Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    ARTICLE

    Role of Organic Amendments to Mitigate Cd Toxicity and Its Assimilation in Triticum aestivum L.

    Tauqeer Ahmad Yasir1, Sobia Aslam1, Muhammad Shahid Rizwan2, Allah Wasaya1,*, Muhammad Ateeq1, Muhammad Naeem Khan3, Sikander Khan Tanveer4, Walid Soufan5, Basharat Ali6, Allah Ditta7,8, Arpna Kumari9, Ayman EL Sabagh10,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.11, pp. 2491-2504, 2022, DOI:10.32604/phyton.2022.022473

    Abstract In soil biota, higher and enduring concentration of heavy metals like cadmium (Cd) is hazardous and associated with great loss in growth, yield, and quality parameters of most of the crop plants. Recently, in-situ applications of eco-friendly stabilizing agents in the form of organic modifications have been utilized to mitigate the adverse effects of Cd-toxicity. This controlled experiment was laid down to appraise the imprints of various applied organic amendments namely poultry manure (PM), farmyard manure (FYM), and sugarcane press mud (PS) to immobilize Cd in polluted soil. Moreover, phytoavailability of Cd in wheat was also accessed under an alkaline… More >

  • Open Access

    ARTICLE

    Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

    Kun-Lin Tsai1,2,*, Li-Woei Chen3, Fang-Yie Leu4,5, Chuan-Tian Wu1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 547-562, 2022, DOI:10.32604/cmc.2022.026557

    Abstract Secure data communication is an essential requirement for an Internet of Things (IoT) system. Especially in Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) systems, when important data are hacked, it may induce property loss or life hazard. Even though many IoT-related communication protocols are equipped with secure policies, they still have some security weaknesses in their IoT systems. LoRaWAN is one of the low power wide-area network protocols, and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality. However, LoRaWAN's encryption key update scheme can be further improved. In this paper, a Two-stage… More >

  • Open Access

    ARTICLE

    Organic Amendments Improve Plant Morpho-Physiology and Antioxidant Metabolism in Mitigating Drought Stress in Bread Wheat (Triticum aestivum L.)

    Taufika Islam Anee1,#, Md. Nur Nabi Islam1,#, Mohamed M. Hassan2, Abdul Awal Chowdhury Masud1, Md. Mahabub Alam1, Mirza Hasanuzzaman1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.9, pp. 1959-1972, 2022, DOI:10.32604/phyton.2022.021137

    Abstract Due to the unpredictable climate change, drought stress is being considered as one of the major threats to crop production. Wheat (Triticum aestivum L. cv. BARI Gom-26) being a dry season crop frequently faces scarcity of water and results in a lower yield. Therefore, this experiment aims to explore the role of different organic amendments (OAs) in mitigating drought stress-induced damage. The pot experiment consisted of different organic amendments viz. compost, vermicompost and poultry manure @0.09 kg m−2 soil, biochar @2.5% w/w soil and chitosan @1% w/w soil which was imposed on the plants grown under both well-watered and drought… More >

  • Open Access

    ARTICLE

    Smart Grid Security by Embedding S-Box Advanced Encryption Standard

    Niraj Kumar1,*, Vishnu Mohan Mishra2, Adesh Kumar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 623-638, 2022, DOI:10.32604/iasc.2022.024804

    Abstract Supervisory control and data acquisition (SCADA) systems continuously monitor the real-time processes in the smart grid. The system software, which is based on a human-machine interface (HMI), makes intelligent decisions to assist the system operator and perform normal grid management activities. The management of SCADA networks and monitoring without proper security is a major concern, as many grids and plant networks still lack necessary monitoring and detection systems, making them vulnerable to attack. SCADA networks exploit physical weaknesses as well as cyber-attacks. Researchers have developed a monitoring system based on a field-programmable gate array (FPGA) and a microcontroller that allows… More >

  • Open Access

    ARTICLE

    Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks

    Nadia Mustaqim Ansari1,*, Rashid Hussain2, Sheeraz Arif3, Syed Sajjad Hussain4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1861-1875, 2022, DOI:10.32604/cmc.2022.023516

    Abstract The security of Internet of Things (IoT) is a challenging task for researchers due to plethora of IoT networks. Side Channel Attacks (SCA) are one of the major concerns. The prime objective of SCA is to acquire the information by observing the power consumption, electromagnetic (EM) field, timing analysis, and acoustics of the device. Later, the attackers perform statistical functions to recover the key. Advanced Encryption Standard (AES) algorithm has proved to be a good security solution for constrained IoT devices. This paper implements a simulation model which is used to modify the AES algorithm using logical masking properties. This… More >

  • Open Access

    ARTICLE

    Cancelable Multi-biometric Template Generation Based on Dual-Tree Complex Wavelet Transform

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Fahad Alraddady2, Fathi E. Abd El-Samie3, Walid El-Shafai3,5, Salwa M. Serag Eldin2,4

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1289-1304, 2022, DOI:10.32604/iasc.2022.024381

    Abstract In this article, we introduce a new cancelable biometric template generation layout depending on selective encryption technology and Dual-Tree Complex Wavelet Transform (DT-CWT) fusion. The input face biometric is entered into the automatic face-segmentation (Viola-Jones) algorithm to detect the object in a short time. Viola-Jones algorithm can detect the left eye, right eye, nose, and mouth of the input biometric image. The encoder can choose the left or right eye to generate a cancelable biometric template. The selected eye image of size M × N is XORed with the created pseudo-random number (PRN) matrix CM × N to provide an… More >

  • Open Access

    ARTICLE

    k-Order Fibonacci Polynomials on AES-Like Cryptology

    Mustafa Asci, Suleyman Aydinyuz*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 277-293, 2022, DOI:10.32604/cmes.2022.017898

    Abstract The Advanced Encryption Standard (AES) is the most widely used symmetric cipher today. AES has an important place in cryptology. Finite field, also known as Galois Fields, are cornerstones for understanding any cryptography. This encryption method on AES is a method that uses polynomials on Galois fields. In this paper, we generalize the AES-like cryptology on 2 × 2 matrices. We redefine the elements of k-order Fibonacci polynomials sequences using a certain irreducible polynomial in our cryptology algorithm. So, this cryptology algorithm is called AES-like cryptology on the k-order Fibonacci polynomial matrix. More >

  • Open Access

    ARTICLE

    Selective Cancellable Multi-Biometric Template Generation Scheme Based on Multi-Exposure Feature Fusion

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Fahad Alraddady2, Fathi E. Abd El-Samie3, Walid El-Safai3,5, Salwa M. Serag Eldin2,4

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 549-565, 2022, DOI:10.32604/iasc.2022.024379

    Abstract This article introduces a new cancellable multi-biometric system based on the combination of a selective encryption method and a deep-learning-based fusion technology. The biometric face image is treated with an automatic face segmentation algorithm (Viola-Jones), and the image of the selected eye is XORed with a PRNG (Pseudo Random Number Generator) matrix. The output array is used to create a primary biometric template. This process changes the histogram of the selected eye image. Arnold’s Cat Map is used to superimpose the PRN pixels only on the pixels of the primary image. Arnold’s cat map deformed eyes are encrypted using the… More >

  • Open Access

    REVIEW

    Deep Learning-Based Cancer Detection-Recent Developments, Trend and Challenges

    Gulshan Kumar1,*, Hamed Alqahtani2

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1271-1307, 2022, DOI:10.32604/cmes.2022.018418

    Abstract Cancer is one of the most critical diseases that has caused several deaths in today’s world. In most cases, doctors and practitioners are only able to diagnose cancer in its later stages. In the later stages, planning cancer treatment and increasing the patient’s survival rate becomes a very challenging task. Therefore, it becomes the need of the hour to detect cancer in the early stages for appropriate treatment and surgery planning. Analysis and interpretation of medical images such as MRI and CT scans help doctors and practitioners diagnose many diseases, including cancer disease. However, manual interpretation of medical images is… More >

  • Open Access

    ARTICLE

    An Investigation on the Visible Characteristics of Four Caesalpiniaceae Wood Species in Gabon

    Zhaoyang Yu1, Jinbo Hu1,2,*, Yuan Liu1,*, Shanshan Chang1, Ting Li2, Gonggang Liu1, Qiongtao Huang3, Jianying Yuan4

    Journal of Renewable Materials, Vol.10, No.5, pp. 1365-1379, 2022, DOI:10.32604/jrm.2022.018255

    Abstract Color, whiteness and glossiness of four caesalpiniaceae wood species were characterized by quantitative measurements and image analysis, i.e., which were respectively Berlinia bracteosa Benth., Monopetalanthus heitzii Pellegr., Distemonanthus benthamianus and Erythrophleum ivorense A. Chev. The color of four wood species was evaluated to be consistent by the CIELab and CIE1931 color system. The boards of B. bracteosa, M. heitzii and E. ivorense was divided into dark color. The wood color of B. bracteosa had the highest red to green hue, while the wood appearance of D. benthamianus had the brightest and yellowest color within the four wood species. The whiteness… More > Graphic Abstract

    An Investigation on the Visible Characteristics of Four Caesalpiniaceae Wood Species in Gabon

Displaying 11-20 on page 2 of 50. Per Page