Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    EIAS: An Efficient Identity-Based Aggregate Signature Scheme for WSNs Against Coalition Attack

    Yong Xie1, Fang Xu2, Xiang Li1, Songsong Zhang1, Xiaodan Zhang1,*, Muhammad Israr3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 903-924, 2019, DOI:10.32604/cmc.2019.05309

    Abstract Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of the data are two most important basic requirements for various services based on big data. Data aggregation is a promising method to decrease operation cost for resource-constrained WSNs. However, the process of data acquisitions in WSNs are in open environments, data aggregation is vulnerable to more special security attacks with hiding feature and subjective fraudulence, such as coalition attack. Aimed to provide data authenticity and integrity protection for WSNs, an efficient and secure identity-based aggregate signature scheme (EIAS) is proposed in this paper.… More >

  • Open Access

    ARTICLE

    An Algorithm for Mining Gradual Moving Object Clusters Pattern From Trajectory Streams

    Yujie Zhang1, Genlin Ji1,*, Bin Zhao1, Bo Sheng2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 885-901, 2019, DOI:10.32604/cmc.2019.05612

    Abstract The discovery of gradual moving object clusters pattern from trajectory streams allows characterizing movement behavior in real time environment, which leverages new applications and services. Since the trajectory streams is rapidly evolving, continuously created and cannot be stored indefinitely in memory, the existing approaches designed on static trajectory datasets are not suitable for discovering gradual moving object clusters pattern from trajectory streams. This paper proposes a novel algorithm of gradual moving object clusters pattern discovery from trajectory streams using sliding window models. By processing the trajectory data in current window, the mining algorithm can capture the trend and evolution of… More >

  • Open Access

    ARTICLE

    A Frame Breaking Based Hybrid Algorithm for UHF RFID Anti-Collision

    Xinyan Wang1,*, Minjun Zhang2, Zengwang Lu3

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 873-883, 2019, DOI:10.32604/cmc.2019.05230

    Abstract Multi-tag collision imposes a vital detrimental effect on reading performance of an RFID system. In order to ameliorate such collision problem and to improve the reading performance, this paper proposes an efficient tag identification algorithm termed as the Enhanced Adaptive Tree Slotted Aloha (EATSA). The key novelty of EATSA is to identify the tags using grouping strategy. Specifically, the whole tag set is divided into groups by a frame of size F. In cases multiple tags fall into a group, the tags of the group are recognized by the improved binary splitting (IBS) method whereas the rest tags are waiting… More >

  • Open Access

    ARTICLE

    Dynamic Response Solution of Multi-Layered Pavement Structure Under FWD Load Appling the Precise Integration Algorithm

    Zejun Han1, Hongyuan Fang2,3,4,*, Juan Zhang5, Fuming Wang2,3,4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 853-871, 2019, DOI:10.32604/cmc.2019.03839

    Abstract The pavement layered structures are composed of surface layer, road base and multi-layered soil foundation. They can be undermined over time by repeated vehicle loads. In this study, a hybrid numerical method which can evaluate the displacement responses of pavement structures under dynamic falling weight deflectometer (FWD) loads. The proposed method consists of two parts: (a) the dynamic stiffness matrices of the points at the surface in the frequency domain which is based on the domain-transformation and dual vector form equation, and (b) interpolates the dynamic stiffness matrices by a continues rational function of frequency. The mixed variables formulation (MVF)… More >

  • Open Access

    ARTICLE

    Defense Against Poisoning Attack via Evaluating Training Samples Using Multiple Spectral Clustering Aggregation Method

    Wentao Zhao1, Pan Li1,*, Chengzhang Zhu1,2, Dan Liu1, Xiao Liu1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 817-832, 2019, DOI:10.32604/cmc.2019.05957

    Abstract The defense techniques for machine learning are critical yet challenging due to the number and type of attacks for widely applied machine learning algorithms are significantly increasing. Among these attacks, the poisoning attack, which disturbs machine learning algorithms by injecting poisoning samples, is an attack with the greatest threat. In this paper, we focus on analyzing the characteristics of positioning samples and propose a novel sample evaluation method to defend against the poisoning attack catering for the characteristics of poisoning samples. To capture the intrinsic data characteristics from heterogeneous aspects, we first evaluate training data by multiple criteria, each of… More >

  • Open Access

    ARTICLE

    On Harmonic and Ev-Degree Molecular Topological Properties of DOX, RTOX and DSL Networks

    Murat Cancan1, *

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 777-786, 2019, DOI:10.32604/cmc.2019.06596

    Abstract Topological indices enable to gather information for the underlying topology of chemical structures and networks. Novel harmonic indices have been defined recently. All degree based topological indices are defined by using the classical degree concept. Recently two novel degree concept have been defined in graph theory: ve-degree and ev-degree. Ve-degree Zagreb indices have been defined by using ve-degree concept. The prediction power of the ve-degree Zagreb indices is stronger than the classical Zagreb indices. Dominating oxide, silicate and oxygen networks are important network models in view of chemistry, physics and information science. Physical and mathematical properties of dominating oxide, silicate… More >

  • Open Access

    ARTICLE

    Application of Image Compression to Multiple-Shot Pictures Using Similarity Norms With Three Level Blurring

    Mohammed Omari1,*, Souleymane Ouled Jaafri1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 753-775, 2019, DOI:10.32604/cmc.2019.06576

    Abstract Image compression is a process based on reducing the redundancy of the image to be stored or transmitted in an efficient form. In this work, a new idea is proposed, where we take advantage of the redundancy that appears in a group of images to be all compressed together, instead of compressing each image by itself. In our proposed technique, a classification process is applied, where the set of the input images are classified into groups based on existing technique like L1 and L2 norms, color histograms. All images that belong to the same group are compressed based on dividing… More >

  • Open Access

    ARTICLE

    A Learning Based Brain Tumor Detection System

    Sultan Noman Qasem1,2, Amar Nazar3, Attia Qamar4, Shahaboddin Shamshirband5,6,*, Ahmad Karim4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 713-727, 2019, DOI:10.32604/cmc.2019.05617

    Abstract Brain tumor is one of the most dangerous disease that causes due to uncontrollable and abnormal cell partition. In this paper, we have used MRI brain scan in comparison with CT brain scan as it is less harmful to detect brain tumor. We considered watershed segmentation technique for brain tumor detection. The proposed methodology is divided as follows: pre-processing, computing foreground applying watershed, extract and supply features to machine learning algorithms. Consequently, this study is tested on big data set of images and we achieved acceptable accuracy from K-NN classification algorithm in detection of brain tumor. More >

  • Open Access

    ARTICLE

    Development of Cloud Based Air Pollution Information System Using Visualization

    SangWook Han1, JungYeon Seo1, Dae-Young Kim2, SeokHoon Kim3, HwaMin Lee3,*

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 697-711, 2019, DOI:10.32604/cmc.2019.06071

    Abstract Air pollution caused by fine dust is a big problem all over the world and fine dust has a fatal impact on human health. But there are too few fine dust measuring stations and the installation cost of fine dust measuring station is very expensive. In this paper, we propose Cloud-based air pollution information system using R. To measure fine dust, we have developed an inexpensive measuring device and studied the technique to accurately measure the concentration of fine dust at the user’s location. And we have developed the smartphone application to provide air pollution information. In our system, we… More >

  • Open Access

    ARTICLE

    A HEVC Video Steganalysis Algorithm Based on PU Partition Modes

    Zhonghao Li1, Laijin Meng1, Shutong Xu1, Zhaohong Li1,2,*, Yunqing Shi3, Yuanchang Liang1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 563-574, 2019, DOI:10.32604/cmc.2019.05565

    Abstract Steganalysis is a technique used for detecting the existence of secret information embedded into cover media such as images and videos. Currently, with the higher speed of the Internet, videos have become a kind of main methods for transferring information. The latest video coding standard High Efficiency Video Coding (HEVC) shows better coding performance compared with the H.264/AVC standard published in the previous time. Therefore, since the HEVC was published, HEVC videos have been widely used as carriers of hidden information.
    In this paper, a steganalysis algorithm is proposed to detect the latest HEVC video steganography method which is based… More >

Displaying 4421-4430 on page 443 of 5350. Per Page