Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    A New Time-Aware Collaborative Filtering Intelligent Recommendation System

    Weijin Jiang1,2,3, Jiahui Chen1,*, Yirong Jiang4,*, Yuhui Xu1, Yang Wang1, Lina Tan1, Guo Liang5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 849-859, 2019, DOI:10.32604/cmc.2019.05932

    Abstract Aiming at the problem that the traditional collaborative filtering recommendation algorithm does not fully consider the influence of correlation between projects on recommendation accuracy, this paper introduces project attribute fuzzy matrix, measures the project relevance through fuzzy clustering method, and classifies all project attributes. Then, the weight of the project relevance is introduced in the user similarity calculation, so that the nearest neighbor search is more accurate. In the prediction scoring section, considering the change of user interest with time, it is proposed to use the time weighting function to improve the influence of the time effect of the evaluation,… More >

  • Open Access

    ARTICLE

    An Efficient Quantum Key Distribution Protocol with Dense Coding on Single Photons

    Hao Xiao1,*, Jun Zhang2, Wenhua Huang3, Mi Zhou4, Wencheng Hu5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 759-775, 2019, DOI:10.32604/cmc.2019.06085

    Abstract Combined with the dense coding mechanism and the bias-BB84 protocol, an efficient quantum key distribution protocol with dense coding on single photons (QDKD-SP) is proposed. Compared with the BB84 or bias-BB84 protocols based on single photons, our QDKD-SP protocol has a higher capacity without increasing the difficulty of its experiment implementation as each correlated photon can carry two bits of useful information. Compared with the quantum dense key distribution (QDKD) protocol based on entangled states, our protocol is more feasible as the preparation and the measurement of a single-photon quantum state is not difficult with current technology. In addition, our… More >

  • Open Access

    ARTICLE

    Achieving Privacy-Preserving Iris Identification Via El Gamal

    Yong Ding1, Lei Tian1, Bo Han2, Huiyong Wang2,*, Yujue Wang1, James Xi Zheng3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 727-738, 2019, DOI:10.32604/cmc.2019.06220

    Abstract Currently, many biometric systems maintain the user’s biometrics and templates in plaintext format, which brings great privacy risk to uses’ biometric information. Biometrics are unique and almost unchangeable, which means it is a great concern for users on whether their biometric information would be leaked. To address this issue, this paper proposes a confidential comparison algorithm for iris feature vectors with masks, and develops a privacy-preserving iris verification scheme based on the El Gamal encryption scheme. In our scheme, the multiplicative homomorphism of encrypted features is used to compare of iris features and their mask information. Also, this paper improves… More >

  • Open Access

    ARTICLE

    Instant Edit Propagation on Images Based on Bilateral Grid

    Feng Li1,2, Chaofeng Ou2, Yan Gui1,2,3,*, Lingyun Xiang1,2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 643-656, 2019, DOI:10.32604/cmc.2019.06094

    Abstract The ability to quickly and intuitively edit digital content has become increasingly important in our everyday life. However, existing edit propagation methods for editing digital images are typically based on optimization with high computational cost for large inputs. Moreover, existing edit propagation methods are generally inefficient and highly time-consuming. Accordingly, to improve edit efficiency, this paper proposes a novel edit propagation method using a bilateral grid, which can achieve instant propagation of sparse image edits. Firstly, given an input image with user interactions, we resample each of its pixels into a regularly sampled bilateral grid, which facilitates efficient mapping from… More >

  • Open Access

    ARTICLE

    ICVSS: A New Method for Vulnerability Quantitative Grading

    Tiantian Tan1,*, Baosheng Wang1, Yong Tang1, Xu Zhou1, Jingwen Han2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 629-641, 2019, DOI:10.32604/cmc.2019.06049

    Abstract Vulnerability technology is the basic of network security technology, vulnerability quantitative grading methods, such as CVSS, WIVSS, ICVSS, provide a reference to vulnerability management, but the problems of ignoring the risk elevation caused by a group of vulnerabilities and low accuracy of exploitable level evaluation exist in current vulnerability quantitative grading methods. To solve problems above in current network security quantitative evaluation methods, this paper verified the high relevance degree between type and exploitable score of vulnerability, proposed a new vulnerability quantitative grading method ICVSS, ICVSS can explore attack path using continuity level defined by privilege, add vulnerability type to… More >

  • Open Access

    ARTICLE

    Generating Questions Based on Semi-Automated and End-to-End Neural Network

    Tianci Xia1,2, Yuan Sun1,2,*, Xiaobing Zhao1,2, Wei Song1, Yumiao Guo3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 617-628, 2019, DOI:10.32604/cmc.2019.05860

    Abstract With the emergence of large-scale knowledge base, how to use triple information to generate natural questions is a key technology in question answering systems. The traditional way of generating questions require a lot of manual intervention and produce lots of noise. To solve these problems, we propose a joint model based on semi-automated model and End-to-End neural network to automatically generate questions. The semi-automated model can generate question templates and real questions combining the knowledge base and center graph. The End-to-End neural network directly sends the knowledge base and real questions to BiLSTM network. Meanwhile, the attention mechanism is utilized… More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

    Weidong Fang1, Wuxiong Zhang1,2,*, QianQian Zhao1,2, Xiaohong Ji3, Wei Chen4, Biruk Assefa5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 583-599, 2019, DOI:10.32604/cmc.2019.05237

    Abstract As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether… More >

  • Open Access

    ARTICLE

    Keyphrase Generation Based on Self-Attention Mechanism

    Kehua Yang1,*, Yaodong Wang1, Wei Zhang1, Jiqing Yao2, Yuquan Le1

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 569-581, 2019, DOI:10.32604/cmc.2019.05952

    Abstract Keyphrase greatly provides summarized and valuable information. This information can help us not only understand text semantics, but also organize and retrieve text content effectively. The task of automatically generating it has received considerable attention in recent decades. From the previous studies, we can see many workable solutions for obtaining keyphrases. One method is to divide the content to be summarized into multiple blocks of text, then we rank and select the most important content. The disadvantage of this method is that it cannot identify keyphrase that does not include in the text, let alone get the real semantic meaning… More >

  • Open Access

    ARTICLE

    Improvement of Flat Surfaces Quality of Aluminum Alloy 6061-O By a Proposed Trajectory of Ball Burnishing Tool

    Ruba Alghazoul1, Almohanad Makki1, Magd Abdel Wahab2,3,*

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 555-568, 2019, DOI:10.32604/cmc.2019.06337

    Abstract Burnishing is a profitable process of surface finishing due to its ability to be automated, which makes burnishing method more desirable than other finishing methods. To obtain high surface finish, non-stop operation is required for CNC machine and we can attain that by choosing a suitable trajectory of the finishing tool. In other words, burnishing paths should be multidirectional rather than monotonic, in order to cover uniformly the surface. Indeed, the burnishing force is also a key parameter of the burnishing process because it determines the degree of plastic deformation, and that makes determining the optimum burnishing force an essential… More >

  • Open Access

    ARTICLE

    Human Behavior Classification Using Geometrical Features of Skeleton and Support Vector Machines

    Syed Muhammad Saqlain Shah1,*, Tahir Afzal Malik2, Robina khatoon1, Syed Saqlain Hassan3, Faiz Ali Shah4

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 535-553, 2019, DOI:10.32604/cmc.2019.07948

    Abstract Classification of human actions under video surveillance is gaining a lot of attention from computer vision researchers. In this paper, we have presented methodology to recognize human behavior in thin crowd which may be very helpful in surveillance. Research have mostly focused the problem of human detection in thin crowd, overall behavior of the crowd and actions of individuals in video sequences. Vision based Human behavior modeling is a complex task as it involves human detection, tracking, classifying normal and abnormal behavior. The proposed methodology takes input video and applies Gaussian based segmentation technique followed by post processing through presenting… More >

Displaying 17311-17320 on page 1732 of 22248. Per Page