Journals / CMC / Vol.57, No.3
Table of Content


    Secure Video Streaming with Lightweight Cipher PRESENT in an SDN Testbed

    Pengcheng Liu1, †, Xiaojun Wang1, †, S. R. Chaudhry1, Khalid Javeed2, Yue Ma3, *, Martin Collier1
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 353-363, 2018, DOI:10.32604/cmc.2018.04142
    Abstract The combination of traditional processors and Field Programmable Gate Arrays (FPGA) is shaping the future networking platform for intensive computation in resource-constrained networks and devices. These networks present two key challenges of security and resource limitations. Lightweight ciphers are suitable to provide data security in such constrained environments. Implementing the lightweight PRESENT encryption algorithm in a reconfigurable platform (FPGAs) can offer secure communication service and flexibility. This paper presents hardware acceleration of security primitives in SDN using NETFPGA-10G. We implement an efficient design of the PRESENT algorithm for faster, smaller and lower power consumption hardware circuit using Verilog. We evaluate… More >


    A Bio-Inspired Global Finite Time Tracking Control of Four-Rotor Test Bench System

    Rooh ul Amin1, Irum Inayat2, Li Aijun1, Shahaboddin Shamshirband3,4,*, Timon Rabczuk5
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 365-388, 2018, DOI:10.32604/cmc.2018.03757
    Abstract A bio-inspired global finite time control using global fast-terminal sliding mode controller and radial basis function network is presented in this article, to address the attitude tracking control problem of the three degree-of-freedom four-rotor hover system. The proposed controller provides convergence of system states in a pre-determined finite time and estimates the unmodeled dynamics of the four-rotor system. Dynamic model of the four-rotor system is derived with Newton’s force equations. The unknown dynamics of four-rotor systems are estimated using Radial basis function. The bio-inspired global fast terminal sliding mode controller is proposed to provide chattering free finite time error convergence… More >


    Some Geometric Invariants of Pseudo-Spherical Evolutes in the Hyperbolic 3-Space

    H. S. Abdel-Aziz1, M. Khalifa Saad1,2,*, A. A. Abdel-Salam1
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 389-415, 2018, DOI:10.32604/cmc.2018.02149
    Abstract In this paper, we study the pseudo-spherical evolutes of curves in three dimensional hyperbolic space. We use techniques from singularity theory to investigate the singularities of pseudo-spherical evolutes and establish some relationships between singularities of these curves and geometric invariants of curves under the action of the Lorentz group. Besides, we defray with illustration some computational examples in support our main results. More >


    Characterization of Loading Rate Effects on the Interactions between Crack Growth and Inclusions in Cementitious Material

    Shuai Zhou3,4, Xiaoying Zhuang1,2,*
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 417-446, 2018, DOI:10.32604/cmc.2018.01742
    Abstract The microcapsule-enabled cementitious material is an appealing building material and it has been attracting increasing research interest. By considering microcapsules as dissimilar inclusions in the material, this paper employs the discrete element method (DEM) to study the effects of loading rates on the fracturing behavior of cementitious specimens containing the inclusion and the crack. The numerical model was first developed and validated based on experimental results. It is then used to systematically study the initiation, the propagation and the coalescence of cracks in inclusion-enabled cementitious materials. The study reveals that the crack propagation speed, the first crack initiation stress, the… More >


    A Size-Dependent Functionally Graded Higher Order Plate Analysis Based on Modified Couple Stress Theory and Moving Kriging Meshfree Method

    T. D. Tran1, Chien H. Thai2,3,*, H. Nguyen-Xuan4,5,*
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 447-483, 2018, DOI:10.32604/cmc.2018.01738
    Abstract A size-dependent computational approach for bending, free vibration and buckling analyses of isotropic and sandwich functionally graded (FG) microplates is in this study presented. We consider both shear deformation and small scale effects through the generalized higher order shear deformation theory and modified couple stress theory (MCST). The present model only retains a single material length scale parameter for capturing properly size effects. A rule of mixture is used to model material properties varying through the thickness of plates. The principle of virtual work is used to derive the discrete system equations which are approximated by moving Kriging interpolation (MKI)… More >


    The Stability of Anionic States of Thymine-Glycine Dimers with Excess Electron

    Yugai Huang 1, 2, *
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 485-494, 2018, DOI:10.32604/cmc.2018.03112
    Abstract It has been demonstrated that low energy electrons (LEEs) can induce serious DNA damages including bases loss and even single and double strand breaks. Experiments also showed that LEE induced DNA damages will be reduced with the presence of amino acids. For understanding of the protection of amino acids to DNA, the stability of 6 kinds of thymine and glycine (T-g) dimers with planar configurations with an excess electron were studied with density functional theory (DFT) method. The results show that, when the excess electron is vertically attached, all the dimers become more active with higher energy. After re-optimization, 4… More >


    Perfect Quantum Teleportation via Bell States

    Xiaoqing Tan1,*, Xiaochun Li1, Pei Yang1
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 495-503, 2018, DOI:10.32604/cmc.2018.03772
    Abstract Quantum mechanics shows superiority than classical mechanics in many aspects and quantum entanglement plays an essential role in information processing and some computational tasks such as quantum teleportation (QT). QT was proposed to transmit the unknown states, in which EPR pairs, the entangled states, can be used as quantum channels. In this paper, we present two simple schemes for teleporting a product state of two arbitrary single-particle and an arbitrary two-particle pure entangled state respectively. Alice and Bob have shared an entangle state. Two Bell states are used as quantum channels. Then after Alice measuring her qubits and informing Bob… More >


    A Virtual Puncture Surgery System Based on Multi-Layer Soft Tissue and Force Mesh

    Xiaorui Zhang1,3,*, Jiali Duan1, Lifeng Zhu2, Ladislav Kavan3
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 505-519, 2018, DOI:10.32604/cmc.2018.01842
    Abstract Puncture is a common operation in surgery, which involves all kinds of tissue materials with different geometry and mechanical properties. As a new cross-disciplinary research area, Virtual Surgery (VS) makes simulation of soft tissue in puncture operation possible in virtual environment. In this paper, we introduce a VS-based puncture system composed by three-layer soft tissue, simulated with spherical harmonic function (SHF), which is covered with a force mesh, constructed by mass spring model (MSM). The two models are combined together with a parameter of SHF named surface radius, which provides MSM with real-time deformation data needed in force calculation. Meanwhile,… More >


    Symmetric Learning Data Augmentation Model for Underwater Target Noise Data Expansion

    Ming He1,2, Hongbin Wang1,*, Lianke Zhou1, Pengming Wang3, Andrew Ju4
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 521-532, 2018, DOI:10.32604/cmc.2018.03710
    Abstract An important issue for deep learning models is the acquisition of training of data. Without abundant data from a real production environment for training, deep learning models would not be as widely used as they are today. However, the cost of obtaining abundant real-world environment is high, especially for underwater environments. It is more straightforward to simulate data that is closed to that from real environment. In this paper, a simple and easy symmetric learning data augmentation model (SLDAM) is proposed for underwater target radiate-noise data expansion and generation. The SLDAM, taking the optimal classifier of an initial dataset as… More >


    Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor

    Guoyuan Lin1,2,*, Bowen Liu1, Pengcheng Xiao3, Min Lei4, Wei Bi5,6
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 533-547, 2018, DOI:10.32604/cmc.2018.03720
    Abstract Anti-detection is becoming as an emerging challenge for anti-phishing. This paper solves the threats of anti-detection from the threshold setting condition. Enough webpages are considered to complicate threshold setting condition when the threshold is settled. According to the common visual behavior which is easily attracted by the salient region of webpages, image retrieval methods based on texton correlation descriptor (TCD) are improved to obtain enough webpages which have similarity in the salient region for the images of webpages. There are two steps for improving TCD which has advantage of recognizing the salient region of images: (1) This paper proposed Weighted… More >


    A Method of Identifying Thunderstorm Clouds in Satellite Cloud Image Based on Clustering

    Lili He1,2, Dantong Ouyang1,2, Meng Wang1,2, Hongtao Bai1,2, Qianlong Yang1,2, Yaqing Liu3,4, Yu Jiang1,2,*
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 549-570, 2018, DOI:10.32604/cmc.2018.03840
    Abstract In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method of spectral threshold recognition and… More >


    Seed Selection for Data Offloading Based on Social and Interest Graphs

    Ying Li1, Jianbo Li1,*, Jianwei Chen1, Minchao Lu1, Caoyuan Li2,3
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 571-587, 2018, DOI:10.32604/cmc.2018.02851
    Abstract The explosive growth of mobile data demand is becoming an increasing burden on current cellular network. To address this issue, we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic. The principle behind it is to select a few important users as seeds for data sharing. The three critical steps are detailed as follows. We first explore individual interests of users by the construction of user profiles, on which an interest graph is built by Gaussian graphical modeling. We then apply the extreme value theory to threshold the encounter duration of user pairs. So, a contact graph… More >


    Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM

    Jian Xu1,2,*, Zhihao Jiang1, Andi Wang1, Chen Wang1, Fucai Zhou1
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 589-602, 2018, DOI:10.32604/cmc.2018.03820
    Abstract With the development of cloud storage, the problem of efficiently checking and proving data integrity needs more consideration. Therefore, much of growing interest has been pursed in the context of the integrity verification of cloud storage. Provable data possession (PDP) and Proofs of retrievablity (POR) are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments. The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not have. Unfortunately, most of POR… More >


    Natural Language Semantic Construction Based on Cloud Database

    Suzhen Wang1, Lu Zhang1, Yanpiao Zhang1, Jieli Sun1, Chaoyi Pang2, Gang Tian3, Ning Cao4,*
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 603-619, 2018, DOI:10.32604/cmc.2018.03884
    Abstract Natural language semantic construction improves natural language comprehension ability and analytical skills of the machine. It is the basis for realizing the information exchange in the intelligent cloud-computing environment. This paper proposes a natural language semantic construction method based on cloud database, mainly including two parts: natural language cloud database construction and natural language semantic construction. Natural Language cloud database is established on the CloudStack cloud-computing environment, which is composed by corpus, thesaurus, word vector library and ontology knowledge base. In this section, we concentrate on the pretreatment of corpus and the presentation of background knowledge ontology, and then put… More >


    Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol

    Jifeng Zhong1,*, Zhihao Liu2,3,*, Juan Xu4
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 621-633, 2018, DOI:10.32604/cmc.2018.03706
    Abstract The controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed. It is found that there are some serious security issues in this protocol. An eavesdropper (Eve) can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation (SCNO) attack. By the same attack, Eve can also steal some information of the secret message that the sender transmits. In addition, the receiver can take the same kind of attack to eavesdrop on some information of… More >


    A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security

    Changting Shi1, *
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 635-652, 2018, DOI:10.32604/cmc.2018.03754
    Abstract In the last decade, IoT has been widely used in smart cities, autonomous driving and Industry 4.0, which lead to improve efficiency, reliability, security and economic benefits. However, with the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the IoT security is being confronted with a series of new threats and challenges. IoT device identification via Radio Frequency Fingerprinting (RFF) extracting from radio signals is a physical-layer method for IoT security. In physical-layer, RFF is a unique characteristic of IoT device themselves, which can difficultly be tampered. Just as people’s unique fingerprinting,… More >


    Retraction Notice to: Mitigating Content Caching Attack in NDN

    Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2
    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 653-653, 2018, DOI:10.32604/cmc.2018.00653
    Abstract none More >

Share Link

WeChat scan