Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,267)
  • Open Access

    ARTICLE

    A Nonuniform Clustering Routing Algorithm Based on an Improved K-Means Algorithm

    Xinliang Tang1, Man Zhang1, Pingping Yu1, Wei Liu2, Ning Cao3, *, Yunfeng Xu4

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1725-1739, 2020, DOI:10.32604/cmc.2020.010272

    Abstract In a large-scale wireless sensor network (WSN), densely distributed sensor nodes process a large amount of data. The aggregation of data in a network can consume a great amount of energy. To balance and reduce the energy consumption of nodes in a WSN and extend the network life, this paper proposes a nonuniform clustering routing algorithm based on the improved K-means algorithm. The algorithm uses a clustering method to form and optimize clusters, and it selects appropriate cluster heads to balance network energy consumption and extend the life cycle of the WSN. To ensure that the cluster head (CH) selection… More >

  • Open Access

    ARTICLE

    A Cross Layer Protocol for Fast Identification of Blocked Tags in Large-Scale RFID Systems

    Chu Chu1, Zhong Huang1, Rui Xu1, Guangjun Wen1, *, Lilan Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1705-1724, 2020, DOI:10.32604/cmc.2020.010190

    Abstract Blocker tag attack is one of the denial-of-service (DoS) attacks that threatens the privacy and security of RFID systems. The attacker interferes with the blocked tag by simulating a fake tag with the same ID, thus causing a collision of message replies. In many practical scenarios, the number of blocked tags may vary, or even be small. For example, the attacker may only block the important customers or high-value items. To avoid the disclosure of privacy and economic losses, it is of great importance to fast pinpoint these blocked ones. However, existing works do not take into account the impact… More >

  • Open Access

    ARTICLE

    Embedding Implicit User Importance for Group Recommendation

    Qing Yang1, Shengjie Zhou1, Heyong Li1, Jingwei Zhang2, 3, *

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1691-1704, 2020, DOI:10.32604/cmc.2020.010256

    Abstract Group recommendations derive from a phenomenon in which people tend to participate in activities together regardless of whether they are online or in reality, which creates real scenarios and promotes the development of group recommendation systems. Different from traditional personalized recommendation methods, which are concerned only with the accuracy of recommendations for individuals, group recommendation is expected to balance the needs of multiple users. Building a proper model for a group of users to improve the quality of a recommended list and to achieve a better recommendation has become a large challenge for group recommendation applications. Existing studies often focus… More >

  • Open Access

    ARTICLE

    A Secure Three-Factor Authenticated Key Agreement Scheme for Multi-Server Environment

    Meichen Xia1, *, Shiliang Li1,, Liu Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1673-1689, 2020, DOI:10.32604/cmc.2020.010177

    Abstract Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years. However, traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service. Moreover, it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party. In order to overcome these difficulties, we designed a secure threefactor multi-server authenticated key agreement protocol based on elliptic curve cryptography, which needs the… More >

  • Open Access

    ARTICLE

    A DRL-Based Container Placement Scheme with Auxiliary Tasks

    Ningcheng Yuan1, Chao Jia2, *, Jizhao Lu3, Shaoyong Guo1, Wencui Li3, Xuesong Qiu1, Lei Shi4

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1657-1671, 2020, DOI:10.32604/cmc.2020.09840

    Abstract Container is an emerging virtualization technology and widely adopted in the cloud to provide services because of its lightweight, flexible, isolated and highly portable properties. Cloud services are often instantiated as clusters of interconnected containers. Due to the stochastic service arrival and complicated cloud environment, it is challenging to achieve an optimal container placement (CP) scheme. We propose to leverage Deep Reinforcement Learning (DRL) for solving CP problem, which is able to learn from experience interacting with the environment and does not rely on mathematical model or prior knowledge. However, applying DRL method directly dose not lead to a satisfying… More >

  • Open Access

    ARTICLE

    Impact Force Magnitude and Location Recognition of Composite Materials

    Yajie Sun1, 2, *, Yanqing Yuan2, Qi Wang2, Sai Ji1, 2, Lihua Wang3, Shao’en Wu4

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1647-1656, 2020, DOI:10.32604/cmc.2020.06331

    Abstract In order to identify the location and magnitude of the impact force accurately, determine the damage range of the structure and accelerate the health monitoring of key components of the composite, this paper studies the location and magnitude of the impact force of composite plates by an inverse method. Firstly, a PZT sensor mounted on the material plate is used to collect the response signal generated by the impact force, which is from several impact locations, and establish transfer functions between the impact location and the PZT sensor. Secondly, this paper applies several forces to any location on the material… More >

  • Open Access

    ARTICLE

    Continuous-Variable Quantum Network Coding Based on Quantum Discord

    Tao Shang1, *, Ran Liu1, Jianwei Liu1, Yafei Hou2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1629-1645, 2020, DOI:10.32604/cmc.2020.09820

    Abstract Establishing entanglement is an essential task of quantum communication technology. Beyond entanglement, quantum discord, as a measure of quantum correlation, is a necessary prerequisite to the success of entanglement distribution. To realize efficient quantum communication based on quantum discord, in this paper, we consider the practical advantages of continuous variables and propose a feasible continuous-variable quantum network coding scheme based on quantum discord. By means of entanglement distribution by separable states, it can achieve quantum entanglement distribution from sources to targets in a butterfly network. Compared with the representative discrete-variable quantum network coding schemes, the proposed continuous-variable quantum network coding… More >

  • Open Access

    ARTICLE

    ECG Classification Using Deep CNN Improved by Wavelet Transform

    Yunxiang Zhao1, Jinyong Cheng1, *, Ping Zhang1, Xueping Peng2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1615-1628, 2020, DOI:10.32604/cmc.2020.09938

    Abstract Atrial fibrillation is the most common persistent form of arrhythmia. A method based on wavelet transform combined with deep convolutional neural network is applied for automatic classification of electrocardiograms. Since the ECG signal is easily inferred, the ECG signal is decomposed into 9 kinds of subsignals with different frequency scales by wavelet function, and then wavelet reconstruction is carried out after segmented filtering to eliminate the influence of noise. A 24-layer convolution neural network is used to extract the hierarchical features by convolution kernels of different sizes, and finally the softmax classifier is used to classify them. This paper applies… More >

  • Open Access

    ARTICLE

    Better Visual Image Super-Resolution with Laplacian Pyramid of Generative Adversarial Networks

    Ming Zhao1, Xinhong Liu1, Xin Yao1, *, Kun He2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1601-1614, 2020, DOI:10.32604/cmc.2020.09754

    Abstract Although there has been a great breakthrough in the accuracy and speed of super-resolution (SR) reconstruction of a single image by using a convolutional neural network, an important problem remains unresolved: how to restore finer texture details during image super-resolution reconstruction? This paper proposes an Enhanced Laplacian Pyramid Generative Adversarial Network (ELSRGAN), based on the Laplacian pyramid to capture the high-frequency details of the image. By combining Laplacian pyramids and generative adversarial networks, progressive reconstruction of super-resolution images can be made, making model applications more flexible. In order to solve the problem of gradient disappearance, we introduce the Residual-in-Residual Dense… More >

  • Open Access

    ARTICLE

    Gain-Enhanced Metamaterial Based Antenna for 5G Communication Standards

    Daniyal Ali Sehrai1, Fazal Muhammad1, Saad Hassan Kiani1, Ziaul Haq Abbas2, Muhammad Tufail3, Sunghwan Kim4, *

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1587-1599, 2020, DOI:10.32604/cmc.2020.011057

    Abstract Metamaterial surfaces play a vital role to achieve the surface waves suppression and in-phase reflection, in order to improve the antenna performance. In this paper, the performance comparison of a fifth generation (5G) antenna design is analyzed and compared with a metamaterial-based antenna for 5G communication system applications. Metamaterial surface is utilized as a reflector due to its in-phase reflection characteristic and high-impedance nature to improve the gain of an antenna. As conventional conducting ground plane does not give enough surface waves suppression which affects the antenna performance in terms of efficiency and gain etc. These factors are well considered… More >

Displaying 3921-3930 on page 393 of 5267. Per Page