Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,233)
  • Open Access

    ARTICLE

    Analysis of Unsteady Heat Transfer Problems with Complex Geometries Using Isogeometric Boundary Element Method

    Weihua Fang1, Zhilin An2, Tiantang Yu2, *, Tinh Quoc Bui3, 4, *

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 929-962, 2020, DOI:10.32604/cmc.2020.05022

    Abstract Numerical analysis of unsteady heat transfer problems with complex geometries by the isogeometric boundary element method (IGABEM) is presented. The IGABEM possesses many desirable merits and features, for instance, (a) exactly represented arbitrarily complex geometries, and higher-order continuity due to nonuniform rational B-splines (NURBS) shape functions; (b) using NURBS for both field approximation and geometric description; (c) directly utilizing geometry data from computer-aided design (CAD); and (d) only boundary discretization. The formulation of IGABEM for unsteady heat transfer is derived. The domain discretization in terms of IGABEM for unsteady heat transfer is required as that in traditional BEM. The internal… More >

  • Open Access

    ARTICLE

    Unsupervised Anomaly Detection via DBSCAN for KPIs Jitters in Network Managements

    Haiwen Chen1, Guang Yu1, Fang Liu2, Zhiping Cai1, *, Anfeng Liu3, Shuhui Chen1, Hongbin Huang1, Chak Fong Cheang4

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 917-927, 2020, DOI:10.32604/cmc.2020.05981

    Abstract For many Internet companies, a huge amount of KPIs (e.g., server CPU usage, network usage, business monitoring data) will be generated every day. How to closely monitor various KPIs, and then quickly and accurately detect anomalies in such huge data for troubleshooting and recovering business is a great challenge, especially for unlabeled data. The generated KPIs can be detected by supervised learning with labeled data, but the current problem is that most KPIs are unlabeled. That is a time-consuming and laborious work to label anomaly for company engineers. Build an unsupervised model to detect unlabeled data is an urgent need… More >

  • Open Access

    ARTICLE

    Edge Computing-Based Tasks Offloading and Block Caching for Mobile Blockchain

    Yong Yan1, Yao Dai2, *, Zhiqiang Zhou3, Wei Jiang4, Shaoyong Guo2

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 905-915, 2020, DOI:10.32604/cmc.2020.07425

    Abstract Internet of Things (IoT) technology is rapidly evolving, but there is no trusted platform to protect user privacy, protect information between different IoT domains, and promote edge processing. Therefore, we integrate the blockchain technology into constructing trusted IoT platforms. However, the application of blockchain in IoT is hampered by the challenges posed by heavy computing processes. To solve the problem, we put forward a blockchain framework based on mobile edge computing, in which the blockchain mining tasks can be offloaded to nearby nodes or the edge computing service providers and the encrypted hashes of blocks can be cached in the… More >

  • Open Access

    ARTICLE

    A Formal Method for Service Choreography Verification Based on Description Logic

    Tingting Zhang1, 2, 3, *, Yushi Lan2, Minggang Yu1, Changyou Zheng1, Kun Liu1

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 893-904, 2020, DOI:10.32604/cmc.2020.06216

    Abstract Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model. This paper presents a new approach of choreography model verification based on Description Logic. A meta model of service choreography is built to provide a conceptual framework to capture the formal syntax and semantics of service choreography. Based on the framework, a set of rules and constraints are defined in Description Logic for choreography model verification. To automate model verification, the UML-based service choreography model will be transformed, by the given algorithms, into the… More >

  • Open Access

    ARTICLE

    Maintaining Complex Formations and Avoiding Obstacles for Multi-Agents

    Yali Wang1, Youqian Feng1, Zhonghai Yin1, Cheng Zhou1, *

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 877-891, 2020, DOI:10.32604/cmc.2020.06423

    Abstract This paper researches some problems in complex formation for multi-agents, in which two matrices are proposed to record the formation. The pattern matrix is used to describe the pattern of the formation; meanwhile, the location matrix is used to record the location of each agent. Thus, all desired positions of each agent will be obtained by geometrical relationship on the basis of two matrices above. In addition a self-adaptation flocking algorithm is proposed to control all agents to form a desired formation and avoid obstacles. The main idea is as follows: agents will form a desired formation through the method… More >

  • Open Access

    ARTICLE

    MFPL: Multi-Frequency Phase Difference Combination Based Device-Free Localization

    Zengshan Tian1, Weiqin Yang1, Yue Jin1, Liangbo Xie1, *, Zhengwen Huang2

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 861-876, 2020, DOI:10.32604/cmc.2020.07297

    Abstract With the popularity of indoor wireless network, device-free indoor localization has attracted more and more attention. Unlike device-based localization where the target is required to carry an active transmitter, their frequent signal scanning consumes a large amount of energy, which is inconvenient for devices with limited energy. In this work, we propose the MFPL, device-free localization (DFL) system based on WiFi distance measurement. First, we combine multi-subcarrier characteristic of Channel State Information (CSI) with classical Fresnel reflection model to get the linear relationship between the change of the length of reflection path and the subcarrier phase difference. Then we calculate… More >

  • Open Access

    ARTICLE

    Two-Dimensional Interpolation Criterion Using DFT Coefficients

    Yuan Chen1, Liangtao Duan1, Weize Sun2, *, Jingxin Xu3

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 849-859, 2020, DOI:10.32604/cmc.2020.07115

    Abstract In this paper, we address the frequency estimator for 2-dimensional (2-D) complex sinusoids in the presence of white Gaussian noise. With the use of the sinc function model of the discrete Fourier transform (DFT) coefficients on the input data, a fast and accurate frequency estimator is devised, where only the DFT coefficient with the highest magnitude and its four neighbors are required. Variance analysis is also included to investigate the accuracy of the proposed algorithm. Simulation results are conducted to demonstrate the superiority of the developed scheme, in terms of the estimation performance and computational complexity. More >

  • Open Access

    ARTICLE

    Stability of Nonlinear Feedback Shift Registers with Periodic Input

    Bo Gao1, *, Xuan Liu1, Xiaobo Wu1, *, Shudong Li2, *, Zhongzhou Lan1, Hui Lu2, *, Boyan Liu1

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 833-847, 2020, DOI:10.32604/cmc.2020.06702

    Abstract The stability of Non-Linear Feedback Shift Registers (NFSRs) plays an important role in the cryptographic security. Due to the complexity of nonlinear systems and the lack of efficient algebraic tools, the theorems related to the stability of NFSRs are still not well-developed. In this paper, we view the NFSR with periodic inputs as a Boolean control network. Based on the mathematical tool of semi-tensor product (STP), the Boolean network can be mapped into an algebraic form. Through these basic theories, we analyze the state space of non-autonomous NFSRs, and discuss the stability of an NFSR with periodic inputs of limited… More >

  • Open Access

    ARTICLE

    Difference of Visual Information Metric Based on Entropy of Primitive

    Yanghong Zhang1, Feng Sun2, Liwei Tian1, Jinfeng Li3, Longqing Zhang3, Shengfu Lan3

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 817-831, 2020, DOI:10.32604/cmc.2020.06076

    Abstract Image sparse representation is a method of efficient compression and coding of image signal in the process of digital image processing. Image after sparse representation, to enhance the transmission efficiency of the image signal. Entropy of Primitive (EoP) is a statistical representation of the sparse representation of the image, which indicates the probability of each base element. Based on the EoP, this paper presents an image quality evaluation method-Difference of Visual Information Metric (DVIM). The principle of this method is to evaluate the image quality with the difference between the original image and the distorted image. The comparative experiments between… More >

  • Open Access

    ARTICLE

    Scalable Skin Lesion Multi-Classification Recognition System

    Fan Liu1, Jianwei Yan2, Wantao Wang2, Jian Liu2, *, Junying Li3, Alan Yang4

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 801-816, 2020, DOI:10.32604/cmc.2020.07039

    Abstract Skin lesion recognition is an important challenge in the medical field. In this paper, we have implemented an intelligent classification system based on convolutional neural network. First of all, this system can classify whether the input image is a dermascopic image with an accuracy of 99%. And then diagnose the dermoscopic image and the non-skin mirror image separately. Due to the limitation of the data, we can only realize the recognition of vitiligo by non-skin mirror. We propose a vitiligo recognition based on the probability average of three structurally identical CNN models. The method is more efficient and robust than… More >

Displaying 15671-15680 on page 1568 of 22233. Per Page