Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access


    Hacking Anti-Shoplifting System to Hide Data within Clothes

    Al Hussien Seddik Saad1,*, E. H. Hafez2, Zubair Ahmad3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 659-674, 2021, DOI:10.32604/cmc.2021.014758

    Abstract Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The… More >

  • Open Access


    A Cross Layer Protocol for Fast Identification of Blocked Tags in Large-Scale RFID Systems

    Chu Chu1, Zhong Huang1, Rui Xu1, Guangjun Wen1, *, Lilan Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1705-1724, 2020, DOI:10.32604/cmc.2020.010190

    Abstract Blocker tag attack is one of the denial-of-service (DoS) attacks that threatens the privacy and security of RFID systems. The attacker interferes with the blocked tag by simulating a fake tag with the same ID, thus causing a collision of message replies. In many practical scenarios, the number of blocked tags may vary, or even be small. For example, the attacker may only block the important customers or high-value items. To avoid the disclosure of privacy and economic losses, it is of great importance to fast pinpoint these blocked ones. However, existing works do not take into account the impact… More >

  • Open Access


    Hashtag Recommendation Using LSTM Networks with Self-Attention

    Yatian Shen1, Yan Li1, Jun Sun1,*, Wenke Ding1, Xianjin Shi1, Lei Zhang1, Xiajiong Shen1, Jing He2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1261-1269, 2019, DOI:10.32604/cmc.2019.06104

    Abstract On Twitter, people often use hashtags to mark the subject of a tweet. Tweets have specific themes or content that are easy for people to manage. With the increase in the number of tweets, how to automatically recommend hashtags for tweets has received wide attention. The previous hashtag recommendation methods were to convert the task into a multi-class classification problem. However, these methods can only recommend hashtags that appeared in historical information, and cannot recommend the new ones. In this work, we extend the self-attention mechanism to turn the hashtag recommendation task into a sequence labeling task. To train and… More >

  • Open Access


    High Security Identity Tags Using Spiral Resonators

    Anju Pradeep1, S. Mridula1, P. Mohanan2

    CMC-Computers, Materials & Continua, Vol.52, No.3, pp. 187-196, 2016, DOI:10.3970/cmc.2016.052.185

    Abstract A highly compact chipless tag based on Frequency coding technique using Spiral Resonators is proposed in this paper. Spirals are well known metamaterial structures and thus capable of sharp resonance, and hence Spiral Resonators can serve as a good candidate for RF Identity Tags. The bit capacity of the proposed tag is 10 bits per sqcm. The prototype of the tag is fabricated on a low-cost substrate of dielectric constant 4.4 and loss tangent 0.02. The overall dimension of tag is 15.4 x 3 x 1.6 mm3. Two methods for reading the tags are also discussed in this paper. Scope… More >

  • Open Access


    A Physical Layer Algorithm for Estimation of Number of Tags in UHF RFID Anti-Collision Design

    Zhong Huang1, Jian Su2, Guangjun Wen1, Wenxian Zheng3, Chu Chu1, Yijun Zhang4,*, Yibo Zhang5

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 399-408, 2019, DOI:10.32604/cmc.2019.05876

    Abstract A priori knowledge of the number of tags is crucial for anti-collision protocols in slotted UHF RFID systems. The number of tags is used to decide optimal frame length in dynamic frame slotted ALOHA (DFSA) and to adjust access probability in random access protocols. Conventional researches estimate the number of tags in MAC layer based on statistics of empty slots, collided slots and successful slots. Usually, a collision detection algorithm is employed to determine types of time slots. Only three types are distinguished because of lack of ability to detect the number of tags in single time slot. In this… More >

Displaying 1-10 on page 1 of 5. Per Page