Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (66)
  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079 - 29 September 2022

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts.… More >

  • Open Access

    ARTICLE

    Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

    Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838 - 22 September 2022

    Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the… More >

  • Open Access

    ARTICLE

    Overexpression of Wheat TaELF3-1BL Delays Flowering in Arabidopsis

    Junsheng Sun#, Haozhen Zhang#, Mingxia Zhang, Sishen Li, Yanrong An*

    Phyton-International Journal of Experimental Botany, Vol.92, No.1, pp. 79-90, 2023, DOI:10.32604/phyton.2022.022225 - 06 September 2022

    Abstract EARLY FLOWERING 3 (ELF3), a light zeitnehmer (time-taker) gene, regulates circadian rhythm and photoperiodic flowering in Arabidopsis, rice, and barley. The three orthologs of ELF3 (TaELF3-1AL, TaELF3-1BL, and TaELF3-1DL) have been identified in wheat too, and one gene, TaELF3-1DL, has been associated with heading date. However, the basic characteristics of these three genes and the roles of the other two genes, TaELF3-1BL and, TaELF3-1AL, remain unknown. Therefore, the present study obtained the coding sequences of the three orthologs (TaELF3-1AL, TaELF3-1BL, and TaELF3-1DL) of ELF3 from bread wheat and characterized them and investigated the role of TaELF3-1BL in Arabidopsis. Protein sequence comparison revealed similarities… More >

  • Open Access

    ARTICLE

    Exploration of Genetic Pattern of Phenological Traits in Wheat (Triticum aestivum L.) under Drought Stress

    Iqra Ishaaq1, Muhammad Umer Farooq1,2,3,4,*, Syeda Anjum Tahira2, Rizwana Maqbool1, Celaleddin Barutçular3, Muhammad Yasir5, Saira Bano2, Zaid Ulhassan6, Ghassan Zahid7, Muhammad Ahsan Asghar8, Sajad Hussain9, Kocsy Gabor8, Ulkar Ibrahimova10,11, Jianqing Zhu4, Anshu Rastogi12,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.12, pp. 2733-2758, 2022, DOI:10.32604/phyton.2022.022094 - 29 August 2022

    Abstract Drought is the major detrimental environmental factor for wheat (Triticum aestivum L.) production. The exploration of genetic patterns underlying drought tolerance is of great significance. Here we report the gene actions controlling the phenological traits using the line × tester model studying 27 crosses and 12 parents under normal irrigation and drought conditions. The results interpreted via multiple analysis (mean performance, correlations, principal component, genetic analysis, heterotic and heterobeltiotic potential) disclosed highly significant differences among germplasm. The phenological waxiness traits (glume, boom, and sheath) were strongly interlinked. Flag leaf area exhibits a positive association with peduncle… More >

  • Open Access

    ARTICLE

    Generalization of Advanced Encryption Standard Based on Field of Any Characteristic

    Nabilah Abughazalah1, Majid Khan2,*, Noor Munir2, Ammar S. Alanazi3, Iqtadar Hussain4,5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6121-6138, 2022, DOI:10.32604/cmc.2022.031417 - 28 July 2022

    Abstract Nowadays most communications are done by utilizing digital transmission mechanisms. The security of this digital information transmitted through different communication systems is quite important. The secrecy of digital data is one of the burning topics of the digitally developed world. There exist many traditional algorithms in the literature to provide methods for robust communication. The most important and recent modern block cipher named the advanced encryption standard (AES) is one of the extensively utilized encryption schemes with binary based. AES is a succession of four fundamental steps: round key, sub-byte, shift row, and mix column.… More >

  • Open Access

    ARTICLE

    Role of Organic Amendments to Mitigate Cd Toxicity and Its Assimilation in Triticum aestivum L.

    Tauqeer Ahmad Yasir1, Sobia Aslam1, Muhammad Shahid Rizwan2, Allah Wasaya1,*, Muhammad Ateeq1, Muhammad Naeem Khan3, Sikander Khan Tanveer4, Walid Soufan5, Basharat Ali6, Allah Ditta7,8, Arpna Kumari9, Ayman EL Sabagh10,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.11, pp. 2491-2504, 2022, DOI:10.32604/phyton.2022.022473 - 12 July 2022

    Abstract In soil biota, higher and enduring concentration of heavy metals like cadmium (Cd) is hazardous and associated with great loss in growth, yield, and quality parameters of most of the crop plants. Recently, in-situ applications of eco-friendly stabilizing agents in the form of organic modifications have been utilized to mitigate the adverse effects of Cd-toxicity. This controlled experiment was laid down to appraise the imprints of various applied organic amendments namely poultry manure (PM), farmyard manure (FYM), and sugarcane press mud (PS) to immobilize Cd in polluted soil. Moreover, phytoavailability of Cd in wheat was… More >

  • Open Access

    ARTICLE

    Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

    Kun-Lin Tsai1,2,*, Li-Woei Chen3, Fang-Yie Leu4,5, Chuan-Tian Wu1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 547-562, 2022, DOI:10.32604/cmc.2022.026557 - 18 May 2022

    Abstract Secure data communication is an essential requirement for an Internet of Things (IoT) system. Especially in Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) systems, when important data are hacked, it may induce property loss or life hazard. Even though many IoT-related communication protocols are equipped with secure policies, they still have some security weaknesses in their IoT systems. LoRaWAN is one of the low power wide-area network protocols, and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality. However, LoRaWAN's encryption key update scheme can be further improved.… More >

  • Open Access

    ARTICLE

    Organic Amendments Improve Plant Morpho-Physiology and Antioxidant Metabolism in Mitigating Drought Stress in Bread Wheat (Triticum aestivum L.)

    Taufika Islam Anee1,#, Md. Nur Nabi Islam1,#, Mohamed M. Hassan2, Abdul Awal Chowdhury Masud1, Md. Mahabub Alam1, Mirza Hasanuzzaman1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.9, pp. 1959-1972, 2022, DOI:10.32604/phyton.2022.021137 - 13 May 2022

    Abstract Due to the unpredictable climate change, drought stress is being considered as one of the major threats to crop production. Wheat (Triticum aestivum L. cv. BARI Gom-26) being a dry season crop frequently faces scarcity of water and results in a lower yield. Therefore, this experiment aims to explore the role of different organic amendments (OAs) in mitigating drought stress-induced damage. The pot experiment consisted of different organic amendments viz. compost, vermicompost and poultry manure @0.09 kg m−2 soil, biochar @2.5% w/w soil and chitosan @1% w/w soil which was imposed on the plants grown under both… More >

  • Open Access

    ARTICLE

    Smart Grid Security by Embedding S-Box Advanced Encryption Standard

    Niraj Kumar1,*, Vishnu Mohan Mishra2, Adesh Kumar3

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 623-638, 2022, DOI:10.32604/iasc.2022.024804 - 15 April 2022

    Abstract Supervisory control and data acquisition (SCADA) systems continuously monitor the real-time processes in the smart grid. The system software, which is based on a human-machine interface (HMI), makes intelligent decisions to assist the system operator and perform normal grid management activities. The management of SCADA networks and monitoring without proper security is a major concern, as many grids and plant networks still lack necessary monitoring and detection systems, making them vulnerable to attack. SCADA networks exploit physical weaknesses as well as cyber-attacks. Researchers have developed a monitoring system based on a field-programmable gate array (FPGA)… More >

  • Open Access

    ARTICLE

    Invariant of Enhanced AES Algorithm Implementations Against Power Analysis Attacks

    Nadia Mustaqim Ansari1,*, Rashid Hussain2, Sheeraz Arif3, Syed Sajjad Hussain4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1861-1875, 2022, DOI:10.32604/cmc.2022.023516 - 24 February 2022

    Abstract The security of Internet of Things (IoT) is a challenging task for researchers due to plethora of IoT networks. Side Channel Attacks (SCA) are one of the major concerns. The prime objective of SCA is to acquire the information by observing the power consumption, electromagnetic (EM) field, timing analysis, and acoustics of the device. Later, the attackers perform statistical functions to recover the key. Advanced Encryption Standard (AES) algorithm has proved to be a good security solution for constrained IoT devices. This paper implements a simulation model which is used to modify the AES algorithm… More >

Displaying 21-30 on page 3 of 66. Per Page