Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24,138)
  • Open Access

    ARTICLE

    Leveraging Logical Anchor into Topology Optimization for Indoor Wireless Fingerprinting

    Lin Wang1,*, Huixiang Liu1, Wenyuan Liu1,2, Nan Jing1, Ahmad Adnan1, Chenshu Wu3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 437-449, 2019, DOI:10.32604/cmc.2019.03814

    Abstract The indoor subarea localization has wide application space in dynamic hot zone identification, indoor layout optimization, store dynamic pricing and crowd flow trend prediction. The ubiquitous mobile devices provide the opportunity for wireless fingerprinting-based indoor localization services. However, there are two short board where the existing methods have been criticized. One is that a tagging approach requires a large number of professional surveys for wireless fingerprint construction, which weakens the scalability of the methods. The other is that the crowdsourcing-based methods encounter the cold boot problem in the system initial stage. To address these issues,… More >

  • Open Access

    ARTICLE

    The Application of BP Neural Networks to Analysis the National Vulnerability

    Guodong Zhao1, Yuewei Zhang1, Yiqi Shi2, Haiyan Lan1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 421-436, 2019, DOI:10.32604/cmc.2019.03782

    Abstract Climate change is the main factor affecting the country’s vulnerability, meanwhile, it is also a complicated and nonlinear dynamic system. In order to solve this complex problem, this paper first uses the analytic hierarchy process (AHP) and natural breakpoint method (NBM) to implement an AHP-NBM comprehensive evaluation model to assess the national vulnerability. By using ArcGIS, national vulnerability scores are classified and the country’s vulnerability is divided into three levels: fragile, vulnerable, and stable. Then, a BP neural network prediction model which is based on multivariate linear regression is used to predict the critical point… More >

  • Open Access

    ARTICLE

    Research on the Signal Reconstruction of the Phased Array Structural Health Monitoring Based Using the Basis Pursuit Algorithm

    Yajie Sun1,2,*, Yanqing Yuan2, Qi Wang2, Lihua Wang3, Enlu Li2, Li Qiao4

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 409-420, 2019, DOI:10.32604/cmc.2019.03642

    Abstract The signal processing problem has become increasingly complex and demand high acquisition system, this paper proposes a new method to reconstruct the structure phased array structural health monitoring signal. The method is derived from the compressive sensing theory and the signal is reconstructed by using the basis pursuit algorithm to process the ultrasonic phased array signals. According to the principles of the compressive sensing and signal processing method, non-sparse ultrasonic signals are converted to sparse signals by using sparse transform. The sparse coefficients are obtained by sparse decomposition of the original signal, and then the More >

  • Open Access

    ARTICLE

    A Study on Dual-Load-Zone Model of Overlying Strata and Evolution Law of Mining Stress

    Yuejin Zhou1,*, Mingpeng Li1, Xiaoding Xu1, Meng Li1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 391-407, 2019, DOI:10.32604/cmc.2019.04456

    Abstract The changeable structure and movement law of overlying strata are the main contributor to the change of mining stress. Starting from the relevant theory of key stratum and particularly based on the theory of mine ground pressure and strata control, this research proposed a new solution to mining stress problems by establishing a dual-load-zone stratum structural model. Elastic foundation beam theory was used to solve the stress of overlying strata of the dual-load-zones with superposition method, which revised the traditional calculation method of mining stress. The abnormal increase of lead abutment pressure in the mining… More >

  • Open Access

    ARTICLE

    Cross-Lingual Non-Ferrous Metals Related News Recognition Method Based on CNN with A Limited Bi-Lingual Dictionary

    Xudong Hong1, Xiao Zheng1,*, Jinyuan Xia1, Linna Wei1, Wei Xue1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 379-389, 2019, DOI:10.32604/cmc.2019.04059

    Abstract To acquire non-ferrous metals related news from different countries’ internet, we proposed a cross-lingual non-ferrous metals related news recognition method based on CNN with a limited bilingual dictionary. Firstly, considering the lack of related language resources of non-ferrous metals, we use a limited bilingual dictionary and CCA to learn cross-lingual word vector and to represent news in different languages uniformly. Then, to improve the effect of recognition, we use a variant of the CNN to learn recognition features and construct the recognition model. The experimental results show that our proposed method acquires better results. More >

  • Open Access

    ARTICLE

    Research on the Relationship Between Garlic and Young Garlic Shoot Based on Big Data

    Feng Guo1, Pingzeng Liu1,*, Wanming Ren2, Ning Cao3, Chao Zhang1, Fujiang Wen1, Helen Min Zhou4

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 363-378, 2019, DOI:10.32604/cmc.2019.03794

    Abstract In view of the problems such as frequent fluctuation of garlic price, lack of efficient forecasting means and difficulty in realizing the steady development of garlic industry, combined with the current situation of garlic industry and the collected data information. Taking Big Data platform of garlic industry chain as the core, using the methods of correlation analysis, smoothness test, co-integration test, and Granger causality test, this paper analyzes the correlation, dynamic, and causality between garlic price and young garlic shoot price. According to the current situation of garlic industry, the garlic industry service based on More >

  • Open Access

    ARTICLE

    Rational Non-Hierarchical Quantum State Sharing Protocol

    Zhao Dou1, Gang Xu1,*, Xiubo Chen1, Kaiguo Yuan2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 335-347, 2019, DOI:10.32604/cmc.2019.04159

    Abstract Rational participants want to maximize their benefits. The protocol with rational participants will be more realistic than the protocol with honest, semi-honest and dishonest participants. We research the rational non-hierarchical quantum state sharing in this paper. General steps of some known quantum state sharing protocol are summarized. Based on these steps, a new rational protocol is proposed. It means that lots of common protocols could be modified to rational protocols. Our protocol is widely applicable. Analyses show that the proposed protocol is rational and secure. It is also all-win for agents. Furthermore, number of deceiving More >

  • Open Access

    ARTICLE

    Improve Computer Visualization of Architecture Based on the Bayesian Network

    Tao Shen1,*, Yukari Nagai1, Chan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 307-318, 2019, DOI:10.32604/cmc.2019.04876

    Abstract Computer visualization has marvelous effects when it is applied in various fields, especially in architectural design. As an emerging force in the innovation industry, architects and design agencies have already demonstrated the value of architectural visual products in actual application projects. Based on the digital image technology, virtual presentation of future scenes simulates architecture design, architectural renderings and multimedia videos. Therefore, it can help design agencies transform the theoretical design concept into a lively and realistic visual which can provide the audience with a clearer understanding of the engineering and construction projects. However, it is More >

  • Open Access

    ARTICLE

    A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

    Xin Jiang1, Mingzhe Liu1,*, Chen Yang1, Yanhua Liu1, Ruili Wang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 45-59, 2019, DOI:10.32604/cmc.2019.03863

    Abstract In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    N. Jayashree1,*, R. S. Bhuvaneswaran1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 263-285, 2019, DOI:10.32604/cmc.2019.03924

    Abstract Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the More >

Displaying 17491-17500 on page 1750 of 24138. Per Page