Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (426)
  • Open Access

    ARTICLE

    Ensuring Readability of Electronic Records Based on Virtualization Technology in Cloud Storage

    Qirun Wang1,2, Fujian Zhu3,4, Yan Leng3,4, Yongjun Ren3,4,*, Jinyue Xia5

    Journal on Internet of Things, Vol.1, No.1, pp. 33-39, 2019, DOI:10.32604/jiot.2019.05898

    Abstract With the rapid development of E-commerce and E-government, there are so many electronic records have been produced. The increasing number of electronic records brings about storage difficulties, the traditional electronic records center is difficult to cope with the current fast growth requirements of electronic records storage and management. Therefore, it is imperative to use cloud storage technology to build electronic record centers. However, electronic records also have weaknesses in the cloud storage environment, and one of them is that once electronic record owners or managers lose physical control of them, the electronic records are more likely to be tampered with… More >

  • Open Access

    ARTICLE

    Ground-Based Cloud Recognition Based on Dense_SIFT Features

    Zhizheng Zhang1, Jing Feng1,*, Jun Yan2, Xiaolei Wang1, Xiaocun Shu1

    Journal of New Media, Vol.1, No.1, pp. 1-9, 2019, DOI:10.32604/jnm.2019.05937

    Abstract Clouds play an important role in modulating radiation processes and climate changes in the Earth's atmosphere. Currently, measurement of meteorological elements such as temperature, air pressure, humidity, and wind has been automated. However, the cloud's automatic identification technology is still not perfect. Thus, this paper presents an approach that extracts dense scale-invariant feature transform (Dense_SIFT) as the local features of four typical cloud images. The extracted cloud features are then clustered by K-means algorithm, and the bag-of-words (BoW) model is used to describe each ground-based cloud image. Finally, support vector machine (SVM) is used for classification and recognition. Based on… More >

  • Open Access

    ARTICLE

    Fuzzy Search for Multiple Chinese Keywords in Cloud Environment

    Zhongjin Fang1, 2, Jinwei Wang1, *, Baowei Wang1, Jianjun Zhang3, Yunqing Shi4

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 351-363, 2019, DOI:10.32604/cmc.2019.07106

    Abstract With the continuous development of cloud computing and big data technology, the use of cloud storage is more and more extensive, and a large amount of data is outsourced for public cloud servers, and the security problems that follow are gradually emerging. It can not only protect the data privacy of users, but also realize efficient retrieval and use of data, which is an urgent problem for cloud storage. Based on the existing fuzzy search and encrypted data fuzzy search schemes, this paper uses the characteristics of fuzzy sounds and polysemy that are unique to Chinese, and realizes the synonym… More >

  • Open Access

    ARTICLE

    A Cross-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1,*, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 395-408, 2019, DOI:10.32604/cmc.2019.05627

    Abstract Tenants in the cloud computing environment share various services, including storage, network, computing, and applications. For better use of services in the cloud computing environment, tenants collaborate in tasks, resulting in challenges to the traditional access control. This study proposes a cross-tenant role-based access control (CT-RBAC) model for collaborative cloud services. This model covers the CT-RBAC0, CT-RBAC1, CT-RBAC2, and CT-RBAC3 models. The model not only extends the RBAC model in the multi-tenant cloud computing mode but also includes four types of authorization modes among tenants. Consequently, the role inheritance constraint is increased, and fine-grained authorization access among trusted tenants is… More >

  • Open Access

    ARTICLE

    Development of Cloud Based Air Pollution Information System Using Visualization

    SangWook Han1, JungYeon Seo1, Dae-Young Kim2, SeokHoon Kim3, HwaMin Lee3,*

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 697-711, 2019, DOI:10.32604/cmc.2019.06071

    Abstract Air pollution caused by fine dust is a big problem all over the world and fine dust has a fatal impact on human health. But there are too few fine dust measuring stations and the installation cost of fine dust measuring station is very expensive. In this paper, we propose Cloud-based air pollution information system using R. To measure fine dust, we have developed an inexpensive measuring device and studied the technique to accurately measure the concentration of fine dust at the user’s location. And we have developed the smartphone application to provide air pollution information. In our system, we… More >

  • Open Access

    ARTICLE

    Network Security Situation Awareness Framework based on Threat Intelligence

    Hongbin Zhang1, 2, Yuzi Yi1, *, Junshe Wang1, Ning Cao3, *, Qiang Duan4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 381-399, 2018, DOI: 10.3970/cmc.2018.03787

    Abstract Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of… More >

  • Open Access

    ARTICLE

    Machine Learning Based Resource Allocation of Cloud Computing in Auction

    Jixian Zhang1, Ning Xie1, Xuejie Zhang1, Kun Yue1, Weidong Li2,*, Deepesh Kumar3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 123-135, 2018, DOI: 10.3970/cmc.2018.03728

    Abstract Resource allocation in auctions is a challenging problem for cloud computing. However, the resource allocation problem is NP-hard and cannot be solved in polynomial time. The existing studies mainly use approximate algorithms such as PTAS or heuristic algorithms to determine a feasible solution; however, these algorithms have the disadvantages of low computational efficiency or low allocate accuracy. In this paper, we use the classification of machine learning to model and analyze the multi-dimensional cloud resource allocation problem and propose two resource allocation prediction algorithms based on linear and logistic regressions. By learning a small-scale training set, the prediction model can… More >

  • Open Access

    ARTICLE

    An Advanced Quantum-Resistant Signature Scheme for Cloud Based on Eisenstein Ring

    Faguo Wu1,2, Xiao Zhang1,2, Wang Yao1,2, Zhiming Zheng1,2, Lipeng Xiang3, Wanpeng Li4

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 19-34, 2018, DOI: 10.3970/cmc.2018.02664

    Abstract Signature, widely used in cloud environment, describes the work as readily identifying its creator. The existing signature schemes in the literature mostly rely on the Hardness assumption which can be easily solved by quantum algorithm. In this paper, we proposed an advanced quantum-resistant signature scheme for Cloud based on Eisenstein Ring (ETRUS) which ensures our signature scheme proceed in a lattice with higher density. We proved that ETRUS highly improve the performance of traditional lattice signature schemes. Moreover, the Norm of polynomials decreases significantly in ETRUS which can effectively reduce the amount of polynomials convolution calculation. Furthermore, storage complexity of… More >

  • Open Access

    ARTICLE

    Aerodynamic Characteristics Calculation and Diffusion Law Analysis of Rectangular-Chaff Clouds Under Airflow

    Biao Wang1,*, Yongjian Yang1, Hesong Huang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.3, pp. 649-678, 2019, DOI:10.31614/cmes.2019.05671

    Abstract To calculate the diffusion law of chaff cloud launched by aircraft, taking rectangular chaff as an example, the diffusion model of chaff cloud is established in this paper. Firstly, the coordinate systems of chaff are defined and the motion model of chaff is established. The motion model mainly includes chaff motion equation and rotation equation, which are obtained by combining the aerodynamic moment and aerodynamic damping. Then, the influence of multi-chaff aerodynamic interference on the movement of chaff is analyzed. Finally, considering the influence of overlap area between chaffs and chaff spacing on the aerodynamic coefficients, the multi-chaff motion model… More >

  • Open Access

    ARTICLE

    The Reproducing Kernel DMS-FEM: 3D Shape Functions and Applications to Linear Solid Mechanics

    Sunilkumar N1, D Roy1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.66, No.3, pp. 249-284, 2010, DOI:10.3970/cmes.2010.066.249

    Abstract We propose a family of 3D versions of a smooth finite element method (Sunilkumar and Roy 2010), wherein the globally smooth shape functions are derivable through the condition of polynomial reproduction with the tetrahedral B-splines (DMS-splines) or tensor-product forms of triangular B-splines and 1D NURBS bases acting as the kernel functions. While the domain decomposition is accomplished through tetrahedral or triangular prism elements, an additional requirement here is an appropriate generation of knotclouds around the element vertices or corners. The possibility of sensitive dependence of numerical solutions to the placements of knotclouds is largely arrested by enforcing the condition of… More >

Displaying 401-410 on page 41 of 426. Per Page