Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Multilayer Self-Defense System to Protect Enterprise Cloud

    Shailendra Mishra, Sunil Kumar Sharma*, Majed A. Alowaidi

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 71-85, 2021, DOI:10.32604/cmc.2020.012475

    Abstract A data breach can seriously impact organizational intellectual property, resources, time, and product value. The risk of system intrusion is augmented by the intrinsic openness of commonly utilized technologies like TCP/IP protocols. As TCP relies on IP addresses, an attacker may easily trace the IP address of the organization. Given that many organizations run the risk of data breach and cyber-attacks at a certain point, a repeatable and well-developed incident response framework is critical to shield them. Enterprise cloud possesses the challenges of security, lack of transparency, trust and loss of controls. Technology eases quickens the processing of information but… More >

  • Open Access

    ARTICLE

    Fingerprint-Based Millimeter-Wave Beam Selection for Interference Mitigation in Beamspace Multi-User MIMO Communications

    Sangmi Moon1, Hyeonsung Kim1, Seng-Phil Hong2, Mingoo Kang3, Intae Hwang1,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 59-70, 2021, DOI:10.32604/cmc.2020.013132

    Abstract Millimeter-wave communications are suitable for application to massive multiple-input multiple-output systems in order to satisfy the ever-growing data traffic demands of the next-generation wireless communication. However, their practical deployment is hindered by the high cost of complex hardware, such as radio frequency (RF) chains. To this end, operation in the beamspace domain, through beam selection, is a viable solution. Generally, the conventional beam selection schemes focus on the feedback and exhaustive search techniques. In addition, since the same beam in the beamspace may be assigned to a different user, conventional beam selection schemes suffer serious multi-user interference. In addition, some… More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue Numerical Modeling and Simulation for Structural Safety and Disaster Mitigation

    Xiaodan Ren1,*, Tiancan Huang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.2, pp. 411-413, 2020, DOI:10.32604/cmes.2020.012603

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Novel Method for Vibration Mitigation of Complex Mechanical Systems

    Cheng Hu*

    Sound & Vibration, Vol.53, No.5, pp. 199-206, 2019, DOI:10.32604/sv.2019.07712

    Abstract Taking the complex mechanical systems as the research project, a theoretical multi-degree-of-freedom (MDOF) model was established. Based on the vibration characteristics analysis of this system, a novel method of vibration mitigation was proposed, which can be applied to most of the complex mechanical systems. Through this method, limited grounding stiffness was made use of and added to certain degree of freedom (DOF) discretely. Thus, the root-meansquare (RMS) of the systems amplitude can be reduced to ideal level. The MATLAB code based on this method was attached, which was tested on the theoretical model. Consider that complex mechanical systems are nonlinear… More >

  • Open Access

    ARTICLE

    Security Analysis of Smart Speaker: Security Attacks and Mitigation

    Youngseok Park1, Hyunsang Choi1, Sanghyun Cho1, Young-Gab Kim2,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1075-1090, 2019, DOI:10.32604/cmc.2019.08520

    Abstract The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack… More >

  • Open Access

    ARTICLE

    Moving Particle Simulation for Mitigation of Sloshing Impact Loads Using Surface Floaters

    B.-H. Lee1, J.-C. Park2, M.-H. Kim3, S.-C. Hwang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.75, No.2, pp. 89-112, 2011, DOI:10.3970/cmes.2011.075.089

    Abstract The violent free-surface motions and the corresponding impact loads are numerically simulated by using the refined Moving Particle Simulation (MPS) method, which was originally proposed by Koshizuka and Oka (1996) for incompressible flows. In the present method, accuracy and efficiency are significantly improved compared to the original MPS method by using optimal source term, optimal gradient and collision models, and improved solid-boundary treatment and search of free-surface particles. The refined MPS method was verified through comparisons against Kishev et al.'s (2006) sloshing experiment. It is also demonstrated that the refined MPS method is excellent in mass conservation regardless of length… More >

Displaying 21-30 on page 3 of 26. Per Page