[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Home / Journals / CMC / Vol.59, No.1, 2019
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    An Improved Method for Web Text Affective Cognition Computing Based on Knowledge Graph

    Bohan Niu1,*, Yongfeng Huang2
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06032
    Abstract The goal of research on the topics such as sentiment analysis and cognition is to analyze the opinions, emotions, evaluations and attitudes that people hold about the entities and their attributes from the text. The word level affective cognition becomes an important topic in sentiment analysis. Extracting the (attribute, opinion word) binary relationship by word segmentation and dependency parsing, and labeling those by existing emotional dictionary combined with webpage information and manual annotation, this paper constitutes a binary relationship knowledge base. By using knowledge embedding method, embedding each element in (attribute, opinion, opinion word) as More >

  • Open AccessOpen Access

    ARTICLE

    A Credit-Based Approach for Overcoming Free-Riding Behaviour in Peer-to-Peer Networks

    Manal Hazazi1, Afnan Almousa1, Heba Kurdi1,2,*, Shiroq Al-Megren1, Shada Alsalamah1
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 15-29, 2019, DOI:10.32604/cmc.2019.06221
    Abstract The underlying premise of peer-to-peer (P2P) systems is the trading of digital resources among individual peers to facilitate file sharing, distributed computing, storage, collaborative applications and multimedia streaming. So-called free-riders challenge the foundations of this system by consuming resources from other peers without offering any resources in return, hindering resource exchange among peers. Therefore, immense effort has been invested in discouraging free-riding and overcoming the ill effects of such unfair use of the system. However, previous efforts have all fallen short of effectively addressing free-riding behaviour in P2P networks. This paper proposes a novel approach… More >

  • Open AccessOpen Access

    ARTICLE

    A Nonlocal Operator Method for Partial Differential Equations with Application to Electromagnetic Waveguide Problem

    Timon Rabczuk1,2,*, Huilong Ren3, Xiaoying Zhuang4,5
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 31-55, 2019, DOI:10.32604/cmc.2019.04567
    Abstract A novel nonlocal operator theory based on the variational principle is proposed for the solution of partial differential equations. Common differential operators as well as the variational forms are defined within the context of nonlocal operators. The present nonlocal formulation allows the assembling of the tangent stiffness matrix with ease and simplicity, which is necessary for the eigenvalue analysis such as the waveguide problem. The present formulation is applied to solve the differential electromagnetic vector wave equations based on electric fields. The governing equations are converted into nonlocal integral form. An hourglass energy functional is More >

  • Open AccessOpen Access

    ARTICLE

    The Prediction of Self-Healing Capacity of Bacteria-Based Concrete Using Machine Learning Approaches

    Xiaoying Zhuang1,2,*, Shuai Zhou3,4
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 57-77, 2019, DOI:10.32604/cmc.2019.04589
    Abstract Advances in machine learning (ML) methods are important in industrial engineering and attract great attention in recent years. However, a comprehensive comparative study of the most advanced ML algorithms is lacking. Six integrated ML approaches for the crack repairing capacity of the bacteria-based self-healing concrete are proposed and compared. Six ML algorithms, including the Support Vector Regression (SVR), Decision Tree Regression (DTR), Gradient Boosting Regression (GBR), Artificial Neural Network (ANN), Bayesian Ridge Regression (BRR) and Kernel Ridge Regression (KRR), are adopted for the relationship modeling to predict crack closure percentage (CCP). Particle Swarm Optimization (PSO) More >

  • Open AccessOpen Access

    ARTICLE

    Computational Machine Learning Representation for the Flexoelectricity Effect in Truncated Pyramid Structures

    Khader M. Hamdia2, Hamid Ghasemi3, Xiaoying Zhuang4,5, Naif Alajlan1, Timon Rabczuk1,2,*
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 79-87, 2019, DOI:10.32604/cmc.2019.05882
    Abstract In this study, machine learning representation is introduced to evaluate the flexoelectricity effect in truncated pyramid nanostructure under compression. A Non-Uniform Rational B-spline (NURBS) based IGA formulation is employed to model the flexoelectricity. We investigate 2D system with an isotropic linear elastic material under plane strain conditions discretized by 45×30 grid of B-spline elements. Six input parameters are selected to construct a deep neural network (DNN) model. They are the Young's modulus, two dielectric permittivity constants, the longitudinal and transversal flexoelectric coefficients and the order of the shape function. The outputs of interest are the More >

  • Open AccessOpen Access

    ARTICLE

    Deep Q-Learning Based Computation Offloading Strategy for Mobile Edge Computing

    Yifei Wei1,*, Zhaoying Wang1, Da Guo1, F. Richard Yu2
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 89-104, 2019, DOI:10.32604/cmc.2019.04836
    Abstract To reduce the transmission latency and mitigate the backhaul burden of the centralized cloud-based network services, the mobile edge computing (MEC) has been drawing increased attention from both industry and academia recently. This paper focuses on mobile users’ computation offloading problem in wireless cellular networks with mobile edge computing for the purpose of optimizing the computation offloading decision making policy. Since wireless network states and computing requests have stochastic properties and the environment’s dynamics are unknown, we use the model-free reinforcement learning (RL) framework to formulate and tackle the computation offloading problem. Each mobile user… More >

  • Open AccessOpen Access

    ARTICLE

    Lever Arm Compensation of Autonomous Underwater Vehicle for Fast Transfer Alignment

    Qi Wang1,2,*, Changsong Yang1,2, Shaoen Wu3, Yuxiang Wang1,2
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 105-118, 2019, DOI:10.32604/cmc.2019.03739
    Abstract Transfer alignment is used to initialize SINS (Strapdown Inertial Navigation System) in motion. Lever-arm effect compensation is studied existing in an AUV (Autonomous Underwater Vehicle) before launched from the mother ship. The AUV is equipped with SINS, Doppler Velocity Log, depth sensor and other navigation sensors. The lever arm will cause large error on the transfer alignment between master inertial navigation system and slave inertial navigation system, especially in big ship situations. This paper presents a novel method that can effectively estimate and compensate the flexural lever arm between the main inertial navigation system mounted… More >

  • Open AccessOpen Access

    ARTICLE

    Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation

    Qun Mo1, Heng Yao1, Fang Cao2, Zheng Chang3, Chuan Qin1,*
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 119-133, 2019, DOI:10.32604/cmc.2019.05770
    Abstract Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information… More >

  • Open AccessOpen Access

    ARTICLE

    An Early Warning System for Curved Road Based on OV7670 Image Acquisition and STM32

    Xiaoliang Wang1, *, Wenhua Song1, Bowei Zhang1, Brandon Mausler2, Frank Jiang1, 3
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 135-147, 2019, DOI:10.32604/cmc.2019.05687
    Abstract Nowadays, the number of vehicles in China has increased significantly. The increase of the number of vehicles has also led to the increasingly complex traffic situation and the urgent safety measures in need. However, the existing early warning devices such as geomagnetic, ultrasonic and infrared detection have some shortcomings like difficult installation and maintenance. In addition, geomagnetic detection will damage the road surface, while ultrasonic and infrared detection will be greatly affected by the environment. Considering the shortcomings of the existing solutions, this paper puts forward a solution of early warning for vehicle turning meeting More >

  • Open AccessOpen Access

    ARTICLE

    Quantum Homomorphic Signature with Repeatable Verification

    Tao Shang1,*, Zhuang Pei2, Ranyiliu Chen3, Jianwei Liu1
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 149-165, 2019, DOI:10.32604/cmc.2019.05360
    Abstract In January 2015, the first quantum homomorphic signature scheme was proposed creatively. However, only one verifier is allowed to verify a signature once in this scheme. In order to support repeatable verification for general scenario, we propose a new quantum homomorphic signature scheme with repeatable verification by introducing serial verification model and parallel verification model. Serial verification model solves the problem of signature verification by combining key distribution and Bell measurement. Parallel verification model solves the problem of signature duplication by logically treating one particle of an EPR pair as a quantum signature and physically More >

  • Open AccessOpen Access

    ARTICLE

    System Architecture and Key Technologies of Network Security Situation Awareness System YHSAS

    Weihong Han1, Zhihong Tian1,*, Zizhong Huang2, Lin Zhong3, Yan Jia2
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 167-180, 2019, DOI:10.32604/cmc.2019.05192
    Abstract Network Security Situation Awareness System YHSAS acquires, understands and displays the security factors which cause changes of network situation, and predicts the future development trend of these security factors. YHSAS is developed for national backbone network, large network operators, large enterprises and other large-scale network. This paper describes its architecture and key technologies: Network Security Oriented Total Factor Information Collection and High-Dimensional Vector Space Analysis, Knowledge Representation and Management of Super Large-Scale Network Security, Multi-Level, Multi-Granularity and Multi-Dimensional Network Security Index Construction Method, Multi-Mode and Multi-Granularity Network Security Situation Prediction Technology, and so on. The More >

  • Open AccessOpen Access

    ARTICLE

    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813
    Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse More >

  • Open AccessOpen Access

    ARTICLE

    Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method

    Yang Wu1, Weiping Shang2,*, Jiahao Chen3
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 199-214, 2019, DOI:10.32604/cmc.2019.05194
    Abstract Robust data hiding techniques attempt to construct covert communication in a lossy public channel. Nowadays, the existing robust JPEG steganographic algorithms cannot overcome the side-information missing situation. Thus, this paper proposes a new robust JPEG steganographic algorithm based on the high tense region location method which needs no side-information of lossy channel. First, a tense region locating method is proposed based on the Harris-Laplacian feature point. Then, robust cover object generating processes are described. Last, the advanced embedding cost function is proposed. A series of experiments are conducted on various JPEG image sets and the More >

  • Open AccessOpen Access

    ARTICLE

    An Asymmetric Controlled Bidirectional Quantum State Transmission Protocol

    Yiru Sun1,2, Yuling Chen1,*, Haseeb Ahmad3, Zhanhong Wei4
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 215-227, 2019, DOI:10.32604/cmc.2019.05253
    Abstract In this paper, we propose an asymmetric controlled bidirectional transmission protocol. In the protocol, by using the thirteen-qubit entangled state as the quantum channel, Alice can realize the transmission of a two-qubit equatorial state for Bob and Bob can transmit a four-qubit equatorial state for Alice under the control of Charlie. Firstly, we give the construction of the quantum channel, which can be done by performing several H and CNOT operations. Secondly, through implementing the appropriate measurements and the corresponding recovery operations, the desired states can be transmitted simultaneously, securely and deterministically. Finally, we analyze the More >

  • Open AccessOpen Access

    ARTICLE

    PMS-Sorting: A New Sorting Algorithm Based on Similarity

    Hongbin Wang1, Lianke Zhou1, Guodong Zhao1,*, Nianbin Wang1, Jianguo Sun1, Yue Zheng2, Lei Chen3
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 229-237, 2019, DOI:10.32604/cmc.2019.04628
    Abstract Borda sorting algorithm is a kind of improvement algorithm based on weighted position sorting algorithm, it is mainly suitable for the high duplication of search results, for the independent search results, the effect is not very good and the computing method of relative score in Borda sorting algorithm is according to the rule of the linear regressive, but position relationship cannot fully represent the correlation changes. aimed at this drawback, the new sorting algorithm is proposed in this paper, named PMS-Sorting algorithm, firstly the position score of the returned results is standardized processing, and the More >

  • Open AccessOpen Access

    ARTICLE

    A GLCM-Feature-Based Approach for Reversible Image Transformation

    Xianyi Chen1,2,*, Haidong Zhong1,2, Zhifeng Bao3
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 239-255, 2019, DOI:10.32604/cmc.2019.03572
    Abstract Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret image without any loss. It also has been proved to be very useful in image content protection and reversible data hiding in encrypted images. However, the standard deviation (SD) is selected as the only feature during the matching of the secret and target image blocks in RIT methods, the matching result is not so good and… More >

  • Open AccessOpen Access

    ARTICLE

    Rayleigh-Type Wave in A Rotated Piezoelectric Crystal Imperfectly Bonded on a Dielectric Substrate

    Guoquan Nie1, *, Menghe Wang1
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 257-274, 2019, DOI:10.32604/cmc.2019.04498
    Abstract Propagation characteristics of Rayleigh-type wave in a piezoelectric layered system are theoretically investigated. The piezoelectric layer is considered as a cubic crystal with finite thickness rotated about Y-axis and is imperfectly bonded onto a semi-infinite dielectric substrate. The imperfect interface between the two constituents is assumed to be mechanically compliant and dielectrically weakly conducting. The exact dispersion relations for electrically open or shorted boundary conditions are obtained. The numerical results show that the phase velocity of Rayleigh-type wave is symmetric with respect to the cut orientation of 45。 and can achieve the maximum propagation speed More >

  • Open AccessOpen Access

    ARTICLE

    Mechanical Response and Energy Dissipation Analysis of Heat-Treated Granite Under Repeated Impact Loading

    Zhiliang Wang1,*, Nuocheng Tian2, Jianguo Wang3, Shengqi Yang3, Guang Liu1
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 275-296, 2019, DOI:10.32604/cmc.2019.04247
    Abstract The mechanical behaviors and energy dissipation characteristics of heat-treated granite were investigated under repeated impact loading. The granite samples were firstly heat-treated at the temperature of 20°C, 200°C, 400°C, and 600°C, respectively. The thermal damage characteristics of these samples were then observed and measured before impact tests. Dynamic impact compression tests finally were carried out using a modified split-Hopkinson pressure bar under three impact velocities of 12 m/s, 15 m/s, and 18 m/s. These test results show that the mineral composition and the main oxides of the granite do not change with these treatment temperatures.… More >

  • Open AccessOpen Access

    ARTICLE

    Image Augmentation-Based Food Recognition with Convolutional Neural Networks

    Lili Pan1, Jiaohua Qin1,*, Hao Chen2, Xuyu Xiang1, Cong Li1, Ran Chen1
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 297-313, 2019, DOI:10.32604/cmc.2019.04097
    Abstract Image retrieval for food ingredients is important work, tremendously tiring, uninteresting, and expensive. Computer vision systems have extraordinary advancements in image retrieval with CNNs skills. But it is not feasible for small-size food datasets using convolutional neural networks directly. In this study, a novel image retrieval approach is presented for small and medium-scale food datasets, which both augments images utilizing image transformation techniques to enlarge the size of datasets, and promotes the average accuracy of food recognition with state-of-the-art deep learning technologies. First, typical image transformation techniques are used to augment food images. Then transfer More >

  • Open AccessOpen Access

    ARTICLE

    Color Image Steganalysis Based on Residuals of Channel Differences

    Yuhan Kang1, Fenlin Liu1, Chunfang Yang1,*, Xiangyang Luo1, Tingting Zhang2
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 315-329, 2019, DOI:10.32604/cmc.2019.05242
    Abstract This study proposes a color image steganalysis algorithm that extracts high-dimensional rich model features from the residuals of channel differences. First, the advantages of features extracted from channel differences are analyzed, and it shown that features extracted in this manner should be able to detect color stego images more effectively. A steganalysis feature extraction method based on channel differences is then proposed, and used to improve two types of typical color image steganalysis features. The improved features are combined with existing color image steganalysis features, and the ensemble classifiers are trained to detect color stego More >

  • Open AccessOpen Access

    ARTICLE

    DPIF: A Framework for Distinguishing Unintentional Quality Problems From Potential Shilling Attacks

    Mohan Li1, Yanbin Sun1, *, Shen Su1, Zhihong Tian1, Yuhang Wang1, *, Xianzhi Wang2
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 331-344, 2019, DOI:10.32604/cmc.2019.05379
    Abstract Maliciously manufactured user profiles are often generated in batch for shilling attacks. These profiles may bring in a lot of quality problems but not worthy to be repaired. Since repairing data always be expensive, we need to scrutinize the data and pick out the data that really deserves to be repaired. In this paper, we focus on how to distinguish the unintentional data quality problems from the batch generated fake users for shilling attacks. A two-steps framework named DPIF is proposed for the distinguishment. Based on the framework, the metrics of homology and suspicious degree More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Neural Network Methods for the Solution of Second Order Boundary Value Problems

    Cosmin Anitescu1, Elena Atroshchenko2, Naif Alajlan3, Timon Rabczuk3,*
    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 345-359, 2019, DOI:10.32604/cmc.2019.06641
    Abstract We present a method for solving partial differential equations using artificial neural networks and an adaptive collocation strategy. In this procedure, a coarse grid of training points is used at the initial training stages, while more points are added at later stages based on the value of the residual at a larger set of evaluation points. This method increases the robustness of the neural network approximation and can result in significant computational savings, particularly when the solution is non-smooth. Numerical results are presented for benchmark problems for scalar-valued PDEs, namely Poisson and Helmholtz equations, as More >

Per Page:

Share Link