Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Resource Allocation and Power Control Policy for Device-toDevice Communication Using Multi-Agent Reinforcement Learning

    Yifei Wei1, *, Yinxiang Qu1, Min Zhao1, Lianping Zhang2, F. Richard Yu3

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1515-1532, 2020, DOI:10.32604/cmc.2020.09130

    Abstract Device-to-Device (D2D) communication is a promising technology that can reduce the burden on cellular networks while increasing network capacity. In this paper, we focus on the channel resource allocation and power control to improve the system resource utilization and network throughput. Firstly, we treat each D2D pair as an independent agent. Each agent makes decisions based on the local channel states information observed by itself. The multi-agent Reinforcement Learning (RL) algorithm is proposed for our multi-user system. We assume that the D2D pair do not possess any information on the availability and quality of the resource block to be selected,… More >

  • Open Access

    ARTICLE

    Media and Mental Health Literacy: Do Mediated Interventions Enhance Mental Health Awareness? Implications and Policy Recommendations

    Arooj Arshad1,*, Mian Ahmad Hanan2,*, Noshina Saleem3, Saima Farzooq4, Remsha Fatima5

    International Journal of Mental Health Promotion, Vol.21, No.3, pp. 99-109, 2019, DOI:10.32604/IJMHP.2019.010834

    Abstract In the current digital era, public health campaigns using media has been very successful in giving knowledge and changes the attitudes of people. But till now scarce literature is available related to media campaigns about mental health. In this study Pre-Post Quasi Experimental Design using vignettes as a data collection measure were employed. The participants were categories in to experimental (n = 138) and control (n = 134) groups having 18–55 years of age to evaluate the efficiency of media mediated interventions using social media campaign in increasing Mental Health Literacy (MHL). The results from nonparametric chi-square test indicated that… More >

  • Open Access

    ARTICLE

    An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update

    Changji Wang1, *, Yuan Yuan2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 1031-1041, 2020, DOI:10.32604/cmc.2020.06278

    Abstract Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud. However, when applying CP-ABE to data outsourcing scenarios, we have to address the challenging issue of policy updates because access control elements, such as users, attributes, and access rules may change frequently. In this paper, we propose a notion of access policy updatable ciphertext-policy attribute-based encryption (APU-CP-ABE) by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption. When an access policy update occurs, data owner is no longer required to download any data for… More >

  • Open Access

    ARTICLE

    Access Control Policy Based on Friend Circle

    Qin Liu1, Tinghuai Ma1, 2, *, Fan Xing1, Yuan Tian3, Abdullah Al-Dhelaan3, Mohammed Al-Dhelaan3

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1143-1159, 2020, DOI:10.32604/cmc.2020.04949

    Abstract Nowadays, the scale of the user’s personal social network (personal network, a network of the user and their friends, where the user we call “center user”) is becoming larger and more complex. It is difficult to find a suitable way to manage them automatically. In order to solve this problem, we propose an access control model for social network to protect the privacy of the central users, which achieves the access control accurately and automatically. Based on the hybrid friend circle detection algorithm, we consider the aspects of direct judgment, indirect trust judgment and malicious users, a set of multi-angle… More >

  • Open Access

    ARTICLE

    The Volatility of High-Yield Bonds Using Mixed Data Sampling Methods

    Maojun Zhang1,2, Jiajin Yao1, Zhonghang Xia3, Jiangxia Nan1,*, Cuiqing Zhang1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1233-1244, 2019, DOI:10.32604/cmc.2019.06118

    Abstract It is well known that economic policy uncertainty prompts the volatility of the high-yield bond market. However, the correlation between economic policy uncertainty and volatility of high-yield bonds is still not clear. In this paper, we employ GARCH-MIDAS models to investigate their correlation with US economic policy uncertainty index and S&P high-yield bond index. The empirical studies show that mixed volatility models can effectively capture the realized volatility of high-yield bonds, and economic policy uncertainty and macroeconomic factors have significant effects on the long-term component of high-yield bonds volatility. More >

  • Open Access

    ABSTRACT

    Fuzzy Logic Model on Operation and Control of Hydro-Power Dams in Malaysia

    Dr. V. Ramani Bai, Prof. Mohamad Rom Tamjis

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.4, No.1, pp. 31-40, 2007, DOI:10.3970/icces.2007.004.031

    Abstract The aim of this paper is to develop a fuzzy logic model for deriving optimal operational rules at the macro level for better performance and control of hydro-power generation. System modeling based on conventional mathematical tools is not well suited for dealing with ill-defined and uncertain systems. By contrast, a fuzzy inference system employing "if-then" rules can model the qualitative aspects of human knowledge and reasoning processes without employing precise quantitative analyses. In fuzzy logic, diagnosis is based on imprecise data. For instance, when the demand is `very high' i.e. in linguistic term, then its value is important in assisting… More >

  • Open Access

    ARTICLE

    Personalized Privacy Protecting Model in Mobile Social Network

    Pingshui Wang1,*, Zecheng Wang1, Tao Chen1,2, Qinjuan Ma1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 533-546, 2019, DOI:10.32604/cmc.2019.05570

    Abstract With the rapid development of the new generation of information technology, the analysis of mobile social network big data is getting deeper and deeper. At the same time, the risk of privacy disclosure in social network is also very obvious. In this paper, we summarize the main access control model in mobile social network, analyze their contribution and point out their disadvantages. On this basis, a practical privacy policy is defined through authorization model supporting personalized privacy preferences. Experiments have been conducted on synthetic data sets. The result shows that the proposed privacy protecting model could improve the security of… More >

Displaying 41-50 on page 5 of 47. Per Page