Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Policy-Based Group Signature Scheme from Lattice

    Yongli Tang1, Yuanhong Li1, Qing Ye1,*, Ying Li1, Xiaojun Wang2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4069-4085, 2022, DOI:10.32604/cmc.2022.026820

    Abstract Although the existing group signature schemes from lattice have been optimized for efficiency, the signing abilities of each member in the group are relatively single. It may not be suitable for complex applications. Inspired by the pioneering work of Bellare and Fuchsbauer, we present a primitive called policy-based group signature. In policy-based group signatures, group members can on behalf of the group to sign documents that meet their own policies, and the generated signatures will not leak the identity and policies of the signer. Moreover, the group administrator is allowed to reveal the identity of signer when a controversy occurs.… More >

  • Open Access

    ARTICLE

    Interest Points Analysis for Internet Forum Based on Long-Short Windows Similarity

    Xinghai Ju1, Jicang Lu1,*, Xiangyang Luo1, Gang Zhou1, Shiyu Wang1, Shunhang Li1, Yang Yang2,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3247-3267, 2022, DOI:10.32604/cmc.2022.026698

    Abstract For Internet forum Points of Interest (PoI), existing analysis methods are usually lack of usability analysis under different conditions and ignore the long-term variation, which lead to blindness in method selection. To address this problem, this paper proposed a PoI variation prediction framework based on similarity analysis between long and short windows. Based on the framework, this paper presented 5 PoI analysis algorithms which can be categorized into 2 types, i.e., the traditional sequence analysis methods such as autoregressive integrated moving average model (ARIMA), support vector regressor (SVR), and the deep learning methods such as convolutional neural network (CNN), long-short… More >

  • Open Access

    ARTICLE

    Safety Helmet Wearing Detection in Aerial Images Using Improved YOLOv4

    Wei Chen1, Mi Liu1,*, Xuhong Zhou2, Jiandong Pan3, Haozhi Tan4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3159-3174, 2022, DOI:10.32604/cmc.2022.026664

    Abstract In construction, it is important to check whether workers wear safety helmets in real time. We proposed using an unmanned aerial vehicle (UAV) to monitor construction workers in real time. As the small target of aerial photography poses challenges to safety-helmet-wearing detection, we proposed an improved YOLOv4 model to detect the helmet-wearing condition in aerial photography: (1) By increasing the dimension of the effective feature layer of the backbone network, the model's receptive field is reduced, and the utilization rate of fine-grained features is improved. (2) By introducing the cross stage partial (CSP) structure into path aggregation network (PANet), the… More >

  • Open Access

    ARTICLE

    Early Rehabilitation After Craniosynostosis Surgery

    Dan Wang1, Lanzheng Bian2, Xiaoyan Hao3, Yiming Liu1,*, Jinyue Xia4, Jing Hu5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3899-3912, 2022, DOI:10.32604/cmc.2022.026660

    Abstract Craniosynostosis is a common congenital craniofacial deformity caused by premature ossification and closure of one or more cranial sutures. Craniosynostosis will not only affect the normal development of the skull, but also may cause a variety of complications, damage the nervous system, and cause long-term effects on the development of physical and mental health. Therefore, it is particularly important to provide new ideas for clinical treatment by studying the rehabilitation methods of craniosynostosis, and to improve the cure rate. To this end, this paper studies the early rehabilitation methods after craniosynostosis surgery and designs a comprehensive early rehabilitation process and… More >

  • Open Access

    ARTICLE

    Fuzzy Hybrid Coyote Optimization Algorithm for Image Thresholding

    Linguo Li1,2, Xuwen Huang2, Shunqiang Qian2, Zhangfei Li2, Shujing Li2,*, Romany F. Mansour3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3073-3090, 2022, DOI:10.32604/cmc.2022.026625

    Abstract In order to address the problems of Coyote Optimization Algorithm in image thresholding, such as easily falling into local optimum, and slow convergence speed, a Fuzzy Hybrid Coyote Optimization Algorithm (hereinafter referred to as FHCOA) based on chaotic initialization and reverse learning strategy is proposed, and its effect on image thresholding is verified. Through chaotic initialization, the random number initialization mode in the standard coyote optimization algorithm (COA) is replaced by chaotic sequence. Such sequence is nonlinear and long-term unpredictable, these characteristics can effectively improve the diversity of the population in the optimization algorithm. Therefore, in this paper we first… More >

  • Open Access

    ARTICLE

    Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects

    Jun-Seob Kim, Ki-Woong Park*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3401-3424, 2022, DOI:10.32604/cmc.2022.026621

    Abstract A ransomware attack that interrupted the operation of Colonial Pipeline (a large U.S. oil pipeline company), showed that security threats by malware have become serious enough to affect industries and social infrastructure rather than individuals alone. The agents and characteristics of attacks should be identified, and appropriate strategies should be established accordingly in order to respond to such attacks. For this purpose, the first task that must be performed is malware classification. Malware creators are well aware of this and apply various concealment and avoidance techniques, making it difficult to classify malware. This study focuses on new features and classification… More >

  • Open Access

    ARTICLE

    Optimization Agricultural Supply Chain: A Case Study of Fertilizer Supplier Selection

    Nguyen Van Thanh1, Nguyen Thi Kim Lan2,*, Syed Tam Husain1, Nguyen Hoang Hai1, Nguyen Viet Tinh1

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4057-4068, 2022, DOI:10.32604/cmc.2022.026587

    Abstract The 21st century is associated with the Industrial Revolution 4.0 and the organic agriculture trend, making the utilization of high-quality fertilizers, abundant nutritional content, economical, and no affect to environment pollution. According to the new concept, clean agricultural production and organic agricultural products are not allowed to excessively use synthetic chemicals such as chemical fertilizers, and plant protection drugs, but priority is to use manure, organic fertilizers, and natural mineral fertilizers. Fertilizer must meet the balanced nutritional requirements of crops, maintain, and improve the fertility of the ground, protect the surrounding ecosystem, and leave harmful effects in agricultural products, products… More >

  • Open Access

    ARTICLE

    Dynamic Intelligent Supply-Demand Adaptation Model Towards Intelligent Cloud Manufacturing

    Yanfei Sun1, Feng Qiao2, Wei Wang1, Bin Xu1, Jianming Zhu1, Romany Fouad Mansour3, Jin Qi1,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2825-2843, 2022, DOI:10.32604/cmc.2022.026574

    Abstract As a new mode and means of smart manufacturing, smart cloud manufacturing (SCM) faces great challenges in massive supply and demand, dynamic resource collaboration and intelligent adaptation. To address the problem, this paper proposes an SCM-oriented dynamic supply-demand (S-D) intelligent adaptation model for massive manufacturing services. In this model, a collaborative network model is established based on the properties of both the supply-demand and their relationships; in addition, an algorithm based on deep graph clustering (DGC) and aligned sampling (AS) is used to divide and conquer the large adaptation domain to solve the problem of the slow computational speed caused… More >

  • Open Access

    ARTICLE

    Multi-Stream CNN-Based Personal Recognition Method Using Surface Electromyogram for 5G Security

    Jin Su Kim1, Min-Gu Kim1, Jae Myung Kim1,2, Sung Bum Pan1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2997-3007, 2022, DOI:10.32604/cmc.2022.026572

    Abstract As fifth generation technology standard (5G) technology develops, the possibility of being exposed to the risk of cyber-attacks that exploits vulnerabilities in the 5G environment is increasing. The existing personal recognition method used for granting permission is a password-based method, which causes security problems. Therefore, personal recognition studies using bio-signals are being conducted as a method to access control to devices. Among bio-signal, surface electromyogram (sEMG) can solve the existing personal recognition problem that was unable to the modification of registered information owing to the characteristic changes in its signal according to the performed operation. Furthermore, as an advantage, sEMG… More >

  • Open Access

    ARTICLE

    Blockchain-based Distributed Power Market Trading Mechanism

    Dongjun Cui1,*, Jinghan He2, Guofang Zhang3, Zihan Hou4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2845-2858, 2022, DOI:10.32604/cmc.2022.026568

    Abstract Distributed power market trading has the characteristics of large number of participants, scattered locations, small single trading scale, and point-to-point trading. The traditional centralized power trading model has the problems of large load, low efficiency, high cost, reliance on third parties and unreliable data. With the characteristics of decentralization and non-tampering, blockchain can establish a point-to-point trusted trading environment and provide effective solutions to the above problems. Therefore, this paper proposed a distributed power market trading framework based on blockchain. In this framework, the distributed power supply characteristics and trading needs of each participant are analyzed, a complete distributed trading… More >

Displaying 8481-8490 on page 849 of 22098. Per Page