Journals / CMC / Vol.56, No.3
Table of Content


  • ARTICLE

    Investigation in the Effects of Configuration Parameters on the Thermal Behavior of Novel Conical Friction Plate in Continuously Sliding Condition

    Yanzhong Wang1, Xiangyu Wu1,*
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 353-363, 2018, DOI: 10.3970/cmc.2018.03714
    Abstract To investigate the effects of configuration parameters and operation condition on the thermal behavior of novel conical friction plate, a three-dimensional finite element model of conical friction plate is established for numerical simulation. The conical surface configuration and friction heat generation of novel conical friction surfaces are discussed. The results indicate that the thermal behavior of the conical friction plate during continuously sliding period is influenced by the conical surface configuration. Maximum temperature occurs in the conical friction plate with cone angle of 24°. The maximum temperature value of friction plate is increased 7.4°C, when cone depth increases from 3… More >

  • ARTICLE

    SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data

    Bo Xiao1, Zhen Wang2, Qi Liu3,*, Xiaodong Liu3
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 365-379, 2018, DOI: 10.3970/cmc.2018.01830
    Abstract In recent years, the rapid development of big data technology has also been favored by more and more scholars. Massive data storage and calculation problems have also been solved. At the same time, outlier detection problems in mass data have also come along with it. Therefore, more research work has been devoted to the problem of outlier detection in big data. However, the existing available methods have high computation time, the improved algorithm of outlier detection is presented, which has higher performance to detect outlier. In this paper, an improved algorithm is proposed. The SMK-means is a fusion algorithm which… More >

  • ARTICLE

    Network Security Situation Awareness Framework based on Threat Intelligence

    Hongbin Zhang1, 2, Yuzi Yi1, *, Junshe Wang1, Ning Cao3, *, Qiang Duan4
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 381-399, 2018, DOI: 10.3970/cmc.2018.03787
    Abstract Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of… More >

  • ARTICLE

    Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices

    En Zhang1,2, Xintao Duan1,2, Siuming Yiu3, Junbin Fang4, Zoe L. Jiang5,*, Tsz HonYuen6, Jie Peng1
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 401-414, 2018, DOI: 10.3970/cmc.2018.03733
    Abstract In the setting of (t, n) threshold secret sharing, at least t parties can reconstruct the secret, and fewer than t parties learn nothing about the secret. However, to achieve fairness, the existing secret sharing schemes either assume a trusted party exists or require running multi-round, which is not practical in a real application. In addition, the cost of verification grows dramatically with the number of participants and the communication complexity is O(t), if there is not a trusted combiner in the reconstruction phase. In this work, we propose a fair server-aided multi-secret sharing scheme for weak computational devices. The… More >

  • ARTICLE

    An Improved Memory Cache Management Study Based on Spark

    Suzhen Wang1, Yanpiao Zhang1, Lu Zhang1, Ning Cao2, *, Chaoyi Pang3
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 415-431, 2018, DOI: 10.3970/cmc.2018.03716
    Abstract Spark is a fast unified analysis engine for big data and machine learning, in which the memory is a crucial resource. Resilient Distribution Datasets (RDDs) are parallel data structures that allow users explicitly persist intermediate results in memory or on disk, and each one can be divided into several partitions. During task execution, Spark automatically monitors cache usage on each node. And when there is a RDD that needs to be stored in the cache where the space is insufficient, the system would drop out old data partitions in a least recently used (LRU) fashion to release more space. However,… More >

  • ARTICLE

    A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks

    Jin Wang1,2, Chunwei Ju2, Yu Gao2, Arun Kumar Sangaiah3, Gwang-jun Kim4,*
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 433-446, 2018, DOI: 10.3970/cmc.2018.04132
    Abstract Wireless Sensor Networks (WSNs) are large-scale and high-density networks that typically have coverage area overlap. In addition, a random deployment of sensor nodes cannot fully guarantee coverage of the sensing area, which leads to coverage holes in WSNs. Thus, coverage control plays an important role in WSNs. To alleviate unnecessary energy wastage and improve network performance, we consider both energy efficiency and coverage rate for WSNs. In this paper, we present a novel coverage control algorithm based on Particle Swarm Optimization (PSO). Firstly, the sensor nodes are randomly deployed in a target area and remain static after deployment. Then, the… More >

  • ARTICLE

    Provably Secure APK Redevelopment Authorization Scheme in the Standard Model

    Daofeng Li1,3,*, Mingxing Luo2, Bowen Zhao1,3, Xiangdong Che4
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 447-465, 2018, DOI: 10.3970/cmc.2018.03692
    Abstract The secure issues of APK are very important in Android applications. In order to solve potential secure problems and copyrights issues in redevelopment of APK files, in this paper we propose a new APK redevelopment mechanism (APK-SAN). By exploring sanitizable signature technology, APK-SAN allows the original developer to authorize specified modifier who can redevelop the designated source code of APK files. Our scheme does not require interactions between the developer and modifiers. It can reduce the communication overhead and computational overhead for developers. Especially, the signature of redeveloped APK files is valid and maintains the copyrights. The proposed APK-SAN signature… More >

  • ARTICLE

    Feature Relationships Learning Incorporated Age Estimation Assisted by Cumulative Attribute Encoding

    Qing Tian1,2,3,*, Meng Cao1,2, Tinghuai Ma1,2
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 467-482, 2018, DOI: 10.3970/cmc.2018.02197
    Abstract The research of human facial age estimation (AE) has attracted increasing attention for its wide applications. Up to date, a number of models have been constructed or employed to perform AE. Although the goal of AE can be achieved by either classification or regression, the latter based methods generally yield more promising results because the continuity and gradualness of human aging can naturally be preserved in age regression. However, the neighbor-similarity and ordinality of age labels are not taken into account yet. To overcome this issue, the cumulative attribute (CA) coding was introduced. Although such age label relationships can be… More >

  • ARTICLE

    RETRACTED: Mitigating Content Caching Attack in NDN

    Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 483-499, 2018, DOI: 10.3970/cmc.2018.03687
    Abstract Content caching is a core component in Named Data Networking (NDN), where content is cached in routers and served for future requests. However, the adversary can launch verification attack by placing poisoned data into the network with a legitimate name and allow the routers in the delivery path to frequently identify the content. Since NDN employs digital signature on each piece of content, verifying all content will exhaust routers’ computational resources due to the massive data in the network. In this paper, we propose a selective verification scheme upon the contents that are hit in the content store and allow… More >

  • ARTICLE

    Perceptual Gradient Similarity Deviation for Full Reference Image Quality Assessment

    Manyu Jin1, Tao Wang1, Zexuan Ji1,*, Xiaobo Shen2
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 501-515, 2018, DOI: 10.3970/cmc.2018.02371
    Abstract Perceptual image quality assessment (IQA) is one of the most indispensable yet challenging problems in image processing and computer vision. It is quite necessary to develop automatic and efficient approaches that can accurately predict perceptual image quality consistently with human subjective evaluation. To further improve the prediction accuracy for the distortion of color images, in this paper, we propose a novel effective and efficient IQA model, called perceptual gradient similarity deviation (PGSD). Based on the gradient magnitude similarity, we proposed a gradient direction selection method to automatically determine the pixel-wise perceptual gradient. The luminance and chrominance channels are both took… More >

  • ARTICLE

    In Situ Synthesis of Cuprous Oxide/Cellulose Nanofibers Gel and Antibacterial Properties

    Ying Hu1,2, Qinfei Ke1, Zhe Li2, Wanli Han3, Zhiyong Yan2,*
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 517-527, 2018, DOI: 10.3970/cmc.2018.03608
    Abstract Cellulose nanofibers were synthesized by acetobacter xylinum (xylinum 1.1812). The cellulose nanofibers with 30-90 nm width constructed three-dimension network gel, which could be used as a wound dressing since it can provide moist environment to a wound. However, cellulose nanofibers have no antimicrobial activity to prevent wound infection. To achieve antimicrobial activity, the cellulose nanofibers can load cuprous oxide (Cu2O) particles on the surface. The cuprous oxide is a kind of safe antibacterial material. The copper ions can be reduced into cuprous oxides by reducing agents such as glucose, N2H4 and sodium hypophosphite. The cellulose nanofibers network gel was soaked… More >

  • ARTICLE

    Fast Near-duplicate Image Detection in Riemannian Space by A Novel Hashing Scheme

    Ligang Zheng1,*, Chao Song2
    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 529-539, 2018, DOI: 10.3970/cmc.2018.03780
    Abstract There is a steep increase in data encoded as symmetric positive definite (SPD) matrix in the past decade. The set of SPD matrices forms a Riemannian manifold that constitutes a half convex cone in the vector space of matrices, which we sometimes call SPD manifold. One of the fundamental problems in the application of SPD manifold is to find the nearest neighbor of a queried SPD matrix. Hashing is a popular method that can be used for the nearest neighbor search. However, hashing cannot be directly applied to SPD manifold due to its non-Euclidean intrinsic geometry. Inspired by the idea… More >

Share Link

WeChat scan