Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (294)
  • Open Access

    ARTICLE

    Green Composite Material Made from Typha latifolia Fibres Bonded with an Epoxidized Linseed Oil/Tall Oil-Based Polyamide Binder System

    Günter Wuzella1, Arunjunai Raj Mahendran1, Andreas Kandelbauer2,*

    Journal of Renewable Materials, Vol.8, No.5, pp. 499-512, 2020, DOI:10.32604/jrm.2020.09615 - 29 April 2020

    Abstract Here, we report the mechanical and water sorption properties of a green composite based on Typha latifolia fibres. The composite was prepared either completely binder-less or bonded with 10% (w/w) of a bio-based resin which was a mixture of an epoxidized linseed oil and a tall-oil based polyamide. The flexural modulus of elasticity, the flexural strength and the water absorption of hot pressed Typha panels were measured and the influence of pressing time and panel density on these properties was investigated. The cure kinetics of the biobased resin was analyzed by differential scanning calorimetry (DSC) in combination More >

  • Open Access

    ARTICLE

    Secrecy Outage Probability Analysis Based on Cognitive Decodeand-Forward Relaying

    Ruoyu Su1, 4, Xiaojun Sun1, 3, Fei Ding1, 2, *, Dengyin Zhang1, 2, Hongbo Zhu1, 2, M. I. M. Wahab5

    CMC-Computers, Materials & Continua, Vol.62, No.3, pp. 1387-1395, 2020, DOI:10.32604/cmc.2020.06864

    Abstract Wireless communications have to face to several different security issues in practice due to the nature of broadcast. The information theory is well known to provide efficient approaches to address security issues in wireless communications, which attracts much attention in both industry and academia in recent years. In this paper, inspired by information theory, we study the outage probability of the opportunistic relay selection based on cognitive decode-and-forward relaying with the secrecy consideration. Specifically, the closed-form expression of the outage probability is proposed. Moreover, the asymptotic performance evaluation on the basis of the analytical results More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

    Weidong Fang1, Wuxiong Zhang1,2,*, QianQian Zhao1,2, Xiaohong Ji3, Wei Chen4, Biruk Assefa5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 583-599, 2019, DOI:10.32604/cmc.2019.05237

    Abstract As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the… More >

  • Open Access

    ARTICLE

    Synthesis of a Fully Biobased Polyfunctional Vinyl Oligomer and Their UV Cured Films Prepared via Thiol-ene Coupling

    Changqing Fu1,2, Jiahui Wang1,2, Lie Chen1,2, Liang Shen1,2,*

    Journal of Renewable Materials, Vol.7, No.8, pp. 795-805, 2019, DOI:10.32604/jrm.2019.07503

    Abstract In this paper, a fully bio-based vinyl oligomer with high functionalities was successfully prepared from rapeseed oil by three modification steps: epoxidation of rapeseed oil, solvent-free and catalyst-free ring opening by 10-undecylenic acid followed by esterification with 10-undecenoyl chloride. Then, the renewable polymers were prepared by photo-polymerization of these modified vegetable oils with typical thiol monomers: pentaerythritol tetrakis (3-mercaptopropionate), pentaerythritol tris (3-mercaptopropionate) and 1,2-ethanedithiol. The synthesis of the vinyl oligomer was monitored by nuclear magnetic resonance and Fourier-transform infrared spectroscopy. The average number of the carbon-carbon double bonds of the resulting vinyl oligomer is high… More >

  • Open Access

    ARTICLE

    Secure Model of Medical Data Sharing for Complex Scenarios

    Wei She1, Yue Hu2, Zhao Tian1, Guoning Liu3, Bo Wang4, Wei Liu1, 2, *

    Journal of Cyber Security, Vol.1, No.1, pp. 11-17, 2019, DOI:10.32604/jcs.2019.05856

    Abstract In order to secure the massive heterogeneous medical data for the complex scenarios and improve the information sharing efficiency in healthcare system, a distributed medical data ledger model (DMDL) is proposed in this paper. This DMDL model has adopted the blockchain technology including the function decoupling, the distributed consensus, smart contract as well as multi-channel communication structure of consortium blockchain. The DMDL model not only has high adaptability, but also meets the requirements of the medical treatment processes which generally involve multi-entities, highly private information and secure transaction. The steps for processing the medical data More >

  • Open Access

    ARTICLE

    Research on Privacy Preserving Data Mining

    Pingshui Wang1,*, Tao Chen1,2, Zecheng Wang1

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 61-68, 2019, DOI:10.32604/jihpp.2019.05943

    Abstract In recent years, with the explosive development in Internet, data storage and data processing technologies, privacy preservation has been one of the greater concerns in data mining. A number of methods and techniques have been developed for privacy preserving data mining. This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation. The existing problems and directions for future research are also discussed. More >

  • Open Access

    ARTICLE

    An Auto-Calibration Approach to Robust and Secure Usage of Accelerometers for Human Motion Analysis in FES Therapies

    Mingxu Sun1,#,*, Yinghang Jiang2,3,#, Qi Liu3,4,*, Xiaodong Liu4

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 67-83, 2019, DOI:10.32604/cmc.2019.06079

    Abstract A Functional Electrical stimulation (FES) therapy is a common rehabilitation intervention after stroke, and finite state machine (FSM) has proven to be an effective and intuitive FES control method. The FSM uses the data information generated by the accelerometer to robustly trigger state transitions. In the medical field, it is necessary to obtain highly safe and accurate acceleration data. In order to ensure the accuracy of the acceleration sensor data without affecting the accuracy of the motion analysis, we need to perform acceleration big data calibration. In this context, we propose a method for robustly More >

  • Open Access

    ARTICLE

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    Dae-Young Kim1, Se Dong Min2, †, Seokhoon Kim3, †, *

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 1-14, 2019, DOI:10.32604/cmc.2019.06102

    Abstract The importance of Blockchain and IoT technology have been highlighted in various fields. These are not unaccustomed words anymore in our lives. Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet. The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues. Consequently, we propose… More >

  • Open Access

    ARTICLE

    CM-Droid: Secure Container for Android Password Misuse Vulnerability

    Wen Zhang1, Keyue Li1,*, Tianyang Li1, Shaozhang Niu1, Zhenguang Gao2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 181-198, 2019, DOI:10.32604/cmc.2019.05813

    Abstract Android applications are associated with a large amount of sensitive data, therefore application developers use encryption algorithms to provide user data encryption, authentication and data integrity protection. However, application developers do not have the knowledge of cryptography, thus the cryptographic algorithm may not be used correctly. As a result, security vulnerabilities are generated. Based on the previous studies, this paper summarizes the characteristics of password misuse vulnerability of Android application software, establishes an evaluation model to rate the security level of the risk of password misuse vulnerability and develops a repair strategy for password misuse More >

  • Open Access

    ARTICLE

    Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States

    Gang Xu1,2,*, Ke Xiao1,*, Zongpeng Li3, Xin-Xin Niu2,4, Michael Ryan5

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 809-827, 2019, DOI:10.32604/cmc.2019.04400

    Abstract In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one More >

Displaying 271-280 on page 28 of 294. Per Page