Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (27,955)
  • Open Access

    ARTICLE

    An Improved Differential Fault Analysis on Block Cipher KLEIN-64

    Min Long1, *, Man Kong1, Sai Long1, Xiang Zhang2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1425-1436, 2020, DOI:10.32604/cmc.2020.011116 - 20 August 2020

    Abstract KLEIN-64 is a lightweight block cipher designed for resource-constrained environment, and it has advantages in software performance and hardware implementation. Recent investigation shows that KLEIN-64 is vulnerable to differential fault attack (DFA). In this paper, an improved DFA is performed to KLEIN-64. It is found that the differential propagation path and the distribution of the S-box can be fully utilized to distinguish the correct and wrong keys when a half-byte fault is injected in the 10th round. By analyzing the difference matrix before the last round of S-box, the location of fault injection can be limited More >

  • Open Access

    ARTICLE

    Empirical Analysis of Agricultural Cultural Resources Value Evaluation under DEA Model

    Wei Liang1, 2, Yang Ni3, Tingyi Li1, Xuejiao Lin1, Soo-Jin Chung1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1411-1424, 2020, DOI:10.32604/cmc.2020.011166 - 20 August 2020

    Abstract Agricultural culture is a productive activity about education and management. It aims at high efficiency and high quality, uses technology as its means, and takes nature as its carrier. Agricultural cultural resources are the product of the rapid development of modern economy. It promotes the development of the national economy and profoundly affects people's production and life. DEA model, also known as data envelope analysis method, is an algorithm that uses multiple data decision units for input and output training to obtain the final model. This article explains the concept and basic characteristics of agricultural… More >

  • Open Access

    ARTICLE

    Quantum Hierarchical Agglomerative Clustering Based on One Dimension Discrete Quantum Walk with Single-Point Phase Defects

    Gongde Guo1, Kai Yu1, Hui Wang2, Song Lin1, *, Yongzhen Xu1, Xiaofeng Chen3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1397-1409, 2020, DOI:10.32604/cmc.2020.011399 - 20 August 2020

    Abstract As an important branch of machine learning, clustering analysis is widely used in some fields, e.g., image pattern recognition, social network analysis, information security, and so on. In this paper, we consider the designing of clustering algorithm in quantum scenario, and propose a quantum hierarchical agglomerative clustering algorithm, which is based on one dimension discrete quantum walk with single-point phase defects. In the proposed algorithm, two nonclassical characters of this kind of quantum walk, localization and ballistic effects, are exploited. At first, each data point is viewed as a particle and performed this kind of… More >

  • Open Access

    ARTICLE

    Remote Sensing Image Classification Algorithm Based on Texture Feature and Extreme Learning Machine

    Xiangchun Liu1, Jing Yu2,Wei Song1, 3, *, Xinping Zhang1, Lizhi Zhao1, Antai Wang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1385-1395, 2020, DOI:10.32604/cmc.2020.011308 - 20 August 2020

    Abstract With the development of satellite technology, the satellite imagery of the earth’s surface and the whole surface makes it possible to survey surface resources and master the dynamic changes of the earth with high efficiency and low consumption. As an important tool for satellite remote sensing image processing, remote sensing image classification has become a hot topic. According to the natural texture characteristics of remote sensing images, this paper combines different texture features with the Extreme Learning Machine, and proposes a new remote sensing image classification algorithm. The experimental tests are carried out through the More >

  • Open Access

    ARTICLE

    Rate-Energy Tradeoff for Wireless Simultaneous Information and Power Transfer in Full-Duplex and Half-Duplex Systems

    Xiaoye Shi1, *, Jin Sun1, Dongming Li1, Fei Ding2, Zhaowei Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1373-1384, 2020, DOI:10.32604/cmc.2020.011018 - 20 August 2020

    Abstract In this paper, we study the rate-energy tradeoff for wireless simultaneous information and power transfer in full-duplex and half-duplex scenarios. To this end, the weighting function of energy efficiency and transmission rate, as rate-energy tradeoff metric is first introduced and the metric optimization problem is formulated. Applying Karush-Kuhn-Tucker (KKT) conditions for Lagrangian optimality and a series of mathematical approximations, the metric optimization problem can be simplified. The closed-form solution of the power ratio is obtained, building direct relationship between power ratio and the rate-energy tradeoff metric. By choosing power ratio, one can make the tradeoff… More >

  • Open Access

    ARTICLE

    Ensemble Learning Based on GBDT and CNN for Adoptability Prediction

    Yunfan Ye1, Fang Liu1, *, Shan Zhao2, Wanting Hu3, Zhiyao Liang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1361-1372, 2020, DOI:10.32604/cmc.2020.011632 - 20 August 2020

    Abstract By efficiently and accurately predicting the adoptability of pets, shelters and rescuers can be positively guided on improving attraction of pet profiles, reducing animal suffering and euthanization. Previous prediction methods usually only used a single type of content for training. However, many pets contain not only textual content, but also images. To make full use of textual and visual information, this paper proposed a novel method to process pets that contain multimodal information. We employed several CNN (Convolutional Neural Network) based models and other methods to extract features from images and texts to obtain the More >

  • Open Access

    ARTICLE

    Fast Compass Alignment for Strapdown Inertial Navigation System

    Jin Sun1, Dengyin Zhang1, *, Xiaoye Shi1, Fei Ding1, 2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1349-1360, 2020, DOI:10.32604/cmc.2020.011459 - 20 August 2020

    Abstract Initial alignment is the precondition for strapdown inertial navigation system (SINS) to navigate. Its two important indexes are accuracy and rapidity, the accuracy of the initial alignment is directly related to the working accuracy of SINS, but in selfalignment, the two indexes are often contradictory. In view of the limitations of conventional data processing algorithms, a novel method of compass alignment based on stored data and repeated navigation calculation for SINS is proposed. By means of data storage, the same data is used in different stages of the initial alignment, which is beneficial to shorten More >

  • Open Access

    ARTICLE

    End-to-End Latency Evaluation of the Sat5G Network Based on Stochastic Network Calculus

    Huaifeng Shi1, Chengsheng Pan1, *, Li Yang2, Debin Wei2, Yunqing Shi3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1335-1348, 2020, DOI:10.32604/cmc.2020.011005 - 20 August 2020

    Abstract Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time, reliability and capacity is an inherent feature of satellite-5G integrated network (Sat5G). However, there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latencysensitive service. To this end, we build a tandem model considering the connection relationship between the various components in Sat5G network architecture, and give an end-to-end latency calculation function based on this model. By introducing stochastic network calculus, we derive the relationship between the end-to-end latency bound and the violation More >

  • Open Access

    ARTICLE

    Ensemble Strategy for Insider Threat Detection from User Activity Logs

    Shihong Zou1, Huizhong Sun1, *, Guosheng Xu1, Ruijie Quan2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1321-1334, 2020, DOI:10.32604/cmc.2020.09649 - 20 August 2020

    Abstract In the information era, the core business and confidential information of enterprises/organizations is stored in information systems. However, certain malicious inside network users exist hidden inside the organization; these users intentionally or unintentionally misuse the privileges of the organization to obtain sensitive information from the company. The existing approaches on insider threat detection mostly focus on monitoring, detecting, and preventing any malicious behavior generated by users within an organization’s system while ignoring the imbalanced ground-truth insider threat data impact on security. To this end, to be able to detect insider threats more effectively, a data… More >

  • Open Access

    ARTICLE

    Case Study: Spark GPU-Enabled Framework to Control COVID-19 Spread Using Cell-Phone Spatio-Temporal Data

    Hussein Shahata Abdallah1, *, Mohamed H. Khafagy1, Fatma A. Omara2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1303-1320, 2020, DOI:10.32604/cmc.2020.011313 - 20 August 2020

    Abstract Nowadays, the world is fighting a dangerous form of Coronavirus that represents an emerging pandemic. Since its early appearance in China Wuhan city, many countries undertook several strict regulations including lockdowns and social distancing measures. Unfortunately, these procedures have badly impacted the world economy. Detecting and isolating positive/probable virus infected cases using a tree tracking mechanism constitutes a backbone for containing and resisting such fast spreading disease. For helping this hard effort, this research presents an innovative case study based on big data processing techniques to build a complete tracking system able to identify the… More >

Displaying 17531-17540 on page 1754 of 27955. Per Page