More >

  • Open Access

    ARTICLE

    A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data

    Xiaonian Wu1,*, Chuyun Zhang3, Runlian Zhang2, Yujue Wang2, Jinhua Cui4

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 61-72, 2018, DOI:10.3970/cmc.2018.02449

    Abstract There are two key issues in distributed intrusion detection system, that is, maintaining load balance of system and protecting data integrity. To address these issues, this paper proposes a new distributed intrusion detection model for big data based on nondestructive partitioning and balanced allocation. A data allocation strategy based on capacity and workload is introduced to achieve local load balance, and a dynamic load adjustment strategy is adopted to maintain global load balance of cluster. Moreover, data integrity is protected by using session reassemble and session partitioning. The simulation results show that the new model More >

  • Open Access

    ARTICLE

    Three-Dimensional Numerical Investigation of Convective Thermal Instabilities in the Sapphire Melt for Czochralski Growth Process

    H. Azoui1, D. Bahloul1,*, N. Soltani2

    FDMP-Fluid Dynamics & Materials Processing, Vol.14, No.2, pp. 87-105, 2018, DOI:10.3970/fdmp.2018.01149

    Abstract In this work we have performed a three-dimensional numerical investigation in order to find the optimal conditions for growing efficiently high quality sapphire crystals with good thermal properties. We have studied thermal instabilities near the melt-crystal interface and the convective heat transfer under the Czochralski (Cz) process. We performed 3-D CFD simulation in cylindrical coordinates and used the Fast Fourier Transform method to analyze the temperature fluctuations. We present a detailed investigation on the effects of the crystal rotation speed and the temperature distribution on thermal instabilities of sapphire melt under forced convection. Where the More >

  • Open Access

    ARTICLE

    Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor

    Guoyuan Lin1,2,*, Bowen Liu1, Pengcheng Xiao3, Min Lei4, Wei Bi5,6

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 533-547, 2018, DOI:10.32604/cmc.2018.03720

    Abstract Anti-detection is becoming as an emerging challenge for anti-phishing. This paper solves the threats of anti-detection from the threshold setting condition. Enough webpages are considered to complicate threshold setting condition when the threshold is settled. According to the common visual behavior which is easily attracted by the salient region of webpages, image retrieval methods based on texton correlation descriptor (TCD) are improved to obtain enough webpages which have similarity in the salient region for the images of webpages. There are two steps for improving TCD which has advantage of recognizing the salient region of images: More >

  • Open Access

    ARTICLE

    Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

    Chak Fong Cheang1,*, Yiqin Wang1, Zhiping Cai2, Gen Xu1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 297-306, 2018, DOI:10.32604/cmc.2018.03808

    Abstract Cloud computing provides easy and on-demand access to computing resources in a configurable pool. The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines (VMs), instead of being restricted on a single physical server. When more and more network services are deployed on the cloud, the detection of the intrusion likes Distributed Denial-of-Service (DDoS) attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud… More >

  • Open Access

    ARTICLE

    Expression Preserved Face Privacy Protection Based on Multi-mode Discriminant Analysis

    Xiang Wang1, *, Chen Xiong1, Qingqi Pei1, Youyang Qu2

    CMC-Computers, Materials & Continua, Vol.57, No.1, pp. 107-121, 2018, DOI:10.32604/cmc.2018.03675

    Abstract Most visual privacy protection methods only hide the identity information of the face images, but the expression, behavior and some other information, which are of great significant in the live broadcast and other scenarios, are also destroyed by the privacy protection process. To this end, this paper introduces a method to remove the identity information while preserving the expression information by performing multi-mode discriminant analysis on the images normalized with AAM algorithm. The face images are decomposed into mutually orthogonal subspaces corresponding to face attributes such as gender, race and expression, each of which owns More >

  • Open Access

    ARTICLE

    Speech Resampling Detection Based on Inconsistency of Band Energy

    Zhifeng Wang1, Diqun Yan1,*, Rangding Wang1, Li Xiang1, Tingting Wu1

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 247-259, 2018, DOI:10.3970/cmc.2018.02902

    Abstract Speech resampling is a typical tempering behavior, which is often integrated into various speech forgeries, such as splicing, electronic disguising, quality faking and so on. By analyzing the principle of resampling, we found that, compared with natural speech, the inconsistency between the bandwidth of the resampled speech and its sampling ratio will be caused because the interpolation process in resampling is imperfect. Based on our observation, a new resampling detection algorithm based on the inconsistency of band energy is proposed. First, according to the sampling ratio of the suspected speech, a band-pass Butterworth filter is More >

  • Open Access

    ARTICLE

    Inverted XML Access Control Model Based on Ontology Semantic Dependency

    Meijuan Wang1,2,*, Jian Wang1, Lihong Guo1,3, Lein Harn4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 465-482, 2018, DOI:10.3970/cmc.2018.02568

    Abstract In the era of big data, the conflict between data mining and data privacy protection is increasing day by day. Traditional information security focuses on protecting the security of attribute values without semantic association. The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information. Considering the semantic association, reasonable security access for privacy protect is required. Semi-structured and self-descriptive XML (eXtensible Markup Language) has become a common form of data organization for database management in big data environments. Based on the semantic integration nature More >

Displaying 3001-3010 on page 301 of 3281. Per Page