Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (27,731)
  • Open Access

    ARTICLE

    Modeling and Analysis the Effects of EMP on the Balise System

    Zhiwei Gao1,*, Shuai Zhang1, Li Hao1, Ning Cao2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 859-878, 2019, DOI:10.32604/cmc.2019.03634

    Abstract Balise system is one kind of high-rate point-mode data transmission equipment. It plays an indispensable role in Chinese Train Control System (CTCS), and it has been immigrated and widely used for passenger dedicated lines and high-speed lines. Thus, its working conditions directly affect train operation safety. However, the balise information transmission system (BITS) is based on the principle of electromagnetic induction, and the communication process is susceptible to external electromagnetic interference. Therefore, it is vital to study the influence of transient signal interference on the balise system. This paper builds the up-link model between the… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Algorithm for Clinical Decision-Support Systems Using Random Forest

    Alia Alabdulkarim1, Mznah Al-Rodhaan2, Yuan Tian*,3, Abdullah Al-Dhelaan2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 585-601, 2019, DOI:10.32604/cmc.2019.05637

    Abstract Clinical decision-support systems are technology-based tools that help healthcare providers enhance the quality of their services to satisfy their patients and earn their trust. These systems are used to improve physicians’ diagnostic processes in terms of speed and accuracy. Using data-mining techniques, a clinical decision support system builds a classification model from hospital’s dataset for diagnosing new patients using their symptoms. In this work, we propose a privacy-preserving clinical decision-support system that uses a privacy-preserving random forest algorithm to diagnose new symptoms without disclosing patients’ information and exposing them to cyber and network attacks. Solving More >

  • Open Access

    ARTICLE

    Online Magnetic Flux Leakage Detection System for Sucker Rod Defects Based on LabVIEW Programming

    Ou Zhang1,*, Xueye Wei1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 529-544, 2019, DOI:10.32604/cmc.2019.04075

    Abstract Aiming at the detection of the sucker rod defects, a real-time detection system is designed using the non-destructive testing technology of magnetic flux leakage (MFL). An MFL measurement system consists of many parts, and this study focuses on the signal acquisition and processing system. First of all, this paper introduces the hardware part of the acquisition system in detail, including the selection of the Hall-effect sensor, the design of the signal conditioning circuit, and the working process of the single chip computer (SCM) control serial port. Based on LabVIEW, a graphical programming software, the software More >

  • Open Access

    ARTICLE

    An Improved Unsupervised Image Segmentation Method Based on Multi-Objective Particle Swarm Optimization Clustering Algorithm

    Zhe Liu1,2,*, Bao Xiang1,3, Yuqing Song1, Hu Lu1, Qingfeng Liu1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 451-461, 2019, DOI:10.32604/cmc.2019.04069

    Abstract Most image segmentation methods based on clustering algorithms use single-objective function to implement image segmentation. To avoid the defect, this paper proposes a new image segmentation method based on a multi-objective particle swarm optimization (PSO) clustering algorithm. This unsupervised algorithm not only offers a new similarity computing approach based on electromagnetic forces, but also obtains the proper number of clusters which is determined by scale-space theory. It is experimentally demonstrated that the applicability and effectiveness of the proposed multi-objective PSO clustering algorithm. More >

  • Open Access

    ARTICLE

    A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem

    Qi He1, Shui Yu2, Huifang Xu3,*, Jia Liu4, Dongmei Huang5, Guohua Liu6, Fangqin Xu3, Yanling Du1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 349-361, 2019, DOI:10.32604/cmc.2019.03703

    Abstract The recent advances in remote sensing and computer techniques give birth to the explosive growth of remote sensing images. The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost savings. However, the openness of cloud brings challenges for image data security. In this paper, we propose a weighted image sharing scheme to ensure the security of remote sensing in cloud environment, which takes the weights of participants (i.e., cloud service providers) into consideration. An extended Mignotte sequence is constructed according to… More >

  • Open Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856

    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily More >

  • Open Access

    ARTICLE

    Optimization Algorithm for Reduction the Size of Dixon Resultant Matrix: A Case Study on Mechanical Application

    Shang Zhang1, *, Seyedmehdi Karimi2, Shahaboddin Shamshirband3, 4, *, Amir Mosavi5,6

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 567-583, 2019, DOI:10.32604/cmc.2019.02795

    Abstract In the process of eliminating variables in a symbolic polynomial system, the extraneous factors are referred to the unwanted parameters of resulting polynomial. This paper aims at reducing the number of these factors via optimizing the size of Dixon matrix. An optimal configuration of Dixon matrix would lead to the enhancement of the process of computing the resultant which uses for solving polynomial systems. To do so, an optimization algorithm along with a number of new polynomials is introduced to replace the polynomials and implement a complexity analysis. Moreover, the monomial multipliers are optimally positioned More >

  • Open Access

    ARTICLE

    A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT

    Liang Kou1, Yiqi Shi2, Liguo Zhang1, Duo Liu1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 545-565, 2019, DOI:10.32604/cmc.2019.03760

    Abstract With the development of computer hardware technology and network technology, the Internet of Things as the extension and expansion of traditional computing network has played an increasingly important role in all professions and trades and has had a tremendous impact on people lifestyle. The information perception of the Internet of Things plays a key role as a link between the computer world and the real world. However, there are potential security threats in the Perceptual Layer Network applied for information perception because Perceptual Layer Network consists of a large number of sensor nodes with weak More >

  • Open Access

    ARTICLE

    Design of Feedback Shift Register of Against Power Analysis Attack

    Yongbin Zhao1,*, XuYang1, RanranLi1

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 517-527, 2019, DOI:10.32604/cmc.2019.03680

    Abstract Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization More >

  • Open Access

    ARTICLE

    Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications

    Shanshan Yu1, Ju Liu1,*, Xiaoqing Zhang1, Shangbin Wu2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 505-516, 2019, DOI:10.32604/cmc.2019.04282

    Abstract Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services. The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP) method. Next, in the defined relay selection area, we More >

Displaying 20131-20140 on page 2014 of 27731. Per Page