Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,097)
  • Open Access

    ARTICLE

    Smartphone User Authentication Based on Holding Position and Touch-Typing Biometrics

    Yu Sun1,2,*, Qiyuan Gao3, Xiaofan Du3, Zhao Gu3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1365-1375, 2019, DOI:10.32604/cmc.2019.06294

    Abstract In this advanced age, when smart phones are the norm, people utilize social networking, online shopping, and even private information storage through smart phones. As a result, identity authentication has become the most critical security activity in this period of the intelligent craze. By analyzing the shortcomings of the existing authentication methods, this paper proposes an identity authentication method based on the behavior of smartphone users. Firstly, the sensor data and touch-screen data of the smart phone users are collected through android programming. Secondly, the eigenvalues of this data are extracted and sent to the server. Thirdly, the Support Vector… More >

  • Open Access

    ARTICLE

    QoS-Aware and Resource-Efficient Dynamic Slicing Mechanism for Internet of Things

    Wenchen He1,*, Shaoyong Guo1, Yun Liang2, Rui Ma3, Xuesong Qiu1, Lei Shi4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1345-1364, 2019, DOI:10.32604/cmc.2019.06669

    Abstract With the popularization of terminal devices and services in Internet of things (IoT), it will be a challenge to design a network resource allocation method meeting various QoS requirements and effectively using substrate resources. In this paper, a dynamic network slicing mechanism including virtual network (VN) mapping and VN reconfiguration is proposed to provide network slices for services. Firstly, a service priority model is defined to create queue for resource allocation. Then a slice including Virtual Network Function (VNF) placement and routing with optimal cost is generated by VN mapping. Next, considering temporal variations of service resource requirements, the size… More >

  • Open Access

    ARTICLE

    Research on Time Synchronization Method Under Arbitrary Network Delay in Wireless Sensor Networks

    Bing Hu1, Feng Xiang2, Fan Wu3, Jian Liu4, Zhe Sun1, Zhixin Sun1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1323-1344, 2019, DOI:10.32604/cmc.2019.06414

    Abstract To cope with the arbitrariness of the network delays, a novel method, referred to as the composite particle filter approach based on variational Bayesian (VB-CPF), is proposed herein to estimate the clock skew and clock offset in wireless sensor networks. VB-CPF is an improvement of the Gaussian mixture kalman particle filter (GMKPF) algorithm. In GMKPF, Expectation-Maximization (EM) algorithm needs to determine the number of mixture components in advance, and it is easy to generate overfitting and underfitting. Variational Bayesian EM (VB-EM) algorithm is introduced in this paper to determine the number of mixture components adaptively according to the observations. Moreover,… More >

  • Open Access

    ARTICLE

    A Coarse Alignment Based on the Sliding Fixed-Interval Least Squares Denoising Method

    Yongyun Zhu1, Tao Zhang1,*, Mohan Li2, Di Wang1, Shaoen Wu3

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1305-1321, 2019, DOI:10.32604/cmc.2019.06406

    Abstract The observation vectors in traditional coarse alignment contain random noise caused by the errors of inertial instruments, which will slow down the convergence rate. To solve the above problem, a real-time noise reduction method, sliding fixed-interval least squares (SFI-LS), is devised to depress the noise in the observation vectors. In this paper, the least square method, improved by a sliding fixed-interval approach, is applied for the real-time noise reduction. In order to achieve a better-performed coarse alignment, the proposed method is utilized to de-noise the random noise in observation vectors. First, the principles of proposed SFI-LS algorithm and coarse alignment… More >

  • Open Access

    ARTICLE

    Detecting Domain Generation Algorithms with Bi-LSTM

    Liang Ding1,*, Lunjie Li1, Jianghong Han1, Yuqi Fan2,*, Donghui Hu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1285-1304, 2019, DOI:10.32604/cmc.2019.06160

    Abstract Botnets often use domain generation algorithms (DGA) to connect to a command and control (C2) server, which enables the compromised hosts connect to the C2 server for accessing many domains. The detection of DGA domains is critical for blocking the C2 server, and for identifying the compromised hosts as well. However, the detection is difficult, because some DGA domain names look normal. Much of the previous work based on statistical analysis of machine learning relies on manual features and contextual information, which causes long response time and cannot be used for real-time detection. In addition, when a new family of… More >

  • Open Access

    ARTICLE

    SNES: Social-Network-Oriented Public Opinion Monitoring Platform Based on ElasticSearch

    Chuiju You1, Dongjie Zhu2,*, Yundong Sun2, Anshan Ye3, Gangshan Wu4, Ning Cao1, Jinming Qiu1, Helen Min Zhou5

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1271-1283, 2019, DOI:10.32604/cmc.2019.06133

    Abstract With the rapid development of social network, public opinion monitoring based on social networks is becoming more and more important. Many platforms have achieved some success in public opinion monitoring. However, these platforms cannot perform well in scalability, fault tolerance, and real-time performance. In this paper, we propose a novel social-network-oriented public opinion monitoring platform based on ElasticSearch (SNES). Firstly, SNES integrates the module of distributed crawler cluster, which provides real-time social media data access. Secondly, SNES integrates ElasticSearch which can store and retrieve massive unstructured data in near real time. Finally, we design subscription module based on Apache Kafka… More >

  • Open Access

    ARTICLE

    Hashtag Recommendation Using LSTM Networks with Self-Attention

    Yatian Shen1, Yan Li1, Jun Sun1,*, Wenke Ding1, Xianjin Shi1, Lei Zhang1, Xiajiong Shen1, Jing He2

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1261-1269, 2019, DOI:10.32604/cmc.2019.06104

    Abstract On Twitter, people often use hashtags to mark the subject of a tweet. Tweets have specific themes or content that are easy for people to manage. With the increase in the number of tweets, how to automatically recommend hashtags for tweets has received wide attention. The previous hashtag recommendation methods were to convert the task into a multi-class classification problem. However, these methods can only recommend hashtags that appeared in historical information, and cannot recommend the new ones. In this work, we extend the self-attention mechanism to turn the hashtag recommendation task into a sequence labeling task. To train and… More >

  • Open Access

    ARTICLE

    Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information

    Ce Li1,2,*, Xinyu Shang2, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Xianlei Xu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1245-1260, 2019, DOI:10.32604/cmc.2019.06159

    Abstract Pipeline defect detection systems collect the videos from cameras of pipeline robots, however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats. The existing systems tend to reach the limit in terms of data access anywhere, access security and video processing on cloud. There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection. In this paper, we deploy the framework of a cloud based pipeline defect detection system, including the user management module, pipeline robot control module, system service module, and defect detection… More >

  • Open Access

    ARTICLE

    The Volatility of High-Yield Bonds Using Mixed Data Sampling Methods

    Maojun Zhang1,2, Jiajin Yao1, Zhonghang Xia3, Jiangxia Nan1,*, Cuiqing Zhang1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1233-1244, 2019, DOI:10.32604/cmc.2019.06118

    Abstract It is well known that economic policy uncertainty prompts the volatility of the high-yield bond market. However, the correlation between economic policy uncertainty and volatility of high-yield bonds is still not clear. In this paper, we employ GARCH-MIDAS models to investigate their correlation with US economic policy uncertainty index and S&P high-yield bond index. The empirical studies show that mixed volatility models can effectively capture the realized volatility of high-yield bonds, and economic policy uncertainty and macroeconomic factors have significant effects on the long-term component of high-yield bonds volatility. More >

  • Open Access

    ARTICLE

    Research on Data Fusion of Adaptive Weighted Multi-Source Sensor

    Donghui Li1, Cong Shen2,*, Xiaopeng Dai1, Xinghui Zhu1, Jian Luo1, Xueting Li1, Haiwen Chen3, Zhiyao Liang4

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1217-1231, 2019, DOI:10.32604/cmc.2019.06354

    Abstract Data fusion can effectively process multi-sensor information to obtain more accurate and reliable results than a single sensor. The data of water quality in the environment comes from different sensors, thus the data must be fused. In our research, self-adaptive weighted data fusion method is used to respectively integrate the data from the PH value, temperature, oxygen dissolved and NH3 concentration of water quality environment. Based on the fusion, the Grubbs method is used to detect the abnormal data so as to provide data support for estimation, prediction and early warning of the water quality. More >

Displaying 16401-16410 on page 1641 of 22097. Per Page