Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (82)
  • Open Access

    ARTICLE

    Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things

    Jingjing Nie1,*, Zhenhua Chen2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4763-4779, 2024, DOI:10.32604/cmc.2024.051181

    Abstract The Internet of Medical Things (IoMT) is an application of the Internet of Things (IoT) in the medical field. It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems, which is essential in smart healthcare. However, Personal Health Records (PHRs) are normally kept in public cloud servers controlled by IoMT service providers, so privacy and security incidents may be frequent. Fortunately, Searchable Encryption (SE), which can be used to execute queries on encrypted data, can address the issue above. Nevertheless, most existing SE schemes cannot solve the vector dominance threshold… More >

  • Open Access

    ARTICLE

    Vehicle Abnormal Behavior Detection Based on Dense Block and Soft Thresholding

    Yuanyao Lu1,*, Wei Chen2, Zhanhe Yu1, Jingxuan Wang1, Chaochao Yang2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5051-5066, 2024, DOI:10.32604/cmc.2024.050865

    Abstract With the rapid advancement of social economies, intelligent transportation systems are gaining increasing attention. Central to these systems is the detection of abnormal vehicle behavior, which remains a critical challenge due to the complexity of urban roadways and the variability of external conditions. Current research on detecting abnormal traffic behaviors is still nascent, with significant room for improvement in recognition accuracy. To address this, this research has developed a new model for recognizing abnormal traffic behaviors. This model employs the R3D network as its core architecture, incorporating a dense block to facilitate feature reuse. This… More >

  • Open Access

    ARTICLE

    Evaluation of Well Spacing for Primary Development of Fractured Horizontal Wells in Tight Sandstone Gas Reservoirs

    Fang Li1,*, Juan Wu1, Haiyong Yi2, Lihong Wu2, Lingyun Du1, Yuan Zeng1

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.5, pp. 1015-1030, 2024, DOI:10.32604/fdmp.2023.043256

    Abstract Methods for horizontal well spacing calculation in tight gas reservoirs are still adversely affected by the complexity of related control factors, such as strong reservoir heterogeneity and seepage mechanisms. In this study, the stress sensitivity and threshold pressure gradient of various types of reservoirs are quantitatively evaluated through reservoir seepage experiments. On the basis of these experiments, a numerical simulation model (based on the special seepage mechanism) and an inverse dynamic reserve algorithm (with different equivalent drainage areas) were developed. The well spacing ranges of Classes I, II, and III wells in the Q gas More > Graphic Abstract

    Evaluation of Well Spacing for Primary Development of Fractured Horizontal Wells in Tight Sandstone Gas Reservoirs

  • Open Access

    ARTICLE

    Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network

    Ruchun Jia1, Jianwei Zhang1,*, Yi Lin1, Yunxiang Han1, Feike Yang2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2523-2546, 2024, DOI:10.32604/cmc.2024.047543

    Abstract In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection, in this paper, a new clustering detection method is designed for air traffic control network security attacks. The feature set for ATC cybersecurity attacks is constructed by setting the feature states, adding recursive features, and determining the feature criticality. The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data. An autoencoder is introduced into the AI (artificial intelligence) algorithm to encode and… More >

  • Open Access

    ARTICLE

    Nodule Detection Using Local Binary Pattern Features to Enhance Diagnostic Decisions

    Umar Rashid1,2,*, Arfan Jaffar1,2, Muhammad Rashid3, Mohammed S. Alshuhri4, Sheeraz Akram1,4,5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3377-3390, 2024, DOI:10.32604/cmc.2024.046320

    Abstract Pulmonary nodules are small, round, or oval-shaped growths on the lungs. They can be benign (noncancerous) or malignant (cancerous). The size of a nodule can range from a few millimeters to a few centimeters in diameter. Nodules may be found during a chest X-ray or other imaging test for an unrelated health problem. In the proposed methodology pulmonary nodules can be classified into three stages. Firstly, a 2D histogram thresholding technique is used to identify volume segmentation. An ant colony optimization algorithm is used to determine the optimal threshold value. Secondly, geometrical features such as More >

  • Open Access

    ARTICLE

    Fault Monitoring Strategy for PV System Based on I-V Feature Library

    Huaxing Zhao1, Yanbo Che1,*, Gang Wen2, Yijing Chen3

    Energy Engineering, Vol.121, No.3, pp. 643-660, 2024, DOI:10.32604/ee.2023.045204

    Abstract Long-term use in challenging natural conditions is possible for photovoltaic modules, which are extremely prone to failure. Failure to diagnose and address faults in Photovoltaic (PV) power systems in a timely manner can cause permanent damage to PV modules and, in more serious cases, fires. Therefore, research into photovoltaic module defect detection techniques is crucial for the growth of the photovoltaic sector as well as for maintaining national economic prosperity and ensuring public safety. Considering the drawbacks of the current real-time and historical data-based methods for monitoring distributed PV systems, this paper proposes a method… More >

  • Open Access

    ARTICLE

    Improving Video Watermarking through Galois Field GF(24) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques

    Yasmin Alaa Hassan1,*, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1423-1442, 2024, DOI:10.32604/cmc.2023.046149

    Abstract Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity. This study delves into the integration of Galois Field (GF) multiplication tables, especially GF(24), and their interaction with distinct irreducible polynomials. The primary aim is to enhance watermarking techniques for achieving imperceptibility, robustness, and efficient execution time. The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process. Scene selection is used strategically to embed watermarks in the most vital frames of the video, while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria, maintaining… More >

  • Open Access

    ARTICLE

    Assessment of the Influence of Tunnel Settlement on Operational Performance of Subway Vehicles

    Gang Niu1,2, Guangwei Zhang1, Zhaoyang Jin1, Wei Zhang3,*, Xiang Liu3

    Structural Durability & Health Monitoring, Vol.18, No.1, pp. 55-71, 2024, DOI:10.32604/sdhm.2023.044832

    Abstract In the realm of subway shield tunnel operations, the impact of tunnel settlement on the operational performance of subway vehicles is a crucial concern. This study introduces an advanced analytical model to investigate rail geometric deformations caused by settlement within a vehicle-track-tunnel coupled system. The model integrates the geometric deformations of the track, attributed to settlement, as track irregularities. A novel “cyclic model” algorithm was employed to enhance computational efficiency without compromising on precision, a claim that was rigorously validated. The model’s capability extends to analyzing the time-history responses of vehicles traversing settlement-affected areas. The More >

  • Open Access

    ARTICLE

    Gender Differences in the Incidence and Related Factors of Low Social Support among Adolescents with Subthreshold Depression

    Yi Shi, Fangfang Shangguan*, Jing Xiao*

    International Journal of Mental Health Promotion, Vol.25, No.12, pp. 1257-1263, 2023, DOI:10.32604/ijmhp.2023.030516

    Abstract Background: Social support is related to depression, but the gender differences and related factors that contribute to low social support among adolescents with subthreshold depression remain to be elucidated. This study explores the relationship between social support and depression, in addition to the gender difference in the incidence of low social support among adolescents with subthreshold depression and its related factors. Methods: A total of 371 Chinese adolescents with subthreshold depression were recruited. All subjects were rated on the Social Support Scale for Adolescents, the Response Style Scale, the Self-Perception Profile for Children, the Individualism-collectivism… More >

  • Open Access

    ARTICLE

    Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks

    R. Saravanan1,*, R. Muthaiah1, A. Rajesh2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2339-2356, 2024, DOI:10.32604/cmes.2023.030898

    Abstract This study develops an Enhanced Threshold Based Energy Detection approach (ETBED) for spectrum sensing in a cognitive radio network. The threshold identification method is implemented in the received signal at the secondary user based on the square law. The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing. Additionally, the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems. In the dynamic threshold, the signal ratio-based threshold is fixed. The threshold is computed by considering the Modified Black Widow Optimization… More > Graphic Abstract

    Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks

Displaying 1-10 on page 1 of 82. Per Page