Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service

    Zengpeng Li1, Jiuru Wang2, *, Chang Choi3, Wenyin Zhang2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 663-674, 2020, DOI:10.32604/cmc.2020.06565

    Abstract Multi-factor authentication (MFA) was proposed by Pointcheval et al. [Pointcheval and Zimmer (2008)] to improve the security of single-factor (and two-factor) authentication. As the backbone of multi-factor authentication, biometric data are widely observed. Especially, how to keep the privacy of biometric at the password database without impairing efficiency is still an open question. Using the vulnerability of encryption (or hash) algorithms, the attacker can still launch offline brute-force attacks on encrypted (or hashed) biometric data. To address the potential risk of biometric disclosure at the password database, in this paper, we propose a novel efficient and secure MFA key exchange… More >

  • Open Access

    ARTICLE

    Skipping Undesired High-Frequency Content to Boost DPI Engine

    Likun Liu1, Jiantao Shi1, *, Xiangzhan Yu1, Hongli Zhang1, Dongyang Zhan2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 649-661, 2020, DOI:10.32604/cmc.2020.07736

    Abstract Deep Packet Inspection (DPI) at the core of many monitoring appliances, such as NIDS, NIPS, plays a major role. DPI is beneficial to content providers and censorship to monitor network traffic. However, the surge of network traffic has put tremendous pressure on the performance of DPI. In fact, the sensitive content being monitored is only a minority of network traffic, that is to say, most is undesired. A close look at the network traffic, we found that it contains many undesired high frequency content (UHC) that are not monitored. As everyone knows, the key to improve DPI performance is to… More >

  • Open Access

    ARTICLE

    Key-Private Identity-Based Proxy Re-Encryption

    Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 633-647, 2020, DOI:10.32604/cmc.2020.06217

    Abstract An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is… More >

  • Open Access

    ARTICLE

    Ground Nephogram Recognition Algorithm Based on Selective Neural Network Ensemble

    Tao Li1, Xiang Li1, *, Yongjun Ren2, Jinyue Xia3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 621-631, 2020, DOI:10.32604/cmc.2020.06463

    Abstract In view of the low accuracy of traditional ground nephogram recognition model, the authors put forward a k-means algorithm-acquired neural network ensemble method, which takes BP neural network ensemble model as the basis, uses k-means algorithm to choose the individual neural networks with partial diversities for integration, and builds the cloud form classification model. Through simulation experiments on ground nephogram samples, the results show that the algorithm proposed in the article can effectively improve the Classification accuracy of ground nephogram recognition in comparison with applying single BP neural network and traditional BP AdaBoost ensemble algorithm on classification of ground nephogram. More >

  • Open Access

    ARTICLE

    Intuitionistic Fuzzy Petri Nets Model Based on Back Propagation Algorithm for Information Services

    Junhua Xi1, *, Kouquan Zheng1, Jianfeng Ma1, Jungang Yang1, Zhiyao Liang2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 605-619, 2020, DOI:10.32604/cmc.2020.06343

    Abstract Intuitionistic fuzzy Petri net is an important class of Petri nets, which can be used to model the knowledge base system based on intuitionistic fuzzy production rules. In order to solve the problem of poor self-learning ability of intuitionistic fuzzy systems, a new Petri net modeling method is proposed by introducing BP (Error Back Propagation) algorithm in neural networks. By judging whether the transition is ignited by continuous function, the intuitionistic fuzziness of classical BP algorithm is extended to the parameter learning and training, which makes Petri network have stronger generalization ability and adaptive function, and the reasoning result is… More >

  • Open Access

    ARTICLE

    Functional Causality between Oil Prices and GDP Based on Big Data

    Ibrahim Mufrah Almanjahie1, 2, Zouaoui Chikr Elmezouar1, 2, 3, *, Ali Laksaci1, 2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 593-604, 2020, DOI:10.32604/cmc.2020.08901

    Abstract This paper examines the causal relationship between oil prices and the Gross Domestic Product (GDP) in the Kingdom of Saudi Arabia. The study is carried out by a data set collected quarterly, by Saudi Arabian Monetary Authority, over a period from 1974 to 2016. We seek how a change in real crude oil price affects the GDP of KSA. Based on a new technique, we treat this data in its continuous path. Precisely, we analyze the causality between these two variables, i.e., oil prices and GDP, by using their yearly curves observed in the four quarters of each year. We… More >

  • Open Access

    ARTICLE

    Hip Fracture Risk Assessment Based on Different Failure Criteria Using QCT-Based Finite Element Modeling

    Hossein Bisheh1, 2, Yunhua Luo1, 3, Timon Rabczuk4, *

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 567-591, 2020, DOI:10.32604/cmc.2020.09393

    Abstract Precise evaluation of hip fracture risk leads to reduce hip fracture occurrence in individuals and assist to check the effect of a treatment. A subject-specific QCT-based finite element model is introduced to evaluate hip fracture risk using the strain energy, von-Mises stress, and von-Mises strain criteria during the single-leg stance and the sideways fall configurations. Choosing a proper failure criterion in hip fracture risk assessment is very important. The aim of this study is to define hip fracture risk index using the strain energy, von Mises stress, and von Mises strain criteria and compare the calculated fracture risk indices using… More >

  • Open Access

    ARTICLE

    Analysis and Process of Music Signals to Generate TwoDimensional Tabular Data and a New Music

    Oakyoung Han1, Jaehyoun Kim2, *

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 553-566, 2020, DOI:10.32604/cmc.2020.09362

    Abstract The processing of sound signals is significantly improved recently. Technique for sound signal processing focusing on music beyond speech area is getting attention due to the development of deep learning techniques. This study is for analysis and process of music signals to generate tow-dimensional tabular data and a new music. For analysis and process part, we represented normalized waveforms for each of input data via frequency domain signals. Then we looked into shorted segment to see the difference wave pattern for different singers. Fourier transform is applied to get spectrogram of the music signals. Filterbank is applied to represent the… More >

  • Open Access

    ARTICLE

    Towards an Artificial Intelligence Framework for Data-Driven Prediction of Coronavirus Clinical Severity

    Xiangao Jiang1, Megan Coffee2, 3, *, Anasse Bari4, *, Junzhang Wang4, Xinyue Jiang5, Jianping Huang1, Jichan Shi1, Jianyi Dai1, Jing Cai1, Tianxiao Zhang6, Zhengxing Wu1, Guiqing He1, Yitong Huang7

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 537-551, 2020, DOI:10.32604/cmc.2020.010691

    Abstract The virus SARS-CoV2, which causes coronavirus disease (COVID-19) has become a pandemic and has spread to every inhabited continent. Given the increasing caseload, there is an urgent need to augment clinical skills in order to identify from among the many mild cases the few that will progress to critical illness. We present a first step towards building an artificial intelligence (AI) framework, with predictive analytics (PA) capabilities applied to real patient data, to provide rapid clinical decision-making support. COVID-19 has presented a pressing need as a) clinicians are still developing clinical acumen to this novel disease and b) resource limitations… More >

  • Open Access

    ARTICLE

    Self-Certificating Root: A Root Zone Security Enhancement Mechanism for DNS

    Wenfeng Liu1, *, Yu Zhang1, Wenjia Zhang1, Lu Liu1, Hongli Zhang1, Binxing Fang1

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 521-536, 2020, DOI:10.32604/cmc.2020.07982

    Abstract As a critical Internet infrastructure, domain name system (DNS) protects the authenticity and integrity of domain resource records with the introduction of security extensions (DNSSEC). DNSSEC builds a single-center and hierarchical resource authentication architecture, which brings management convenience but places the DNS at risk from a single point of failure. When the root key suffers a leak or misconfiguration, top level domain (TLD) authority cannot independently protect the authenticity of TLD data in the root zone. In this paper, we propose self-certificating root, a lightweight security enhancement mechanism of root zone compatible with DNS/DNSSEC protocol. By adding the TLD public… More >

Displaying 4161-4170 on page 417 of 5350. Per Page