Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Improved Data Stream Clustering Method: Incorporating KD-Tree for Typicality and Eccentricity-Based Approach

    Dayu Xu1,{{sup}}#{{/sup}}, Jiaming Lü1,{{sup}}#{{/sup}}, Xuyao Zhang2, Hongtao Zhang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2557-2573, 2024, DOI:10.32604/cmc.2024.045932

    Abstract Data stream clustering is integral to contemporary big data applications. However, addressing the ongoing influx of data streams efficiently and accurately remains a primary challenge in current research. This paper aims to elevate the efficiency and precision of data stream clustering, leveraging the TEDA (Typicality and Eccentricity Data Analysis) algorithm as a foundation, we introduce improvements by integrating a nearest neighbor search algorithm to enhance both the efficiency and accuracy of the algorithm. The original TEDA algorithm, grounded in the concept of “Typicality and Eccentricity Data Analytics”, represents an evolving and recursive method that requires no prior knowledge. While the… More >

  • Open Access

    ARTICLE

    Tensile Strain Capacity Prediction of Engineered Cementitious Composites (ECC) Using Soft Computing Techniques

    Rabar H. Faraj1,*, Hemn Unis Ahmed2,3, Hardi Saadullah Fathullah4, Alan Saeed Abdulrahman2, Farid Abed5

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2925-2954, 2024, DOI:10.32604/cmes.2023.029392

    Abstract Plain concrete is strong in compression but brittle in tension, having a low tensile strain capacity that can significantly degrade the long-term performance of concrete structures, even when steel reinforcing is present. In order to address these challenges, short polymer fibers are randomly dispersed in a cement-based matrix to form a highly ductile engineered cementitious composite (ECC). This material exhibits high ductility under tensile forces, with its tensile strain being several hundred times greater than conventional concrete. Since concrete is inherently weak in tension, the tensile strain capacity (TSC) has become one of the most extensively researched properties. As a… More >

  • Open Access

    ARTICLE

    Can PAPE-Induced Increases in Jump Height Be Explained by Jumping Kinematics?

    Xiaojie Jiang1, Xin Li1, Yining Xu1, Dong Sun1, Julien S. Baker2, Yaodong Gu1,3,*

    Molecular & Cellular Biomechanics, Vol.20, No.2, pp. 67-79, 2023, DOI:10.32604/mcb.2023.042910

    Abstract

    The aim of this study was to investigate whether kinematic data during a countermovement jump (CMJ) could explain the post-activation performance enhancement (PAPE) effects following acute resistance exercise. Twenty-four male participants with resistance training and jumping experience were recruited and randomly assigned to either the experimental group (PAPE-stimulus) (n = 12) or the control group (n = 12). In the experimental group, participants performed 5 reps of squats at 80% 1RM to induce PAPE, while the control group received no intervention. Both groups performed three CMJ tests before (PRE) and at immediate (POST0), 4 (POST4), 8 (POST8), and 12 (POST12)… More > Graphic Abstract

    Can PAPE-Induced Increases in Jump Height Be Explained by Jumping Kinematics?

  • Open Access

    ARTICLE

    An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

    Nouf Saeed Alotaibi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2061-2078, 2023, DOI:10.32604/cmc.2023.039446

    Abstract Intrusion Detection System (IDS) is a network security mechanism that analyses all users’ and applications’ traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the input characteristics for the IDS… More >

  • Open Access

    ARTICLE

    A Flexible Architecture for Cryptographic Applications: ECC and PRESENT

    Muhammad Rashid1,*, Omar S. Sonbul1, Muhammad Arif2, Furqan Aziz Qureshi3, Saud. S. Alotaibi4, Mohammad H. Sinky1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1009-1025, 2023, DOI:10.32604/cmc.2023.039901

    Abstract This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography (ECC) and PRESENT for cryptographic applications. The features of the proposed work are (i) computation of only the point multiplication operation of ECC over for a 163-bit key generation, (ii) execution of only the variant of an 80-bit PRESENT block cipher for data encryption & decryption and (iii) execution of point multiplication operation (ECC algorithm) along with the data encryption and decryption (PRESENT algorithm). To establish an area overhead for the flexible design, dedicated hardware architectures of ECC and PRESENT are implemented in the first step, and a sum of… More >

  • Open Access

    ARTICLE

    Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters

    Jin Wang1, Ying Liu1, Shuying Rao1, R. Simon Sherratt2, Jinbin Hu1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3849-3865, 2023, DOI:10.32604/cmc.2023.037150

    Abstract Data security and user privacy have become crucial elements in multi-tenant data centers. Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements. In the data center network (DCN), short and long flows are sensitive to low latency and high throughput, respectively. The traditional security processing approaches, however, neglect these characteristics and requirements. This paper proposes a fine-grained security enhancement mechanism (SEM) to solve the problem of heterogeneous traffic and reduce the traffic completion time (FCT) of short flows while ensuring the security of multi-tenant traffic transmission. Specifically, for short flows in DCN,… More >

  • Open Access

    ARTICLE

    EsECC_SDN: Attack Detection and Classification Model for MANET

    Veera Ankalu Vuyyuru1, Youseef Alotaibi2, Neenavath Veeraiah3,*, Saleh Alghamdi4, Korimilli Sirisha5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6665-6688, 2023, DOI:10.32604/cmc.2023.032140

    Abstract Mobile Ad Hoc Networks (MANET) is the framework for social networking with a realistic framework. In the MANET environment, based on the query, information is transmitted between the sender and receiver. In the MANET network, the nodes within the communication range are involved in data transmission. Even the nodes that lie outside of the communication range are involved in the transmission of relay messages. However, due to the openness and frequent mobility of nodes, they are subjected to the vast range of security threats in MANET. Hence, it is necessary to develop an appropriate security mechanism for the data MANET… More >

  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Signature Scheme for IoT in Healthcare

    Latika Kakkar1, Deepali Gupta1, Sarvesh Tanwar2, Sapna Saxena3, Khalid Alsubhi4, Divya Anand5, Irene Delgado Noya6,7, Nitin Goyal1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6151-6168, 2022, DOI:10.32604/cmc.2022.023769

    Abstract To provide faster access to the treatment of patients, healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient. There is a huge limitation in the sensing layer as the IoT devices here have low computational power, limited storage and less battery life. So, this huge amount of data needs to be stored on the cloud. The information and the data sensed by these devices is made accessible on the internet from where medical staff, doctors, relatives and family members can access this information. This helps in improving the treatment as… More >

  • Open Access

    ARTICLE

    A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network

    W. Gracy Theresa1,*, A. Gayathri2, P. Rama3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1337-1351, 2023, DOI:10.32604/iasc.2023.028425

    Abstract Mobile computing is the most powerful application for network communication and connectivity, given recent breakthroughs in the field of wireless networks or Mobile Ad-hoc networks (MANETs). There are several obstacles that effective networks confront and the networks must be able to transport data from one system to another with adequate precision. For most applications, a framework must ensure that the retrieved data reflects the transmitted data. Before driving to other nodes, if the frame between the two nodes is deformed in the data-link layer, it must be repaired. Most link-layer protocols immediately disregard the frame and enable the high-layer protocols… More >

Displaying 1-10 on page 1 of 34. Per Page