Journals / CMC / Vol.62, No.1
Table of Content


  • ARTICLE

    Digital Forensics for Recoloring via Convolutional Neural Network

    Zhangyi Shen1, Feng Ding2, *, Yunqing Shi1
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 1-16, 2020, DOI:10.32604/cmc.2020.08291
    Abstract As a common medium in our daily life, images are important for most people to gather information. There are also people who edit or even tamper images to deliberately deliver false information under different purposes. Thus, in digital forensics, it is necessary to understand the manipulating history of images. That requires to verify all possible manipulations applied to images. Among all the image editing manipulations, recoloring is widely used to adjust or repaint the colors in images. The color information is an important visual information that image can deliver. Thus, it is necessary to guarantee the correctness of color in… More >

  • ARTICLE

    Multiscale Analysis of the Effect of Debris on Fretting Wear Process Using a Semi-Concurrent Method

    Shengjie Wang1, Tongyan Yue2, Magd Abdel Wahab3, 4, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 17-35, 2020, DOI:10.32604/cmc.2020.07790
    Abstract Fretting wear is a phenomenon, in which wear happens between two oscillatory moving contact surfaces in microscale amplitude. In this paper, the effect of debris between pad and specimen is analyzed by using a semi-concurrent multiscale method. Firstly, the macroscale fretting wear model is performed. Secondly, the part with the wear profile is imported from the macroscale model to a microscale model after running in stage. Thirdly, an effective pad’s radius is extracted by analyzing the contact pressure in order to take into account the effect of the debris. Finally, the effective radius is up-scaled from the microscale model to… More >

  • ARTICLE

    Entropy Generation for Flow and Heat Transfer of Sisko-Fluid Over an Exponentially Stretching Surface

    Mohamed Abd El-Aziz1, 2, A. M. Aly1, 3, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 37-59, 2020, DOI:10.32604/cmc.2020.08488
    Abstract In the present study, the effects of the magnetic field on the entropy generation during fluid flow and heat transfer of a Sisko-fluid over an exponentially stretching surface are considered. The similarity transformations are used to transfer the governing partial differential equations into a set of nonlinear-coupled ordinary differential equations. Runge-Kutta-Fehlberg method is used to solve the governing problem. The effects of magnetic field parameter M, local slip parameter λ, generalized Biot number γ, Sisko fluid material parameter A, Eckert number Ec, Prandtl number Pr and Brinkman number Br at two values of power law index on the velocity, temperature,… More >

  • ARTICLE

    Numerical Simulations for Stochastic Computer Virus Propagation Model

    Muhammad Shoaib Arif1, *, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Javeria Nawaz Abbasi3, Amna Nazeer3, Umer Javed4
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 61-77, 2020, DOI:10.32604/cmc.2020.08595
    Abstract We are presenting the numerical simulations for the stochastic computer virus propagation model in this manuscript. We are comparing the solutions of stochastic and deterministic computer virus models. Outcomes of a threshold number R0 hold in stochastic computer virus model. If R0 < 1 then in such a condition virus controlled in the computer population while R0 > 1 shows virus rapidly spread in the computer population. Unfortunately, stochastic numerical techniques fail to cope with large step sizes of time. The suggested structure of the stochastic non-standard finite difference technique can never violate the dynamical properties. On this basis, we… More >

  • ARTICLE

    Multi-Scale Analysis of Fretting Fatigue in Heterogeneous Materials Using Computational Homogenization

    Dimitra Papagianni1, 2, Magd Abdel Wahab3, 4, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 79-97, 2020, DOI:10.32604/cmc.2020.07988
    Abstract This paper deals with modeling of the phenomenon of fretting fatigue in heterogeneous materials using the multi-scale computational homogenization technique and finite element analysis (FEA). The heterogeneous material for the specimens consists of a single hole model (25% void/cell, 16% void/cell and 10% void/cell) and a four-hole model (25% void/cell). Using a representative volume element (RVE), we try to produce the equivalent homogenized properties and work on a homogeneous specimen for the study of fretting fatigue. Next, the fretting fatigue contact problem is performed for 3 new cases of models that consist of a homogeneous and a heterogeneous part (single… More >

  • ARTICLE

    Median Filtering Forensics Scheme for Color Images Based on Quaternion Magnitude-Phase CNN

    Jinwei Wang1, *, Yang Zhang1
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 99-112, 2020, DOI:10.32604/cmc.2020.04373
    Abstract In the paper, a convolutional neural network based on quaternion transformation is proposed to detect median filtering for color images. Compared with conventional convolutional neural network, color images can be processed in a holistic manner in the proposed scheme, which makes full use of the correlation between RGB channels. And due to the use of convolutional neural network, it can effectively avoid the one-sidedness of artificial features. Experimental results have shown the scheme’s improvement over the state-of-the-art scheme on the accuracy of color image median filtering detection. More >

  • ARTICLE

    Neural Dialogue Model with Retrieval Attention for Personalized Response Generation

    Cong Xu1, 2, Zhenqi Sun2, 3, Qi Jia2, 3, Dezheng Zhang2, 3, Yonghong Xie2, 3,*, Alan Yang4
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 113-122, 2020, DOI:10.32604/cmc.2020.05239
    Abstract With the success of new speech-based human-computer interfaces, there is a great need for effective and friendly dialogue agents that can communicate with people naturally and continuously. However, the lack of personality and consistency is one of critical problems in neural dialogue systems. In this paper, we aim to generate consistent response with fixed profile and background information for building a realistic dialogue system. Based on the encoder-decoder model, we propose a retrieval mechanism to deliver natural and fluent response with proper information from a profile database. Moreover, in order to improve the efficiency of training the dataset related to… More >

  • ARTICLE

    Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing

    Weijin Jiang1, 2, 3, Yang Wang1,*, Yirong Jiang4,*, Yuhui Xu1, Jiahui Chen1, Lina Tan1, Guo Liang5
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 123-136, 2020, DOI:10.32604/cmc.2020.05933
    Abstract In mobile cloud computing, trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud. Aiming at the security and trust management of mobile agent system in mobile cloud computing environment, the Human Trust Mechanism (HTM) is used to study the subjective trust formation, trust propagation and trust evolution law, and the subjective trust dynamic management algorithm (MASTM) is proposed. Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data, the public trust host… More >

  • ARTICLE

    Research on Privacy Disclosure Detection Method in Social Networks Based on Multi-Dimensional Deep Learning

    Yabin Xu1, 2, *, Xuyang Meng1, Yangyang Li3, Xiaowei Xu4, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 137-155, 2020, DOI:10.32604/cmc.2020.05825
    Abstract In order to effectively detect the privacy that may be leaked through social networks and avoid unnecessary harm to users, this paper takes microblog as the research object to study the detection of privacy disclosure in social networks. First, we perform fast privacy leak detection on the currently published text based on the fastText model. In the case that the text to be published contains certain private information, we fully consider the aggregation effect of the private information leaked by different channels, and establish a convolution neural network model based on multi-dimensional features (MF-CNN) to detect privacy disclosure comprehensively and… More >

  • ARTICLE

    A General Framework of Reversible Data Hiding with Controlled Contrast Enhancement

    Shaowei Weng1, 2, *, Yiyun Liu1, Yunqing Shi3, Bo Ou4, Chunyu Zhang5, Cuiping Wang6
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 157-177, 2020, DOI:10.32604/cmc.2020.05681
    Abstract This paper proposes a two-step general framework for reversible data hiding (RDH) schemes with controllable contrast enhancement. The first step aims at preserving visual perception as much as possible on the basis of achieving high embedding capacity (EC), while the second step is used for increasing image contrast. In the second step, some peak-pairs are utilized so that the histogram of pixel values is modified to perform histogram equalization (HE), which would lead to the image contrast enhancement. However, for HE, the utilization of some peak-pairs easily leads to over-enhanced image contrast when a large number of bits are embedded.… More >

  • ARTICLE

    Elastoplastic Analysis of Circular Tunnel in Saturated Ground Under Different Load Conditions

    Panpan Zhai1, 2, Ping Xu1, 2, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 179-197, 2020, DOI:10.32604/cmc.2020.06474
    Abstract When a tunnel is excavated below the groundwater table, groundwater flows in through the excavated wall of the tunnel and seepage forces act on it. These forces significantly affect the ground reaction curve, which is defined as the relationship between the internal pressure and radial displacement of the tunnel wall. This study investigates analytical solutions for seepage forces acting on the lining of a circular tunnel under steady-state groundwater flow. Considering the tunnel’s construction or service period and boundary conditions, the direction of maximum principal stress changes, and the input stress of the Mohr-Coulomb criterion varies. The stress distribution and… More >

  • ARTICLE

    Fire Detection Method Based on Improved Fruit Fly Optimization-Based SVM

    Fangming Bi1, 2, Xuanyi Fu1, 2, Wei Chen1, 2, 3, *, Weidong Fang4, Xuzhi Miao1, 2, Biruk Assefa1, 5
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 199-216, 2020, DOI:10.32604/cmc.2020.06258
    Abstract Aiming at the defects of the traditional fire detection methods, which are caused by false positives and false negatives in large space buildings, a fire identification detection method based on video images is proposed. The algorithm first uses the hybrid Gaussian background modeling method and the RGB color model to perform fire prejudgment on the video image, which can eliminate most non-fire interferences. Secondly, the traditional regional growth algorithm is improved and the fire image segmentation effect is effectively improved. Then, based on the segmented image, the dynamic and static features of the fire flame are further analyzed and extracted… More >

  • ARTICLE

    News Text Topic Clustering Optimized Method Based on TF-IDF Algorithm on Spark

    Zhuo Zhou1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Qiang Liu1, Neal N. Xiong2
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 217-231, 2020, DOI:10.32604/cmc.2020.06431
    Abstract Due to the slow processing speed of text topic clustering in stand-alone architecture under the background of big data, this paper takes news text as the research object and proposes LDA text topic clustering algorithm based on Spark big data platform. Since the TF-IDF (term frequency-inverse document frequency) algorithm under Spark is irreversible to word mapping, the mapped words indexes cannot be traced back to the original words. In this paper, an optimized method is proposed that TF-IDF under Spark to ensure the text words can be restored. Firstly, the text feature is extracted by the TF-IDF algorithm combined CountVectorizer… More >

  • ARTICLE

    TCPW BR: A Wireless Congestion Control Scheme Base on RTT

    Liwei Tian1, 2, *, Jinfeng Li3, Longqing Zhang2, Yu Sun4, Lei Yang2
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 233-244, 2020, DOI:10.32604/cmc.2020.06135
    Abstract The wireless network is limited by the transmission medium, and the transmission process is subject to large interference and jitter. This jitter can cause sporadic loss and is mistaken for congestion by the congestion control mechanism. The TCP Westwood protocol (referred to as TCPW) is such that it cannot distinguish between congestion loss and wireless jitter loss, which makes the congestion mechanism too sensitive and reduces bandwidth utilization. Based on this, the TCPW protocol is modified based on the estimate of the Round-Trip Time (referred to as RTT) value-called TCPW BR. The algorithm uses the measured smooth RTT value and… More >

  • ARTICLE

    Microstructural Modeling and Multiscale Mechanical Properties Analysis of Cancellous Bone

    Zhiqiang Huang1, 2, Yufeng Nie1, *, Yiqiang Li1
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 245-265, 2020, DOI:10.32604/cmc.2020.06284
    Abstract This paper is devoted to the microstructure geometric modeling and mechanical properties computation of cancellous bone. The microstructure of the cancellous bone determines its mechanical properties and a precise geometric modeling of this structure is important to predict the material properties. Based on the microscopic observation, a new microstructural unit cell model is established by introducing the Schwarz surface in this paper. And this model is very close to the real microstructure and satisfies the main biological characteristics of cancellous bone. By using the unit cell model, the multiscale analysis method is newly applied to predict the mechanical properties of… More >

  • ARTICLE

    Fatigue Investigations on Steel Pipeline Containing 3D Coplanar and Non-Coplanar Cracks

    Zhongmin Xiao1, Wengang Zhang2, Yanmei Zhang1, *, Mu Fan3
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 267-280, 2020, DOI:10.32604/cmc.2020.06567
    Abstract Fluctuated loadings from currents, waves and sea ground motions are observed on offshore steel pipelines, and they will result in small cracks to propagate continuously and cause unexpected damage to offshore/geotechnical infrastructures. In spite of the availability of efficient techniques and high-power computers for solving crack problems, investigations on the fatigue life of offshore pipelines with 3D interacting cracks are still rarely found in open literature. In the current study, systematic numerical investigations are performed on fatigue crack growth behaviours of offshore pipelines containing coplanar and non-coplanar cracks. Extended finite element method (XFEM) is adopted to simulate the fatigue crack… More >

  • ARTICLE

    A Survey of Lower Limb Rehabilitation Systems and Algorithms Based on Functional Electrical Stimulation

    Mingxu Sun1, *, Xueyan Wu2, Qi Liu3, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 281-292, 2020, DOI:10.32604/cmc.2020.06098
    Abstract Functional electrical stimulation is a method of repairing a dysfunctional limb in a stroke patient by using low-intensity electrical stimulation. Currently, it is widely used in smart medical treatment for limb rehabilitation in stroke patients. In this paper, the development of FES systems is sorted out and analyzed in a time order. Then, the progress of functional electrical stimulation in the field of rehabilitation is reviewed in details in two aspects, i.e., system development and algorithm progress. In the system aspect, the development of the first FES control and stimulation system, the core of the lower limb-based neuroprosthesis system and… More >

  • ARTICLE

    SSD Real-Time Illegal Parking Detection Based on Contextual Information Transmission

    Huanrong Tang1, Aoming Peng1, Dongming Zhang2, Tianming Liu3, Jianquan Ouyang1, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 293-307, 2020, DOI:10.32604/cmc.2020.06427
    Abstract With the improvement of the national economic level, the number of vehicles is still increasing year by year. According to the statistics of National Bureau of Statics, the number is approximately up to 327 million in China by the end of 2018, which makes urban traffic pressure continues to rise so that the negative impact of urban traffic order is growing. Illegal parking-the common problem in the field of transportation security is urgent to be solved and traditional methods to address it are mainly based on ground loop and manual supervision, which may miss detection and cost much manpower. Due… More >

  • ARTICLE

    Image Interpolation via Gaussian-Sinc Interpolators with Partition of Unity

    Gang Xu1, *, Ran Ling1, Lishan Deng1, Qing Wu1, Weiyin Ma2
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 309-319, 2020, DOI:10.32604/cmc.2020.06509
    Abstract In this paper, we propose a novel image interpolation method by using Gaussian-Sinc automatic interpolators with partition of unity property. A comprehensive comparison is made with classical image interpolation methods, such as the bicubic interpolation, Lanczos interpolation, cubic Schaum interpolation, cubic B-spline interpolation and cubic Moms interpolation. The experimental results show the effectiveness of the improved image interpolation method via some image quality metrics such as PSNR and SSIM. More >

  • ARTICLE

    Parameters Compressing in Deep Learning

    Shiming He1, Zhuozhou Li1, Yangning Tang1, Zhuofan Liao1, Feng Li1, *, Se-Jung Lim2
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 321-336, 2020, DOI:10.32604/cmc.2020.06130
    Abstract With the popularity of deep learning tools in image decomposition and natural language processing, how to support and store a large number of parameters required by deep learning algorithms has become an urgent problem to be solved. These parameters are huge and can be as many as millions. At present, a feasible direction is to use the sparse representation technique to compress the parameter matrix to achieve the purpose of reducing parameters and reducing the storage pressure. These methods include matrix decomposition and tensor decomposition. To let vector take advance of the compressing performance of matrix decomposition and tensor decomposition,… More >

  • ARTICLE

    An Improved Whale Optimization Algorithm for Feature Selection

    Wenyan Guo1, *, Ting Liu1, Fang Dai1, Peng Xu1
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 337-354, 2020, DOI:10.32604/cmc.2020.06411
    Abstract Whale optimization algorithm (WOA) is a new population-based metaheuristic algorithm. WOA uses shrinking encircling mechanism, spiral rise, and random learning strategies to update whale’s positions. WOA has merit in terms of simple calculation and high computational accuracy, but its convergence speed is slow and it is easy to fall into the local optimal solution. In order to overcome the shortcomings, this paper integrates adaptive neighborhood and hybrid mutation strategies into whale optimization algorithms, designs the average distance from itself to other whales as an adaptive neighborhood radius, and chooses to learn from the optimal solution in the neighborhood instead of… More >

  • ARTICLE

    Research on Cell Manufacturing Facility Layout Problem Based on Improved NSGA-II

    Yanlin Zhao1, 2, *, Jiansha Lu1, Qing Yan1, Lili La1, Lili Xu1
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 355-364, 2020, DOI:10.32604/cmc.2020.06396
    Abstract With the rapid development of the individualized demand market, the demand for manufacturing flexibility has increased over time. As a result, a cell manufacturing system suitable for many varieties and small batches has been produced. With the goal of minimizing the area and logistics handling volume, and considering the arrangement order of facilities and channel constraints, a mathematical model was established, and the problem was solved by improved NSGA-II. After non-dominated sorting, traditional NSGA-II will cross-operate the individuals with the best sorting to generate new individuals. Such a selection strategy is extremely easy to fall into the local optimal solution.… More >

  • ARTICLE

    Optimization Design of RC Ribbed Floor System Using Eagle Strategy with Particle Swarm Optimization

    Jiejiang Zhu1, *, Bolun Zhou1
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 365-383, 2020, DOI:10.32604/cmc.2020.06655
    Abstract The eagle strategy algorithm is combined with particle swarm optimization in this paper. The new algorithm, denoted as the ES-PSO, is implemented by interfacing Etabs structural analysis codes. ES-PSO is used to optimize the RC ribbed floor system, including floor and underground garage roof. By considering the effects of reinforcement, the principle of virtual work is applied to calculate the deflections of components. Construction cost is taken as the objective function and the constraint conditions are required to satisfy. Accordingly, the optimal layout, the optimal sections of the beams and slabs and the corresponding reinforcements are obtained for different column… More >

  • ARTICLE

    An OpenFlow-Based Load Balancing Strategy in SDN

    Xiaojun Shi1, Yangyang Li2, *, Haiyong Xie2, 3, Tengfei Yang2, Linchao Zhang2, Panyu Liu4, Heng Zhang4, Zhiyao Liang5
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 385-398, 2020, DOI:10.32604/cmc.2020.06418
    Abstract In today’s datacenter network, the quantity growth and complexity increment of traffic is unprecedented, which brings not only the booming of network development, but also the problem of network performance degradation, such as more chance of network congestion and serious load imbalance. Due to the dynamically changing traffic patterns, the state-of the-art approaches that do this all require forklift changes to data center networking gear. The root of problem is lack of distinct strategies for elephant and mice flows. Under this condition, it is essential to enforce accurate elephant flow detection and come up with a novel load balancing solution… More >

  • ARTICLE

    A Convolution-Based System for Malicious URLs Detection

    Chaochao Luo1, Shen Su2, *, Yanbin Sun2, Qingji Tan3, Meng Han4, Zhihong Tian2, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 399-411, 2020, DOI:10.32604/cmc.2020.06507
    Abstract Since the web service is essential in daily lives, cyber security becomes more and more important in this digital world. Malicious Uniform Resource Locator (URL) is a common and serious threat to cybersecurity. It hosts unsolicited content and lure unsuspecting users to become victim of scams, such as theft of private information, monetary loss, and malware installation. Thus, it is imperative to detect such threats. However, traditional approaches for malicious URLs detection that based on the blacklists are easy to be bypassed and lack the ability to detect newly generated malicious URLs. In this paper, we propose a novel malicious… More >

  • ARTICLE

    The Effect of Initial Defects on Overall Mechanical Properties of Concrete Material

    Yunfa Zhang1, Xiaozhou Xia1, *, Zhenjie Wu1, Qing Zhang1
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 413-442, 2020, DOI:10.32604/cmc.2020.04660
    Abstract Considering the fact that the initial defects, like the imperfect interfacial transition zones (ITZ) and the micro voids in mortar matrix, weaken the mechanical properties of concrete, this study develops corresponding constitutive models for ITZ and matrix, and simulates the concrete failure with finite element methods. Specifically, an elastic-damage traction-separation model for ITZ is constructed, and an anisotropic plastic-damage model distinguishing the strength-difference under tension and compression for mortar matrix is proposed as well. In this anisotropic plastic-damage model, the weakening effect of micro voids is reflected by introducing initial isotropic damage, the distinct characteristic of tension and compression which… More >

  • ARTICLE

    Complexity Effective Frequency and Sidelink Synchronization Algorithm for LTE Device-to-Device Communication Systems

    Yong-An Jung1, Min-Goo Kang2, Young-Hwan You1, *
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 443-458, 2020, DOI:10.32604/cmc.2020.08777
    Abstract Device-to-device (D2D) communication is considered as a major challenge in the long term evolution (LTE) network wherein devices directly communicate with each other. One of the key challenges in D2D sidelink is reliable and reduced-complexity synchronization. To address this issue, a computationally efficient sequential detection scheme for integer carrier frequency offset and sidelink identity is proposed in the LTED2D system. To perform the frequency offset detection without retrieving the sidelink identity, the conjugate relation between two primary sidelink synchronization sequences is exploited, which facilitates the detection tasks of frequency offset and sidelink identity to be decoupled. It is demonstrated from… More >

  • ARTICLE

    Shadow Detection and Removal From Photo-Realistic Synthetic Urban Image Using Deep Learning

    Hee-Jin Yoon1, Kang-Jik Kim1, Jun-Chul Chun1,*
    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 459-472, 2020, DOI:10.32604/cmc.2020.08799
    Abstract Recently, virtual reality technology that can interact with various data is used for urban design and analysis. Reality, one of the most important elements in virtual reality technology, means visual expression so that a person can experience threedimensional space like reality. To obtain this realism, real-world data are used in the various fields. For example, in order to increase the realism of 3D modeled building textures real aerial images are utilized in 3D modelling. However, the aerial image captured during the day can be shadowed by the sun and it can cause the distortion or deterioration of image. To resolve… More >

Share Link

WeChat scan