Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,435)
  • Open Access

    ARTICLE

    A Fair Blind Signature Scheme to Revoke Malicious Vehicles in VANETs

    Xiaoliang Wang1,*, Jianming Jiang1,2, Shujing Zhao1, Liang Bai1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 249-262, 2019, DOI:10.32604/cmc.2019.04088

    Abstract With the rapid development of IoT (Internet of Things), VANETs (Vehicular Ad-Hoc Networks) have become an attractive ad-hoc network that brings convenience into people’s lives. Vehicles can be informed of the position, direction, speed and other real-time information of nearby vehicles to avoid traffic jams and accidents. However, VANET environments could be dangerous in the absence of security protection. Because of the openness and self-organization of VANETs, there are plenty of malicious pathways. To guarantee vehicle security, the research aims to provide an effective VANET security mechanism that can track malicious vehicles as necessary. Therefore, this work focuses on malicious… More >

  • Open Access

    ARTICLE

    Development and Application of Big Data Platform for Garlic Industry Chain

    Weijie Chen1, Guo Feng1, Chao Zhang1, Pingzeng Liu1,*, Wanming Ren2, Ning Cao3, Jianrui Ding4

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 229-248, 2019, DOI:10.32604/cmc.2019.03743

    Abstract In order to effectively solve the problems which affect the stable and healthy development of garlic industry, such as the uncertainty of the planting scale and production data, the influence factors of price fluctuation is difficult to be accurately analyzed, the difficult to predict the trend of price change, the uncertainty of the market concentration, and the difficulty of the short-term price prediction etc. the big data platform of the garlic industry chain has been developed. Combined with a variety of data acquisition technology, the information collection of influencing factors for garlic industry chain is realized. Based on the construction… More >

  • Open Access

    ARTICLE

    GA-BP Air Quality Evaluation Method Based on Fuzzy Theory

    Ma Ning1,*, Jianhe Guan1, Pingzeng Liu2, Ziqing Zhang3, Gregory M. P. O’Hare4

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 215-227, 2019, DOI:10.32604/cmc.2019.03763

    Abstract With the rapid development of China’s economy, the scale of the city has been continuously expanding, industrial enterprises have been increasing, the discharge of multiple pollutants has reached the top of the world, and the environmental problems become more and more serious. The air pollution problem is particularly prominent. Air quality has become a daily concern for people. In order to control air pollution, it is necessary to grasp the air quality situation in an all-round way. It is necessary to evaluate air quality. Accurate results of air quality evaluation can help people know more about air quality. In this… More >

  • Open Access

    ARTICLE

    Spatial Quantitative Analysis of Garlic Price Data Based on ArcGIS Technology

    Guojing Wu1, Chao Zhang1,*, Pingzeng Liu1, Wanming Ren2, Yong Zheng2, Feng Guo1, Xiaowei Chen3, Russell Higgs4

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 183-195, 2019, DOI:10.32604/cmc.2019.03792

    Abstract In order to solve the hidden regional relationship among garlic prices, this paper carries out spatial quantitative analysis of garlic price data based on ArcGIS technology. The specific analysis process is to collect prices of garlic market from 2015 to 2017 in different regions of Shandong Province, using the Moran's Index to obtain monthly Moran indicators are positive, so as to analyze the overall positive relationship between garlic prices; then using the geostatistical analysis tool in ArcGIS to draw a spatial distribution Grid diagram, it was found that the price of garlic has a significant geographical agglomeration phenomenon and showed… More >

  • Open Access

    ARTICLE

    ia-PNCC: Noise Processing Method for Underwater Target Recognition Convolutional Neural Network

    Nianbin Wang1, Ming He1,2, Jianguo Sun1,*, Hongbin Wang1, Lianke Zhou1, Ci Chu1, Lei Chen3

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 169-181, 2019, DOI:10.32604/cmc.2019.03709

    Abstract Underwater target recognition is a key technology for underwater acoustic countermeasure. How to classify and recognize underwater targets according to the noise information of underwater targets has been a hot topic in the field of underwater acoustic signals. In this paper, the deep learning model is applied to underwater target recognition. Improved anti-noise Power-Normalized Cepstral Coefficients (ia-PNCC) is proposed, based on PNCC applied to underwater noises. Multitaper and normalized Gammatone filter banks are applied to improve the anti-noise capacity. The method is combined with a convolutional neural network in order to recognize the underwater target. Experiment results show that the… More >

  • Open Access

    ARTICLE

    GFCache: A Greedy Failure Cache Considering Failure Recency and Failure Frequency for an Erasure-Coded Storage System

    Mingzhu Deng1, Fang Liu2,*, Ming Zhao3, Zhiguang Chen2, Nong Xiao2,1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 153-167, 2019, DOI:10.32604/cmc.2019.03585

    Abstract In the big data era, data unavailability, either temporary or permanent, becomes a normal occurrence on a daily basis. Unlike the permanent data failure, which is fixed through a background job, temporarily unavailable data is recovered on-the-fly to serve the ongoing read request. However, those newly revived data is discarded after serving the request, due to the assumption that data experiencing temporary failures could come back alive later. Such disposal of failure data prevents the sharing of failure information among clients, and leads to many unnecessary data recovery processes, (e.g. caused by either recurring unavailability of a data or multiple… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage

    Zhiliang Deng1,2, Yongjun Ren3,4, Yepeng Liu3,4, Xiang Yin5, Zixuan Shen3,4, Hye-Jin Kim6,*

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 135-151, 2019, DOI:10.32604/cmc.2019.02967

    Abstract Cloud storage represents the trend of intensive, scale and specialization of information technology, which has changed the technical architecture and implementation method of electronic records management. Moreover, it will provide a convenient way to generate more advanced and efficient management of the electronic data records. However, in cloud storage environment, it is difficult to guarantee the trustworthiness of electronic records, which results in a series of severe challenges to electronic records management. Starting from the definition and specification of electronic records, this paper firstly analyzes the requirements of the trustworthiness in cloud storage during their long-term preservation according to the… More >

  • Open Access

    ARTICLE

    Some Topological Indices Computing Results If Archimedean Lattices L(4,6,12)

    Kang Qiong1,*, Xinting Li2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 121-133, 2019, DOI:10.32604/cmc.2019.03723

    Abstract The introduction of graph-theoretical structure descriptors represents an important step forward in the research of predictive models in chemistry and falls within the lines of the increasing use of mathematical and computational methods in contemporary chemistry. The basis for these models is the study of the quantitative structure-property and structure-activity relationship. In this paper, we investigate Great rhom-bitrihexagonal which is a kind of dodecagon honeycomb net-work covered by quadrangle and hexagon. Many topological indexes of Great rhom-bitrihexagonal have being investigated, such as sum-connectivity index, atom-bond connectivity index, geometric-arithmetic index, fifth, harmonic index, Randić connectivity index, first Zagreb index, second Zagreb… More >

  • Open Access

    ARTICLE

    Differentially Private Real-Time Streaming Data Publication Based on Sliding Window Under Exponential Decay

    Lan Sun1, Chen Ge1, Xin Huang1, Yingjie Wu1,*, Yan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 61-78, 2019, DOI:10.32604/cmc.2019.03744

    Abstract Continuous response of range query on steaming data provides useful information for many practical applications as well as the risk of privacy disclosure. The existing research on differential privacy streaming data publication mostly pay close attention to boosting query accuracy, but pay less attention to query efficiency, and ignore the effect of timeliness on data weight. In this paper, we propose an effective algorithm of differential privacy streaming data publication under exponential decay mode. Firstly, by introducing the Fenwick tree to divide and reorganize data items in the stream, we achieve a constant time complexity for inserting a new item… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment

    Zhihua Xia1,*, Lihua Lu1, Tong Qiu1, H. J. Shim1, Xianyi Chen1, Byeungwoo Jeon2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 27-43, 2019, DOI:10.32604/cmc.2019.02688

    Abstract Content based image retrieval (CBIR) techniques have been widely deployed in many applications for seeking the abundant information existed in images. Due to large amounts of storage and computational requirements of CBIR, outsourcing image search work to the cloud provider becomes a very attractive option for many owners with small devices. However, owing to the private content contained in images, directly outsourcing retrieval work to the cloud provider apparently bring about privacy problem, so the images should be protected carefully before outsourcing. This paper presents a secure retrieval scheme for the encrypted images in the YUV color space. With this… More >

Displaying 21921-21930 on page 2193 of 22435. Per Page