Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    An Adaptive and Parallel Metaheuristic Framework for Wrapper-Based Feature Selection Using Arctic Puffin Optimization

    Wy-Liang Cheng1, Wei Hong Lim1,*, Kim Soon Chong1, Sew Sun Tiang1, Yit Hong Choo2, El-Sayed M. El-kenawy3,4, Amal H. Alharbi5, Marwa M. Eid6,7

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2021-2050, 2025, DOI:10.32604/cmc.2025.064243 - 29 August 2025

    Abstract The exponential growth of data in recent years has introduced significant challenges in managing high-dimensional datasets, particularly in industrial contexts where efficient data handling and process innovation are critical. Feature selection, an essential step in data-driven process innovation, aims to identify the most relevant features to improve model interpretability, reduce complexity, and enhance predictive accuracy. To address the limitations of existing feature selection methods, this study introduces a novel wrapper-based feature selection framework leveraging the recently proposed Arctic Puffin Optimization (APO) algorithm. Specifically, we incorporate a specialized conversion mechanism to effectively adapt APO from continuous… More >

  • Open Access

    ARTICLE

    Light-Weighted Mutual Authentication and Key Agreement in V2N VANET

    Yanan Liu1, Lei Cao1,*, Zheng Zhang1,*, Ge Li2, Shuo Qiu1, Suhao Wang1

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4997-5019, 2025, DOI:10.32604/cmc.2025.066836 - 30 July 2025

    Abstract As the adoption of Vehicular Ad-hoc Networks (VANETs) grows, ensuring secure communication between smart vehicles and remote application servers (APPs) has become a critical challenge. While existing solutions focus on various aspects of security, gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments. This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function (PUF) for authentication and key agreement, offering a comprehensive solution to the security challenges in VANETs. The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs, ensuring the confidentiality and integrity of vehicle-to-network… More >

  • Open Access

    ARTICLE

    Water Huff-n-Puff Optimization in High Saturation Tight Oil Reservoirs

    Zhengyang Zhang1,2, Jing Sun1,2,*, Xin Shi3, Dehua Liu1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.3, pp. 509-527, 2025, DOI:10.32604/fdmp.2025.060393 - 01 April 2025

    Abstract High saturation pressure reservoirs experience rapid pressure decline during exploitation, leading to significant changes in crude oil phase behavior and a continuous increase in viscosity after degassing, which adversely affects oil recovery. This challenge is particularly acute in tight sandstone reservoirs. To optimize the development strategy for such reservoirs, a series of experiments were conducted using core samples from a high saturation tight sandstone reservoir in the JS oilfield. Gas-dissolved crude oil was prepared by mixing wellhead oil and gas samples, enabling the identification of the critical point where viscosity changes as pressure decreases. Oil-water… More >

  • Open Access

    ARTICLE

    Root Security Parameter Generation Mechanism Based on SRAM PUF for Smart Terminals in Power IoT

    Xiao Feng1,2,3,*, Xiao Liao1,3, Xiaokang Lin1,3, Yonggui Wang1,3

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1307-1325, 2025, DOI:10.32604/cmc.2025.061069 - 26 March 2025

    Abstract In the context of the diversity of smart terminals, the unity of the root of trust becomes complicated, which not only affects the efficiency of trust propagation, but also poses a challenge to the security of the whole system. In particular, the solidification of the root of trust in non-volatile memory (NVM) restricts the system’s dynamic updating capability, which is an obvious disadvantage in a rapidly changing security environment. To address this issue, this study proposes a novel approach to generate root security parameters using static random access memory (SRAM) physical unclonable functions (PUFs). SRAM… More >

  • Open Access

    ARTICLE

    A Novel Attack on Complex APUFs Using the Evolutionary Deep Convolutional Neural Network

    Ali Ahmadi Shahrakht1, Parisa Hajirahimi2, Omid Rostami3, Diego Martín4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3059-3081, 2023, DOI:10.32604/iasc.2023.040502 - 11 September 2023

    Abstract As the internet of things (IoT) continues to expand rapidly, the significance of its security concerns has grown in recent years. To address these concerns, physical unclonable functions (PUFs) have emerged as valuable tools for enhancing IoT security. PUFs leverage the inherent randomness found in the embedded hardware of IoT devices. However, it has been shown that some PUFs can be modeled by attackers using machine-learning-based approaches. In this paper, a new deep learning (DL)-based modeling attack is introduced to break the resistance of complex XAPUFs. Because training DL models is a problem that falls… More >

  • Open Access

    PROCEEDINGS

    Analysis of Production Dynamics of Fractured Horizontal Well with CO2 Huff and Puff in Shale Reservoirs

    Meng Wang1, Jun Yao1, Dongyan Fan1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.2, pp. 1-1, 2023, DOI:10.32604/icces.2023.08913

    Abstract In view of the current situation of the lack of suitable calculation models for the analysis of production dynamics of fractured horizontal well with CO2 huff and puff in shale reservoirs,based on the process and mechanism of CO2 huff and puff, an analytical model for the production dynamics of fractured horizontal well with CO2 huff and puff in shale reservoirs was proposed, in which took into account the changes in crude oil viscosity and volume caused by the difference in CO2 concentration at different locations in the formation after soaking and the adsorption and desorption process of CO2More >

  • Open Access

    ARTICLE

    Horizontal Well Interference Performance and Water Injection Huff and Puff Effect on Well Groups with Complex Fracture Networks: A Numerical Study

    Haoyu Fu1,2,3, Hua Liu1,2, Xiaohu Hu1,2, Lei Wang1,2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2285-2309, 2023, DOI:10.32604/cmes.2023.027996 - 03 August 2023

    Abstract Well interference has become a common phenomenon with the increasing scale of horizontal well fracturing. Recent studies on well interference in horizontal wells do not properly reflect the physical model of the postfracturing well groups and the realistic fracturing process of infill wells. Establishing the correspondence between well interference causative factors and manifestations is of great significance for infill well deployment and secondary oil recovery. In this work, we develop a numerical model that considers low velocity non-Darcy seepage in shale reservoirs to study the inter-well interference phenomenon that occurs in the Santanghu field, and… More >

  • Open Access

    ARTICLE

    MCRO-PUF: A Novel Modified Crossover RO-PUF with an Ultra-Expanded CRP Space

    Hassan Rabiei1, Masoud Kaveh2, Mohammad Reza Mosavi1, Diego Martín3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4831-4845, 2023, DOI:10.32604/cmc.2023.034981 - 28 December 2022

    Abstract With the expanding use of the Internet of Things (IoT) devices and the connection of humans and devices to the Internet, the need to provide security in this field is constantly growing. The conventional cryptographic solutions need the IoT device to store secret keys in its non-volatile memory (NVM) leading the system to be vulnerable to physical attacks. In addition, they are not appropriate for IoT applications due to their complex calculations. Thus, physically unclonable functions (PUFs) have been introduced to simultaneously address these issues. PUFs are lightweight and easy-to-access hardware security primitives which employ… More >

  • Open Access

    ARTICLE

    A Novel Secure Scan Design Based on Delayed Physical Unclonable Function

    Weizheng Wang1,2, Xingxing Gong1, Xiangqi Wang3, Gwang-jun Kim4,*, Fayez Alqahtani5, Amr Tolba6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6605-6622, 2023, DOI:10.32604/cmc.2023.031617 - 28 December 2022

    Abstract The advanced integrated circuits have been widely used in various situations including the Internet of Things, wireless communication, etc. But its manufacturing process exists unreliability, so cryptographic chips must be rigorously tested. Due to scan testing provides high test coverage, it is applied to the testing of cryptographic integrated circuits. However, while providing good controllability and observability, it also provides attackers with a backdoor to steal keys. In the text, a novel protection scheme is put forward to resist scan-based attacks, in which we first use the responses generated by a strong physical unclonable function More >

  • Open Access

    ARTICLE

    Secured Cloud Communication Using Lightweight Hash Authentication with PUF

    R. Padmavathy*, M. Newlin Rajkumar

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 233-243, 2022, DOI:10.32604/csse.2022.021129 - 23 March 2022

    Abstract Internet-of-Things (IoT) is an awaited technology in real-world applications to process daily tasks using intelligent techniques. The main process of data in IoT involves communication, integration, and coordination with other real-world applications. The security of transferred, stored, and processed data in IoT is not ensured in many constraints. Internet-enabled smart devices are widely used among populations for all types of applications, thus increasing the popularity of IoT among widely used server technologies. Smart grid is used in this article with IoT to manage large data. A smart grid is a collection of numerous users in… More >

Displaying 1-10 on page 1 of 15. Per Page