Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23,027)
  • Open Access

    ARTICLE

    Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving

    Lei Xu1, Chungen Xu1,*, Zhongyi Liu1, Yunling Wang2,3, Jianfeng Wang2,3

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 675-690, 2019, DOI:10.32604/cmc.2019.05276

    Abstract With the rapid development of cloud computing and Internet of Things (IoT) technology, massive data raises and shuttles on the network every day. To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party. However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed. Different from traditional encrypted data search scheme, this paper focuses on providing a solution to search the data from one or more IoT device by… More >

  • Open Access

    ARTICLE

    Collaborative Filtering Recommendation Algorithm Based on Multi-Relationship Social Network

    Sheng Bin1,*, Gengxin Sun1, Ning Cao2, Jinming Qiu2, Zhiyong Zheng3, Guohua Yang4, Hongyan Zhao5, Meng Jiang6, Lina Xu7

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 659-674, 2019, DOI:10.32604/cmc.2019.05858

    Abstract Recommendation system is one of the most common applications in the field of big data. The traditional collaborative filtering recommendation algorithm is directly based on user-item rating matrix. However, when there are huge amounts of user and commodities data, the efficiency of the algorithm will be significantly reduced. Aiming at the problem, a collaborative filtering recommendation algorithm based on multi-relational social networks is proposed. The algorithm divides the multi-relational social networks based on the multi-subnet complex network model into communities by using information dissemination method, which divides the users with similar degree into a community. More >

  • Open Access

    ARTICLE

    Key Process Protection of High Dimensional Process Data in Complex Production

    He Shi1,2,3,4, Wenli Shang1,2,3,4,*, Chunyu Chen1,2,3,4, Jianming Zhao1,2,3,4, Long Yin1, 2, 3, 4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 645-658, 2019, DOI:10.32604/cmc.2019.05648

    Abstract In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional More >

  • Open Access

    ARTICLE

    Locating Steganalysis of LSB Matching Based on Spatial and Wavelet Filter Fusion

    Chunfang Yang1,*, Jie Wang1, Chengliang Lin1, Huiqin Chen2, Wenjuan Wang1

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 633-644, 2019, DOI:10.32604/cmc.2019.06154

    Abstract For the case of that only a single stego image of LSB (Least Significant Bit) matching steganography is available, the existing steganalysis algorithms cannot effectively locate the modified pixels. Therefore, an algorithm is proposed to locate the modified pixels of LSB matching based on spatial and wavelet filter fusion. Firstly, the validity of using the residuals obtained by spatial and wavelet filtering to locate the modified pixels of LSB matching is analyzed. It is pointed out that both of these two kinds of residuals can be used to identify the modified pixels of LSB matching More >

  • Open Access

    ARTICLE

    An Improved Integration for Trimmed Geometries in Isogeometric Analysis

    Jinlan Xu1, Ningning Sun1, Laixin Shu1, Timon Rabczuk2, Gang Xu1,*

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 615-632, 2019, DOI:10.32604/cmc.2019.04464

    Abstract Trimming techniques are efficient ways to generate complex geometries in Computer-Aided Design (CAD). In this paper, an improved integration for trimmed geometries in isogeometric analysis (IGA) is proposed. The proposed method can improve the accuracy of the approximation and the condition number of the stiffness matrix. In addition, comparing to the traditional approaches, the trimming techniques can reduce the number of the integration elements with much fewer integration points, which improves the computational efficiency significantly. Several examples are illustrated to show the effectiveness of the proposed approach. More >

  • Open Access

    ARTICLE

    Satellite Cloud-Derived Wind Inversion Algorithm Using GPU

    Lili He1,2, Hongtao Bai1,2, Dantong Ouyang1,2, Changshuai Wang1,2, Chong Wang1,2,3, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 599-613, 2019, DOI:10.32604/cmc.2019.05928

    Abstract Cloud-derived wind refers to the wind field data product reversely derived through satellite remote sensing cloud images. Satellite cloud-derived wind inversion has the characteristics of large scale, computationally intensive and long time. The most widely used cloud-derived serial--tracer cloud tracking method is the maximum cross-correlation coefficient (MCC) method. In order to overcome the efficiency bottleneck of the cloud-derived serial MCC algorithm, we proposed a parallel cloud-derived wind inversion algorithm based on GPU framework in this paper, according to the characteristics of independence between each wind vector calculation. In this algorithm, each iteration is considered as… More >

  • Open Access

    ARTICLE

    Rayleigh-Type Wave in A Rotated Piezoelectric Crystal Imperfectly Bonded on a Dielectric Substrate

    Guoquan Nie1, *, Menghe Wang1

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 257-274, 2019, DOI:10.32604/cmc.2019.04498

    Abstract Propagation characteristics of Rayleigh-type wave in a piezoelectric layered system are theoretically investigated. The piezoelectric layer is considered as a cubic crystal with finite thickness rotated about Y-axis and is imperfectly bonded onto a semi-infinite dielectric substrate. The imperfect interface between the two constituents is assumed to be mechanically compliant and dielectrically weakly conducting. The exact dispersion relations for electrically open or shorted boundary conditions are obtained. The numerical results show that the phase velocity of Rayleigh-type wave is symmetric with respect to the cut orientation of 45。 and can achieve the maximum propagation speed More >

  • Open Access

    ARTICLE

    An Improved Method for Web Text Affective Cognition Computing Based on Knowledge Graph

    Bohan Niu1,*, Yongfeng Huang2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06032

    Abstract The goal of research on the topics such as sentiment analysis and cognition is to analyze the opinions, emotions, evaluations and attitudes that people hold about the entities and their attributes from the text. The word level affective cognition becomes an important topic in sentiment analysis. Extracting the (attribute, opinion word) binary relationship by word segmentation and dependency parsing, and labeling those by existing emotional dictionary combined with webpage information and manual annotation, this paper constitutes a binary relationship knowledge base. By using knowledge embedding method, embedding each element in (attribute, opinion, opinion word) as More >

  • Open Access

    ARTICLE

    Quantum Homomorphic Signature with Repeatable Verification

    Tao Shang1,*, Zhuang Pei2, Ranyiliu Chen3, Jianwei Liu1

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 149-165, 2019, DOI:10.32604/cmc.2019.05360

    Abstract In January 2015, the first quantum homomorphic signature scheme was proposed creatively. However, only one verifier is allowed to verify a signature once in this scheme. In order to support repeatable verification for general scenario, we propose a new quantum homomorphic signature scheme with repeatable verification by introducing serial verification model and parallel verification model. Serial verification model solves the problem of signature verification by combining key distribution and Bell measurement. Parallel verification model solves the problem of signature duplication by logically treating one particle of an EPR pair as a quantum signature and physically More >

  • Open Access

    ARTICLE

    Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States

    Gang Xu1,2,*, Ke Xiao1,*, Zongpeng Li3, Xin-Xin Niu2,4, Michael Ryan5

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 809-827, 2019, DOI:10.32604/cmc.2019.04400

    Abstract In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one More >

Displaying 22461-22470 on page 2247 of 23027. Per Page