Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    An Intelligent Hybrid Mutual Authentication Scheme for Industrial Internet of Thing Networks

    Muhammad Adil1, Jehad Ali2, Muhammad Sajjad Khan3, Junsu Kim3, Ryan Alturki4, Mohammad Zakarya4, Mukhtaj Khan4, Rahim Khan4, Su Min Kim3,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967 - 22 March 2021

    Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and More >

  • Open Access

    ARTICLE

    Nodes Effect on the Bending Performance of Laminated Bamboo Lumber Unit

    Yiwei Xuan1,3, Haitao Li1,*, Zhemin Bei1, Zhenhua Xiong2, Rodolfo Lorenzo4, Ileana Corbi5, Ottavia Corbi5

    Journal of Renewable Materials, Vol.9, No.6, pp. 1143-1156, 2021, DOI:10.32604/jrm.2021.015292 - 11 March 2021

    Abstract This research studied the ultimate bearing capacity of laminated bamboo lumber (LBL) unit and thereby calculated the maximum bending moment. The load-displacement chart for all specimens was obtained. Then the flexural capacity of members with and without bamboo nodes in the middle section was coMPared. The bending experiment phenomenon of LBL unit was concluded. Different failure modes of bending components were analysed and concluded. Finally, the bending behaviour of LBL units is coMPared with other bamboo and timber products. It is shown that the average ultimate load of BS members is 866.1 N, the average… More >

  • Open Access

    ARTICLE

    A Meshless Collocation Method with Barycentric Lagrange Interpolation for Solving the Helmholtz Equation

    Miaomiao Yang, Wentao Ma, Yongbin Ge*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 25-54, 2021, DOI:10.32604/cmes.2021.012575 - 22 December 2020

    Abstract In this paper, Chebyshev interpolation nodes and barycentric Lagrange interpolation basis function are used to deduce the scheme for solving the Helmholtz equation. First of all, the interpolation basis function is applied to treat the spatial variables and their partial derivatives, and the collocation method for solving the second order differential equations is established. Secondly, the differential equations on a given test node. Finally, based on three kinds of test nodes, numerical experiments show that the present scheme can not only calculate the high wave numbers problems, but also calculate the variable wave numbers problems. More >

  • Open Access

    ARTICLE

    A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network

    Gundala Swathi*

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 335-345, 2020, DOI:10.32604/csse.2020.35.335

    Abstract Researches in wireless mobile ad hoc networks have an inherent challenge of vulnerable diagnosis due to the diverse behaviour pattern of the vulnerable nodes causing heterogeneous vtype1, vtype2, vtupe3 and vtype4 faults. This paper proposes a protocol for the diagnosis of vulnerability nodes with threephases of clustering, vulnerable detection and vulnerable fault classification in wireless networks. This protocol employs the technique of probabilistic neural network for classification of vulnerable nodes and detects vulnerable nodes through timeout mechanism and vtype3, vtype4, vtype1, vtype2 nodes through the method of analysis variance. Network simulator NS-2.3.35 is employed for More >

  • Open Access

    ARTICLE

    3-Dimensional Bag of Visual Words Framework on Action Recognition

    Shiqi Wang1, Yimin Yang1, *, Ruizhong Wei1, Qingming Jonathan Wu2

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1081-1091, 2020, DOI:10.32604/cmc.2020.09648 - 30 April 2020

    Abstract Human motion recognition plays a crucial role in the video analysis framework. However, a given video may contain a variety of noises, such as an unstable background and redundant actions, that are completely different from the key actions. These noises pose a great challenge to human motion recognition. To solve this problem, we propose a new method based on the 3-Dimensional (3D) Bag of Visual Words (BoVW) framework. Our method includes two parts: The first part is the video action feature extractor, which can identify key actions by analyzing action features. In the video action More >

  • Open Access

    ARTICLE

    An Influence Maximization Algorithm Based on the Influence Propagation Range of Nodes

    Yong Hua1,Bolun Chen1,2,∗,Yan Yuan1, Guochang Zhu1, Fenfen Li1

    Journal on Internet of Things, Vol.1, No.2, pp. 77-88, 2019, DOI:10.32604/jiot.2019.05941

    Abstract The problem of influence maximization in the social network G is to find k seed nodes with the maximum influence. The seed set S has a wider range of influence in the social network G than other same-size node sets. The influence of a node is usually established by using the IC model (Independent Cascade model) with a considerable amount of Monte Carlo simulations used to approximate the influence of the node. In addition, an approximate effect (1-1/e) is obtained, when the number of Monte Carlo simulations is 10000 and the probability of propagation is More >

  • Open Access

    ARTICLE

    An Influence Maximization Algorithm Based on the Mixed Importance of Nodes

    Yong Hua1, Bolun Chen1,2,*, Yan Yuan1, Guochang Zhu1, Jialin Ma1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 517-531, 2019, DOI:10.32604/cmc.2019.05278

    Abstract The influence maximization is the problem of finding k seed nodes that maximize the scope of influence in a social network. Therefore, the comprehensive influence of node needs to be considered, when we choose the most influential node set consisted of k seed nodes. On account of the traditional methods used to measure the influence of nodes, such as degree centrality, betweenness centrality and closeness centrality, consider only a single aspect of the influence of node, so the influence measured by traditional methods mentioned above of node is not accurate. In this paper, we obtain the More >

  • Open Access

    ARTICLE

    A Novel Multi-Hop Algorithm for Wireless Network with Unevenly Distributed Nodes

    Yu Liu1, Zhong Yang2, Xiaoyong Yan3, Guangchi Liu4, Bo Hu5,*

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 79-100, 2019, DOI:10.32604/cmc.2019.03626

    Abstract Node location estimation is not only the promise of the wireless network for target recognition, monitoring, tracking and many other applications, but also one of the hot topics in wireless network research. In this paper, the localization algorithm for wireless network with unevenly distributed nodes is discussed, and a novel multi-hop localization algorithm based on Elastic Net is proposed. The proposed approach is formulated as a regression problem, which is solved by Elastic Net. Unlike other previous localization approaches, the proposed approach overcomes the shortcomings of traditional approaches assume that nodes are distributed in regular… More >

  • Open Access

    ARTICLE

    A New Anisotropic Local Meshing Method and Its Application in Parametric Surface Triangulation

    W.W. Zhang1, Y.F. Nie1, Y.Q. Li1

    CMES-Computer Modeling in Engineering & Sciences, Vol.88, No.6, pp. 507-530, 2012, DOI:10.3970/cmes.2012.088.507

    Abstract A new algorithm for anisotropic triangular meshes generation in two dimension is presented. The inputs to the algorithm are the boundary geometry information and a metric tensor that specifies the desired element size and shape. The initial nodes are firstly distributed according to the above mentioned geometrical information, after bubble simulation, the optimized nodes set that meets the requirements of the metric tensor is obtained quickly. Then taking full advantage of the nodes set and the adjacency lists information provided by the process of node placement, a handful of non-satellite nodes are removed from the… More >

  • Open Access

    ARTICLE

    Arbitrary Placement of Secondary Nodes, and Error Control, in the Meshless Local Petrov-Galerkin (MLPG) Method

    H.-G. Kim, S. N. Atluri1

    CMES-Computer Modeling in Engineering & Sciences, Vol.1, No.3, pp. 11-32, 2000, DOI:10.3970/cmes.2000.001.313

    Abstract The truly meshless local Petrov-Galerkin (MLPG) method holds a great promise in solving boundary value problems, using a local symmetric weak form as a natural approach. In the present paper, in the context of MLPG and the meshless interpolation of a moving least squares (MLS) type, a method which uses primary and secondary nodes in the domain and on the global boundary is introduced, in order to improve the accuracy of solution. The secondary nodes can be placed at any location where one needs to obtain a better resolution. The sub-domains for the shape functions… More >

Displaying 31-40 on page 4 of 40. Per Page