Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23,827)
  • Open Access

    ARTICLE

    A Dual-spline Approach to Load Error Repair in a HEMS Sensor Network

    Xiaodong Liu1, Qi Liu1,*

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 179-194, 2018, DOI:10.32604/cmc.2018.04025

    Abstract In a home energy management system (HEMS), appliances are becoming diversified and intelligent, so that certain simple maintenance work can be completed by appliances themselves. During the measurement, collection and transmission of electricity load data in a HEMS sensor network, however, problems can be caused on the data due to faulty sensing processes and/or lost links, etc. In order to ensure the quality of retrieved load data, different solutions have been presented, but suffered from low recognition rates and high complexity. In this paper, a validation and repair method is presented to detect potential failures More >

  • Open Access

    ARTICLE

    Communication Mechanism and Algorithm of Composite Location Analysis of Emergency Communication based on Rail

    Yong Jiang1, Xiaolin Zhong1,*, Yong Guo1, Meixia Duan2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 321-340, 2018, DOI:10.32604/cmc.2018.03796

    Abstract The emergency communication system based on rail is an unconventional emergency communication mode, it is a complement equipment for that conventional communication system can’t work while tunnel mine accident occurs. Medium of transmission channel is the widely existing rail in the tunnel. In this paper we analyzed the characteristics of the rail transmission channel, verified the feasibility that information is transmitted by vibration signal in rail, we proposed the realization plan of the system. Communication protocol and processing mechanism suitable for rail transmission are designed according to the characteristics of channel bandwidth and low data… More >

  • Open Access

    ARTICLE

    A Memory-efficient Simulation Method of Grover's Search Algorithm

    Xuwei Tang1, Juan Xu1,2,3,*, Bojia Duan1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 307-319, 2018, DOI:10.32604/cmc.2018.03693

    Abstract Grover's search algorithm is one of the most significant quantum algorithms, which can obtain quadratic speedup of the extensive search problems. Since Grover's search algorithm cannot be implemented on a real quantum computer at present, its quantum simulation is regarded as an effective method to study the search performance. When simulating the Grover's algorithm, the storage space required is exponential, which makes it difficult to simulate the high-qubit Grover's algorithm. To this end, we deeply study the storage problem of probability amplitude, which is the core of the Grover simulation algorithm. We propose a novel… More >

  • Open Access

    ARTICLE

    Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

    Chak Fong Cheang1,*, Yiqin Wang1, Zhiping Cai2, Gen Xu1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 297-306, 2018, DOI:10.32604/cmc.2018.03808

    Abstract Cloud computing provides easy and on-demand access to computing resources in a configurable pool. The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines (VMs), instead of being restricted on a single physical server. When more and more network services are deployed on the cloud, the detection of the intrusion likes Distributed Denial-of-Service (DDoS) attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud… More >

  • Open Access

    ARTICLE

    Research on Hybrid Model of Garlic Short-term Price Forecasting based on Big Data

    Baojia Wang1, Pingzeng Liu1,*, Zhang Chao1, Wang Junmei1, Weijie Chen1, Ning Cao2, Gregory M.P. O’Hare3, Fujiang Wen1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 283-296, 2018, DOI:10.32604/cmc.2018.03791

    Abstract Garlic prices fluctuate dramatically in recent years and it is very difficult to predict garlic prices. The autoregressive integrated moving average (ARIMA) model is currently the most important method for predicting garlic prices. However, the ARIMA model can only predict the linear part of the garlic prices, and cannot predict its nonlinear part. Therefore, it is urgent to adopt a method to analyze the nonlinear characteristics of garlic prices. After comparing the advantages and disadvantages of several major prediction models which used to forecast nonlinear time series, using support vector machine (SVM) model to predict… More >

  • Open Access

    ARTICLE

    An Evidence Combination Method based on DBSCAN Clustering

    Kehua Yang1,2,*, Tian Tan1, Wei Zhang1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 269-281, 2018, DOI:10.32604/cmc.2018.03696

    Abstract Dempster-Shafer (D-S) evidence theory is a key technology for integrating uncertain information from multiple sources. However, the combination rules can be paradoxical when the evidence seriously conflict with each other. In the paper, we propose a novel combination algorithm based on unsupervised Density-Based Spatial Clustering of Applications with Noise (DBSCAN) density clustering. In the proposed mechanism, firstly, the original evidence sets are preprocessed by DBSCAN density clustering, and a successfully focal element similarity criteria is used to mine the potential information between the evidence, and make a correct measure of the conflict evidence. Then, two More >

  • Open Access

    ARTICLE

    Band Selection Method of Absorption Peak Perturbance for the FTIR/ATR Spectrum Analysis

    Jun Xie1, Chong Wang1, Jiaxiang Cai2, Fuhong Cai1,*

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 261-268, 2018, DOI:10.32604/cmc.2018.03669

    Abstract The rapid quantification method of human serum glucose was established by using the Fourier transform infrared spectroscopy (FTIR) and attenuated total reflection (ATR). By the subtracted spectra between glucose aqueous solution and de-ionized water, absorption peaks are calculated in fingerprint area. Based on these absorption peaks and multiple linear regression (MLR) model, discrete band selection method of absorption peaks disturbance model (APDM) was developed. 5 absorption peaks 1150 cm-1, 1103 cm-1, 1078 cm-1, 1034 cm-1, 991 cm-1 were found in fingerprint area. Used these absorption peaks to establish absorption peaks disturbance model, the optimal wavelength combinations are 1140 More >

  • Open Access

    ARTICLE

    Fault Diagnosis of Motor in Frequency Domain Signal by Stacked De-noising Auto-encoder

    Xiaoping Zhao1, Jiaxin Wu1,*, Yonghong Zhang2, Yunqing Shi3, Lihua Wang2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 223-242, 2018, DOI:10.32604/cmc.2018.02490

    Abstract With the rapid development of mechanical equipment, mechanical health monitoring field has entered the era of big data. Deep learning has made a great achievement in the processing of large data of image and speech due to the powerful modeling capabilities, this also brings influence to the mechanical fault diagnosis field. Therefore, according to the characteristics of motor vibration signals (nonstationary and difficult to deal with) and mechanical ‘big data’, combined with deep learning, a motor fault diagnosis method based on stacked de-noising auto-encoder is proposed. The frequency domain signals obtained by the Fourier transform More >

  • Open Access

    ARTICLE

    Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks

    Daofu Gong1,2, Yan Chen1,2, Haoyu Lu1,*, Zhenyu Li3, Yibing Han1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 243-260, 2018, DOI:10.32604/cmc.2018.03781

    Abstract To detect and recover random tampering areas, a combined-decision-based self-embedding watermarking scheme is proposed herein. In this scheme, the image is first partitioned into 2×2 size blocks. Next, the high 5 bits of a block’s average value is embedded into its offset block. The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks. The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering. More >

  • Open Access

    ARTICLE

    A MPTCP Scheduler for Web Transfer

    Wenjun Yang1, Pingping Dong1,2,*, Wensheng Tang1, Xiaoping Lou1, Hangjun Zhou3, Kai Gao4, Haodong Wang5

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 205-222, 2018, DOI:10.32604/cmc.2018.03726

    Abstract Multipath TCP (MPTCP) is the most significant extension of TCP that enables transmission via multiple paths concurrently to improve the resource usage and throughput of long flows. However, due to the concurrent multiple transfer (CMT) in short flow trans-mission, the congestion window (cwnd) of each MPTCP subflow is too small and it may lead to timeout when a single lost packet cannot be recovered through fast retransmission. As a result, MPTCP has even worse performance for short flows compared to regular TCP. In this paper, we take the first step to analyze the main reason… More >

Displaying 18051-18060 on page 1806 of 23827. Per Page