Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (557)
  • Open Access

    ARTICLE

    Simulation of Dynamic Failure Evolution in Brittle Solids without Using Nonlocal Terms in the Strain-Stress Space

    Z. Chen1, W. Hu1, E.P. Chen2

    CMES-Computer Modeling in Engineering & Sciences, Vol.1, No.4, pp. 57-62, 2000, DOI:10.3970/cmes.2000.001.509

    Abstract To simulate the dynamic failure evolution without using nonlocal terms in the strain-stress space, a damage diffusion equation is formulated with the use of a combined damage/plasticity model that was primarily applied to the case of rock fragmentation. A vectorized model solver is developed for large-scale simulation. Two-dimensional sample problems are considered to illustrate the features of the proposed solution procedure. It appears that the proposed approach is effective in simulating the evolution of localization, with parallel computing, in a single computational domain involving different lower-order governing differential equations. More >

  • Open Access

    ARTICLE

    An Analytical Method for Computing the One-Dimensional Backward Wave Problem

    Chein-ShanLiu1

    CMC-Computers, Materials & Continua, Vol.13, No.3, pp. 219-234, 2009, DOI:10.3970/cmc.2009.013.219

    Abstract The present paper reveals a new computational method for the illposed backward wave problem. The Fourier series is used to formulate a first-kind Fredholm integral equation for the unknown initial data of velocity. Then, we consider a direct regularization to obtain a second-kind Fredholm integral equation. The termwise separable property of kernel function allows us to obtain an analytical solution of regularization type. The sufficient condition of the data for the existence and uniqueness of solution is derived. The error estimate of the regularization solution is provided. Some numerical results illustrate the performance of the new method. More >

  • Open Access

    ARTICLE

    A Heterogeneous Virtual Machines Resource Allocation Scheme in Slices Architecture of 5G Edge Datacenter

    Changming Zhao1,2,*, Tiejun Wang2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 423-437, 2019, DOI:10.32604/cmc.2019.07501

    Abstract In the paper, we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment. In general, the different slices for different task scenarios exist in the same edge layer synchronously. A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity. In the condition, the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment. Based on the slicing and container concept, we propose the resource allocation scheme named Two-Dimension allocation and… More >

  • Open Access

    ARTICLE

    An Improved Method for Web Text Affective Cognition Computing Based on Knowledge Graph

    Bohan Niu1,*, Yongfeng Huang2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06032

    Abstract The goal of research on the topics such as sentiment analysis and cognition is to analyze the opinions, emotions, evaluations and attitudes that people hold about the entities and their attributes from the text. The word level affective cognition becomes an important topic in sentiment analysis. Extracting the (attribute, opinion word) binary relationship by word segmentation and dependency parsing, and labeling those by existing emotional dictionary combined with webpage information and manual annotation, this paper constitutes a binary relationship knowledge base. By using knowledge embedding method, embedding each element in (attribute, opinion, opinion word) as a word vector into the… More >

  • Open Access

    ARTICLE

    Some Topological Indices Computing Results If Archimedean Lattices L(4,6,12)

    Kang Qiong1,*, Xinting Li2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 121-133, 2019, DOI:10.32604/cmc.2019.03723

    Abstract The introduction of graph-theoretical structure descriptors represents an important step forward in the research of predictive models in chemistry and falls within the lines of the increasing use of mathematical and computational methods in contemporary chemistry. The basis for these models is the study of the quantitative structure-property and structure-activity relationship. In this paper, we investigate Great rhom-bitrihexagonal which is a kind of dodecagon honeycomb net-work covered by quadrangle and hexagon. Many topological indexes of Great rhom-bitrihexagonal have being investigated, such as sum-connectivity index, atom-bond connectivity index, geometric-arithmetic index, fifth, harmonic index, Randić connectivity index, first Zagreb index, second Zagreb… More >

  • Open Access

    ARTICLE

    A Method of Identifying Thunderstorm Clouds in Satellite Cloud Image Based on Clustering

    Lili He1,2, Dantong Ouyang1,2, Meng Wang1,2, Hongtao Bai1,2, Qianlong Yang1,2, Yaqing Liu3,4, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 549-570, 2018, DOI:10.32604/cmc.2018.03840

    Abstract In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method of spectral threshold recognition and… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

  • Open Access

    ARTICLE

    Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

    Chak Fong Cheang1,*, Yiqin Wang1, Zhiping Cai2, Gen Xu1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 297-306, 2018, DOI:10.32604/cmc.2018.03808

    Abstract Cloud computing provides easy and on-demand access to computing resources in a configurable pool. The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines (VMs), instead of being restricted on a single physical server. When more and more network services are deployed on the cloud, the detection of the intrusion likes Distributed Denial-of-Service (DDoS) attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system. In this paper, we… More >

  • Open Access

    ARTICLE

    A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

    Yongli Tang1, Huanhuan Lian1, Zemao Zhao2, Xixi Yan1,*

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 339-352, 2018, DOI: 10.3970/cmc.2018.02965

    Abstract With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted… More >

  • Open Access

    ARTICLE

    On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

    Lizhi Xiong1,*, Yunqing Shi2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 523-539, 2018, DOI: 10.3970/cmc.2018.01791

    Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding schemes are proposed for encrypted… More >

Displaying 541-550 on page 55 of 557. Per Page