Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,113)
  • Open Access

    ARTICLE

    A New NTRU-Type Public-Key Cryptosystem over the Binary Field

    Youyu Gu1, Xiongwei Xie2, Chunsheng Gu3,*

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 305-316, 2019, DOI:10.32604/cmc.2019.04121

    Abstract As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time… More >

  • Open Access

    ARTICLE

    New Generation Model of Word Vector Representation Based on CBOW or Skip-Gram

    Zeyu Xiong1,*, Qiangqiang Shen1, Yueshan Xiong1, Yijie Wang1, Weizi Li2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 259-273, 2019, DOI:10.32604/cmc.2019.05155

    Abstract Word vector representation is widely used in natural language processing tasks. Most word vectors are generated based on probability model, its bag-of-words features have two major weaknesses: they lose the ordering of the words and they also ignore semantics of the words. Recently, neural-network language models CBOW and Skip-Gram are developed as continuous-space language models for words representation in high dimensional real-valued vectors. These vector representations have recently demonstrated promising results in various NLP tasks because of their superiority in capturing syntactic and contextual regularities in language. In this paper, we propose a new strategy based on optimization in contiguous… More >

  • Open Access

    ARTICLE

    Stream-Based Data Sampling Mechanism for Process Object

    Yongzheng Lin1, Hong Liu1, ∗, Zhenxiang Chen2, Kun Zhang2, Kun Ma2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 245-257, 2019, DOI:10.32604/cmc.2019.04322

    Abstract Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find… More >

  • Open Access

    ARTICLE

    Balanced Deep Supervised Hashing

    Hefei Ling1, Yang Fang1, Lei Wu1, Ping Li1,*, Jiazhong Chen1, Fuhao Zou1, Jialie Shen2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 85-100, 2019, DOI:10.32604/cmc.2019.05588

    Abstract Recently, Convolutional Neural Network (CNN) based hashing method has achieved its promising performance for image retrieval task. However, tackling the discrepancy between quantization error minimization and discriminability maximization of network outputs simultaneously still remains unsolved. Motivated by the concern, we propose a novel Balanced Deep Supervised Hashing (BDSH) based on variant posterior probability to learn compact discriminability-preserving binary code for large scale image data. Distinguished from the previous works, BDSH can search an equilibrium point within the discrepancy. Towards the goal, a delicate objective function is utilized to maximize the discriminability of the output space with the variant posterior probability… More >

  • Open Access

    ARTICLE

    An Optimal Multi-Vector Iterative Algorithm in a Krylov Subspace for Solving the Ill-Posed Linear Inverse Problems

    Chein-Shan Liu 1

    CMC-Computers, Materials & Continua, Vol.33, No.2, pp. 175-198, 2013, DOI:10.3970/cmc.2013.033.175

    Abstract An optimal m-vector descent iterative algorithm in a Krylov subspace is developed, of which the m weighting parameters are optimized from a properly defined objective function to accelerate the convergence rate in solving an ill-posed linear problem. The optimal multi-vector iterative algorithm (OMVIA) is convergent fast and accurate, which is verified by numerical tests of several linear inverse problems, including the backward heat conduction problem, the heat source identification problem, the inverse Cauchy problem, and the external force recovery problem. Because the OMVIA has a good filtering effect, the numerical results recovered are quite smooth with small error, even under… More >

  • Open Access

    ARTICLE

    The time-dependent Green's function of the transverse vibration of a composite rectangular membrane

    V.G.Yakhno1, D. Ozdek2,3

    CMC-Computers, Materials & Continua, Vol.33, No.2, pp. 155-173, 2013, DOI:10.3970/cmc.2013.033.155

    Abstract A new method for the approximate computation of the time-dependent Green's function for the equations of the transverse vibration of a multi stepped membrane is suggested. This method is based on generalization of the Fourier series expansion method and consists of the following steps. The first step is finding eigenvalues and an orthogonal set of eigenfunctions corresponding to an ordinary differential operator with boundary and matching conditions. The second step is a regularization (approximation) of the Dirac delta function in the form of the Fourier series with a finite number of terms, using the orthogonal set of eigenfunctions. The third… More >

  • Open Access

    ARTICLE

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    Dae-Young Kim1, Se Dong Min2, †, Seokhoon Kim3, †, *

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06102

    Abstract The importance of Blockchain and IoT technology have been highlighted in various fields. These are not unaccustomed words anymore in our lives. Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet. The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues. Consequently, we propose a new data transmission scheme… More >

  • Open Access

    ARTICLE

    A Quantum Authorization Management Protocol Based on EPR-Pairs

    Yan Chang1,*, Shibin Zhang1, Lili Yan1, Guihua Han1, Haiquan Song1, Yan Zhang1, Xueyang Li1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 1005-1014, 2019, DOI:10.32604/cmc.2019.06297

    Abstract Quantum authorization management (QAM) is the quantum scheme for privilege management infrastructure (PMI) problem. Privilege management (authorization management) includes authentication and authorization. Authentication is to verify a user’s identity. Authorization is the process of verifying that a authenticated user has the authority to perform a operation, which is more fine-grained. In most classical schemes, the authority management center (AMC) manages the resources permissions for all network nodes within the jurisdiction. However, the existence of AMC may be the weakest link of the whole scheme. In this paper, a protocol for QAM without AMC is proposed based on entanglement swapping. In… More >

  • Open Access

    ARTICLE

    LRV: A Tool for Academic Text Visualization to Support the Literature Review Process

    Tahani Almutairi1,*, Maha Al-yahya2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 741-751, 2019, DOI:10.32604/cmc.2019.06239

    Abstract Text visualization is concerned with the representation of text in a graphical form to facilitate comprehension of large textual data. Its aim is to improve the ability to understand and utilize the wealth of text-based information available. An essential task in any scientific research is the study and review of previous works in the specified domain, a process that is referred to as the literature survey process. This process involves the identification of prior work and evaluating its relevance to the research question. With the enormous number of published studies available online in digital form, this becomes a cumbersome task… More >

  • Open Access

    ARTICLE

    A Reliable Stochastic Numerical Analysis for Typhoid Fever Incorporating With Protection Against Infection

    Muhammad Shoaib Arif1,*, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Rabia Fayyaz3, Mehvish Naz3, Umer Javed4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 787-804, 2019, DOI:10.32604/cmc.2019.04655

    Abstract In this paper, a reliable stochastic numerical analysis for typhoid fever incorporating with protection against infection has been considered. We have compared the solutions of stochastic and deterministic typhoid fever model. It has been shown that the stochastic typhoid fever model is more realistic as compared to the deterministic typhoid fever model. The effect of threshold number T* hold in stochastic typhoid fever model. The proposed framework of the stochastic non-standard finite difference scheme (SNSFD) preserves all dynamical properties like positivity, bounded-ness and dynamical consistency defined by Mickens, R. E. The stochastic numerical simulation of the model showed that increase… More >

Displaying 19001-19010 on page 1901 of 22113. Per Page