Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Laboratory Model Tests and DEM Simulations of Unloading- Induced Tunnel Failure Mechanism

    Abierdi1, Yuzhou Xiang2, Haiyi Zhong2, Xin Gu2, Hanlong Liu2, 3, Wengang Zhang2, 3, *

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 825-844, 2020, DOI:10.32604/cmc.2020.07946

    Abstract Tunnel excavation is a complicated loading-unloading-reloading process characterized by decreased radial stresses and increased axial stresses. An approach that considers only loading, is generally used in tunnel model testing. However, this approach is incapable of characterizing the unloading effects induced by excavation on surrounding rocks and hence presents radial and tangential stress paths during the failure process that are different from the actual stress state of tunnels. This paper carried out a comparative analysis using laboratory model testing and particle flow code (PFC2D)-based numerical simulation, and shed light upon the crack propagation process and, microscopic stress and force chain variations… More >

  • Open Access

    ARTICLE

    Molecular Dynamics Simulations for Anisotropic Thermal Conductivity of Borophene

    Yue Jia1, Chun Li1, *, Jinwu Jiang2, Ning Wei3, Yang Chen4, Yongjie Jessica Zhang5

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 813-823, 2020, DOI:10.32604/cmc.2020.07801

    Abstract The present work carries out molecular dynamics simulations to compute the thermal conductivity of the borophene nanoribbon and the borophene nanotube using the Muller-Plathe approach. We investigate the thermal conductivity of the armchair and zigzag borophenes, and show the strong anisotropic thermal conductivity property of borophene. We compare results of the borophene nanoribbon and the borophene nanotube, and find the thermal conductivity of the borophene is orientation dependent. The thermal conductivity of the borophene does not vary as changing the width of the borophene nanoribbon and the perimeter of the borophene nanotube. In addition, the thermal conductivity of the borophene… More >

  • Open Access

    ARTICLE

    Energy Efficiency in Internet of Things: An Overview

    Wuxiong Zhang1, 2, Weidong Fang1, 2, *, Qianqian Zhao1, 2, Xiaohong Ji3, Guoqing Jia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 787-811, 2020, DOI:10.32604/cmc.2020.07620

    Abstract Energy efficiency is very important for the Internet of Things (IoT), especially for front-end sensed terminal or node. It not only embodies the node’s life, but also reflects the lifetime of the network. Meanwhile, it is also a key indicator of green communications. Unfortunately, there is no article on systematic analysis and review for energy efficiency evaluation in IoT. In this paper, we systemically analyze the architecture of IoT, and point out its energy distribution, Furthermore, we summarized the energy consumption model in IoT, analyzed the pros and cons of improving energy efficiency, presented a state of the art the… More >

  • Open Access

    ARTICLE

    OTT Messages Modeling and Classification Based on Recurrent Neural Networks

    Guangyong Yang1, Jianqiu Zeng1, Mengke Yang2, *, Yifei Wei3, Xiangqing Wang3, Zulfiqar Hussain Pathan4

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 769-785, 2020, DOI:10.32604/cmc.2020.07528

    Abstract A vast amount of information has been produced in recent years, which brings a huge challenge to information management. The better usage of big data is of important theoretical and practical significance for effectively addressing and managing messages. In this paper, we propose a nine-rectangle-grid information model according to the information value and privacy, and then present information use policies based on the rough set theory. Recurrent neural networks were employed to classify OTT messages. The content of user interest is effectively incorporated into the classification process during the annotation of OTT messages, ending with a reliable trained classification model.… More >

  • Open Access

    ARTICLE

    Improvement of Stochastic Competitive Learning for Social Network

    Wenzheng Li1, Yijun Gu1, *

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 755-768, 2020, DOI:10.32604/cmc.2020.07984

    Abstract As an unsupervised learning method, stochastic competitive learning is commonly used for community detection in social network analysis. Compared with the traditional community detection algorithms, it has the advantage of realizing the timeseries community detection by simulating the community formation process. In order to improve the accuracy and solve the problem that several parameters in stochastic competitive learning need to be pre-set, the author improves the algorithms and realizes improved stochastic competitive learning by particle position initialization, parameter optimization and particle domination ability self-adaptive. The experiment result shows that each improved method improves the accuracy of the algorithm, and the… More >

  • Open Access

    ARTICLE

    Expanding Hot Code Path for Data Cleaning on Software Graph

    Guang Sun1, 2, *, Xiaoping Fan1, Wangdong Jiang1, Hangjun Zhou1, Fenghua Li1, Rong Yang1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 743-753, 2020, DOI:10.32604/cmc.2020.05564

    Abstract Graph analysis can be done at scale by using Spark GraphX which loading data into memory and running graph analysis in parallel. In this way, we should take data out of graph databases and put it into memory. Considering the limitation of memory size, the premise of accelerating graph analytical process reduces the graph data to a suitable size without too much loss of similarity to the original graph. This paper presents our method of data cleaning on the software graph. We use SEQUITUR data compression algorithm to find out hot code path and store it as a whole paths… More >

  • Open Access

    ARTICLE

    An Efficient Certificateless Aggregate Signature Scheme Designed for VANET

    Cui Li1, *, Gang Wu1, Lipeng Xing1, Feng Zhu1, Liang Zhao2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 725-742, 2020, DOI:10.32604/cmc.2020.07188

    Abstract The Vehicular Ad-hoc Network (VANET) is the fundamental of smart transportation system in the future, but the security of the communication between vehicles and vehicles, between vehicles and roadside infrastructures have become increasingly prominent. Certificateless aggregate signature protocol is used to address this security issue, but the existing schemes still have many drawbacks in terms of security and efficiency: First, many schemes are not secure, and signatures can be forged by the attacker; Second, even if some scheme are secure, many schemes use a large number of bilinear pairing operation, and the computation overhead is large. At the same time,… More >

  • Open Access

    ARTICLE

    A Fast Method for Shortest-Path Cover Identification in Large Complex Networks

    Qiang Wei1, 2, *, Guangmin Hu1, Chao Shen3, Yunfei Yin4, 5

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 705-724, 2020, DOI:10.32604/cmc.2020.07467

    Abstract Fast identifying the amount of information that can be gained by measuring a network via shortest-paths is one of the fundamental problem for networks exploration and monitoring. However, the existing methods are time-consuming for even moderate-scale networks. In this paper, we present a method for fast shortest-path cover identification in both exact and approximate scenarios based on the relationship between the identification and the shortest distance queries. The effectiveness of the proposed method is validated through synthetic and real-world networks. The experimental results show that our method is 105 times faster than the existing methods and can solve the shortest-path… More >

  • Open Access

    ARTICLE

    Data Cleaning Based on Stacked Denoising Autoencoders and Multi-Sensor Collaborations

    Xiangmao Chang1, 2, *, Yuan Qiu1, Shangting Su1, Deliang Yang3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 691-703, 2020, DOI:10.32604/cmc.2020.07923

    Abstract Wireless sensor networks are increasingly used in sensitive event monitoring. However, various abnormal data generated by sensors greatly decrease the accuracy of the event detection. Although many methods have been proposed to deal with the abnormal data, they generally detect and/or repair all abnormal data without further differentiate. Actually, besides the abnormal data caused by events, it is well known that sensor nodes prone to generate abnormal data due to factors such as sensor hardware drawbacks and random effects of external sources. Dealing with all abnormal data without differentiate will result in false detection or missed detection of the events.… More >

  • Open Access

    ARTICLE

    Feature Fusion Multi-View Hashing Based on Random Kernel Canonical Correlation Analysis

    Junshan Tan1, Rong Duan1, Jiaohua Qin1, *, Xuyu Xiang1, Yun Tan1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 675-689, 2020, DOI:10.32604/cmc.2020.07730

    Abstract Hashing technology has the advantages of reducing data storage and improving the efficiency of the learning system, making it more and more widely used in image retrieval. Multi-view data describes image information more comprehensively than traditional methods using a single-view. How to use hashing to combine multi-view data for image retrieval is still a challenge. In this paper, a multi-view fusion hashing method based on RKCCA (Random Kernel Canonical Correlation Analysis) is proposed. In order to describe image content more accurately, we use deep learning dense convolutional network feature DenseNet to construct multi-view by combining GIST feature or BoW_SIFT (Bag-of-Words… More >

Displaying 4151-4160 on page 416 of 5350. Per Page