Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,249)
  • Open Access

    ARTICLE

    A Novel Reversible Data Hiding Scheme Based on Lesion Extraction and with Contrast Enhancement for Medical Images

    Xingxing Xiao1, Yang1,*, Rui Li2, Weiming Zhang3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 101-115, 2019, DOI:10.32604/cmc.2019.05293

    Abstract The medical industry develops rapidly as science and technology advance. People benefit from medical resource sharing, but suffer from privacy leaks at the same time. In order to protect patients’ privacy and improve quality of medical images, a novel reversible data hiding (RDH) scheme based on lesion extraction and with contrast enhancement is proposed. Furthermore, the proposed scheme can enhance the contrast of medial image's lesion area directly and embed high-capacity privacy data reversibly. Different from previous segmentation methods, this scheme first adopts distance regularized level set evolution (DRLSE) to extract lesion and targets at the lesion area accurately for… More >

  • Open Access

    ARTICLE

    Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

    Wen Tian1, Xiaopeng Ji1,*, Weiwei Liu1, Guangjie Liu1, Rong Lin1,2, Jiangtao Zhai3, Yuewei Dai3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 193-211, 2019, DOI:10.32604/cmc.2019.05290

    Abstract Cyber-physical system (CPS) is an advanced system that integrats physical processes, computation and communication resources. The security of cyber-physical systems has become an active research area in recent years. In this paper, we focus on defensive strategies against network attacks in CPS. We introduce both low- and highinteraction honeypots into CPS as a security management tool deliberately designed to be probed, attacked and compromised. In addition, an analysis resource constraint is introduced for the purpose of optimizing defensive strategies against network attacks in CPS. We study the offensive and defensive interactions of CPS and model the offensive and defensive process… More >

  • Open Access

    ARTICLE

    An Improved MDS-MAP Localization Algorithm Based on Weighted Clustering and Heuristic Merging for Anisotropic Wireless Networks with Energy Holes

    Jing Wang1,*, Xiaohe Qiu1, Yuanfei Tu1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 227-244, 2019, DOI:10.32604/cmc.2019.05281

    Abstract The MDS-MAP (multidimensional scaling-MAP) localization algorithm utilize almost merely connectivity information, and therefore it is easy to implement in practice of wireless sensor networks (WSNs). Anisotropic networks with energy hole, however, has blind communication spots that cause loss of information in the merging phase of MDSMAP. To enhance the positioning accuracy, the authors propose an MDS-MAP (CH) algorithm which can improve the clustering and merging strategy. In order to balance the effect of energy consumption and the network topology stabilization, we present a weighted clustering scheme, which considers the residual energy, the degree of connectivity nodes and node density. As… More >

  • Open Access

    ARTICLE

    Relation Extraction for Massive News Texts

    Libo Yin1, Xiang Meng2, Jianxun Li3, Jianguo Sun2,*

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 275-285, 2019, DOI:10.32604/cmc.2019.05556

    Abstract With the development of information technology including Internet technologies, the amount of textual information that people need to process daily is increasing. In order to automatically obtain valuable and user-informed information from massive amounts of textual data, many researchers have conducted in-depth research in the area of entity relation extraction. Based on the existing research of word vector and the method of entity relation extraction, this paper designs and implements an method based on support vector machine (SVM) for extracting English entity relationships from massive news texts. The method converts sentences in natural language into a form of numerical matrix… More >

  • Open Access

    ARTICLE

    Improved Fully Convolutional Network for Digital Image Region Forgery Detection

    Jiwei Zhang1, Yueying Li2, Shaozhang Niu1,*, Zhiyi Cao1, Xinyi Wang1

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 287-303, 2019, DOI:10.32604/cmc.2019.05353

    Abstract With the rapid development of image editing techniques, the image splicing behavior, typically for those that involve copying a portion from one original image into another targeted image, has become one of the most prevalent challenges in our society. The existing algorithms relying on hand-crafted features can be used to detect image splicing but unfortunately lack precise location information of the tampered region. On the basis of changing the classifications of fully convolutional network (FCN), here we proposed an improved FCN that enables locating the spliced region. Specifically, we first insert the original images into the training dataset that contains… More >

  • Open Access

    ARTICLE

    Network Embedding-Based Anomalous Density Searching for Multi-Group Collaborative Fraudsters Detection in Social Media

    Chengzhang Zhu1, 2, Wentao Zhao2, *, Qian Li1, Pan Li2, Qiaobo Da3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 317-333, 2019, DOI:10.32604/cmc.2019.05677

    Abstract Detecting collaborative fraudsters who manipulate opinions in social media is becoming extremely important in order to provide reliable information, in which, however, the diversity in different groups of collaborative fraudsters presents a significant challenge to existing collaborative fraudsters detection methods. These methods often detect collaborative fraudsters as the largest group of users who have the strongest relation with each other in the social media, consequently overlooking the other groups of fraudsters that are with strong user relation yet small group size. This paper introduces a novel network embedding-based framework NEST and its instance BEST to address this issue. NEST detects… More >

  • Open Access

    ARTICLE

    A Novel Broadband Microstrip Antenna Based on Operation of Multi-Resonant Modes

    Taohua Chen1, Yueyun Chen1,*, Rongling Jian1, Zushen Liu2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 335-349, 2019, DOI:10.32604/cmc.2019.07073

    Abstract A novel broadband microstrip antenna under operation of TM1/2,0, TM10 and TM12 modes through a shorting wall and slots is proposed in this paper. Initially, an inverted U-shaped slot is adopted around the feeding point, which achieves a good impedance matching on TM10 mode and separates the patch into two parts. Additionally, a shorting wall is added underneath the edge of smaller patch to excite another one-quarter resonant mode, i.e., TM1/2,0 mode of smaller patch close to TM10 mode to expand the impedance bandwidth. Further, the antenna width is enlarged and two symmetrical vertical rectangular slots are cut on the… More >

  • Open Access

    ARTICLE

    Fuzzy Search for Multiple Chinese Keywords in Cloud Environment

    Zhongjin Fang1, 2, Jinwei Wang1, *, Baowei Wang1, Jianjun Zhang3, Yunqing Shi4

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 351-363, 2019, DOI:10.32604/cmc.2019.07106

    Abstract With the continuous development of cloud computing and big data technology, the use of cloud storage is more and more extensive, and a large amount of data is outsourced for public cloud servers, and the security problems that follow are gradually emerging. It can not only protect the data privacy of users, but also realize efficient retrieval and use of data, which is an urgent problem for cloud storage. Based on the existing fuzzy search and encrypted data fuzzy search schemes, this paper uses the characteristics of fuzzy sounds and polysemy that are unique to Chinese, and realizes the synonym… More >

  • Open Access

    ARTICLE

    Knowledge Composition and Its Influence on New Product Development Performance in the Big Data Environment

    Chuanrong Wu1,*, Veronika Lee1, Mark E. McMurtrey2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 365-378, 2019, DOI:10.32604/cmc.2019.06949

    Abstract Product innovation is regarded as a primary means for enterprises to maintain their competitive advantage. Knowledge transfer is a major way that enterprises access knowledge from the external environment for new product innovation. Knowledge transfer may face the risk of infringement of the intellectual property rights of other enterprises and the termination of licensing agreements by the knowledge source. Enterprises must develop independent innovation knowledge at the same time they profit from knowledge transfers. Therefore, new product development by an enterprise usually consists of three types of new knowledge: big data knowledge transferred from big data knowledge providers, private knowledge… More >

  • Open Access

    ARTICLE

    Outage Capacity Analysis for Cognitive Non-Orthogonal Multiple Access Downlink Transmissions Systems in the Presence of Channel Estimation Error

    Yinghua Zhang1,2, Yanfang Dong2, Lei Wang1, Jian Liu1,*, Yunfeng Peng1, Jim Feng3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 379-393, 2019, DOI:10.32604/cmc.2019.05790

    Abstract In this paper, we propose a downlink cognitive non-orthogonal multiple access (NOMA) network, where the secondary users (SUs) operate in underlay mode. In the network, secondary transmitter employs NOMA signaling for downlink transmission, and the primary user (PU) is interfered by the transmission from SU. The expressions for the outage probabilities are derived in closed-form for both primary and secondary users in the presence of channel estimation error. Numerical simulation results show that the channel estimation error and the inter-network interference cause degradation of the downlink outage performance. Also the power allocation and the location have a significant impact on… More >

Displaying 19121-19130 on page 1913 of 22249. Per Page