Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (334)
  • Open Access

    ARTICLE

    Optimizing Bidders Selection of Multi-Round Procurement Problem in Software Project Management Using Parallel Max-Min Ant System Algorithm

    Dac-Nhuong Le1,2,3,*, Gia Nhu Nguyen2,4, Harish Garg5, Quyet-Thang Huynh6, Trinh Ngoc Bao7, Nguyen Ngoc Tuan8

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 993-1010, 2021, DOI:10.32604/cmc.2020.012464 - 30 October 2020

    Abstract This paper presents a Game-theoretic optimization via Parallel MinMax Ant System (PMMAS) algorithm is used in practice to determine the Nash equilibrium value to resolve the confusion in choosing appropriate bidders of multi-round procurement problem in software project management. To this end, we introduce an approach that proposes: (i) A Game-theoretic model of multiround procurement problem (ii) A Nash equilibrium strategy corresponds to multi-round strategy bid (iii) An application of PSO for the determination of global Nash equilibrium. The balance point in Nash Equilibrium can help to maintain a sustainable structure not only in terms… More >

  • Open Access

    ARTICLE

    Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization Algorithm for Secured Free Scale Networks against Malicious Attacks

    Ganeshan Keerthana1,*, Panneerselvam Anandan2, Nandhagopal Nachimuthu3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 903-917, 2021, DOI:10.32604/cmc.2020.012255 - 30 October 2020

    Abstract Due to the recent proliferation of cyber-attacks, highly robust wireless sensor networks (WSN) become a critical issue as they survive node failures. Scale-free WSN is essential because they endure random attacks effectively. But they are susceptible to malicious attacks, which mainly targets particular significant nodes. Therefore, the robustness of the network becomes important for ensuring the network security. This paper presents a Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization (RHAFS-SA) Algorithm. It is introduced for improving the robust nature of free scale networks over malicious attacks (MA) with no change in degree distribution. The More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain

    Lejun Zhang1,2,*, Minghui Peng1, Weizheng Wang3 , Yansen Su4, Shuna Cui5,6, Seokhoon Kim7

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 499-515, 2021, DOI:10.32604/cmc.2020.012205 - 30 October 2020

    Abstract In the digital era, electronic medical record (EMR) has been a major way for hospitals to store patients’ medical data. The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing. The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput. To address these issues, we propose a secure and efficient medical data storage and sharing scheme based on double blockchain. In our scheme, we encrypt the original EMR and store it in the cloud. The storage blockchain… More >

  • Open Access

    ARTICLE

    ALCencryption: A Secure and Efficient Algorithm for Medical Image Encryption

    Jiao Ge1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1083-1100, 2020, DOI:10.32604/cmes.2021.013039 - 15 December 2020

    Abstract With the rapid development of medical informatization and the popularization of digital imaging equipment, DICOM images contain the personal privacy of patients, and there are security risks in the process of storage and transmission, so it needs to be encrypted. In order to solve the security problem of medical images on mobile devices, a safe and efficient medical image encryption algorithm called ALCencryption is designed. The algorithm first analyzes the medical image and distinguishes the color image from the gray image. For gray images, the improved Arnold map is used to scramble them according to More >

  • Open Access

    ARTICLE

    Sawdust Short Fiber Reinforced Epoxidized Natural Rubber: Insight on Its Mechanical, Physical, and Thermal Aspects

    O. S. Dahham1, N. Z. Noriman1,2,*, H. Jaya1, R. Hamzah1, M. U. Umar2,3, I. Johari4

    Journal of Renewable Materials, Vol.8, No.12, pp. 1633-1645, 2020, DOI:10.32604/jrm.2020.011377 - 12 November 2020

    Abstract In this work, Epoxidized natural rubber/sawdust short fiber (ENR-50/ SD) composites at different fiber content (5, 10, 15 and 20 phr) and size (fine size at 60–100 μm and coarse size at 10–20 mm) were prepared using two-roll mill and electrical-hydraulic hot press machine respectively. Curing characteristics, water uptake, tensile, morphological, physical, and thermal properties of the composites were investigated. Results indicated that the scorch time and cure time became shorter whereas torque improved as SD content increase. Though the decline of tensile strength and elongation at break values, modulus, hardness and crosslinking density have More >

  • Open Access

    ARTICLE

    Secure Information Access Strategy for a Virtual Data Centre

    Sivaranjani Balakrishnan1,∗, D. Surendran2,†

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 357-366, 2020, DOI:10.32604/csse.2020.35.357

    Abstract With the arrival of on-demand computing, data centre requirements are extensive, with fluid boundaries. Loaded Internet applications, service-oriented architectures, virtualization and security provisioning are the major operations of a data centre. Security is an absolute necessity of any network architecture, and the virtual IT data centre is no exception. At the boundary, security is focused on securing the terminals of the data centre from external threats and providing a secure gateway to the Internet. The paradigm shift towards a new computing environment makes communications more complicated for Infrastructure Providers (InP). This complexity includes the security… More >

  • Open Access

    ARTICLE

    Data Secure Storage Mechanism of Sensor Networks Based on Blockchain

    Jin Wang1, 2, Wencheng Chen1, Lei Wang3, *, R. Simon Sherratt4, Osama Alfarraj5, Amr Tolba5, 6

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2365-2384, 2020, DOI:10.32604/cmc.2020.011567 - 16 September 2020

    Abstract As the number of sensor network application scenarios continues to grow, the security problems inherent in this approach have become obstacles that hinder its wide application. However, it has attracted increasing attention from industry and academia. The blockchain is based on a distributed network and has the characteristics of nontampering and traceability of block data. It is thus naturally able to solve the security problems of the sensor networks. Accordingly, this paper first analyzes the security risks associated with data storage in the sensor networks, then proposes using blockchain technology to ensure that data storage… More >

  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505 - 16 September 2020

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance.… More >

  • Open Access

    ARTICLE

    Secure Provenance of Electronic Records Based on Blockchain

    Qirun Wang1, Fujian Zhu2, Sai Ji2, Yongjun Ren2, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1753-1769, 2020, DOI:10.32604/cmc.2020.07366 - 20 August 2020

    Abstract At present, the provenance of electronic records is stored centrally. The centralized way of information storage has huge risks. Whether the database itself is destroyed or the communication between the central database and the external interruption occurs, the provenance information of the stored electronic records will not play its role. At the same time, uncertainties such as fires and earthquakes will also pose a potential threat to centralized databases. Moreover, the existing security provenance model is not specifically designed for electronic records. In this paper, a security provenance model of electronic records is constructed based More >

  • Open Access

    ARTICLE

    Device-Independent Quantum Key Distribution Protocol Based on Hyper-Entanglement

    Yan Chang1, *, Shibin Zhang1, Lili Yan1, Xueyang Li1, Tian Cao1, Qirun Wang2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 879-896, 2020, DOI:10.32604/cmc.2020.010042 - 23 July 2020

    Abstract The secure key rate of quantum key distribution (QKD) is greatly reduced because of the untrusted devices. In this paper, to raise the secure key rate of QKD, a device-independent quantum key distribution (DIQKD) protocol is proposed based on hyper-entangled states and Bell inequalities. The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition. Based on the formalization of Clauser-Horne Shimony-Holt (CHSH) violation measurement on local correlation, the probability of a secure secret bit is obtained, which is produced by a pair of hyper-entangled particles. More >

Displaying 291-300 on page 30 of 334. Per Page