Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,462)
  • Open Access


    Deep Feature Fusion Model for Sentence Semantic Matching

    Xu Zhang1, Wenpeng Lu1,*, Fangfang Li2,3, Xueping Peng3, Ruoyu Zhang1

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 601-616, 2019, DOI:10.32604/cmc.2019.06045

    Abstract Sentence semantic matching (SSM) is a fundamental research in solving natural language processing tasks such as question answering and machine translation. The latest SSM research benefits from deep learning techniques by incorporating attention mechanism to semantically match given sentences. However, how to fully capture the semantic context without losing significant features for sentence encoding is still a challenge. To address this challenge, we propose a deep feature fusion model and integrate it into the most popular deep learning architecture for sentence matching task. The integrated architecture mainly consists of embedding layer, deep feature fusion layer, matching layer and prediction layer.… More >

  • Open Access


    A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and Chaotic Map

    Jing Liu1,5, Jingbing Li1,*, Jieren Cheng1, Jixin Ma2, Naveed Sadiq3, Baoru Han4, Qiang Geng5, Yang Ai5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 889-910, 2019, DOI:10.32604/cmc.2019.06034

    Abstract In order to solve the problem of patient information security protection in medical images, whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected, a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) and chaotic map is proposed in this paper. First, DTCWT-DCT transformation was performed on medical images, and dot product was per-formed in relation to the transformation matrix and logistic map. Inverse transformation was undertaken to obtain encrypted medical images. Then, in… More >

  • Open Access


    Measure-Resend Semi-Quantum Private Comparison Scheme Using GHZ Class States

    Lili Yan1,*, Yan Chang1, Shibin Zhang1, Qirun Wang2, Zhiwei Sheng1, Yuhua Sun1

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 877-887, 2019, DOI:10.32604/cmc.2019.06222

    Abstract Quantum private comparison is an important topic in quantum cryptography. Recently, the idea of semi-quantumness has been often used in designing private comparison protocol, which allows some of the participants to remain classical. In this paper, we propose a semi quantum private comparison scheme based on Greenberge-Horne-Zeilinger (GHZ) class states, which allows two classical participants to compare the equality of their private secret with the help of a quantum third party (server). In the proposed protocol, server is semi-honest who will follow the protocol honestly, but he may try to learn additional information from the protocol execution. The classical participants’… More >

  • Open Access


    Texture Feature Extraction Method for Ground Nephogram Based on Contourlet and the Power Spectrum Analysis Algorithm

    Xiaoying Chen1, 2, *, Shijun Zhao2, Xiaolei Wang2, Xuejin Sun2, Jing Feng2, Nan Ye3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 861-875, 2019, DOI:10.32604/cmc.2019.06230

    Abstract It is important to extract texture feature from the ground-base cloud image for cloud type automatic detection. In this paper, a new method is presented to capture the contour edge, texture and geometric structure of cloud images by using Contourlet and the power spectrum analysis algorithm. More abundant texture information is extracted. Cloud images can be obtained a multiscale and multidirection decomposition. The coefficient matrix from Contourlet transform of ground nephogram is calculated. The energy, mean and variance characteristics calculated from coefficient matrix are composed of the feature information. The frequency information of the data series from the feature vector… More >

  • Open Access


    Long Short Term Memory Networks Based Anomaly Detection for KPIs

    Haiqi Zhu1, Fanzhi Meng2,*, Seungmin Rho3, Mohan Li4,*, Jianyu Wang1, Shaohui Liu1, Feng Jiang1

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 829-847, 2019, DOI:10.32604/cmc.2019.06115

    Abstract In real-world many internet-based service companies need to closely monitor large amounts of data in order to ensure stable operation of their business. However, anomaly detection for these data with various patterns and data quality has been a great challenge, especially without labels. In this paper, we adopt an anomaly detection algorithm based on Long Short-Term Memory (LSTM) Network in terms of reconstructing KPIs and predicting KPIs. They use the reconstruction error and prediction error respectively as the criteria for judging anomalies, and we test our method with real data from a company in the insurance industry and achieved good… More >

  • Open Access


    Cultivated Land Monitoring System Based on Dynamic Wake-Up UAV and Wireless of Distributed Storage

    Longqing Zhang1, Liping Bai1,*, Xinwei Zhang2, Yanghong Zhang2, Lei Yang1, Xiangdu Yan2

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 817-828, 2019, DOI:10.32604/cmc.2019.06062

    Abstract The drawbacks of the traditional multi-hop structure of wireless sensor networks (WSNS) are susceptible to reflection, scattering and diffraction, serious attenuation of signal intensity and phase deviation due to various obstacles in cultivated land environment and mountains. In this paper, the wireless signal intensity is measured and curve fitting is done respectively in both open environment and obstacle-environment with both sending and receiving height of 0 m, 1 m, and 2 m. It is found out that packet loss probability is too high when an obstacle exists. In such a case, unmanned aerial vehicle (UAV) is introduced to activate terrestrial… More >

  • Open Access


    GPR Wave Propagation Model in a Complex Geoelectric Structure Using Conformal First-Order Symplectic Euler Algorithm

    Man Yang1,2,3, Hongyuan Fang1,2,3,*, Juan Zhang4, Fuming Wang1,2,3, Jianwei Lei1,2,3, Heyang Jia1,2,3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 793-816, 2019, DOI:10.32604/cmc.2019.06042

    Abstract Possessing advantages such as high computing efficiency and ease of programming, the Symplectic Euler algorithm can be applied to construct a ground-penetrating radar (GPR) wave propagation numerical model for complex geoelectric structures. However, the Symplectic Euler algorithm is still a difference algorithm, and for a complicated boundary, ladder grids are needed to perform an approximation process, which results in a certain amount of error. Further, grids that are too dense will seriously decrease computing efficiency. This paper proposes a conformal Symplectic Euler algorithm based on the conformal grid technique, amends the electric/magnetic field-updating equations of the Symplectic Euler algorithm by… More >

  • Open Access


    Task-Based Resource Allocation Bid in Edge Computing Micro Datacenter

    Yeting Guo1, Fang Liu2,*, Nong Xiao1, Zhengguo Chen1,3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 777-792, 2019, DOI:10.32604/cmc.2019.06366

    Abstract Edge computing attracts online service providers (SP) to offload services to edge computing micro datacenters that are close to end users. Such offloads reduce packet-loss rates, delays and delay jitter when responding to service requests. Simultaneously, edge computing resource providers (RP) are concerned with maximizing incomes by allocating limited resources to SPs. Most works on this topic make a simplified assumption that each SP has a fixed demand; however, in reality, SPs themselves may have multiple task-offloading alternatives. Thus, their demands could be flexibly changed, which could support finer-grained allocations and further improve the incomes for RPs. Here, we propose… More >

  • Open Access


    A Dynamic Memory Allocation Optimization Mechanism Based on Spark

    Suzhen Wang1, Shanshan Geng1, Zhanfeng Zhang1, Anshan Ye2, Keming Chen2, Zhaosheng Xu2, Huimin Luo2, Gangshan Wu3,*, Lina Xu4, Ning Cao5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 739-757, 2019, DOI:10.32604/cmc.2019.06097

    Abstract Spark is a distributed data processing framework based on memory. Memory allocation is a focus question of Spark research. A good memory allocation scheme can effectively improve the efficiency of task execution and memory resource utilization of the Spark. Aiming at the memory allocation problem in the Spark2.x version, this paper optimizes the memory allocation strategy by analyzing the Spark memory model, the existing cache replacement algorithms and the memory allocation methods, which is on the basis of minimizing the storage area and allocating the execution area according to the demand. It mainly including two parts: cache replacement optimization and… More >

  • Open Access


    A New Anti-Quantum Proxy Blind Signature for Blockchain-Enabled Internet of Things

    Chaoyang Li1,2,3, Gang Xu2, Yuling Chen1,*, Haseeb Ahmad4, Jian Li3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 711-726, 2019, DOI:10.32604/cmc.2019.06279

    Abstract Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public, distributed and decentration. And blockchain-enabled internet of things (BIoT) has a tendency to make a revolutionary change for the internet of things (IoT) which requires distributed trustless consensus. However, the scalability and security issues become particularly important with the dramatically increasing number of IoT devices. Especially, with the development of quantum computing, many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks. In this paper, an anti-quantum proxy blind signature scheme based on the lattice cryptography has been… More >

Displaying 17511-17520 on page 1752 of 22462. Per Page