Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (346)
  • Open Access

    ARTICLE

    An Effective and Secure Quality Assurance System for a Computer Science Program

    Mohammad Alkhatib*

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 975-995, 2022, DOI:10.32604/csse.2022.021398 - 10 November 2021

    Abstract Improving the quality assurance (QA) processes and acquiring accreditation are top priorities for academic programs. The learning outcomes (LOs) assessment and continuous quality improvement represent core components of the quality assurance system (QAS). Current assessment methods suffer deficiencies related to accuracy and reliability, and they lack well-organized processes for continuous improvement planning. Moreover, the absence of automation, and integration in QA processes forms a major obstacle towards developing efficient quality system. There is a pressing need to adopt security protocols that provide required security services to safeguard the valuable information processed by QAS as well.… More >

  • Open Access

    ARTICLE

    Clustering Gene Expression Data Through Modified Agglomerative M-CURE Hierarchical Algorithm

    E. Kavitha1,*, R. Tamilarasan2, N. Poonguzhali3, M. K. Jayanthi Kannan4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1027-141, 2022, DOI:10.32604/csse.2022.020634 - 10 November 2021

    Abstract Gene expression refers to the process in which the gene information is used in the functional gene product synthesis. They basically encode the proteins which in turn dictate the functionality of the cell. The first step in gene expression study involves the clustering usage. This is due to the reason that biological networks are very complex and the genes volume increases the comprehending challenges along with the data interpretation which itself inhibit vagueness, noise and imprecision. For a biological system to function, the essential cellular molecules must interact with its surrounding including RNA, DNA, metabolites… More >

  • Open Access

    ARTICLE

    IoT & AI Enabled Three-Phase Secure and Non-Invasive COVID 19 Diagnosis System

    Anurag Jain1, Kusum Yadav2, Hadeel Fahad Alharbi2, Shamik Tiwari1,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 423-438, 2022, DOI:10.32604/cmc.2022.020238 - 03 November 2021

    Abstract Corona is a viral disease that has taken the form of an epidemic and is causing havoc worldwide after its first appearance in the Wuhan state of China in December 2019. Due to the similarity in initial symptoms with viral fever, it is challenging to identify this virus initially. Non-detection of this virus at the early stage results in the death of the patient. Developing and densely populated countries face a scarcity of resources like hospitals, ventilators, oxygen, and healthcare workers. Technologies like the Internet of Things (IoT) and artificial intelligence can play a vital… More >

  • Open Access

    ARTICLE

    Dynamic Encryption and Secure Transmission of Terminal Data Files

    Ruchun Jia1,*, Yang Xin2, Bo Liu3, Qin Qin4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1221-1232, 2022, DOI:10.32604/cmc.2022.019318 - 03 November 2021

    Abstract Data is the last defense line of security, in order to prevent data loss, no matter where the data is stored, copied or transmitted, it is necessary to accurately detect the data type, and further clarify the form and encryption structure of the data transmission process to ensure the accuracy of the data, so as to prevent data leakage, take the data characteristics as the core, use transparent encryption and decryption technology as the leading, and According to the data element characteristics such as identity authentication, authority management, outgoing management, file audit and external device… More >

  • Open Access

    ARTICLE

    OTP-Based Software-Defined Cloud Architecture for Secure Dynamic Routing

    Tae Woo Kim1, Yi Pan2, Jong Hyuk Park1,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1035-1049, 2022, DOI:10.32604/cmc.2022.015546 - 03 November 2021

    Abstract In the current era, anyone can freely access the Internet thanks to the development of information and communication technology. The cloud is attracting attention due to its ability to meet continuous user demands for resources. Additionally, Cloud is effective for systems with large data flow such as the Internet of Things (IoT) systems and Smart Cities. Nonetheless, the use of traditional networking technology in the cloud causes network traffic overload and network security problems. Therefore, the cloud requires efficient networking technology to solve the existing challenges. In this paper, we propose one-time password-based software-defined cloud… More >

  • Open Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888 - 25 October 2021

    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol… More >

  • Open Access

    ARTICLE

    A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System

    Bander Alzahrani1, Ahmed Barnawi1, Azeem Irshad2, Areej Alhothali1, Reem Alotaibi1, Muhammad Shafiq3,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6141-6158, 2022, DOI:10.32604/cmc.2022.020774 - 11 October 2021

    Abstract Unmanned aerial vehicles (UAVs) have recently attracted widespread attention in civil and commercial applications. For example, UAVs (or drone) technology is increasingly used in crowd monitoring solutions due to its wider air footprint and the ability to capture data in real time. However, due to the open atmosphere, drones can easily be lost or captured by attackers when reporting information to the crowd management center. In addition, the attackers may initiate malicious detection to disrupt the crowd-sensing communication network. Therefore, security and privacy are one of the most significant challenges faced by drones or the… More >

  • Open Access

    ARTICLE

    Distributed Secure Storage Scheme Based on Sharding Blockchain

    Jin Wang1,2, Chenchen Han1, Xiaofeng Yu3,*, Yongjun Ren4, R. Simon Sherratt5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4485-4502, 2022, DOI:10.32604/cmc.2022.020648 - 11 October 2021

    Abstract Distributed storage can store data in multiple devices or servers to improve data security. However, in today's explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose. A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage. Under this scheme, the following improvements have been made in this paper. This paper first analyzes the problems faced by distributed storage. Then proposed to build a new distributed storage blockchain scheme with sharding blockchain.… More >

  • Open Access

    ARTICLE

    Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission

    Hesham Alhumyani1,*, Ibrahim Alrube1, Sameer Alsharif1, Ashraf Afifi1, Chokri Ben Amar1, Hala S. El-Sayed2, Osama S. Faragallah3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4657-4673, 2022, DOI:10.32604/cmc.2022.020338 - 11 October 2021

    Abstract The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification and integrity scheme. The images are firstly split into dedicated segments of the same block sizes. Then, different Analytic Beta-Wavelet (ABW) orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method. ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes. We conduct a comparative study comparing the watermarked images using three kinds of More >

  • Open Access

    ARTICLE

    Bcvop2p: Decentralized Blockchain-Based Authentication Scheme for Secure Voice Communication

    Mustafa Kara1,*, Muhammed Ali Aydın1,2, Hasan Hüseyin Balık1

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1901-1918, 2022, DOI:10.32604/iasc.2022.021309 - 09 October 2021

    Abstract Peer-to-peer VoIP applications are exposed to threats in the Internet environment as they carry out conversations over the Internet, which is an electronic communication line, and its security has always been largely a matter of concern. Authentication of the caller is the first line of defense among the security principles and is an important principle to provide security in VoIP application. Authentication methods in VoIP applications are usually based on trusted third parties or through centralized architecture. This situation creates problems in terms of single point of failure and privacy in call security over IP More >

Displaying 241-250 on page 25 of 346. Per Page