Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,375)
  • Open Access

    ARTICLE

    Research on the Relationship Between Garlic and Young Garlic Shoot Based on Big Data

    Feng Guo1, Pingzeng Liu1,*, Wanming Ren2, Ning Cao3, Chao Zhang1, Fujiang Wen1, Helen Min Zhou4

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 363-378, 2019, DOI:10.32604/cmc.2019.03794

    Abstract In view of the problems such as frequent fluctuation of garlic price, lack of efficient forecasting means and difficulty in realizing the steady development of garlic industry, combined with the current situation of garlic industry and the collected data information. Taking Big Data platform of garlic industry chain as the core, using the methods of correlation analysis, smoothness test, co-integration test, and Granger causality test, this paper analyzes the correlation, dynamic, and causality between garlic price and young garlic shoot price. According to the current situation of garlic industry, the garlic industry service based on Big Data is put forward.… More >

  • Open Access

    ARTICLE

    Rational Non-Hierarchical Quantum State Sharing Protocol

    Zhao Dou1, Gang Xu1,*, Xiubo Chen1, Kaiguo Yuan2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 335-347, 2019, DOI:10.32604/cmc.2019.04159

    Abstract Rational participants want to maximize their benefits. The protocol with rational participants will be more realistic than the protocol with honest, semi-honest and dishonest participants. We research the rational non-hierarchical quantum state sharing in this paper. General steps of some known quantum state sharing protocol are summarized. Based on these steps, a new rational protocol is proposed. It means that lots of common protocols could be modified to rational protocols. Our protocol is widely applicable. Analyses show that the proposed protocol is rational and secure. It is also all-win for agents. Furthermore, number of deceiving agents is considered to redefine… More >

  • Open Access

    ARTICLE

    Improve Computer Visualization of Architecture Based on the Bayesian Network

    Tao Shen1,*, Yukari Nagai1, Chan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 307-318, 2019, DOI:10.32604/cmc.2019.04876

    Abstract Computer visualization has marvelous effects when it is applied in various fields, especially in architectural design. As an emerging force in the innovation industry, architects and design agencies have already demonstrated the value of architectural visual products in actual application projects. Based on the digital image technology, virtual presentation of future scenes simulates architecture design, architectural renderings and multimedia videos. Therefore, it can help design agencies transform the theoretical design concept into a lively and realistic visual which can provide the audience with a clearer understanding of the engineering and construction projects. However, it is challenging for designers to produce… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

    Xin Jiang1, Mingzhe Liu1,*, Chen Yang1, Yanhua Liu1, Ruili Wang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 45-59, 2019, DOI:10.32604/cmc.2019.03863

    Abstract In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the mesh network as the public… More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    N. Jayashree1,*, R. S. Bhuvaneswaran1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 263-285, 2019, DOI:10.32604/cmc.2019.03924

    Abstract Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the watermark and transformed original image… More >

  • Open Access

    ARTICLE

    Estimating the Number of Posts in Sina Weibo

    Kai Dong1,2,*, Taolin Guo1, Xiaolin Fang1, Zhen Ling1, Haibo Ye3

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 197-213, 2019, DOI:10.32604/cmc.2019.03903

    Abstract Sina Weibo, an online social network site, has gained popularity but lost it in recent years. Now we are still curious on the number of posts in Sina Weibo in its golden age. Besides checking this number in Sina’s operating results, we aim to estimate and verify this number through measurement by using statistical techniques. Existing approaches on measurement always rely on the supported streaming application programming interface (API) which provides proportional sampling. However no such API is available for Sina Weibo. Instead, Sina provides a public timeline API which provides non-proportional sampling but always returns a (nearly) fixed number… More >

  • Open Access

    ARTICLE

    An Entity-Association-Based Matrix Factorization Recommendation Algorithm

    Gongshen Liu1, Kui Meng1,*, Jiachen Ding1, Jan P. Nees1, Hongyi Guo1, Xuewen Zhang1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 101-120, 2019, DOI:10.32604/cmc.2019.03898

    Abstract Collaborative filtering is the most popular approach when building recommender systems, but the large scale and sparse data of the user-item matrix seriously affect the recommendation results. Recent research shows the user’s social relations information can improve the quality of recommendation. However, most of the current social recommendation algorithms only consider the user's direct social relations, while ignoring potential users’ interest preference and group clustering information. Moreover, project attribute is also important in item rating. We propose a recommendation algorithm which using matrix factorization technology to fuse user information and project information together. We first detect the community structure using… More >

  • Open Access

    ARTICLE

    A Novel Multi-Hop Algorithm for Wireless Network with Unevenly Distributed Nodes

    Yu Liu1, Zhong Yang2, Xiaoyong Yan3, Guangchi Liu4, Bo Hu5,*

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 79-100, 2019, DOI:10.32604/cmc.2019.03626

    Abstract Node location estimation is not only the promise of the wireless network for target recognition, monitoring, tracking and many other applications, but also one of the hot topics in wireless network research. In this paper, the localization algorithm for wireless network with unevenly distributed nodes is discussed, and a novel multi-hop localization algorithm based on Elastic Net is proposed. The proposed approach is formulated as a regression problem, which is solved by Elastic Net. Unlike other previous localization approaches, the proposed approach overcomes the shortcomings of traditional approaches assume that nodes are distributed in regular areas without holes or obstacles,… More >

  • Open Access

    ARTICLE

    High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources

    Di Xiao1,*, Jia Liang1, Qingqing Ma1, Yanping Xiang1, Yushu Zhang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 1-13, 2019, DOI:10.32604/cmc.2019.02171

    Abstract To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptability of CS to nonequivalent resources. The original image is divided into two parts: one part is encrypted with traditional stream cipher; the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously. The collected non-image data is firstly encrypted with simple stream cipher. For data security management, the encrypted non-image data is then embedded into the encrypted image, and… More >

  • Open Access

    ARTICLE

    A Co-Verification Interface Design for High-Assurance CPS

    Yu Zhang1,2,*, Mengxing Huang1,2,*, Hao Wang3, Wenlong Feng1,2, Jieren Cheng1,2, Hui Zhou1,2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 287-306, 2019, DOI:10.32604/cmc.2019.03736

    Abstract Cyber-Physical Systems (CPS) tightly integrate cyber and physical components and transcend traditional control systems and embedded system. Such systems are often mission-critical; therefore, they must be high-assurance. High-assurance CPS require co-verification which takes a comprehensive view of the whole system to verify the correctness of a cyber and physical components together. Lack of strict multiple semantic definition for interaction between the two domains has been considered as an obstacle to the CPS co-verification. A Cyber/Physical interface model for hierarchical a verification of CPS is proposed. First, we studied the interaction mechanism between computation and physical processes. We further classify the… More >

Displaying 21851-21860 on page 2186 of 22375. Per Page