Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access

    ARTICLE

    Polynomial Commitment in a Verkle Tree Based on a Non-Positional Polynomial Notation

    Kunbolat T. Algazy1, Kairat S. Sakan1,2,*, Saule E. Nyssanbayeva1,2, Ardabek Khompysh1,3

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1581-1595, 2025, DOI:10.32604/cmc.2025.065085 - 09 June 2025

    Abstract This paper examines the application of the Verkle tree—an efficient data structure that leverages commitments and a novel proof technique in cryptographic solutions. Unlike traditional Merkle trees, the Verkle tree significantly reduces signature size by utilizing polynomial and vector commitments. Compact proofs also accelerate the verification process, reducing computational overhead, which makes Verkle trees particularly useful. The study proposes a new approach based on a non-positional polynomial notation (NPN) employing the Chinese Remainder Theorem (CRT). CRT enables efficient data representation and verification by decomposing data into smaller, independent components, simplifying computations, reducing overhead, and enhancing… More >

  • Open Access

    ARTICLE

    Prediction and Comparative Analysis of Rooftop PV Solar Energy Efficiency Considering Indoor and Outdoor Parameters under Real Climate Conditions Factors with Machine Learning Model

    Gökhan Şahin1,*, Ihsan Levent2, Gültekin Işık2, Wilfried van Sark1, Sabir Rustemli3

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1215-1248, 2025, DOI:10.32604/cmes.2025.063193 - 11 April 2025

    Abstract This research investigates the influence of indoor and outdoor factors on photovoltaic (PV) power generation at Utrecht University to accurately predict PV system performance by identifying critical impact factors and improving renewable energy efficiency. To predict plant efficiency, nineteen variables are analyzed, consisting of nine indoor photovoltaic panel characteristics (Open Circuit Voltage (Voc), Short Circuit Current (Isc), Maximum Power (Pmpp), Maximum Voltage (Umpp), Maximum Current (Impp), Filling Factor (FF), Parallel Resistance (Rp), Series Resistance (Rs), Module Temperature) and ten environmental factors (Air Temperature, Air Humidity, Dew Point, Air Pressure, Irradiation, Irradiation Propagation, Wind Speed, Wind… More >

  • Open Access

    ARTICLE

    Software Defined Range-Proof Authentication Mechanism for Untraceable Digital ID

    So-Eun Jeon1, Yeon-Ji Lee2, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3213-3228, 2025, DOI:10.32604/cmes.2025.062082 - 03 March 2025

    Abstract The Internet of Things (IoT) is extensively applied across various industrial domains, such as smart homes, factories, and intelligent transportation, becoming integral to daily life. Establishing robust policies for managing and governing IoT devices is imperative. Secure authentication for IoT devices in resource-constrained environments remains challenging due to the limitations of conventional complex protocols. Prior methodologies enhanced mutual authentication through key exchange protocols or complex operations, which are impractical for lightweight devices. To address this, our study introduces the privacy-preserving software-defined range proof (SDRP) model, which achieves secure authentication with low complexity. SDRP minimizes the More >

  • Open Access

    ARTICLE

    Towards Net Zero Resilience: A Futuristic Architectural Strategy for Cyber-Attack Defence in Industrial Control Systems (ICS) and Operational Technology (OT)

    Hariharan Ramachandran1,*, Richard Smith2, Kenny Awuson David1,*, Tawfik Al-Hadhrami3, Parag Acharya1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3619-3641, 2025, DOI:10.32604/cmc.2024.054802 - 17 February 2025

    Abstract This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios… More >

  • Open Access

    ARTICLE

    Impact of Different Rooftop Coverings on Photovoltaic Panel Temperature

    Aws Al-Akam1,*, Ahmed A. Abduljabbar2, Ali Jaber Abdulhamed1

    Energy Engineering, Vol.121, No.12, pp. 3761-3777, 2024, DOI:10.32604/ee.2024.055198 - 22 November 2024

    Abstract Photovoltaic (PV) panels are essential to the global transition towards sustainable energy, offering a clean, renewable source that reduces reliance on fossil fuels and mitigates climate change. High temperatures can significantly affect the performance of photovoltaic (PV) panels by reducing their efficiency and power output. This paper explores the consequential effect of various rooftop coverings on the thermal performance of photovoltaic (PV) panels. It investigates the relationship between the type of rooftop covering materials and the efficiency of PV panels, considering the thermal performance and its implications for enhancing their overall performance and sustainability. The… More >

  • Open Access

    REVIEW

    A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges

    Muhammad Muntasir Yakubu1,2,*, Mohd Fadzil B Hassan1,3, Kamaluddeen Usman Danyaro1, Aisha Zahid Junejo4, Muhammed Siraj5, Saidu Yahaya1, Shamsuddeen Adamu1, Kamal Abdulsalam6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1437-1481, 2024, DOI:10.32604/csse.2024.054556 - 22 November 2024

    Abstract This study conducts a systematic literature review (SLR) of blockchain consensus mechanisms, an essential protocols that maintain the integrity, reliability, and decentralization of distributed ledger networks. The aim is to comprehensively investigate prominent mechanisms’ security features and vulnerabilities, emphasizing their security considerations, applications, challenges, and future directions. The existing literature offers valuable insights into various consensus mechanisms’ strengths, limitations, and security vulnerabilities and their real-world applications. However, there remains a gap in synthesizing and analyzing this knowledge systematically. Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’ security and vulnerabilities comprehensively. The… More >

  • Open Access

    ARTICLE

    Physio-Mechanical Characterization of Recycled Polyethylene Terephthalate and Soda-Lime Glass Waste Composite for Roof Tile Application

    Yusuf Olanrewaju Busari1,2,*, Issah Sadiq Ibrahim1, Kabir S. Ajao1, Norliana Mohd Abbas2, James Obafemi Adegbola1, Hassan Kobe Ibrahim3, Abdallah Reghioua4, Yusuf Lanre Shuaib-Babata1, Rachael Oluwatoyosi Idowu1

    Journal of Polymer Materials, Vol.41, No.3, pp. 117-129, 2024, DOI:10.32604/jpm.2024.055895 - 30 September 2024

    Abstract The research paper focuses on manufacturing composite materials from waste polyethylene terephthalate (PET) reinforced with soda-lime glass to provide a lightweight, less brittle, and high rust resistance when exposed to hazardous environment. In developing nations such as Nigeria, there is a significant surge in the volume of bottled water and other packaging materials used in households, leading to a rapid accumulation of biodegradable waste, that presents concerns such as the creation of landfills and health issues. PET are thermoplastic polymer that can be melted and shaped into various objects. This study involves the incorporation of… More >

  • Open Access

    ARTICLE

    Performance of Thermal Insulation of Different Composite Walls and Roofs Materials Used for Energy Efficient Building Construction in Iraq

    Ahmed Mustaffa Saleem, Abdullah A. Badr, Bahjat Hassan Alyas, Omar Rafae Alomar*

    Frontiers in Heat and Mass Transfer, Vol.22, No.4, pp. 1231-1244, 2024, DOI:10.32604/fhmt.2024.053770 - 30 August 2024

    Abstract This study numerically involves the performance of thermal insulation of different types of composite walls and roofs to demonstrate the best model that can be used for energy-efficient building construction in Iraq. The mathematical model is solved by building its code using the Transmission Matrix Method in MATLAB software. The weather data of 21st July 2022 in Baghdad City/Iraq is selected as a test day. The wall types are selected: the first type consists of cement mortar, brick, and gypsum, the second type consists of cement mortar, brick, gypsum, and plaster and the third type… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233 - 18 July 2024

    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233 - 18 July 2024

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

Displaying 1-10 on page 1 of 44. Per Page