Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection

    Yue Zhang1, Dengpan Ye2, Junjun Gan1, Zhenyu Li3, Qingfeng Cheng1,*

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 151-167, 2018, DOI: 10.3970/cmc.2018.02464

    Abstract In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method, this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection. For the spatial image, this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain. Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography, and use the minimum distortion coding to realize the embedding of the secret messages.… More >

  • Open Access

    ARTICLE

    A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data

    Xiaonian Wu1,*, Chuyun Zhang3, Runlian Zhang2, Yujue Wang2, Jinhua Cui4

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 61-72, 2018, DOI: 10.3970/cmc.2018.02449

    Abstract There are two key issues in distributed intrusion detection system, that is, maintaining load balance of system and protecting data integrity. To address these issues, this paper proposes a new distributed intrusion detection model for big data based on nondestructive partitioning and balanced allocation. A data allocation strategy based on capacity and workload is introduced to achieve local load balance, and a dynamic load adjustment strategy is adopted to maintain global load balance of cluster. Moreover, data integrity is protected by using session reassemble and session partitioning. The simulation results show that the new model enjoys favorable advantages such as… More >

  • Open Access

    ARTICLE

    Detection of Graphene Cracks By Electromagnetic Induction, Insensitive to Doping Level

    Taeshik Yoon1,†, Sumin Kang1,†, Tae Yeob Kang1, Taek-Soo Kim1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.2, pp. 351-361, 2019, DOI:10.32604/cmes.2019.06672

    Abstract Detection of cracks is a great concern in production and operation processes of graphene based devices to ensure uniform quality. Here, we show a detection method for graphene cracks by electromagnetic induction. The time varying magnetic field leads to induced voltage signals on graphene, and the signals are detected by a voltmeter. The measured level of induced voltage is correlated with the number of cracks in graphene positively. The correlation is attributed to the increasing inductive characteristic of defective graphene, and it is verified by electromagnetic simulation and radio frequency analysis. Furthermore, we demonstrate that the induced voltage signal is… More >

  • Open Access

    ARTICLE

    A Hierarchy Distributed-Agents Model for Network Risk Evaluation Based on Deep Learning

    Jin Yang1, Tao Li1, Gang Liang1,*, Wenbo He2, Yue Zhao3

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.1, pp. 1-23, 2019, DOI:10.32604/cmes.2019.04727

    Abstract Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic, which is especially relevant in Network Intrusion Detection. In this paper, as enlightened by the theory of Deep Learning Neural Networks, Hierarchy Distributed-Agents Model for Network Risk Evaluation, a newly developed model, is proposed. The architecture taken on by the distributed-agents model are given, as well as the approach of analyzing network intrusion detection using Deep Learning, the mechanism of sharing hyper-parameters to improve the efficiency of learning is presented, and the hierarchical evaluative framework for Network Risk Evaluation of the proposed… More >

  • Open Access

    ARTICLE

    Structural Damage Detection Using a Modified Artificial Bee Colony Algorithm

    H.J. Xu1, Z.H. Ding1, Z.R. Lu1,2, J.K. Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.111, No.4, pp. 335-355, 2016, DOI:10.3970/cmes.2016.111.335

    Abstract An optimization approach based on Artificial Bee Colony (ABC) algorithm is proposed for structural local damage detection in this study. The objective function for the damage identification problem is established by structural parameters and modal assurance criteria (MAC). The ABC algorithm is presented to solve the certain objective function. Then the Tournament Selection Strategy and chaotic search mechanism is adopted to enhance global search ability of the certain algorithm. A coupled double-beam system is studied as numerical example to illustrate the correctness and efficiency of the propose method. The simulation results show that the modified ABC algorithm can identify the… More >

  • Open Access

    ARTICLE

    Active Cancellation Stealth Analysis Based on Cancellaty

    Mingxu Yi1, Lifeng Wang1,2, Yalin Pan1, Jun Huang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.109-110, No.5, pp. 427-446, 2015, DOI:10.3970/cmes.2015.109.427

    Abstract Active cancellation stealth is a significant developing direction in modern stealth technology field. In this paper, according to characteristics of linear frequency modulated (LFM) signal and nonlinear frequency modulated (NLFM) signal, the cancellation signal was designed. An important parameter called cancellaty which is used to measure the effect of cancellation is proposed. The basic theory of active cancellation stealth is introduced. Based on radar target fluctuation models, the formulas of the radar detection probability are given. Combining the definition of cancellaty with radar detection probability, the effective scope of the cancellaty is ensured. Simulation results show the effectiveness and the… More >

  • Open Access

    ARTICLE

    Method for Detecting Macroscopic Irregularities in Gears Based on Template Matching and the Nonequivalence Operation

    W.C. Wang1, F.L. Chang2, Y.L. Liu1, X. J. Wu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.107, No.5, pp. 411-431, 2015, DOI:10.3970/cmes.2015.107.411

    Abstract The detection of macroscopic irregularities is an essential procedure during the production of gears, and it helps to guarantee the quality of electromechanical transmission equipment. The working principles of template matching and the image nonequivalence operation are described in detail in this paper. Gray-level transformation, edge-preserving filtering, image segmentation, feature extraction, and pattern recognition were analyzed, leading to the design of a defect detection system based on template matching and the nonequivalence operation, followed by the development of a hardware platform and application software for the system. The experimental results indicate that the proposed detection system could perform fast detection… More >

  • Open Access

    ARTICLE

    Real-Time Moving Targets Detection in Dynamic Scenes

    Fan Li1, Yang Yang

    CMES-Computer Modeling in Engineering & Sciences, Vol.107, No.2, pp. 103-124, 2015, DOI:10.3970/cmes.2015.107.103

    Abstract The shift of the camera leads to unsteadiness of backgrounds in video sequences. The motion of camera will results in mixture of backgrounds and foregrounds motion. So it is a challenge for targets detection in dynamic scenes. A realtime moving target detection algorithm with low complexity in dynamic scenes is proposed in this paper. Sub-block based image registration is applied to remove the global motion of the video frame. Considering the blocks in one frame have different motion vectors, the global motion of each block is separately estimated. Then, a neighbor-based background modeling is applied to extract the moving objects.… More >

  • Open Access

    ARTICLE

    Compact Local IRBF and Domain Decomposition Method for solving PDEs using a Distributed termination detection based parallel algorithm

    N. Pham-Sy1, C.-D. Tran1, T.-T. Hoang-Trieu1, N. Mai-Duy1, T. Tran-Cong1

    CMES-Computer Modeling in Engineering & Sciences, Vol.92, No.1, pp. 1-31, 2013, DOI:10.3970/cmes.2013.092.001

    Abstract Compact Local Integrated Radial Basis Function (CLIRBF) methods based on Cartesian grids can be effective numerical methods for solving partial differential equations (PDEs) for fluid flow problems. The combination of the domain decomposition method and function approximation using CLIRBF methods yields an effective coarse-grained parallel processing approach. This approach has enabled not only each sub-domain in the original analysis domain to be discretised by a separate CLIRBF network but also compact local stencils to be independently treated. The present algorithm, namely parallel CLIRBF, achieves higher throughput in solving large scale problems by, firstly, parallel processing of sub-regions which constitute the… More >

  • Open Access

    ARTICLE

    Multiple-damage detection using the best achievable flexibility change

    Q.W.Yang1, J.K.Liu2, C.H. Li3

    CMES-Computer Modeling in Engineering & Sciences, Vol.91, No.4, pp. 313-335, 2013, DOI:10.3970/cmes.2013.091.313

    Abstract A method based on best achievable flexibility change is presented in this paper to localize and quantify multiple damages in structures. The key process of the damage localization approach is the computation of the Euclidean distances between the measured flexibility change and the best achievable flexibility changes. The location of damage can be identified by searching for a value that is considerably smaller than others in these distances. For the multiple-damage case, a sequential damage localization approach is proposed to locate the damage sites one by one. With the suspected damaged elements determined, the flexibility sensitivity method is employed to… More >

Displaying 1531-1540 on page 154 of 1580. Per Page