Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (287)
  • Open Access

    ARTICLE

    A Formal Method for Service Choreography Verification Based on Description Logic

    Tingting Zhang1, 2, 3, *, Yushi Lan2, Minggang Yu1, Changyou Zheng1, Kun Liu1

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 893-904, 2020, DOI:10.32604/cmc.2020.06216

    Abstract Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model. This paper presents a new approach of choreography model verification based on Description Logic. A meta model of service choreography is built to provide a conceptual framework to capture the formal syntax and semantics of service choreography. Based on the framework, a set of rules and constraints are defined in Description Logic for choreography model verification. To automate model verification, the UML-based service choreography model will be transformed, by the given algorithms, into the… More >

  • Open Access

    ARTICLE

    Strategy Selection for Moving Target Defense in Incomplete Information Game

    Huan Zhang1, Kangfeng Zheng1, *, Xiujuan Wang2, Shoushan Luo1, Bin Wu1

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 763-786, 2020, DOI:10.32604/cmc.2020.06553

    Abstract As a core component of the network, web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers. Although the moving target defense (MTD) has been proposed to increase the attack difficulty for the attackers, there is no solo approach can cope with different attacks; in addition, it is impossible to implement all these approaches simultaneously due to the resource limitation. Thus, the selection of an optimal defense strategy based on MTD has become the focus of research. In general, the confrontation of two players in… More >

  • Open Access

    ARTICLE

    Glyphosate retention in grassland riparian areas is reduced by the invasion of exotic trees

    Giaccio GCM1, P Laterra2, VC Aparicio3, JL Costa3

    Phyton-International Journal of Experimental Botany, Vol.85, pp. 108-116, 2016, DOI:10.32604/phyton.2016.85.108

    Abstract In this study, we examined some aspects regarding the effect of willow trees (Salix fragilis L.) invasion of grassland riparian environments in the Argentinean Pampas on the runoff reduction, sedimentation and glyphosate retention in the riparian vegetation strip (RVS). To assess the influence of willows on the filtering mechanisms, we performed runoff simulation experiments in plots of 1.5 x 2.5 m, in coastal environments characterized by the presence of willows or the lack of trees. Despite the short length of the experimental plots, the retention of glyphosate in the controls, with no trees, was higher and reached almost 74%. Nevertheless,… More >

  • Open Access

    ARTICLE

    Inventory of fruit species and ethnobotanical aspects in Sultepec, Mexico State, Mexico

    Rubí-Arriaga M, A González-Huerta, I Martínez-De La Cruz, O Franco-Mora, JF Ramírez-Dávila, JA López-Sandoval, GV Hernández-Flores

    Phyton-International Journal of Experimental Botany, Vol.83, pp. 203-211, 2014, DOI:10.32604/phyton.2014.83.203

    Abstract Sultepec, State of Mexico, located on the central part of Mexico, belongs to the Physiographic province “Sierra Madre del Sur” and to the Subprovince “Depresión del Balsas”. Although it is known for its floristic richness, it lacks an inventory of vascular plants, including the fruit species. The aim of this work was to elaborate a database including family, scientific name, local name, biological form, origin, use, management, production and service of the fruit species. Plants were collected continuously from June 2010 to June 2011. Subsequently, they were determined in the herbarium “Eizi Matuda” (CODAGEM) from the Facultad de Ciencias Agrícolas… More >

  • Open Access

    ARTICLE

    Floristic associations and filtering ability of riparian vegetation strips

    Giaccio GCM1, P Laterra2, F Cabria3

    Phyton-International Journal of Experimental Botany, Vol.86, pp. 112-123, 2017, DOI:10.32604/phyton.2017.86.112

    Abstract The analysis of lateral flow runoff of superficial nutrients and sediments from an agricultural origin and their retention by infiltration of riparian vegetation strips are of great importance in reducing the agricultural externalities on surface water quality. The aim of this study was to relate soil infiltration to the main biophysical properties of riparian environments in the Pampa Austral of Argentina, defined by the composition of its plant community and the coverage of exotic species. We explored the relationships between hydraulic conductivity (Ks) and aboveground, litter and root biomasses, organic matter concentration, terrain slope, soil bulk density, texture and electrical… More >

  • Open Access

    ARTICLE

    Research on Flight First Service Model and Algorithms for the Gate Assignment Problem

    Jiarui Zhang1, Gang Wang2,*, Siyuan Tong1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1091-1104, 2019, DOI:10.32604/cmc.2019.05907

    Abstract Aiming at the problem of gate allocation of transit flights, a flight first service model is established. Under the constraints of maximizing the utilization rate of gates and minimizing the transit time, the idea of “first flight serving first” is used to allocate the first time, and then the hybrid algorithm of artificial fish swarm and simulated annealing is used to find the optimal solution. That means the fish swarm algorithm with the swallowing behavior is employed to find the optimal solution quickly, and the simulated annealing algorithm is used to obtain a global optimal allocation scheme for the optimal… More >

  • Open Access

    ARTICLE

    Application of GB/T 19426-2004 “Safety Assessment for In-Service Pressure Vessels Containing Defects” to the Long-Distance Oil Pipeline

    Zihua Zhao1, Yu Zhou, Zheng Zhang, Qunpeng Zhong

    Structural Durability & Health Monitoring, Vol.6, No.2, pp. 101-112, 2010, DOI:10.3970/sdhm.2010.006.101

    Abstract Annex H"Safety assessment method for straight pressure pipeline with local thinning area" of "Safety assessment for in-service pressure vessels containing defects"(GB/T 19426-2004) is briefly introduced. The maximum allowable hanging (unsupported) length of straight pressure pipeline with a local thinning area (LTA) is then determined by using this assessment method. This is the first time that the assessment method has been applied to the long-distance oil pipeline. As a typical case, we have analyzed a length of straight pressure pipeline with LTA and gave the relationship of maximum allowable unsupported length, operating pressure and the depth of LTA. More >

  • Open Access

    ARTICLE

    SERVQUAL Model Based Evaluation Analysis of Railway Passenger Transport Service Quality in China

    Huiwei Niu1, Jiao Yao1,*, Jing Zhao2, Jin Wang3,4

    Journal on Big Data, Vol.1, No.1, pp. 17-24, 2019, DOI:10.32604/jbd.2019.05799

    Abstract Railway is the backbone of Chinese transportation system, but its poor quality of services for passengers cause complains now and then. This study first analyzed the influencing factors of service quality on railway passenger, and its quality characteristics was also explained, and finally we proposed an evaluation system of service quality on railway passenger transport. Through the statistical analysis and processing of the basic information from survey data from railway station, trains and the official website of the ticket purchase, the evaluation score of question naire was converted into the score in evaluation index system, which was based on SERVQUAL… More >

  • Open Access

    ARTICLE

    A Cross-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1,*, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 395-408, 2019, DOI:10.32604/cmc.2019.05627

    Abstract Tenants in the cloud computing environment share various services, including storage, network, computing, and applications. For better use of services in the cloud computing environment, tenants collaborate in tasks, resulting in challenges to the traditional access control. This study proposes a cross-tenant role-based access control (CT-RBAC) model for collaborative cloud services. This model covers the CT-RBAC0, CT-RBAC1, CT-RBAC2, and CT-RBAC3 models. The model not only extends the RBAC model in the multi-tenant cloud computing mode but also includes four types of authorization modes among tenants. Consequently, the role inheritance constraint is increased, and fine-grained authorization access among trusted tenants is… More >

  • Open Access

    ARTICLE

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    Dae-Young Kim1, Se Dong Min2, †, Seokhoon Kim3, †, *

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06102

    Abstract The importance of Blockchain and IoT technology have been highlighted in various fields. These are not unaccustomed words anymore in our lives. Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet. The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues. Consequently, we propose a new data transmission scheme… More >

Displaying 271-280 on page 28 of 287. Per Page