Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    PUF-Based Key Distribution in Wireless Sensor Networks

    Zheng Zhang1, Yanan Liu1, *, Qinyuan Zuo1, Lein Harn2, Shuo Qiu1, Yuan Cheng1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1261-1280, 2020, DOI:10.32604/cmc.2020.010034

    Abstract Physical Unclonable Functions (PUFs) can be seen as kind of hardware oneway functions, who are easily fabricated but difficult to clone, duplicate or predict. Therefore, PUFs with unclonable and unpredictable properties are welcome to be applied in designing lightweight cryptography protocols. In this paper, a Basic Key Distribution Scheme (Basic-KDS) based on PUFs is firstly proposed. Then, by employing different deployment modes, a Random Deployment Key Distribution Scheme (RD-KDS) and a Grouping Deployment Key Distribution Scheme (GD-KDS) are further proposed based on the Basic-KDS for large scale wireless sensor networks. In our proposals, a sensor is not pre-distributed with any… More >

  • Open Access

    ARTICLE

    A Controlled Quantum Dialogue Protocol Based on Quantum Walks

    Jinqiao Dai1, Shibin Zhang1, *, Yan Chang1, Xueyang Li1, Tao Zheng1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1247-1260, 2020, DOI:10.32604/cmc.2020.010550

    Abstract In order to enable two parties to exchange their secret information equally, we propose a controlled quantum dialogue protocol based on quantum walks, which implements the equal exchange of secret information between the two parties with the help of the controller TP. The secret information is transmitted via quantum walks, by using this method, the previously required entangled particles do not need to be prepared in the initial phase, and the entangled particles can be produced spontaneously via quantum walks. Furthermore, to resist TP’s dishonest behavior, we use a hash function to verify the correctness of the secret information. The… More >

  • Open Access

    ARTICLE

    A Multi-Tenant Usage Access Model for Cloud Computing

    Zhengtao Liu1, *, Yun Yang1, Wen Gu1, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1233-1245, 2020, DOI:10.32604/cmc.2020.010846

    Abstract Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. It offers tremendous advantages for enterprises and service providers. It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service. To realize access control in a multi-tenant cloud computing environment, this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants. The model consists of three submodels, which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.… More >

  • Open Access

    ARTICLE

    Image Denoising with Adaptive Weighted Graph Filtering

    Ying Chen1, 2, Yibin Tang3, Lin Zhou1, Yan Zhou3, 4, Jinxiu Zhu3, Li Zhao1, *

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1219-1232, 2020, DOI:10.32604/cmc.2020.010638

    Abstract Graph filtering, which is founded on the theory of graph signal processing, is proved as a useful tool for image denoising. Most graph filtering methods focus on learning an ideal lowpass filter to remove noise, where clean images are restored from noisy ones by retaining the image components in low graph frequency bands. However, this lowpass filter has limited ability to separate the low-frequency noise from clean images such that it makes the denoising procedure less effective. To address this issue, we propose an adaptive weighted graph filtering (AWGF) method to replace the design of traditional ideal lowpass filter. In… More >

  • Open Access

    ARTICLE

    A Pupil-Positioning Method Based on the Starburst Model

    Pingping Yu1, Wenjie Duan1, Yi Sun2, Ning Cao3, *, Zhenzhou Wang1, Guojun Lu4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1199-1217, 2020, DOI:10.32604/cmc.2020.010384

    Abstract Human eye detection has become an area of interest in the field of computer vision with an extensive range of applications in human-computer interaction, disease diagnosis, and psychological and physiological studies. Gaze-tracking systems are an important research topic in the human-computer interaction field. As one of the core modules of the head-mounted gaze-tracking system, pupil positioning affects the accuracy and stability of the system. By tracking eye movements to better locate the center of the pupil, this paper proposes a method for pupil positioning based on the starburst model. The method uses vertical and horizontal coordinate integral projections in the… More >

  • Open Access

    ARTICLE

    Research on the Pedestrian Re-Identification Method Based on Local Features and Gait Energy Images

    Xinliang Tang1, Xing Sun1, Zhenzhou Wang1, Pingping Yu1, Ning Cao2, *, Yunfeng Xu3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1185-1198, 2020, DOI:10.32604/cmc.2020.010283

    Abstract The appearance of pedestrians can vary greatly from image to image, and different pedestrians may look similar in a given image. Such similarities and variabilities in the appearance and clothing of individuals make the task of pedestrian re-identification very challenging. Here, a pedestrian re-identification method based on the fusion of local features and gait energy image (GEI) features is proposed. In this method, the human body is divided into four regions according to joint points. The color and texture of each region of the human body are extracted as local features, and GEI features of the pedestrian gait are also… More >

  • Open Access

    ARTICLE

    A Method for Assessing the Fairness of Health Resource Allocation Based on Geographical Grid

    Jin Han1, Wenhao Jiang1, Jin Shi2, *, Sun Xin2, Jin Peng2, Haibo Liu3

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1171-1184, 2020, DOI:10.32604/cmc.2019.07447

    Abstract The assessment of the fairness of health resource allocation is an important part of the study for the fairness of social development. The data used in most of the existing assessment methods comes from statistical yearbooks or field survey sampling. These statistics are generally based on administrative areas and are difficult to support a fine-grained evaluation model. In response to these problems, the evaluation method proposed in this paper is based on the query statistics of the geographic grid of the target area, which are more accurate and efficient. Based on the query statistics of hot words in the geographic… More >

  • Open Access

    ARTICLE

    Simulation of Coupling Process of Flexible Needle Insertion into Soft Tissue Based on ABAQUS

    Linze Wang1, Dedong Gao1, *, Jiajie Fu1, Yuzhou Luo2, Shijian Zhao1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1153-1169, 2020, DOI:10.32604/cmc.2020.010073

    Abstract In order to get to the desired target inside the body, it is essential to investigate the needle-tissue coupling process and calculate the tissue deformation. A cantilever beam model is presented to predicting the deflection and bending angle of flexible needle by analyzing the distribution of the force on needle shaft during the procedure of needle insertion into soft tissue. Furthermore, a finite element (FE) coupling model is proposed to simulate the needle-tissue interactive process. The plane and spatial models are created to relate the needle and tissue nodes. Combined with the cantilever beam model and the finite element needle-tissue… More >

  • Open Access

    ARTICLE

    A High Gain, Noise Cancelling 2515-4900 MHz CMOS LNA for China Mobile 5G Communication Application

    Xiaorong Zhao1, Weili Cheng2, Hongjin Zhu1, Chunpeng Ge3, Gengyuan Zhou1, *, Zhongjun Fu1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1139-1151, 2020, DOI:10.32604/cmc.2020.010220

    Abstract With the development of the times, people’s requirements for communication technology are becoming higher and higher. 4G communication technology has been unable to meet development needs, and 5G communication technology has emerged as the times require. This article proposes the design of a low-noise amplifier (LNA) that will be used in the 5G band of China Mobile Communications. A low noise amplifier for mobile 5G communication is designed based on Taiwan Semiconductor Manufacturing Company (TSMC) 0.13 μm Radio Frequency (RF) Complementary Metal Oxide Semiconductor (CMOS) process. The LNA employs self-cascode devices in currentreuse configuration to enable lower supply voltage operation… More >

  • Open Access

    ARTICLE

    Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles

    Pengshou Xie1, Guoqiang Ma1, *, Tao Feng1, Yan Yan1, 2, Xueming Han1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1127-1137, 2020, DOI:10.32604/cmc.2020.09695

    Abstract Undoubtedly, uncooperative or malicious nodes threaten the safety of Internet of Vehicles (IoV) by destroying routing or data. To this end, some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication, data, energy, etc., to detect and evaluate vehicle nodes. However, it is difficult to effectively assess the trust level of a vehicle node only by message forwarding, data consistency, and energy sufficiency. In order to resolve these problems, a novel mechanism and a new trust calculating model is proposed in this paper. First, the four tuple… More >

Displaying 4031-4040 on page 404 of 5350. Per Page