Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Computational Analysis of the Effect of Nano Particle Material Motion on Mixed Convection Flow in the Presence of Heat Generation and Absorption

    Muhammad Ashraf1, Amir Abbas1, Saqib Zia2, Yu-Ming Chu3, 4, Ilyas Khan5, *, Kottakkaran Sooppy Nisar6

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1809-1823, 2020, DOI:10.32604/cmc.2020.011404

    Abstract The present study is concerned with the physical behavior of the combined effect of nano particle material motion and heat generation/absorption due to the effect of different parameters involved in prescribed flow model. The formulation of the flow model is based on basic universal equations of conservation of momentum, energy and mass. The prescribed flow model is converted to non-dimensional form by using suitable scaling. The obtained transformed equations are solved numerically by using finite difference scheme. For the analysis of above said behavior the computed numerical data for fluid velocity, temperature profile, and mass concentration for several constraints that… More >

  • Open Access

    ARTICLE

    APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite

    Tairan Hu1, Tianyang Zhou1, Yichao Zang1, *, Qingxian Wang1, Hang Li2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1795-1807, 2020, DOI:10.32604/cmc.2020.011071

    Abstract With serious cybersecurity situations and frequent network attacks, the demands for automated pentests continue to increase, and the key issue lies in attack planning. Considering the limited viewpoint of the attacker, attack planning under uncertainty is more suitable and practical for pentesting than is the traditional planning approach, but it also poses some challenges. To address the efficiency problem in uncertainty planning, we propose the APU-D* Lite algorithm in this paper. First, the pentest framework is mapped to the planning problem with the Planning Domain Definition Language (PDDL). Next, we develop the pentest information graph to organize network information and… More >

  • Open Access

    ARTICLE

    A Hybrid Path Planning Method Based on Articulated Vehicle Model

    Zhongping Chen1, Dong Wang1, *, Gang Chen2, Yanxi Ren3, Danjie Du4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1781-1793, 2020, DOI:10.32604/cmc.2020.010902

    Abstract Due to the unique steering mechanism and driving characteristics of the articulated vehicle, a hybrid path planning method based on the articulated vehicle model is proposed to meet the demand of obstacle avoidance and searching the path back and forth of the articulated vehicle. First, Support Vector Machine (SVM) theory is used to obtain the two-dimensional optimal zero potential curve and the maximum margin, and then, several key points are selected from the optimal zero potential curves by using Longest Accessible Path (LAP) method. Next, the Cubic Bezier (CB) curve is adopted to connect the curve that satisfies the curvature… More >

  • Open Access

    ARTICLE

    Tissue Segmentation in Nasopharyngeal CT Images Using TwoStage Learning

    Yong Luo1, Xiaojie Li2, Chao Luo2, Feng Wang1, Xi Wu2, Imran Mumtaz3, Cheng Yi1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1771-1780, 2020, DOI:10.32604/cmc.2020.010069

    Abstract Tissue segmentation is a fundamental and important task in nasopharyngeal images analysis. However, it is a challenging task to accurately and quickly segment various tissues in the nasopharynx region due to the small difference in gray value between tissues in the nasopharyngeal image and the complexity of the tissue structure. In this paper, we propose a novel tissue segmentation approach based on a two-stage learning framework and U-Net. In the proposed methodology, the network consists of two segmentation modules. The first module performs rough segmentation and the second module performs accurate segmentation. Considering the training time and the limitation of… More >

  • Open Access

    ARTICLE

    Secure Provenance of Electronic Records Based on Blockchain

    Qirun Wang1, Fujian Zhu2, Sai Ji2, Yongjun Ren2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1753-1769, 2020, DOI:10.32604/cmc.2020.07366

    Abstract At present, the provenance of electronic records is stored centrally. The centralized way of information storage has huge risks. Whether the database itself is destroyed or the communication between the central database and the external interruption occurs, the provenance information of the stored electronic records will not play its role. At the same time, uncertainties such as fires and earthquakes will also pose a potential threat to centralized databases. Moreover, the existing security provenance model is not specifically designed for electronic records. In this paper, a security provenance model of electronic records is constructed based on PREMIS and METS. Firstly,… More >

  • Open Access

    ARTICLE

    Research on Real-Time High Reliable Network File Distribution Technology

    Chenglong Li1, Peipeng Liu1, Hewei Yu1, *, Mengmeng Ge2, Xiangzhan Yu2, Yi Xin2, Yuhang Wang3, Dongyu Zhang4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1739-1752, 2020, DOI:10.32604/cmc.2020.09019

    Abstract The rapid development of Internet of Things (IoT) technology has made previously unavailable data available, and applications can take advantage of device data for people to visualize, explore, and build complex analyses. As the size of the network and the number of network users continue to increase, network requests tend to aggregate on a small number of network resources, which results in uneven load on network requests. Real-time, highly reliable network file distribution technology is of great importance in the Internet of Things. This paper studies real-time and highly reliable file distribution technology for large-scale networks. In response to this… More >

  • Open Access

    ARTICLE

    Identifying Honeypots from ICS Devices Using Lightweight Fuzzy Testing

    Yanbin Sun1, Xiaojun Pan1, Chao Xu2, Penggang Sun2, Quanlong Guan3, Mohan Li1, *, Men Han4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1723-1737, 2020, DOI:10.32604/cmc.2020.010593

    Abstract The security issues of industrial control systems (ICSs) have become increasingly prevalent. As an important part of ICS security, honeypots and antihoneypots have become the focus of offensive and defensive confrontation. However, research on ICS honeypots still lacks breakthroughs, and it is difficult to simulate real ICS devices perfectly. In this paper, we studied ICS honeypots to identify and address their weaknesses. First, an intelligent honeypot identification framework is proposed, based on which feature data type requirements and feature data acquisition for honeypot identification is studied. Inspired by vulnerability mining, we propose a feature acquisition approach based on lightweight fuzz… More >

  • Open Access

    ARTICLE

    Paillier-Based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving

    Xiehua Li1,*, Fang Li1, Jie Jiang1, Xiaoyu Mei2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1707-1721, 2020, DOI:10.32604/cmc.2020.011227

    Abstract Efficient multi-keyword fuzzy search over encrypted data is a desirable technology for data outsourcing in cloud storage. However, the current searchable encryption solutions still have deficiencies in search efficiency, accuracy and multiple data owner support. In this paper, we propose an encrypted data searching scheme that can support multiple keywords fuzzy search with order preserving (PMS). First, a new spelling correction algorithm-(Possibility-Levenshtein based Spelling Correction) is proposed to correct user input errors, so that fuzzy keywords input can be supported. Second, Paillier encryption is introduced to calculate encrypted relevance score of multiple keywords for order preserving. Then, a queue-based query… More >

  • Open Access

    ARTICLE

    An Improved Deep Fusion CNN for Image Recognition

    Rongyu Chen1, Lili Pan1, *, Cong Li1, Yan Zhou1, Aibin Chen1, Eric Beckman2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1691-1706, 2020, DOI:10.32604/cmc.2020.011706

    Abstract With the development of Deep Convolutional Neural Networks (DCNNs), the extracted features for image recognition tasks have shifted from low-level features to the high-level semantic features of DCNNs. Previous studies have shown that the deeper the network is, the more abstract the features are. However, the recognition ability of deep features would be limited by insufficient training samples. To address this problem, this paper derives an improved Deep Fusion Convolutional Neural Network (DF-Net) which can make full use of the differences and complementarities during network learning and enhance feature expression under the condition of limited datasets. Specifically, DF-Net organizes two… More >

  • Open Access

    ARTICLE

    Quantum Algorithms and Experiment Implementations Based on IBM Q

    Wenjie Liu1, 2, *, Junxiu Chen2, Yinsong Xu2, Jiahao Tang2, Lian Tong3, Xiaoyu Song4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1671-1689, 2020, DOI:10.32604/cmc.2020.07564

    Abstract With the rapid development of quantum theory and technology in recent years, especially the emergence of some quantum cloud computing platforms, more and more researchers are not satisfied with the theoretical derivation and simulation verification of quantum computation (especially quantum algorithms), experimental verification on real quantum devices has become a new trend. In this paper, three representative quantum algorithms, namely Deutsch-Jozsa, Grover, and Shor algorithms, are briefly depicted, and then their implementation circuits are presented, respectively. We program these circuits on python with QISKit to connect the remote real quantum devices (i.e., ibmqx4, ibmqx5) on IBM Q to verify these… More >

Displaying 14211-14220 on page 1422 of 22248. Per Page