Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (170)
  • Open Access

    ARTICLE

    Read-Write Dependency Aware Register Allocation

    Sheng Xiao1,*, Yong Chen2, Jing He3, Xi Yang4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3527-3540, 2023, DOI:10.32604/csse.2023.027081

    Abstract Read-write dependency is an important factor restricting software efficiency. Timing Speculative (TS) is a processing architecture aiming to improve energy efficiency of microprocessors. Timing error rate, influenced by the read-write dependency, bottlenecks the voltage down-scaling and so the energy efficiency of TS processors. We proposed a method called Read-Write Dependency Aware Register Allocation. It is based on the Read-Write Dependency aware Interference Graph (RWDIG) conception. Registers are reallocated to loosen the read-write dependencies, so resulting in a reduction of timing errors. The traditional no operation (Nop) padding method is also redesigned to increase the distance value to above 2. We… More >

  • Open Access

    ARTICLE

    Quantum Secure Undeniable Signature for Blockchain-Enabled Cold-Chain Logistics System

    Chaoyang Li, Hongxue Shen, Xiayang Shi, Hui Liang*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3941-3956, 2023, DOI:10.32604/cmc.2023.037796

    Abstract Data security and user privacy are two main security concerns in the cold-chain logistics system (CCLS). Many security issues exist in traditional CCLS, destroying data security and user privacy. The digital signature can provide data verification and identity authentication based on the mathematical difficulty problem for logistics data sharing in CCLS. This paper first established a blockchain-enabled cold-chain logistics system (BCCLS) based on union blockchain technology, which can provide secure data sharing among different logistics nodes and guarantee logistics data security with the untampered blockchain ledger. Meanwhile, a lattice-based undeniable signature scheme is designed to strengthen the security of logistics… More >

  • Open Access

    ARTICLE

    Stackelberg Game-Based Resource Allocation with Blockchain for Cold-Chain Logistics System

    Yang Zhang1, Chaoyang Li2,*, Xiangjun Xin2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2429-2442, 2023, DOI:10.32604/cmc.2023.037139

    Abstract Cold-chain logistics system (CCLS) plays the role of collecting and managing the logistics data of frozen food. However, there always exist problems of information loss, data tampering, and privacy leakage in traditional centralized systems, which influence frozen food security and people’s health. The centralized management form impedes the development of the cold-chain logistics industry and weakens logistics data availability. This paper first introduces a distributed CCLS based on blockchain technology to solve the centralized management problem. This system aggregates the production base, storage, transport, detection, processing, and consumer to form a cold-chain logistics union. The blockchain ledger guarantees that the… More >

  • Open Access

    ARTICLE

    Delivery Invoice Information Classification System for Joint Courier Logistics Infrastructure

    Youngmin Kim1, Sunwoo Hwang2, Jaemin Park1, Joouk Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3027-3044, 2023, DOI:10.32604/cmc.2023.027877

    Abstract With the growth of the online market, demand for logistics and courier cargo is increasing rapidly. Accordingly, in the case of urban areas, road congestion and environmental problems due to cargo vehicles are mainly occurring. The joint courier logistics system, a plan to solve this problem, aims to establish an efficient logistics transportation system by utilizing one joint logistics delivery terminal by several logistics and delivery companies. However, several courier companies use different types of courier invoices. Such a system has a problem of information data transmission interruption. Therefore, the data processing process was systematically analyzed, a practically feasible methodology… More >

  • Open Access

    ARTICLE

    External UHF Sensor for GIS PD Insulation Defect from Resin Hole

    Li Xiao1,2, Xu Yang1,2,*, Guozhi Zhang1,2, Lin Cheng1,2, Yi Jiang1,2, Chuanxian Luo1,2, Jing Zhang1,2

    Energy Engineering, Vol.120, No.5, pp. 1239-1252, 2023, DOI:10.32604/ee.2023.025530

    Abstract In view of the effective perception demand of PD (Partial Discharge) insulation defect of in-service GIS (Gas Insulated Switchgear), the external UHF (Ultra High Frequency, 0.3−3 GHz) sensing technology for GIS PD insulation defect from resin hole is studied in this paper. Firstly, rectangular waveguide theory is used to analyze the electromagnetic wave propagation characteristics from rectangular resin hole in GIS disc insulator. It is found that the energy of leaked electromagnetic wave mainly concentrates in the frequency band above 1 GHz. Then based on this frequency band characteristics, a cavity-backed bowtie sensor for GIS PD external detection is designed… More >

  • Open Access

    ARTICLE

    Automatic Extraction of the Sparse Prior Correspondences for Non-Rigid Point Cloud Registration

    Yan Zhu1,2, Lili Tian2, Fan Ye2, Gaofeng Sun1, Xianyong Fang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1835-1856, 2023, DOI:10.32604/cmes.2023.025662

    Abstract Non-rigid registration of point clouds is still far from stable, especially for the largely deformed one. Sparse initial correspondences are often adopted to facilitate the process. However, there are few studies on how to build them automatically. Therefore, in this paper, we propose a robust method to compute such priors automatically, where a global and local combined strategy is adopted. These priors in different degrees of deformation are obtained by the locally geometrical-consistent point matches from the globally structural-consistent region correspondences. To further utilize the matches, this paper also proposes a novel registration method based on the Coherent Point Drift… More >

  • Open Access

    ARTICLE

    Lung Cancer Segmentation with Three-Parameter Logistic Type Distribution Model

    Debnath Bhattacharyya1, Eali. Stephen Neal Joshua2, N. Thirupathi Rao2, Yung-cheol Byun3,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1447-1465, 2023, DOI:10.32604/cmc.2023.031878

    Abstract Lung cancer is the leading cause of mortality in the world affecting both men and women equally. When a radiologist just focuses on the patient’s body, it increases the amount of strain on the radiologist and the likelihood of missing pathological information such as abnormalities are increased. One of the primary objectives of this research work is to develop computer-assisted diagnosis and detection of lung cancer. It also intends to make it easier for radiologists to identify and diagnose lung cancer accurately. The proposed strategy which was based on a unique image feature, took into consideration the spatial interaction of… More >

  • Open Access

    ARTICLE

    Optimization of Anti-Collapse Drilling Fluid Systems with High Potassium Content

    Yu Xia1, Jian Guan4, Yong Gao5, Shanfa Tang1,2,3,*, Jialuo Rong1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1609-1622, 2023, DOI:10.32604/fdmp.2023.025263

    Abstract The ash mudstone in some oil formations is highly water-sensitive. The oil formation is fractured, and the risk of well leakage and collapse is not negligible. This study presents a countermeasure for well collapse prevention, based on a “force-chemistry synergistic balance” approach and the utilization of environmentally friendly and efficient hydration inhibitors. The relevance of this approach is demonstrated considering a drilling fluid system with the high potassium content. The analysis shows that the system can maintain good rheological properties, filtration loss and suspension stability even after aging at 130°C for 16 h. The primary roll recovery of rock chips… More >

  • Open Access

    ARTICLE

    The synergistic effects of PRDX5 and Nrf2 on lung cancer progression and drug resistance under oxidative stress in the zebrafish models

    SITONG QIAN1,2,#, YING FANG1,#, CHENGYUN YAO1,#, YONGSHENG WANG3,#, ZHI ZHANG1, XIAOHUA WANG1, JIN GAO1, YONG FENG1, LEI SUN1, RUNYUE ZOU2, GUOREN ZHOU1,*, JINJUN YE1,*, RUIXUE XIA4,*, HONGPING XIA5,6,*

    Oncology Research, Vol.30, No.2, pp. 53-64, 2022, DOI:10.32604/or.2022.026302

    Abstract Previous studies have shown that PRDX5 and Nrf2 are antioxidant proteins related to abnormal reactive oxidative species (ROS). PRDX5 and Nrf2 play a critical role in the progression of inflammations and tumors. The combination of PRDX5 and Nrf2 was examined by Co-immunoprecipitation, western blotting and Immunohistochemistry. H2O2 was applied to affect the production of ROS and induced multi-resistant protein 1 (MRP1) expression in NSCLC cells. The zebrafish models mainly investigated the synergistic effects of PRDX5 and Nrf2 on lung cancer drug resistance under oxidative stress. We showed that PRDX5 and Nrf2 form a complex and significantly increase the NSCLC tissues… More >

  • Open Access

    ARTICLE

    Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT

    J. R. Arunkumar1,*, S. Velmurugan2, Balarengadurai Chinnaiah3, G. Charulatha4, M. Ramkumar Prabhu4, A. Prabhu Chakkaravarthy5

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2635-2645, 2023, DOI:10.32604/csse.2023.031605

    Abstract Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of applications and greatly attractive benefits, for example, self-governing, low expenditure on execution and data communication, long-term function, and unsupervised access to the network. The Internet of Things (IoT) is an attractive, exciting paradigm. By applying communication technologies in sensors and supervising features, WSNs have initiated communication between the IoT devices. Though IoT offers access to the highest amount of information collected through WSNs, it leads to privacy management problems. Hence, this paper provides a Logistic Regression machine learning with the Elliptical Curve Cryptography technique (LRECC) to… More >

Displaying 31-40 on page 4 of 170. Per Page