Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (477)
  • Open Access

    ARTICLE

    Application of Self-Organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection

    Ling Tan1,*, Chong Li2, Jingming Xia2, Jun Cao3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 275-288, 2019, DOI:10.32604/cmc.2019.03735

    Abstract Due to the widespread use of the Internet, customer information is vulnerable to computer systems attack, which brings urgent need for the intrusion detection technology. Recently, network intrusion detection has been one of the most important technologies in network security detection. The accuracy of network intrusion detection has reached higher accuracy so far. However, these methods have very low efficiency in network intrusion detection, even the most popular SOM neural network method. In this paper, an efficient and fast network intrusion detection method was proposed. Firstly, the fundamental of the two different methods are introduced respectively. Then, the self-organizing feature… More >

  • Open Access

    ARTICLE

    Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States

    Gang Xu1,2,*, Ke Xiao1,*, Zongpeng Li3, Xin-Xin Niu2,4, Michael Ryan5

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 809-827, 2019, DOI:10.32604/cmc.2019.04400

    Abstract In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our… More >

  • Open Access

    ARTICLE

    Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks

    Daofu Gong1,2, Yan Chen1,2, Haoyu Lu1,*, Zhenyu Li3, Yibing Han1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 243-260, 2018, DOI:10.32604/cmc.2018.03781

    Abstract To detect and recover random tampering areas, a combined-decision-based self-embedding watermarking scheme is proposed herein. In this scheme, the image is first partitioned into 2×2 size blocks. Next, the high 5 bits of a block’s average value is embedded into its offset block. The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks. The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering. More >

  • Open Access

    ARTICLE

    Full-Blind Delegating Private Quantum Computation

    Wenjie Liu1,2,*, Zhenyu Chen2, Jinsuo Liu3, Zhaofeng Su4, Lianhua Chi5

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 211-223, 2018, DOI: 10.3970/cmc.2018.02288

    Abstract The delegating private quantum computation (DQC) protocol with the universal quantum gate set {X,Z,H,P,R,CNOT} was firstly proposed by Broadbent et al. [Broadbent (2015)], and then Tan et al. [Tan and Zhou (2017)] tried to put forward a half-blind DQC protocol (HDQC) with another universal set {H,P,CNOT,T}. However, the decryption circuit of Toffoli gate (i.e. T) is a little redundant, and Tan et al.’s protocol [Tan and Zhou (2017)] exists the information leak. In addition, both of these two protocols just focus on the blindness of data (i.e. the client’s input and output), but do not consider the blindness of computation… More >

  • Open Access

    ARTICLE

    A Real-time Monitoring Technique for Local Plasticity in Metals Based on Lamb Waves and a Directional Actuator/Sensor Set

    Y. L. Liu1, N. Hu2, H. Xu3, H. Ning1, L. K. Wu1

    CMC-Computers, Materials & Continua, Vol.40, No.1, pp. 1-20, 2014, DOI:10.3970/cmc.2014.040.001

    Abstract A real-time monitoring technique for local plasticity using Lamb waves was developed. Tensile test of a thin aluminum plate with a circular hole where high stress concentration was induced was conducted to verify this technique. During the tensile test, a series of wave signals passing through the local plastic region were collected using a directional actuator/sensor set to monitor plasticity evolution. A pulse compression technique was used to process the wave signals. With the increase of tensile stress in the specimen, the amplitude changes of S0 and A0 modes were obtained and the difference of Lamb wave signals was further… More >

  • Open Access

    ARTICLE

    Prediction of Delamination Onset and Critical Force in Carbon/Epoxy Panels Impacted by Ice Spheres

    Jennifer D. Rhymer1, Hyonny Kim1

    CMC-Computers, Materials & Continua, Vol.35, No.2, pp. 87-117, 2013, DOI:10.3970/cmc.2013.035.087

    Abstract Polymer matrix composite structures are exposed to a variety of impact threats including hail ice. Internal delamination damage created by these impacts can exist in a form that is visually undetectable. This paper establishes an analysis methodology for predicting the onset of delamination damage in toughened carbon/epoxy composite laminates when impacted by high velocity ice spheres (hailstones). Experiments and analytical work focused on ice sphere impact onto composite panels have determined the failure threshold energy as a function of varying ice diameter and panel thickness, and have established the ability to predict the onset of delamination using cohesive elements in… More >

  • Open Access

    ARTICLE

    Nearest Particle Distance and the Statistical Distribution of Agglomerates from a Model of a Finite Set of Particles

    J. Zidek1,2, J. Kucera1, J. Jancar1,2

    CMC-Computers, Materials & Continua, Vol.24, No.3, pp. 183-208, 2011, DOI:10.3970/cmc.2011.024.183

    Abstract The structural analysis of a particulate composite with randomly distributed hard spheres is presented based on a model proposed earlier. The structural factors considered include the distribution of interparticle distances and the conditions for particle agglomeration. The interparticle distance was characterized by the nearest particle distance (NPD) and the distance derived from Delaunay triangulation (DT). The distances were calculated for every particle in the particle set and analyzed in the form of a cumulative distribution function (CDF). The CDF provides two parameters: the representation of particles which are in very close proximity to their neighbors and the most frequent distance… More >

Displaying 471-480 on page 48 of 477. Per Page