Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    PMS-Sorting: A New Sorting Algorithm Based on Similarity

    Hongbin Wang1, Lianke Zhou1, Guodong Zhao1,*, Nianbin Wang1, Jianguo Sun1, Yue Zheng2, Lei Chen3

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 229-237, 2019, DOI:10.32604/cmc.2019.04628

    Abstract Borda sorting algorithm is a kind of improvement algorithm based on weighted position sorting algorithm, it is mainly suitable for the high duplication of search results, for the independent search results, the effect is not very good and the computing method of relative score in Borda sorting algorithm is according to the rule of the linear regressive, but position relationship cannot fully represent the correlation changes. aimed at this drawback, the new sorting algorithm is proposed in this paper, named PMS-Sorting algorithm, firstly the position score of the returned results is standardized processing, and the similarity retrieval word string with… More >

  • Open Access

    ARTICLE

    An Asymmetric Controlled Bidirectional Quantum State Transmission Protocol

    Yiru Sun1,2, Yuling Chen1,*, Haseeb Ahmad3, Zhanhong Wei4

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 215-227, 2019, DOI:10.32604/cmc.2019.05253

    Abstract In this paper, we propose an asymmetric controlled bidirectional transmission protocol. In the protocol, by using the thirteen-qubit entangled state as the quantum channel, Alice can realize the transmission of a two-qubit equatorial state for Bob and Bob can transmit a four-qubit equatorial state for Alice under the control of Charlie. Firstly, we give the construction of the quantum channel, which can be done by performing several H and CNOT operations. Secondly, through implementing the appropriate measurements and the corresponding recovery operations, the desired states can be transmitted simultaneously, securely and deterministically. Finally, we analyze the performance of the protocol,… More >

  • Open Access

    ARTICLE

    Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method

    Yang Wu1, Weiping Shang2,*, Jiahao Chen3

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 199-214, 2019, DOI:10.32604/cmc.2019.05194

    Abstract Robust data hiding techniques attempt to construct covert communication in a lossy public channel. Nowadays, the existing robust JPEG steganographic algorithms cannot overcome the side-information missing situation. Thus, this paper proposes a new robust JPEG steganographic algorithm based on the high tense region location method which needs no side-information of lossy channel. First, a tense region locating method is proposed based on the Harris-Laplacian feature point. Then, robust cover object generating processes are described. Last, the advanced embedding cost function is proposed. A series of experiments are conducted on various JPEG image sets and the results show that the proposed… More >

  • Open Access

    ARTICLE

    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813

    Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse vulnerability. And on this basis,… More >

  • Open Access

    ARTICLE

    System Architecture and Key Technologies of Network Security Situation Awareness System YHSAS

    Weihong Han1, Zhihong Tian1,*, Zizhong Huang2, Lin Zhong3, Yan Jia2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 167-180, 2019, DOI:10.32604/cmc.2019.05192

    Abstract Network Security Situation Awareness System YHSAS acquires, understands and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. YHSAS is developed for national backbone network, large network operators, large enterprises and other large-scale network. This paper describes its architecture and key technologies: Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis, Knowledge Representation and Management of Super Large-Scale Network Security, Multi-Level, Multi-Granularity and Multi-Dimensional Network Security Index Construction Method, Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology, and so on. The performance tests show that YHSAS… More >

  • Open Access

    ARTICLE

    An Early Warning System for Curved Road Based on OV7670 Image Acquisition and STM32

    Xiaoliang Wang1, *, Wenhua Song1, Bowei Zhang1, Brandon Mausler2, Frank Jiang1, 3

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 135-147, 2019, DOI:10.32604/cmc.2019.05687

    Abstract Nowadays, the number of vehicles in China has increased significantly. The increase of the number of vehicles has also led to the increasingly complex traffic situation and the urgent safety measures in need. However, the existing early warning devices such as geomagnetic, ultrasonic and infrared detection have some shortcomings like difficult installation and maintenance. In addition, geomagnetic detection will damage the road surface, while ultrasonic and infrared detection will be greatly affected by the environment. Considering the shortcomings of the existing solutions, this paper puts forward a solution of early warning for vehicle turning meeting based on image acquisition and… More >

  • Open Access

    ARTICLE

    Lever Arm Compensation of Autonomous Underwater Vehicle for Fast Transfer Alignment

    Qi Wang1,2,*, Changsong Yang1,2, Shaoen Wu3, Yuxiang Wang1,2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 105-118, 2019, DOI:10.32604/cmc.2019.03739

    Abstract Transfer alignment is used to initialize SINS (Strapdown Inertial Navigation System) in motion. Lever-arm effect compensation is studied existing in an AUV (Autonomous Underwater Vehicle) before launched from the mother ship. The AUV is equipped with SINS, Doppler Velocity Log, depth sensor and other navigation sensors. The lever arm will cause large error on the transfer alignment between master inertial navigation system and slave inertial navigation system, especially in big ship situations. This paper presents a novel method that can effectively estimate and compensate the flexural lever arm between the main inertial navigation system mounted on the mother ship and… More >

  • Open Access

    ARTICLE

    Deep Q-Learning Based Computation Offloading Strategy for Mobile Edge Computing

    Yifei Wei1,*, Zhaoying Wang1, Da Guo1, F. Richard Yu2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 89-104, 2019, DOI:10.32604/cmc.2019.04836

    Abstract To reduce the transmission latency and mitigate the backhaul burden of the centralized cloud-based network services, the mobile edge computing (MEC) has been drawing increased attention from both industry and academia recently. This paper focuses on mobile users’ computation offloading problem in wireless cellular networks with mobile edge computing for the purpose of optimizing the computation offloading decision making policy. Since wireless network states and computing requests have stochastic properties and the environment’s dynamics are unknown, we use the model-free reinforcement learning (RL) framework to formulate and tackle the computation offloading problem. Each mobile user learns through interactions with the… More >

  • Open Access

    ARTICLE

    The Prediction of Self-Healing Capacity of Bacteria-Based Concrete Using Machine Learning Approaches

    Xiaoying Zhuang1,2,*, Shuai Zhou3,4

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 57-77, 2019, DOI:10.32604/cmc.2019.04589

    Abstract Advances in machine learning (ML) methods are important in industrial engineering and attract great attention in recent years. However, a comprehensive comparative study of the most advanced ML algorithms is lacking. Six integrated ML approaches for the crack repairing capacity of the bacteria-based self-healing concrete are proposed and compared. Six ML algorithms, including the Support Vector Regression (SVR), Decision Tree Regression (DTR), Gradient Boosting Regression (GBR), Artificial Neural Network (ANN), Bayesian Ridge Regression (BRR) and Kernel Ridge Regression (KRR), are adopted for the relationship modeling to predict crack closure percentage (CCP). Particle Swarm Optimization (PSO) is used for the hyper-parameters… More >

  • Open Access

    ARTICLE

    A Nonlocal Operator Method for Partial Differential Equations with Application to Electromagnetic Waveguide Problem

    Timon Rabczuk1,2,*, Huilong Ren3, Xiaoying Zhuang4,5

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 31-55, 2019, DOI:10.32604/cmc.2019.04567

    Abstract A novel nonlocal operator theory based on the variational principle is proposed for the solution of partial differential equations. Common differential operators as well as the variational forms are defined within the context of nonlocal operators. The present nonlocal formulation allows the assembling of the tangent stiffness matrix with ease and simplicity, which is necessary for the eigenvalue analysis such as the waveguide problem. The present formulation is applied to solve the differential electromagnetic vector wave equations based on electric fields. The governing equations are converted into nonlocal integral form. An hourglass energy functional is introduced for the elimination of… More >

Displaying 4491-4500 on page 450 of 5350. Per Page