Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (425)
  • Open Access

    ARTICLE

    A Random Fusion of Mix3D and PolarMix to Improve Semantic Segmentation Performance in 3D Lidar Point Cloud

    Bo Liu1,2, Li Feng1,*, Yufeng Chen3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 845-862, 2024, DOI:10.32604/cmes.2024.047695

    Abstract This paper focuses on the effective utilization of data augmentation techniques for 3D lidar point clouds to enhance the performance of neural network models. These point clouds, which represent spatial information through a collection of 3D coordinates, have found wide-ranging applications. Data augmentation has emerged as a potent solution to the challenges posed by limited labeled data and the need to enhance model generalization capabilities. Much of the existing research is devoted to crafting novel data augmentation methods specifically for 3D lidar point clouds. However, there has been a lack of focus on making the most of the numerous existing… More >

  • Open Access

    ARTICLE

    Modularized and Parametric Modeling Technology for Finite Element Simulations of Underground Engineering under Complicated Geological Conditions

    Jiaqi Wu1, Li Zhuo1,*, Jianliang Pei1, Yao Li2, Hongqiang Xie1, Jiaming Wu1, Huaizhong Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 621-645, 2024, DOI:10.32604/cmes.2024.046398

    Abstract The surrounding geological conditions and supporting structures of underground engineering are often updated during construction, and these updates require repeated numerical modeling. To improve the numerical modeling efficiency of underground engineering, a modularized and parametric modeling cloud server is developed by using Python codes. The basic framework of the cloud server is as follows: input the modeling parameters into the web platform, implement Rhino software and FLAC3D software to model and run simulations in the cloud server, and return the simulation results to the web platform. The modeling program can automatically generate instructions that can run the modeling process in… More >

  • Open Access

    ARTICLE

    Securing Mobile Cloud-Based Electronic Health Records: A Blockchain-Powered Cryptographic Solution with Enhanced Privacy and Efficiency

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Journal of Intelligent Medicine and Healthcare, Vol.2, pp. 15-34, 2024, DOI:10.32604/jimh.2024.048784

    Abstract The convergence of handheld devices and cloud-based computing has transformed how Electronic Health Records (EHRs) are stored in mobile cloud paradigms, offering benefits such as affordability, adaptability, and portability. However, it also introduces challenges regarding network security and data confidentiality, as it aims to exchange EHRs among mobile users while maintaining high levels of security. This study proposes an innovative blockchain-based solution to these issues and presents secure cloud storage for healthcare data. To provide enhanced cryptography, the proposed method combines an enhanced Blowfish encryption method with a new key generation technique called Elephant Herding Optimization with Resistance-Based Training (EHO-RBT).… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

    Bin Wu1,2, Xianyi Chen3, Jinzhou Huang4,*, Caicai Zhang5, Jing Wang6, Jing Yu1,2, Zhiqiang Zhao7, Zhuolin Mei1,2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3177-3194, 2024, DOI:10.32604/cmc.2023.047147

    Abstract In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in… More >

  • Open Access

    ARTICLE

    Part-Whole Relational Few-Shot 3D Point Cloud Semantic Segmentation

    Shoukun Xu1, Lujun Zhang1, Guangqi Jiang1, Yining Hua2, Yi Liu1,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3021-3039, 2024, DOI:10.32604/cmc.2023.045853

    Abstract This paper focuses on the task of few-shot 3D point cloud semantic segmentation. Despite some progress, this task still encounters many issues due to the insufficient samples given, e.g., incomplete object segmentation and inaccurate semantic discrimination. To tackle these issues, we first leverage part-whole relationships into the task of 3D point cloud semantic segmentation to capture semantic integrity, which is empowered by the dynamic capsule routing with the module of 3D Capsule Networks (CapsNets) in the embedding network. Concretely, the dynamic routing amalgamates geometric information of the 3D point cloud data to construct higher-level feature representations, which capture the relationships… More >

  • Open Access

    ARTICLE

    Numerical Investigation of the Angle of Attack Effect on Cloud Cavitation Flow around a Clark-Y Hydrofoil

    Di Peng1,2, Guoqing Chen1, Jiale Yan1,*, Shiping Wang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2947-2964, 2024, DOI:10.32604/cmes.2024.047265

    Abstract Cavitation is a prevalent phenomenon within the domain of ship and ocean engineering, predominantly occurring in the tail flow fields of high-speed rotating propellers and on the surfaces of high-speed underwater vehicles. The re-entrant jet and compression wave resulting from the collapse of cavity vapour are pivotal factors contributing to cavity instability. Concurrently, these phenomena significantly modulate the evolution of cavitation flow. In this paper, numerical investigations into cloud cavitation over a Clark-Y hydrofoil were conducted, utilizing the Large Eddy Simulation (LES) turbulence model and the Volume of Fluid (VOF) method within the OpenFOAM framework. Comparative analysis of results obtained… More > Graphic Abstract

    Numerical Investigation of the Angle of Attack Effect on Cloud Cavitation Flow around a Clark-Y Hydrofoil

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System

    Yanzhong Sun1, Xiaoni Du1,*, Shufen Niu2, Xiaodong Yang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3287-3310, 2024, DOI:10.32604/cmes.2023.043589

    Abstract Traditional email systems can only achieve one-way communication, which means only the receiver is allowed to search for emails on the email server. In this paper, we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption (CL-BSE) by combining the storage function of cloud server with the communication function of email server. In the new model, not only can the data receiver search for the relevant content by generating its own trapdoor, but the data owner also can retrieve the content in the same way. Meanwhile, there are dual… More >

  • Open Access

    ARTICLE

    RESTlogic: Detecting Logic Vulnerabilities in Cloud REST APIs

    Ziqi Wang*, Weihan Tian, Baojiang Cui

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1797-1820, 2024, DOI:10.32604/cmc.2023.047051

    Abstract The API used to access cloud services typically follows the Representational State Transfer (REST) architecture style. RESTful architecture, as a commonly used Application Programming Interface (API) architecture paradigm, not only brings convenience to platforms and tenants, but also brings logical security challenges. Security issues such as quota bypass and privilege escalation are closely related to the design and implementation of API logic. Traditional code level testing methods are difficult to construct a testing model for API logic and test samples for in-depth testing of API logic, making it difficult to detect such logical vulnerabilities. We propose RESTlogic for this purpose.… More >

  • Open Access

    ARTICLE

    Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks

    Shiyan Zhang1,*, Ruohan Xu2, Zhangbo Xu3, Cenhua Yu1, Yuyang Jiang1, Yuting Zhao4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2287-2308, 2024, DOI:10.32604/cmc.2023.046550

    Abstract The 6th generation mobile networks (6G) network is a kind of multi-network interconnection and multi-scenario coexistence network, where multiple network domains break the original fixed boundaries to form connections and convergence. In this paper, with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness, this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration. Due to the conflict between the utility of different flows, the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions. Regarding the tradeoff between… More >

  • Open Access

    ARTICLE

    MCWOA Scheduler: Modified Chimp-Whale Optimization Algorithm for Task Scheduling in Cloud Computing

    Chirag Chandrashekar1, Pradeep Krishnadoss1,*, Vijayakumar Kedalu Poornachary1, Balasundaram Ananthakrishnan1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2593-2616, 2024, DOI:10.32604/cmc.2024.046304

    Abstract Cloud computing provides a diverse and adaptable resource pool over the internet, allowing users to tap into various resources as needed. It has been seen as a robust solution to relevant challenges. A significant delay can hamper the performance of IoT-enabled cloud platforms. However, efficient task scheduling can lower the cloud infrastructure’s energy consumption, thus maximizing the service provider’s revenue by decreasing user job processing times. The proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm (MCWOA), combines elements of the Chimp Optimization Algorithm (COA) and the Whale Optimization Algorithm (WOA). To enhance MCWOA’s identification precision, the Sobol sequence… More >

Displaying 1-10 on page 1 of 425. Per Page