Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (391)
  • Open Access


    Analysis of the Efficiency-Energy with Regression and Classification in Household Using K-NN

    Qi Liu1,2, Zhiyun Yang1, Xiaodong Liu3, Scholas Mbonihankuye4,*

    Journal of New Media, Vol.1, No.2, pp. 101-113, 2019, DOI:10.32604/jnm.2019.06958

    Abstract This paper aims to study energy consumption in a house. Home energy man-agement system (HEMS) has become very important, because energy consumption of a residential sector accounts for a significant amount of total energy consumption. However, a conventional HEMS has some architectural limitations among dimensional variables reusability and interoperability. Furthermore, the cost of implementation in HEMS is very expensive, which leads to the disturbance of the spread of a HEMS. Therefore, this study proposes an Internet of Things (IoT) based HEMS with lightweight photovoltaic (PV) system over dynamic home area networks (DHANs), which enables the construction of a HEMS to… More >

  • Open Access


    T Application of MES System in the Safety Management of Offshore Oil and Gas Fields

    Yong Chen1,*, Lei Cui1, Chong Wang2

    Journal of Quantum Computing, Vol.1, No.1, pp. 41-48, 2019, DOI:10.32604/jqc.2019.06283

    Abstract In order to solve the problem of data island in the safety management of offshore oil and gas fields, take full advantage of data for subsequent analysis and development, and support production safety management of oil and gas fields, the MES, which is maturely applied in manufacturing and downstream production of CNOOC (China National Offshore Oil Corporation), is introduced by the petroleum administration at the eastern South China sea. The system adopts the real-time database and relational database to collect the scattered structured data, such as evidence information of offshore oil and gas production facilities personnel, on-site hidden danger information… More >

  • Open Access


    Contribution of Biomechanics to Management of Ligament and Tendon Injuries

    Savio L-Y. Woo∗,†, Matthew B. Fisher, Andrew J. Feola

    Molecular & Cellular Biomechanics, Vol.5, No.1, pp. 49-68, 2008, DOI:10.3970/mcb.2008.005.049

    Abstract The contribution of biomechanics to the advancement of management of ligament and tendon injuries has been significant. Thanks to Professor Y.C. Fung's writing and guidance, our field of research has done fundamental work on anatomy and biology of ligaments and tendons, developed methods to accurately determine mechanical properties, identified various experimental factors which could change the outcome measurements as well as examined biological factors that change tissue properties in-vivo. Professor Fung also gave us his quasi-linear viscoelastic theory for soft tissues so that the time and history dependent properties of ligaments and tendons could be properly described. More >

  • Open Access


    An Application-Oriented Buffer Management Strategy in Opportunistic Networks

    Meihua Liu1, Xinchen Zhang2,*, Shuangkui Ge3, Xiaoli Chen1, Jianbin Wu2, Mao Tian1

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 559-574, 2019, DOI:10.32604/cmc.2019.04843

    Abstract In Opportunistic networks (ONs), buffer management is critical to improve the message exchanging efficiency due to the limited storage space and transmission bandwidth at the wireless edge. Current solutions make message scheduling and drop policy based on assumptions that messages can always been forwarded in a single contact, and all node pairs have the same contact rates. However, such ideal assumptions are invalid for realistic mobility traces of hand-held. Recent studies show that the single contact duration is limited and the mobility of nodes is heterogeneous in reality. In this paper, a buffer management strategy based on contact duration and… More >

  • Open Access


    A Quantum Authorization Management Protocol Based on EPR-Pairs

    Yan Chang1,*, Shibin Zhang1, Lili Yan1, Guihua Han1, Haiquan Song1, Yan Zhang1, Xueyang Li1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1005-1014, 2019, DOI:10.32604/cmc.2019.06297

    Abstract Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed based on entanglement swapping. In… More >

  • Open Access


    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848

    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of a machine learning algorithm to… More >

  • Open Access


    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and complexity, more research is necessary.… More >

  • Open Access


    An Improved Memory Cache Management Study Based on Spark

    Suzhen Wang1, Yanpiao Zhang1, Lu Zhang1, Ning Cao2, *, Chaoyi Pang3

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 415-431, 2018, DOI: 10.3970/cmc.2018.03716

    Abstract Spark is a fast unified analysis engine for big data and machine learning, in which the memory is a crucial resource. Resilient Distribution Datasets (RDDs) are parallel data structures that allow users explicitly persist intermediate results in memory or on disk, and each one can be divided into several partitions. During task execution, Spark automatically monitors cache usage on each node. And when there is a RDD that needs to be stored in the cache where the space is insufficient, the system would drop out old data partitions in a least recently used (LRU) fashion to release more space. However,… More >

  • Open Access


    Tracking Features in Image Sequences with Kalman Filtering, Global Optimization, Mahalanobis Distance and a Management Model

    Raquel R. Pinho1, João Manuel R. S. Tavares1

    CMES-Computer Modeling in Engineering & Sciences, Vol.46, No.1, pp. 51-76, 2009, DOI:10.3970/cmes.2009.046.051

    Abstract This work addresses the problem of tracking feature points along image sequences. In order to analyze the undergoing movement, an approach based on the Kalman filtering technique has been used, which basically carries out the estimation and correction of the features' movement in every image frame. So as to integrate the measurements obtained from each image into the Kalman filter, a data optimization process has been adopted to achieve the best global correspondence set. The proposed criterion minimizes the cost of global matching, which is based on the Mahalanobis distance. A management model is employed to manage the features being… More >

  • Open Access


    A New Uncertain Optimization Method Based on Intervals and An Approximation Management Model

    C. Jiang1, X. Han1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.22, No.2, pp. 97-118, 2007, DOI:10.3970/cmes.2007.022.097

    Abstract A new uncertain optimization method is developed based on intervals and an approximation management model. A general uncertain optimization problem is considered in which the objective function and constraints are both nonlinear and uncertain, and intervals are used to model the uncertainty existing in the system. Based on a possibility degree of interval,anonlinear interval number programming (NINP) method is proposed. A deterministic objective function is constructed to maximize the possibility degree of the uncertain objective function, and the uncertain constraints are changed into deterministic ones by introducing some possibility degree levels. If the optimal possibility degree of the objective function… More >

Displaying 381-390 on page 39 of 391. Per Page