Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,915)
  • Open Access

    ARTICLE

    A Novel Universal Steganalysis Algorithm Based on the IQM and the SRM

    Yu Yang1,2,*, Yuwei Chen1,2, Yuling Chen2, Wei Bi3,4

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 261-272, 2018, DOI: 10.3970/cmc.2018.02736

    Abstract The state-of-the-art universal steganalysis method, spatial rich model (SRM), and the steganalysis method using image quality metrics (IQM) are both based on image residuals, while they use 34671 and 10 features respectively. This paper proposes a novel steganalysis scheme that combines their advantages in two ways. First, filters used in the IQM are designed according to the models of the SRM owning to their strong abilities for detecting the content adaptive steganographic methods. In addition, a total variant (TV) filter is also used due to its good performance of preserving image edge properties during filtering.… More >

  • Open Access

    ARTICLE

    Improved GNSS Cooperation Positioning Algorithm for Indoor Localization

    Taoyun Zhou1,2, Baowang Lian1, Siqing Yang2,*, Yi Zhang1, Yangyang Liu1,3

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 225-245, 2018, DOI: 10.3970/cmc.2018.02671

    Abstract For situations such as indoor and underground parking lots in which satellite signals are obstructed, GNSS cooperative positioning can be used to achieve high-precision positioning with the assistance of cooperative nodes. Here we study the cooperative positioning of two static nodes, node 1 is placed on the roof of the building and the satellite observation is ideal, node 2 is placed on the indoor windowsill where the occlusion situation is more serious, we mainly study how to locate node 2 with the assistance of node 1. Firstly, the two cooperative nodes are located with pseudo-range… More >

  • Open Access

    ARTICLE

    Sentiment Classification Based on Piecewise Pooling Convolutional Neural Network

    Yuhong Zhang1,*, Qinqin Wang1, Yuling Li1, Xindong Wu2

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 285-297, 2018, DOI: 10.3970/cmc.2018.02604

    Abstract Recently, the effectiveness of neural networks, especially convolutional neural networks, has been validated in the field of natural language processing, in which, sentiment classification for online reviews is an important and challenging task. Existing convolutional neural networks extract important features of sentences without local features or the feature sequence. Thus, these models do not perform well, especially for transition sentences. To this end, we propose a Piecewise Pooling Convolutional Neural Network (PPCNN) for sentiment classification. Firstly, with a sentence presented by word vectors, convolution operation is introduced to obtain the convolution feature map vectors. Secondly, More >

  • Open Access

    ARTICLE

    Automatic Mining of Security-Sensitive Functions from Source Code

    Lin Chen1,2, Chunfang Yang1,2,*, Fenlin Liu1,2, Daofu Gong1,2, Shichang Ding3

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 199-210, 2018, DOI: 10.3970/cmc.2018.02574

    Abstract When dealing with the large-scale program, many automatic vulnerability mining techniques encounter such problems as path explosion, state explosion, and low efficiency. Decomposition of large-scale programs based on safety-sensitive functions helps solve the above problems. And manual identification of security-sensitive functions is a tedious task, especially for the large-scale program. This study proposes a method to mine security-sensitive functions the arguments of which need to be checked before they are called. Two argument-checking identification algorithms are proposed based on the analysis of two implementations of argument checking. Based on these algorithms, security-sensitive functions are detected More >

  • Open Access

    ARTICLE

    Full-Blind Delegating Private Quantum Computation

    Wenjie Liu1,2,*, Zhenyu Chen2, Jinsuo Liu3, Zhaofeng Su4, Lianhua Chi5

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 211-223, 2018, DOI: 10.3970/cmc.2018.02288

    Abstract The delegating private quantum computation (DQC) protocol with the universal quantum gate set {X,Z,H,P,R,CNOT} was firstly proposed by Broadbent et al. [Broadbent (2015)], and then Tan et al. [Tan and Zhou (2017)] tried to put forward a half-blind DQC protocol (HDQC) with another universal set {H,P,CNOT,T}. However, the decryption circuit of Toffoli gate (i.e. T) is a little redundant, and Tan et al.’s protocol [Tan and Zhou (2017)] exists the information leak. In addition, both of these two protocols just focus on the blindness of data (i.e. the client’s input and output), but do not consider the More >

  • Open Access

    ARTICLE

    Biodegradation of Medicinal Plants Waste in an Anaerobic Digestion Reactor for Biogas Production

    Kabir Fardad1, Bahman Najafi1, Sina Faizollahzadeh Ardabili1, Amir Mosavi2,3, Shahaboddin Shamshirband,4,5,*, Timon Rabczuk2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 381-392, 2018, DOI: 10.3970/cmc.2018.01803

    Abstract Glycyrrhiza glabra, Mint, Cuminum cyminum, Lavender and Arctium medicinal are considered as edible plants with therapeutic properties and as medicinal plants in Iran. After extraction process of medicinal plants, residual wastes are not suitable for animal feed and are considered as waste and as an environmental threat. At present there is no proper management of waste of these plants and they are burned or buried. The present study discusses the possibility of biogas production from Glycyrrhiza Glabra Waste (GGW), Mentha Waste (MW), Cuminum Cyminum Waste (CCW), Lavender Waste (LW) and Arctium Waste (AW). 250 g… More >

  • Open Access

    ARTICLE

    Coverless Steganography for Digital Images Based on a Generative Model

    Xintao Duan1,*, Haoxian Song1, Chuan Qin2, Muhammad Khurram Khan3

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 483-493, 2018, DOI: 10.3970/cmc.2018.01798

    Abstract In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the secret image. The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image. Thus, we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the More >

  • Open Access

    ARTICLE

    On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

    Lizhi Xiong1,*, Yunqing Shi2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 523-539, 2018, DOI: 10.3970/cmc.2018.01791

    Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding… More >

  • Open Access

    ARTICLE

    Molecular Structure and Electronic Spectra of CoS under the Radiation Fields

    Qijun Wu1, Limin Han1, Lingxuan Wang2, Xun Gong3,*

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 393-403, 2018, DOI: 10.3970/cmc.2018.01740

    Abstract We optimized the ground-state stable configuration of CoS molecule in different external radiation fields (0-0.04 atomic units (a.u.)) at the basis set level of 6-311G++ (d, p) using the B3LYP density functional theory. On this basis, the molecular structure, total energy, energy gap, and the intensities of infrared ray (IR) spectra, Raman spectra, and ultraviolet-visible (UV-Vis) absorption spectra of CoS molecule were computed using the same method. The results showed that the molecular structure changed greatly under the effect of the external radiation fields and had significant dependency on the radiation fields. The total energy More >

  • Open Access

    ARTICLE

    Real-Time Visual Tracking with Compact Shape and Color Feature

    Zhenguo Gao1, Shixiong Xia1, Yikun Zhang1, Rui Yao1,*, Jiaqi Zhao1, Qiang Niu1, Haifeng Jiang2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 509-521, 2018, DOI: 10.3970/cmc.2018.02634

    Abstract The colour feature is often used in the object tracking. The tracking methods extract the colour features of the object and the background, and distinguish them by a classifier. However, these existing methods simply use the colour information of the target pixels and do not consider the shape feature of the target, so that the description capability of the feature is weak. Moreover, incorporating shape information often leads to large feature dimension, which is not conducive to real-time object tracking. Recently, the emergence of visual tracking methods based on deep learning has also greatly increased… More >

Displaying 22461-22470 on page 2247 of 22915. Per Page