Home / Journals / CMC / Vol.58, No.2, 2019
Special Issues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Improve Computer Visualization of Architecture Based on the Bayesian Network

    Tao Shen1,*, Yukari Nagai1, Chan Gao2
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 307-318, 2019, DOI:10.32604/cmc.2019.04876
    Abstract Computer visualization has marvelous effects when it is applied in various fields, especially in architectural design. As an emerging force in the innovation industry, architects and design agencies have already demonstrated the value of architectural visual products in actual application projects. Based on the digital image technology, virtual presentation of future scenes simulates architecture design, architectural renderings and multimedia videos. Therefore, it can help design agencies transform the theoretical design concept into a lively and realistic visual which can provide the audience with a clearer understanding of the engineering and construction projects. However, it is More >

  • Open AccessOpen Access

    ARTICLE

    WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings

    Chunhua Li1,*, Peng Wang1, Changhong Sun1, Ke Zhou1, Ping Huang2
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 319-333, 2019, DOI:10.32604/cmc.2019.03856
    Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily More >

  • Open AccessOpen Access

    ARTICLE

    Rational Non-Hierarchical Quantum State Sharing Protocol

    Zhao Dou1, Gang Xu1,*, Xiubo Chen1, Kaiguo Yuan2
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 335-347, 2019, DOI:10.32604/cmc.2019.04159
    Abstract Rational participants want to maximize their benefits. The protocol with rational participants will be more realistic than the protocol with honest, semi-honest and dishonest participants. We research the rational non-hierarchical quantum state sharing in this paper. General steps of some known quantum state sharing protocol are summarized. Based on these steps, a new rational protocol is proposed. It means that lots of common protocols could be modified to rational protocols. Our protocol is widely applicable. Analyses show that the proposed protocol is rational and secure. It is also all-win for agents. Furthermore, number of deceiving More >

  • Open AccessOpen Access

    ARTICLE

    A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem

    Qi He1, Shui Yu2, Huifang Xu3,*, Jia Liu4, Dongmei Huang5, Guohua Liu6, Fangqin Xu3, Yanling Du1
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 349-361, 2019, DOI:10.32604/cmc.2019.03703
    Abstract The recent advances in remote sensing and computer techniques give birth to the explosive growth of remote sensing images. The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost savings. However, the openness of cloud brings challenges for image data security. In this paper, we propose a weighted image sharing scheme to ensure the security of remote sensing in cloud environment, which takes the weights of participants (i.e., cloud service providers) into consideration. An extended Mignotte sequence is constructed according to… More >

  • Open AccessOpen Access

    ARTICLE

    Research on the Relationship Between Garlic and Young Garlic Shoot Based on Big Data

    Feng Guo1, Pingzeng Liu1,*, Wanming Ren2, Ning Cao3, Chao Zhang1, Fujiang Wen1, Helen Min Zhou4
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 363-378, 2019, DOI:10.32604/cmc.2019.03794
    Abstract In view of the problems such as frequent fluctuation of garlic price, lack of efficient forecasting means and difficulty in realizing the steady development of garlic industry, combined with the current situation of garlic industry and the collected data information. Taking Big Data platform of garlic industry chain as the core, using the methods of correlation analysis, smoothness test, co-integration test, and Granger causality test, this paper analyzes the correlation, dynamic, and causality between garlic price and young garlic shoot price. According to the current situation of garlic industry, the garlic industry service based on More >

  • Open AccessOpen Access

    ARTICLE

    Cross-Lingual Non-Ferrous Metals Related News Recognition Method Based on CNN with A Limited Bi-Lingual Dictionary

    Xudong Hong1, Xiao Zheng1,*, Jinyuan Xia1, Linna Wei1, Wei Xue1
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 379-389, 2019, DOI:10.32604/cmc.2019.04059
    Abstract To acquire non-ferrous metals related news from different countries’ internet, we proposed a cross-lingual non-ferrous metals related news recognition method based on CNN with a limited bilingual dictionary. Firstly, considering the lack of related language resources of non-ferrous metals, we use a limited bilingual dictionary and CCA to learn cross-lingual word vector and to represent news in different languages uniformly. Then, to improve the effect of recognition, we use a variant of the CNN to learn recognition features and construct the recognition model. The experimental results show that our proposed method acquires better results. More >

  • Open AccessOpen Access

    ARTICLE

    A Study on Dual-Load-Zone Model of Overlying Strata and Evolution Law of Mining Stress

    Yuejin Zhou1,*, Mingpeng Li1, Xiaoding Xu1, Meng Li1
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 391-407, 2019, DOI:10.32604/cmc.2019.04456
    Abstract The changeable structure and movement law of overlying strata are the main contributor to the change of mining stress. Starting from the relevant theory of key stratum and particularly based on the theory of mine ground pressure and strata control, this research proposed a new solution to mining stress problems by establishing a dual-load-zone stratum structural model. Elastic foundation beam theory was used to solve the stress of overlying strata of the dual-load-zones with superposition method, which revised the traditional calculation method of mining stress. The abnormal increase of lead abutment pressure in the mining… More >

  • Open AccessOpen Access

    ARTICLE

    Research on the Signal Reconstruction of the Phased Array Structural Health Monitoring Based Using the Basis Pursuit Algorithm

    Yajie Sun1,2,*, Yanqing Yuan2, Qi Wang2, Lihua Wang3, Enlu Li2, Li Qiao4
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 409-420, 2019, DOI:10.32604/cmc.2019.03642
    Abstract The signal processing problem has become increasingly complex and demand high acquisition system, this paper proposes a new method to reconstruct the structure phased array structural health monitoring signal. The method is derived from the compressive sensing theory and the signal is reconstructed by using the basis pursuit algorithm to process the ultrasonic phased array signals. According to the principles of the compressive sensing and signal processing method, non-sparse ultrasonic signals are converted to sparse signals by using sparse transform. The sparse coefficients are obtained by sparse decomposition of the original signal, and then the More >

  • Open AccessOpen Access

    ARTICLE

    The Application of BP Neural Networks to Analysis the National Vulnerability

    Guodong Zhao1, Yuewei Zhang1, Yiqi Shi2, Haiyan Lan1,*, Qing Yang3
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 421-436, 2019, DOI:10.32604/cmc.2019.03782
    Abstract Climate change is the main factor affecting the country’s vulnerability, meanwhile, it is also a complicated and nonlinear dynamic system. In order to solve this complex problem, this paper first uses the analytic hierarchy process (AHP) and natural breakpoint method (NBM) to implement an AHP-NBM comprehensive evaluation model to assess the national vulnerability. By using ArcGIS, national vulnerability scores are classified and the country’s vulnerability is divided into three levels: fragile, vulnerable, and stable. Then, a BP neural network prediction model which is based on multivariate linear regression is used to predict the critical point… More >

  • Open AccessOpen Access

    ARTICLE

    Leveraging Logical Anchor into Topology Optimization for Indoor Wireless Fingerprinting

    Lin Wang1,*, Huixiang Liu1, Wenyuan Liu1,2, Nan Jing1, Ahmad Adnan1, Chenshu Wu3
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 437-449, 2019, DOI:10.32604/cmc.2019.03814
    Abstract The indoor subarea localization has wide application space in dynamic hot zone identification, indoor layout optimization, store dynamic pricing and crowd flow trend prediction. The ubiquitous mobile devices provide the opportunity for wireless fingerprinting-based indoor localization services. However, there are two short board where the existing methods have been criticized. One is that a tagging approach requires a large number of professional surveys for wireless fingerprint construction, which weakens the scalability of the methods. The other is that the crowdsourcing-based methods encounter the cold boot problem in the system initial stage. To address these issues,… More >

  • Open AccessOpen Access

    ARTICLE

    An Improved Unsupervised Image Segmentation Method Based on Multi-Objective Particle Swarm Optimization Clustering Algorithm

    Zhe Liu1,2,*, Bao Xiang1,3, Yuqing Song1, Hu Lu1, Qingfeng Liu1
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 451-461, 2019, DOI:10.32604/cmc.2019.04069
    Abstract Most image segmentation methods based on clustering algorithms use single-objective function to implement image segmentation. To avoid the defect, this paper proposes a new image segmentation method based on a multi-objective particle swarm optimization (PSO) clustering algorithm. This unsupervised algorithm not only offers a new similarity computing approach based on electromagnetic forces, but also obtains the proper number of clusters which is determined by scale-space theory. It is experimentally demonstrated that the applicability and effectiveness of the proposed multi-objective PSO clustering algorithm. More >

  • Open AccessOpen Access

    ARTICLE

    Forecasting Model Based on Information-Granulated GA-SVR and ARIMA for Producer Price Index

    Xiangyan Tang1,2, Liang Wang3, Jieren Cheng1,2,4,*, Jing Chen2, Victor S. Sheng5
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 463-491, 2019, DOI:10.32604/cmc.2019.03816
    Abstract The accuracy of predicting the Producer Price Index (PPI) plays an indispensable role in government economic work. However, it is difficult to forecast the PPI. In our research, we first propose an unprecedented hybrid model based on fuzzy information granulation that integrates the GA-SVR and ARIMA (Autoregressive Integrated Moving Average Model) models. The fuzzy-information-granulation-based GA-SVR-ARIMA hybrid model is intended to deal with the problem of imprecision in PPI estimation. The proposed model adopts the fuzzy information-granulation algorithm to pre-classification-process monthly training samples of the PPI, and produced three different sequences of fuzzy information granules, whose… More >

  • Open AccessOpen Access

    ARTICLE

    Detecting Iris Liveness with Batch Normalized Convolutional Neural Network

    Min Long1,2,*, Yan Zeng1
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 493-504, 2019, DOI:10.32604/cmc.2019.04378
    Abstract Aim to countermeasure the presentation attack for iris recognition system, an iris liveness detection scheme based on batch normalized convolutional neural network (BNCNN) is proposed to improve the reliability of the iris authentication system. The BNCNN architecture with eighteen layers is constructed to detect the genuine iris and fake iris, including convolutional layer, batch-normalized (BN) layer, Relu layer, pooling layer and full connected layer. The iris image is first preprocessed by iris segmentation and is normalized to 256×256 pixels, and then the iris features are extracted by BNCNN. With these features, the genuine iris and More >

  • Open AccessOpen Access

    ARTICLE

    Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications

    Shanshan Yu1, Ju Liu1,*, Xiaoqing Zhang1, Shangbin Wu2
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 505-516, 2019, DOI:10.32604/cmc.2019.04282
    Abstract Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services. The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP) method. Next, in the defined relay selection area, we More >

  • Open AccessOpen Access

    ARTICLE

    Design of Feedback Shift Register of Against Power Analysis Attack

    Yongbin Zhao1,*, XuYang1, RanranLi1
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 517-527, 2019, DOI:10.32604/cmc.2019.03680
    Abstract Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization More >

  • Open AccessOpen Access

    ARTICLE

    Online Magnetic Flux Leakage Detection System for Sucker Rod Defects Based on LabVIEW Programming

    Ou Zhang1,*, Xueye Wei1
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 529-544, 2019, DOI:10.32604/cmc.2019.04075
    Abstract Aiming at the detection of the sucker rod defects, a real-time detection system is designed using the non-destructive testing technology of magnetic flux leakage (MFL). An MFL measurement system consists of many parts, and this study focuses on the signal acquisition and processing system. First of all, this paper introduces the hardware part of the acquisition system in detail, including the selection of the Hall-effect sensor, the design of the signal conditioning circuit, and the working process of the single chip computer (SCM) control serial port. Based on LabVIEW, a graphical programming software, the software More >

  • Open AccessOpen Access

    ARTICLE

    A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT

    Liang Kou1, Yiqi Shi2, Liguo Zhang1, Duo Liu1,*, Qing Yang3
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 545-565, 2019, DOI:10.32604/cmc.2019.03760
    Abstract With the development of computer hardware technology and network technology, the Internet of Things as the extension and expansion of traditional computing network has played an increasingly important role in all professions and trades and has had a tremendous impact on people lifestyle. The information perception of the Internet of Things plays a key role as a link between the computer world and the real world. However, there are potential security threats in the Perceptual Layer Network applied for information perception because Perceptual Layer Network consists of a large number of sensor nodes with weak More >

  • Open AccessOpen Access

    ARTICLE

    Optimization Algorithm for Reduction the Size of Dixon Resultant Matrix: A Case Study on Mechanical Application

    Shang Zhang1, *, Seyedmehdi Karimi2, Shahaboddin Shamshirband3, 4, *, Amir Mosavi5,6
    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 567-583, 2019, DOI:10.32604/cmc.2019.02795
    Abstract In the process of eliminating variables in a symbolic polynomial system, the extraneous factors are referred to the unwanted parameters of resulting polynomial. This paper aims at reducing the number of these factors via optimizing the size of Dixon matrix. An optimal configuration of Dixon matrix would lead to the enhancement of the process of computing the resultant which uses for solving polynomial systems. To do so, an optimization algorithm along with a number of new polynomials is introduced to replace the polynomials and implement a complexity analysis. Moreover, the monomial multipliers are optimally positioned More >

Per Page:

Share Link