Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (261)
  • Open Access

    ARTICLE

    Memetic Optimization with Cryptographic Encryption for Secure Medical Data Transmission in IoT-Based Distributed Systems

    Srinath Doss1, Jothi Paranthaman2, Suseendran Gopalakrishnan3, Akila Duraisamy3, Souvik Pal4, Balaganesh Duraisamy5, Chung Le Van6,*, Dac-Nhuong Le7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1577-1594, 2021, DOI:10.32604/cmc.2020.012379

    Abstract In the healthcare system, the Internet of Things (IoT) based distributed systems play a vital role in transferring the medical-related documents and information among the organizations to reduce the replication in medical tests. This datum is sensitive, and hence security is a must in transforming the sensational contents. In this paper, an Evolutionary Algorithm, namely the Memetic Algorithm is used for encrypting the text messages. The encrypted information is then inserted into the medical images using Discrete Wavelet Transform 1 level and 2 levels. The reverse method of the Memetic Algorithm is implemented when extracting a hidden message from the… More >

  • Open Access

    ARTICLE

    Sawdust Short Fiber Reinforced Epoxidized Natural Rubber: Insight on Its Mechanical, Physical, and Thermal Aspects

    O. S. Dahham1, N. Z. Noriman1,2,*, H. Jaya1, R. Hamzah1, M. U. Umar2,3, I. Johari4

    Journal of Renewable Materials, Vol.8, No.12, pp. 1633-1645, 2020, DOI:10.32604/jrm.2020.011377

    Abstract In this work, Epoxidized natural rubber/sawdust short fiber (ENR-50/ SD) composites at different fiber content (5, 10, 15 and 20 phr) and size (fine size at 60–100 μm and coarse size at 10–20 mm) were prepared using two-roll mill and electrical-hydraulic hot press machine respectively. Curing characteristics, water uptake, tensile, morphological, physical, and thermal properties of the composites were investigated. Results indicated that the scorch time and cure time became shorter whereas torque improved as SD content increase. Though the decline of tensile strength and elongation at break values, modulus, hardness and crosslinking density have shown enhancements with the increasing… More >

  • Open Access

    ARTICLE

    Secure Information Access Strategy for a Virtual Data Centre

    Sivaranjani Balakrishnan1,∗, D. Surendran2,†

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 357-366, 2020, DOI:10.32604/csse.2020.35.357

    Abstract With the arrival of on-demand computing, data centre requirements are extensive, with fluid boundaries. Loaded Internet applications, service-oriented architectures, virtualization and security provisioning are the major operations of a data centre. Security is an absolute necessity of any network architecture, and the virtual IT data centre is no exception. At the boundary, security is focused on securing the terminals of the data centre from external threats and providing a secure gateway to the Internet. The paradigm shift towards a new computing environment makes communications more complicated for Infrastructure Providers (InP). This complexity includes the security of the data centre’s components… More >

  • Open Access

    ARTICLE

    Optimizing Bidders Selection of Multi-Round Procurement Problem in Software Project Management Using Parallel Max-Min Ant System Algorithm

    Dac-Nhuong Le1,2,3,*, Gia Nhu Nguyen2,4, Harish Garg5, Quyet-Thang Huynh6, Trinh Ngoc Bao7, Nguyen Ngoc Tuan8

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 993-1010, 2021, DOI:10.32604/cmc.2020.012464

    Abstract This paper presents a Game-theoretic optimization via Parallel MinMax Ant System (PMMAS) algorithm is used in practice to determine the Nash equilibrium value to resolve the confusion in choosing appropriate bidders of multi-round procurement problem in software project management. To this end, we introduce an approach that proposes: (i) A Game-theoretic model of multiround procurement problem (ii) A Nash equilibrium strategy corresponds to multi-round strategy bid (iii) An application of PSO for the determination of global Nash equilibrium. The balance point in Nash Equilibrium can help to maintain a sustainable structure not only in terms of project management but also… More >

  • Open Access

    ARTICLE

    Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization Algorithm for Secured Free Scale Networks against Malicious Attacks

    Ganeshan Keerthana1,*, Panneerselvam Anandan2, Nandhagopal Nachimuthu3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 903-917, 2021, DOI:10.32604/cmc.2020.012255

    Abstract Due to the recent proliferation of cyber-attacks, highly robust wireless sensor networks (WSN) become a critical issue as they survive node failures. Scale-free WSN is essential because they endure random attacks effectively. But they are susceptible to malicious attacks, which mainly targets particular significant nodes. Therefore, the robustness of the network becomes important for ensuring the network security. This paper presents a Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization (RHAFS-SA) Algorithm. It is introduced for improving the robust nature of free scale networks over malicious attacks (MA) with no change in degree distribution. The proposed RHAFS-SA is an enhanced… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain stores the index of the… More >

  • Open Access

    ARTICLE

    Data Secure Storage Mechanism of Sensor Networks Based on Blockchain

    Jin Wang1, 2, Wencheng Chen1, Lei Wang3, *, R. Simon Sherratt4, Osama Alfarraj5, Amr Tolba5, 6

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2365-2384, 2020, DOI:10.32604/cmc.2020.011567

    Abstract As the number of sensor network application scenarios continues to grow, the security problems inherent in this approach have become obstacles that hinder its wide application. However, it has attracted increasing attention from industry and academia. The blockchain is based on a distributed network and has the characteristics of nontampering and traceability of block data. It is thus naturally able to solve the security problems of the sensor networks. Accordingly, this paper first analyzes the security risks associated with data storage in the sensor networks, then proposes using blockchain technology to ensure that data storage in the sensor networks is… More >

  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance. For remote execution, recent studies… More >

  • Open Access

    ARTICLE

    Secure Provenance of Electronic Records Based on Blockchain

    Qirun Wang1, Fujian Zhu2, Sai Ji2, Yongjun Ren2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1753-1769, 2020, DOI:10.32604/cmc.2020.07366

    Abstract At present, the provenance of electronic records is stored centrally. The centralized way of information storage has huge risks. Whether the database itself is destroyed or the communication between the central database and the external interruption occurs, the provenance information of the stored electronic records will not play its role. At the same time, uncertainties such as fires and earthquakes will also pose a potential threat to centralized databases. Moreover, the existing security provenance model is not specifically designed for electronic records. In this paper, a security provenance model of electronic records is constructed based on PREMIS and METS. Firstly,… More >

  • Open Access

    ARTICLE

    Verifiable Outsourcing of High-Degree Polynomials and Tts Application in Keyword Search

    Jun Yea, Xianlin Zhoub, Zheng Xuc, Yong Dingd

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 41-46, 2018, DOI:10.1080/10798587.2016.1267239

    Abstract In big data era, people cannot afford more and more complex computation work due to the constrained computation resources. The high reliability, strong processing capacity, large storage space of cloud computing makes the resource-constrained clients remotely operate the heavy computation task with the help of cloud server. In this paper, a new algorithm for secure outsourcing of high degree polynomials is proposed. We introduce a camouflage technique, which the real polynomial will be disguised to the untrusted cloud server. In addition, the input and output will not be revealed in the computation process and the clients can easily verify the… More >

Displaying 221-230 on page 23 of 261. Per Page