Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,427)
  • Open Access

    ARTICLE

    Research on Trust Model in Container-Based Cloud Service

    Xiaolan Xie1,2, Tianwei Yuan1,*, Xiao Zhou3, Xiaochun Cheng4

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 273-283, 2018, DOI: 10.3970/cmc.2018.03587

    Abstract Container virtual technology aims to provide program independence and resource sharing. The container enables flexible cloud service. Compared with traditional virtualization, traditional virtual machines have difficulty in resource and expense requirements. The container technology has the advantages of smaller size, faster migration, lower resource overhead, and higher utilization. Within container-based cloud environment, services can adopt multi-target nodes. This paper reports research results to improve the traditional trust model with consideration of cooperation effects. Cooperation trust means that in a container-based cloud environment, services can be divided into multiple containers for different container nodes. When multiple target nodes work for one… More >

  • Open Access

    ARTICLE

    Speech Resampling Detection Based on Inconsistency of Band Energy

    Zhifeng Wang1, Diqun Yan1,*, Rangding Wang1, Li Xiang1, Tingting Wu1

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 247-259, 2018, DOI: 10.3970/cmc.2018.02902

    Abstract Speech resampling is a typical tempering behavior, which is often integrated into various speech forgeries, such as splicing, electronic disguising, quality faking and so on. By analyzing the principle of resampling, we found that, compared with natural speech, the inconsistency between the bandwidth of the resampled speech and its sampling ratio will be caused because the interpolation process in resampling is imperfect. Based on our observation, a new resampling detection algorithm based on the inconsistency of band energy is proposed. First, according to the sampling ratio of the suspected speech, a band-pass Butterworth filter is designed to filter out the… More >

  • Open Access

    ARTICLE

    A Spark Scheduling Strategy for Heterogeneous Cluster

    Xuewen Zhang1, Zhonghao Li1, Gongshen Liu1,*, Jiajun Xu1, Tiankai Xie2, Jan Pan Nees1

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 405-417, 2018, DOI: 10.3970/cmc.2018.02527

    Abstract As a main distributed computing system, Spark has been used to solve problems with more and more complex tasks. However, the native scheduling strategy of Spark assumes it works on a homogenized cluster, which is not so effective when it comes to heterogeneous cluster. The aim of this study is looking for a more effective strategy to schedule tasks and adding it to the source code of Spark. After investigating Spark scheduling principles and mechanisms, we developed a stratifying algorithm and a node scheduling algorithm is proposed in this paper to optimize the native scheduling strategy of Spark. In this… More >

  • Open Access

    ARTICLE

    Reversible Natural Language Watermarking Using Synonym Substitution and Arithmetic Coding

    Lingyun Xiang1,2, Yan Li2, Wei Hao3,*, Peng Yang4, Xiaobo Shen5

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 541-559, 2018, DOI: 10.3970/cmc.2018.03510

    Abstract For protecting the copyright of a text and recovering its original content harmlessly, this paper proposes a novel reversible natural language watermarking method that combines arithmetic coding and synonym substitution operations. By analyzing relative frequencies of synonymous words, synonyms employed for carrying payload are quantized into an unbalanced and redundant binary sequence. The quantized binary sequence is compressed by adaptive binary arithmetic coding losslessly to provide a spare for accommodating additional data. Then, the compressed data appended with the watermark are embedded into the cover text via synonym substitutions in an invertible manner. On the receiver side, the watermark and… More >

  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI: 10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication… More >

  • Open Access

    ARTICLE

    Rare Bird Sparse Recognition via Part-Based Gist Feature Fusion and Regularized Intraclass Dictionary Learning

    Jixin Liu1,*, Ning Sun1,2, Xiaofei Li1, Guang Han1, Haigen Yang1, Quansen Sun3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 435-446, 2018, DOI: 10.3970/cmc.2018.02177

    Abstract Rare bird has long been considered an important in the field of airport security, biological conservation, environmental monitoring, and so on. With the development and popularization of IOT-based video surveillance, all day and weather unattended bird monitoring becomes possible. However, the current mainstream bird recognition methods are mostly based on deep learning. These will be appropriate for big data applications, but the training sample size for rare bird is usually very short. Therefore, this paper presents a new sparse recognition model via improved part detection and our previous dictionary learning. There are two achievements in our work: (1) after the… More >

  • Open Access

    ARTICLE

    The Discrete-Analytical Solution Method for Investigation Dynamics of the Sphere with Inhomogeneous Initial Stresses

    Surkay D. Akbarov1,2, Hatam H. Guliyev3, Yusif M. Sevdimaliyev4, Nazmiye Yahnioglu5,*

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 359-380, 2018, DOI:10.3970/cmc.2018.00173

    Abstract The paper deals with a development of the discrete-analytical method for the solution of the dynamical problems of a hollow sphere with inhomogeneous initial stresses. The examinations are made with respect to the problem on the natural vibration of the hollow sphere the initial stresses in which is caused by internal and external uniformly distributed pressure. The initial stresses in the sphere are determined within the scope of the exact equations of elastostatics. It is assumed that after appearing this static initial stresses the sphere gets a dynamical excitation and mechanical behavior of the sphere caused by this excitation is… More >

  • Open Access

    ARTICLE

    Robust Image Hashing via Random Gabor Filtering and DWT

    Zhenjun Tang1,*, Man Ling1, Heng Yao1, Zhenxing Qian2, Xianquan Zhang1, Jilian Zhang3, Shijie Xu1

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 331-344, 2018, DOI:10.3970/cmc.2018.02222

    Abstract Image hashing is a useful multimedia technology for many applications, such as image authentication, image retrieval, image copy detection and image forensics. In this paper, we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform (DWT). Specifically, robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map, and then are compressed via a single-level 2-D DWT. Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band. Many experiments with open image datasets are carried out and the results illustrate… More >

  • Open Access

    ARTICLE

    Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB

    Qili Zhou1, Yongbin Qiu1, Li Li1,*, Jianfeng Lu1, Wenqiang Yuan1, Xiaoqing Feng2, Xiaoyang Mao3

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 151-163, 2018, DOI:10.3970/cmc.2018.055.151

    Abstract Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee security. To solve these problems, steganography using reversible texture synthesis based on seeded region growing and LSB is proposed. Secret information is embedded in the process of synthesizing texture image from the existing natural texture. Firstly, we refine the visual effect. Abnormality of synthetic texture cannot be fully prevented if no approach of controlling visual effect is applied in the process of generating synthetic texture.… More >

  • Open Access

    ARTICLE

    Modelling the Roles of Cewebrity Trust and Platform Trust in Consumers’ Propensity of Live-Streaming: An Extended TAM Method

    Donghui Li1, Guozheng Zhang1,*, Zeng Xu1, Yong Lan1, Yongdong Shi2, Zhiyao Liang2, Haiwen Chen3

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 137-150, 2018, DOI:10.3970/cmc.2018.055.137

    Abstract Live streaming is a booming industry in China, involving an increasing number of Internet users. Previous studies show that trust is a cornerstone to develop e-commerce. Trust in the streaming industry is different from that of other e-commerce areas. There are two major dimensions of trust in the live streaming context: platform trust and cewebrity trust, which are both important for customers to adopt and reuse a specific live streaming service. We collected questionnaire data from 520 participates who have used live streaming services in China. We model the collected data and identified factors that can influence users’ propensity by… More >

Displaying 7311-7320 on page 732 of 7427. Per Page