Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access


    Weak Fault Feature Extraction of the Rotating Machinery Using Flexible Analytic Wavelet Transform and Nonlinear Quantum Permutation Entropy

    Lili Bai1,*, Wenhui Li1, He Ren1,2, Feng Li1, Tao Yan1, Lirong Chen3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4513-4531, 2024, DOI:10.32604/cmc.2024.051348

    Abstract Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery, where weak fault characteristic signals hinder accurate fault state representation, we propose a novel feature extraction method that combines the Flexible Analytic Wavelet Transform (FAWT) with Nonlinear Quantum Permutation Entropy. FAWT, leveraging fractional orders and arbitrary scaling and translation factors, exhibits superior translational invariance and adjustable fundamental oscillatory characteristics. This flexibility enables FAWT to provide well-suited wavelet shapes, effectively matching subtle fault components and avoiding performance degradation associated with fixed frequency partitioning and low-oscillation bases in detecting weak faults. In our approach,… More >

  • Open Access


    Cloud Resource Integrated Prediction Model Based on Variational Modal Decomposition-Permutation Entropy and LSTM

    Xinfei Li2, Xiaolan Xie1,2,*, Yigang Tang2, Qiang Guo1,2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2707-2724, 2023, DOI:10.32604/csse.2023.037351

    Abstract Predicting the usage of container cloud resources has always been an important and challenging problem in improving the performance of cloud resource clusters. We proposed an integrated prediction method of stacking container cloud resources based on variational modal decomposition (VMD)-Permutation entropy (PE) and long short-term memory (LSTM) neural network to solve the prediction difficulties caused by the non-stationarity and volatility of resource data. The variational modal decomposition algorithm decomposes the time series data of cloud resources to obtain intrinsic mode function and residual components, which solves the signal decomposition algorithm’s end-effect and modal confusion problems.… More >

  • Open Access


    Short-Term Prediction of Photovoltaic Power Generation Based on LMD Permutation Entropy and Singular Spectrum Analysis

    Wenchao Ma*

    Energy Engineering, Vol.120, No.7, pp. 1685-1699, 2023, DOI:10.32604/ee.2023.025404

    Abstract The power output state of photovoltaic power generation is affected by the earth's rotation and solar radiation intensity. On the one hand, its output sequence has daily periodicity; on the other hand, it has discrete randomness. With the development of new energy economy, the proportion of photovoltaic energy increased accordingly. In order to solve the problem of improving the energy conversion efficiency in the grid-connected optical network and ensure the stability of photovoltaic power generation, this paper proposes the short-term prediction of photovoltaic power generation based on the improved multi-scale permutation entropy, local mean decomposition… More >

  • Open Access


    Modified 2 Satisfiability Reverse Analysis Method via Logical Permutation Operator

    Siti Zulaikha Mohd Jamaludin1, Mohd. Asyraf Mansor2, Aslina Baharum3,*, Mohd Shareduwan Mohd Kasihmuddin1, Habibah A. Wahab4, Muhammad Fadhil Marsani1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2853-2870, 2023, DOI:10.32604/cmc.2023.032654

    Abstract The effectiveness of the logic mining approach is strongly correlated to the quality of the induced logical representation that represent the behaviour of the data. Specifically, the optimum induced logical representation indicates the capability of the logic mining approach in generalizing the real datasets of different variants and dimensions. The main issues with the logic extracted by the standard logic mining techniques are lack of interpretability and the weakness in terms of the structural and arrangement of the 2 Satisfiability logic causing lower accuracy. To address the issues, the logical permutation serves as an alternative… More >

  • Open Access


    DWT-SVD Based Image Steganography Using Threshold Value Encryption Method

    Jyoti Khandelwal1, Vijay Kumar Sharma1, Dilbag Singh2,*, Atef Zaguia3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3299-3312, 2022, DOI:10.32604/cmc.2022.023116

    Abstract Digital image steganography technique based on hiding the secret data behind of cover image in such a way that it is not detected by the human visual system. This paper presents an image scrambling method that is very useful for grayscale secret images. In this method, the secret image decomposes in three parts based on the pixel's threshold value. The division of the color image into three parts is very easy based on the color channel but in the grayscale image, it is difficult to implement. The proposed image scrambling method is implemented in image More >

  • Open Access


    Hyperchaos and MD5 Based Efficient Color Image Cipher

    Muhammad Samiullah1, Waqar Aslam1, Saima Sadiq2, Arif Mehmood1, Gyu Sang Choi3,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1645-1670, 2022, DOI:10.32604/cmc.2022.021019

    Abstract While designing and developing encryption algorithms for text and images, the main focus has remained on security. This has led to insufficient attention on the improvement of encryption efficiency, enhancement of hyperchaotic sequence randomness, and dynamic DNA-based S-box. In this regard, a new symmetric block cipher scheme has been proposed. It uses dynamic DNA-based S-box connected with MD5 and a hyperchaotic system to produce confusion and diffusion for encrypting color images. Our proposed scheme supports various size color images. It generates three DNA based S-boxes for substitution namely DNA_1_s-box, DNA_2_s-box and DNA_3_s-box, each of size… More >

  • Open Access


    A Novel Medical Image Encryption Using Rössler System

    K. Sundara Krishnan1,*, Syed Suhaila1, S. P. Raja2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1081-1101, 2022, DOI:10.32604/iasc.2022.024023

    Abstract The technological advances made possible by the Internet, coupled with the unforeseen critical circumstances set in motion by the Covid-19 pandemic, have greatly increased the generation and transmission of medical images every day. Medical image transmission over an unsecured public network threatens the privacy of sensitive patient information. We have, in this paper, designed a new secure color medical image encryption algorithm based on binary plane decomposition, DNA (deoxyribonucleic acid) computing, and the chaotic Rössler dynamical system. At first, a bit-by-bit swap is performed on twenty four binary planes of the input image and encoded… More >

  • Open Access


    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation… More >

  • Open Access


    Applying and Comparison of Chaotic-Based Permutation Algorithms for Audio Encryption

    Osama M. Abu Zaid1,*, Medhat A. Tawfeek2,3, Saad Alanazi2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3161-3176, 2021, DOI:10.32604/cmc.2021.015175

    Abstract This research presents, and clarifies the application of two permutation algorithms, based on chaotic map systems, and applied to a file of speech signals. They are the Arnold cat map-based permutation algorithm, and the Baker’s chaotic map-based permutation algorithm. Both algorithms are implemented on the same speech signal sample. Then, both the premier and the encrypted file histograms are documented and plotted. The speech signal amplitude values with time signals of the original file are recorded and plotted against the encrypted and decrypted files. Furthermore, the original file is plotted against the encrypted file, using… More >

  • Open Access


    Space-Time Cluster Analysis of Accidental Oil Spills in Rivers State, Nigeria, 2011–2019

    Sami Ullah1, Hanita Daud1, Nooraini Zainuddin1, Sarat C. Dass2, Alamgir Khalil3, Hadi Fanaee-T4, Ilyas Khan5,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3065-3074, 2021, DOI:10.32604/cmc.2021.012624

    Abstract Oil spills cause environmental pollution with a serious threat to local communities and sustainable development. Accidental oil spills can be modelled as a stochastic process where each oil spill event is described by its spatial locations and incidence-time and hence allow for space-time cluster analysis. Space-time cluster analysis can detect space-time pattern distribution of oil spills which can be useful for implementing preventive measures and evidence-based decision making. This study aims to detect the space-time clusters of accidental oil spills in Rivers state, Nigeria through the Space-time Scan Statistic. The Space-time Scan Statistic was applied… More >

Displaying 1-10 on page 1 of 12. Per Page