Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    A Reliable Stochastic Numerical Analysis for Typhoid Fever Incorporating With Protection Against Infection

    Muhammad Shoaib Arif1,*, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Rabia Fayyaz3, Mehvish Naz3, Umer Javed4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 787-804, 2019, DOI:10.32604/cmc.2019.04655

    Abstract In this paper, a reliable stochastic numerical analysis for typhoid fever incorporating with protection against infection has been considered. We have compared the solutions of stochastic and deterministic typhoid fever model. It has been shown that the stochastic typhoid fever model is more realistic as compared to the deterministic typhoid fever model. The effect of threshold number T* hold in stochastic typhoid fever model. The proposed framework of the stochastic non-standard finite difference scheme (SNSFD) preserves all dynamical properties like positivity, bounded-ness and dynamical consistency defined by Mickens, R. E. The stochastic numerical simulation of the model showed that increase… More >

  • Open Access

    ARTICLE

    Analyzing the Structure and Connectivity of Continent-Level Internet Topology

    Xionglve Li1, Junhua Xi1, Zhiping Cai1,*, Tao Yang1, Chak Fong Cheang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 955-964, 2019, DOI:10.32604/cmc.2019.05769

    Abstract The research and analysis of Internet topology is hot in the field of network measurement, which have important applications in network security, traffic scheduling and many other fields. Most of the existing works are focused on the AS-level and router-level topology, but few works are about the IP-level topology. In fact, obtaining the topology of each continent and knowing how the topologies of the continents are connected to each other can help us understanding the Internet around the world more thoroughly. In this paper, we obtained data sets from RIPE, constructed and analyzed network topologies of all the continents. By… More >

  • Open Access

    ARTICLE

    Shape, Color and Texture Based CBIR System Using Fuzzy Logic Classifier

    D. Yuvaraj1, M. Sivaram2, B. Karthikeyan3,*, Jihan Abdulazeez4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 729-739, 2019, DOI:10.32604/cmc.2019.05945

    Abstract The perfect image retrieval and retrieval time are the two major challenges in CBIR systems. To improve the retrieval accuracy, the whole database is searched based on many image characteristics such as color, shape, texture and edge information which leads to more time consumption. This paper presents a new fuzzy based CBIR method, which utilizes colour, shape and texture attributes of the image. Fuzzy rule based system is developed by combining color, shape, and texture feature for enhanced image recovery. In this approach, DWT is used to pull out the texture characteristics and the region based moment invariant is utilized… More >

  • Open Access

    ARTICLE

    The Algorithm of Chemical Species Analysis for Ab Intio Molecular Dynamics Simulations and Its Application

    Zhiyi Han1, Yugai Huang2,3, Xiaoqiang Xie1, Ying Mei1, Bin Gu1,*

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 995-1003, 2019, DOI:10.32604/cmc.2019.02181

    Abstract In ab initio molecular dynamics (AIMD) simulations of chemical reactions, it is important but difficult to identify the chemical species in the trajectory automatically and quickly. In this paper, based on the chemical graph theory, an algorithm for molecular species identification, according to the molecular coordinates and empirical bond length database, is presented. As an example, the chemical species in condensed glycine at room temperature are investigated with our algorithm in detail. The chemical species, including canonical and zwitterionic glycine, their protonated and de-protonated states, and the free protons, are all identified, counted and recorded correctly. Potential applications and further… More >

  • Open Access

    ARTICLE

    Dynamics Modeling and Stability Analysis of Tilt Wing Unmanned Aerial Vehicle During Transition

    Yonghong Zhang1,*, Yunfei Deng1, Yunping Liu1, Lihua Wang1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 833-851, 2019, DOI:10.32604/cmc.2019.04078

    Abstract In the transition mode of quad tilt wing-unmanned aerial vehicle (QTW-UAV), the system stability of UAV will change with the tilt angle changes, which will cause serious head drop down. Meanwhile, with the complex air flow and other disturbances, the system is prone to side bias, frying, stall and other kinetic stability problems, hence the system stability analysis has become an urgent problem to be solved. To solve the stability problem, we need the quantitative criteria of system stability and effective tool of stability analysis, and can improve the stability of the motion control by optimizing the structural parameters of… More >

  • Open Access

    ARTICLE

    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848

    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of a machine learning algorithm to… More >

  • Open Access

    ARTICLE

    Location Privacy in Device-Dependent Location-Based Services: Challenges and Solution

    Yuhang Wang1, Yanbin Sun1,*, Shen Su1, Zhihong Tian1, Mohan Li1, Jing Qiu1, Xianzhi Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 983-993, 2019, DOI:10.32604/cmc.2019.05547

    Abstract With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the… More >

  • Open Access

    ARTICLE

    SWRR: The Link Scheduling Algorithm Based on Weighted Round-Robin

    Tianbo Lu1,2,*, Ru Yan1,2, Chao Li3,*, Lihua Yin3, Hao Chen1, Xieyu Zou4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 965-982, 2019, DOI:10.32604/cmc.2019.05635

    Abstract With the rapid development of the Internet, people pay more and more attention to the protection of privacy. The second-generation onion routing system Tor is the most commonly used among anonymous communication systems, which can be used to protect user privacy effectively. In recent years, Tor’s congestion problem has become the focus of attention, and it can affect Tor’s performance even user experience. Firstly, we investigate the causes of Tor network congestion and summarize some link scheduling algorithms proposed in recent years. Then we propose the link scheduling algorithm SWRR based on WRR (Weighted Round Robin). In this process, we… More >

  • Open Access

    ARTICLE

    Distortion Function for Emoji Image Steganography

    Lina Shi1, Zichi Wang1, Zhenxing Qian1,*, Nannan Huang1, Pauline Puteaux2, Xinpeng Zhang1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 943-953, 2019, DOI:10.32604/cmc.2019.05768

    Abstract Nowadays, emoji image is widely used in social networks. To achieve covert communication in emoji images, this paper proposes a distortion function for emoji images steganography. The profile of image content, the intra- and inter-frame correlation are taken into account in the proposed distortion function to fit the unique properties of emoji image. The three parts are combined together to measure the risks of detection due to the modification on the cover data. With the popular syndrome trellis coding (STC), the distortion of stego emoji image is minimized using the proposed distortion function. As a result, less detectable artifacts could… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding Based on Pixel-Value-Ordering and Pixel Block Merging Strategy

    Wengui Su1,2, Xiang Wang3,*, Yulong Shen1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 925-941, 2019, DOI:10.32604/cmc.2019.04842

    Abstract With the reversible data hiding method based on pixel-value-ordering, data are embedded through the modification of the maximum and minimum values of a block. A significant relationship exists between the embedding performance and the block size. Traditional pixel-value-ordering methods utilize pixel blocks with a fixed size to embed data; the smaller the pixel blocks, greater is the embedding capacity. However, it tends to result in the deterioration of the quality of the marked image. Herein, a novel reversible data hiding method is proposed by incorporating a block merging strategy into Li et al.’s pixel-value-ordering method, which realizes the dynamic control… More >

Displaying 4411-4420 on page 442 of 5350. Per Page