Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17,301)
  • Open Access


    Developing a New Security Framework for Bluetooth Low Energy Devices

    Qiaoyang Zhang1, Zhiyao Liang1,*, Zhiping Cai2

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 457-471, 2019, DOI:10.32604/cmc.2019.03758

    Abstract Wearable devices are becoming more popular in our daily life. They are usually used to monitor health status, track fitness data, or even do medical tests, etc. Since the wearable devices can obtain a lot of personal data, their security issues are very important. Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy (BLE) are commonly impractical or insecure for many BLE based wearable devices nowadays, we design and implement a security framework in order to protect the communication between these devices. The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible… More >

  • Open Access


    Quantitative Analysis of Crime Incidents in Chicago Using Data Analytics Techniques

    Daniel Rivera Ruiz1,*, Alisha Sawant1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 389-396, 2019, DOI:10.32604/cmc.2019.06433

    Abstract In this paper we aim to identify certain social factors that influence, and thus can be used to predict, the occurrence of crimes. The factors under consideration for this analytic are social demographics such as age, sex, poverty, etc., train ridership, traffic density and the number of business licenses per community area in Chicago, IL. A factor will be considered pertinent if there is high correlation between it and the number of crimes of a particular type in that community area. More >

  • Open Access


    Privacy-Preserving Content-Aware Search Based on Two-Level Index

    Zhangjie Fu1,*, Lili Xia1, Yuling Liu2, Zuwei Tian3

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 473-491, 2019, DOI:10.32604/cmc.2019.03785

    Abstract Nowadays, cloud computing is used more and more widely, more and more people prefer to using cloud server to store data. So, how to encrypt the data efficiently is an important problem. The search efficiency of existed search schemes decreases as the index increases. For solving this problem, we build the two-level index. Simultaneously, for improving the semantic information, the central word expansion is combined. The purpose of privacy-preserving content-aware search by using the two-level index (CKESS) is that the first matching is performed by using the extended central words, then calculate the similarity between the trapdoor and the secondary… More >

  • Open Access


    A Deep Collocation Method for the Bending Analysis of Kirchhoff Plate

    Hongwei Guo3, Xiaoying Zhuang3,4,5, Timon Rabczuk1,2,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 433-456, 2019, DOI:10.32604/cmc.2019.06660

    Abstract In this paper, a deep collocation method (DCM) for thin plate bending problems is proposed. This method takes advantage of computational graphs and backpropagation algorithms involved in deep learning. Besides, the proposed DCM is based on a feedforward deep neural network (DNN) and differs from most previous applications of deep learning for mechanical problems. First, batches of randomly distributed collocation points are initially generated inside the domain and along the boundaries. A loss function is built with the aim that the governing partial differential equations (PDEs) of Kirchhoff plate bending problems, and the boundary/initial conditions are minimised at those collocation… More >

  • Open Access


    A Review on Fretting Wear Mechanisms, Models and Numerical Analyses

    Tongyan Yue1,2, Magd Abdel Wahab3,4,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 405-432, 2019, DOI:10.32604/cmc.2019.04253

    Abstract Fretting wear is a material damage in contact surfaces due to micro relative displacement between them. It causes some general problems in industrial applications, such as loosening of fasteners or sticking in components supposed to move relative to each other. Fretting wear is a complicated problem involving material properties of tribo-system and working conditions of them. Due to these various factors, researchers have studied the process of fretting wear by experiments and numerical modelling methods. This paper reviews recent literature on the numerical modelling method of fretting wear. After a briefly introduction on the mechanism of fretting wear, numerical models,… More >

  • Open Access


    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and complexity, more research is necessary.… More >

  • Open Access


    A Data Download Method from RSUs Using Fog Computing in Connected Vehicles

    Dae-Young Kim1, Seokhoon Kim2,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 375-387, 2019, DOI:10.32604/cmc.2019.06077

    Abstract Communication is important for providing intelligent services in connected vehicles. Vehicles must be able to communicate with different places and exchange information while driving. For service operation, connected vehicles frequently attempt to download large amounts of data. They can request data downloading to a road side unit (RSU), which provides infrastructure for connected vehicles. The RSU is a data bottleneck in a transportation system because data traffic is concentrated on the RSU. Therefore, it is not appropriate for a connected vehicle to always attempt a high speed download from the RSU. If the mobile network between a connected vehicle and… More >

  • Open Access


    Security and Privacy Frameworks for Access Control Big Data Systems

    Paolina Centonze1,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 361-374, 2019, DOI:10.32604/cmc.2019.06223

    Abstract In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data (BD) processing cluster frameworks, which are adopted to manage yottabyte of unstructured sensitive data. For instance, Big Data systems’ privacy and security restrictions are most likely to failure due to the malformed AC policy configurations. Furthermore, BD systems were initially developed toped to take care of some of the DB issues to address BD challenges and many of these dealt with… More >

  • Open Access


    Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation

    Qun Mo1, Heng Yao1, Fang Cao2, Zheng Chang3, Chuan Qin1,*

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 119-133, 2019, DOI:10.32604/cmc.2019.05770

    Abstract Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information in the most significant bits… More >

  • Open Access


    Computational Machine Learning Representation for the Flexoelectricity Effect in Truncated Pyramid Structures

    Khader M. Hamdia2, Hamid Ghasemi3, Xiaoying Zhuang4,5, Naif Alajlan1, Timon Rabczuk1,2,*

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 79-87, 2019, DOI:10.32604/cmc.2019.05882

    Abstract In this study, machine learning representation is introduced to evaluate the flexoelectricity effect in truncated pyramid nanostructure under compression. A Non-Uniform Rational B-spline (NURBS) based IGA formulation is employed to model the flexoelectricity. We investigate 2D system with an isotropic linear elastic material under plane strain conditions discretized by 45×30 grid of B-spline elements. Six input parameters are selected to construct a deep neural network (DNN) model. They are the Young's modulus, two dielectric permittivity constants, the longitudinal and transversal flexoelectric coefficients and the order of the shape function. The outputs of interest are the strain in the stress direction… More >

Displaying 14261-14270 on page 1427 of 17301. Per Page  

Share Link

WeChat scan