Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    In Situ Generation of Copper Nanoparticles in Heat-Treated Copper-Containing Masson’s Pine as a Preservative Process for Sawn Timber

    Minting Lai, Guijun Xie*, Wanju Li, Lamei Li, Yongjian Cao

    Journal of Renewable Materials, Vol.11, No.6, pp. 2665-2678, 2023, DOI:10.32604/jrm.2023.027441

    Abstract Heat-treated wood has good dimensional stability, durability, and color, but its susceptibility to fungal growth affects its commercial value. In this study, lumber harvested from mature Masson’s pine (Pinus massoniana Lamb.) was vacuum impregnated with a basic copper salt solution (copper hydroxide, diethanolamine, and polyethylene glycol 200) prior to heat-treatment at 220°C for 3 h. Antifungal properties, surface chemistry, crystal structure and sugar contents were tested, compared with heat treatment alone. The results showed that the samples treated by heating without copper salt treatment showed poor suppression of fungal growth, the copper-impregnated heat-treated wood suppressed (100%) the growth of Botryodiplodia theobromaeMore >

  • Open Access

    ARTICLE

    A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map

    Sultan Almakdi1, Mohammed S. Alshehri1, Yousef Asiri1, Mimonah Al Qathrady2,*, Anas Ibrar3, Jawad Ahmad4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3017-3036, 2023, DOI:10.32604/csse.2023.037281

    Abstract Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data. Medical picture encryption is a crucial step in many cloud-based and healthcare applications. In this study, a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things (IoMT) and cloud storage. A disorganized three-dimensional map is the foundation of the proposed cipher. The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process. The suggested cryptosystem… More >

  • Open Access

    ARTICLE

    Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing

    Emad Alsuwat1,*, Suhare Solaiman1, Hatim Alsuwat2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3743-3759, 2023, DOI:10.32604/cmc.2023.035126

    Abstract Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning (ML) models. Due to attackers’ (and/or benign equivalents’) dynamic behavior changes, testing data distribution frequently diverges from original training data over time, resulting in substantial model failures. Due to their dispersed and dynamic nature, distributed denial-of-service attacks pose a danger to cybersecurity, resulting in attacks with serious consequences for users and businesses. This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service (DDOS) in the network.… More >

  • Open Access

    ARTICLE

    Optical Ciphering Scheme for Cancellable Speaker Identification System

    Walid El-Shafai1,2, Marwa A. Elsayed1, Mohsen A. Rashwan3, Moawad I. Dessouky1, Adel S. El-Fishawy1, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 563-578, 2023, DOI:10.32604/csse.2023.024375

    Abstract Most current security and authentication systems are based on personal biometrics. The security problem is a major issue in the field of biometric systems. This is due to the use in databases of the original biometrics. Then biometrics will forever be lost if these databases are attacked. Protecting privacy is the most important goal of cancelable biometrics. In order to protect privacy, therefore, cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases. One methodology to achieve non-invertibility is the employment of non-invertible transforms. This… More >

  • Open Access

    ARTICLE

    Measurement and Analysis of Three-Dimensional Surface Topography of Sawn Timber Based on Scanning Probe Method

    Yuhang He1, Rongzhuo Zhang1, Sarah Mohrmann2, Zheng Wang1,*, Jiujin Fang3

    Journal of Renewable Materials, Vol.10, No.12, pp. 3303-3311, 2022, DOI:10.32604/jrm.2022.020681

    Abstract In order to explore the characteristics of the three-dimensional surface morphology of sawn timber, a threedimensional wood surface morphology tester based on the scanning probe method and the principle of atomic force microscope was used to test the three-dimensional surface morphology of three kinds of sawn timber and calculate its surface roughness. This study also analyzed the reasonable plan for the value of wood surface roughness and the advantages of the three-dimensional shape tester, as well as the influence of tree species, three sections, air-dry density and other factors on the surface roughness of the specimen after mechanical processing. The… More >

  • Open Access

    ARTICLE

    Rice (Oryza sativa L.) Breeding among Hassawi Landrace and Egyptian Genotypes for Stem Borer (Chilo agamemnon Bles.) Resistance and Related Quantitative Traits

    Mohammed I. Al-Daej1, Mohamed M. El-Malky2, Muhammad N. Sattar3, Adel A. Rezk1,4, Muhammad N. Naqqash5, Jameel M. Al-Khayri1,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.9, pp. 1905-1922, 2022, DOI:10.32604/phyton.2022.020629

    Abstract Rice stem borer (Chilo agamemnon Bles.) is a primary insect pest of rice and is a major limiting factor to rice production. Breeding for insect-resistant crop varieties has been an economic way of integrated pest management (IPM) as it offers a viable and ecologically acceptable approach. This study was aimed to evaluate rice genotypes for their resistance against rice stem borer. Seven parental genotypes with twenty one F1 crosses were evaluated for genotypic variation in field experiments. Analysis of variance revealed significant differences for the studied traits in almost all crosses and parents. In addition, the mean squares of parents… More >

  • Open Access

    ARTICLE

    An Analysis of the Formation Mechanisms of Abrasive Particles and Their Effects on Cutting Efficiency

    Wei Zhang*

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.4, pp. 1153-1167, 2022, DOI:10.32604/fdmp.2022.019719

    Abstract Magnetic induction-free abrasive wire sawing (MIFAWS) is a method that combines magnetic fields with traditional free abrasive wire sawing technologies. Magnetic abrasive particles (MAPs) are attracted on a magnetized wire, thus leading to an increase in their number into the cutting zone. The number of instantaneous-effective abrasive particles (IEAPs) adsorbed on the wire surface has a great influence on the cutting efficiency of the saw wire. In this study, a mathematic model of the movement of the MAP is presented, and the factors influencing the IEAPs number, including slurry-supply speed and slurry dynamic viscosity, are investigated both by means of… More >

  • Open Access

    ARTICLE

    Autonomous Exploration Based on Multi-Criteria Decision-Making and Using D* Lite Algorithm

    Novak Zagradjanin1,*, Dragan Pamucar2, Kosta Jovanovic1, Nikola Knezevic1, Bojan Pavkovic3

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1369-1386, 2022, DOI:10.32604/iasc.2022.021979

    Abstract An autonomous robot is often in a situation to perform tasks or missions in an initially unknown environment. A logical approach to doing this implies discovering the environment by the incremental principle defined by the applied exploration strategy. A large number of exploration strategies apply the technique of selecting the next robot position between candidate locations on the frontier between the unknown and the known parts of the environment using the function that combines different criteria. The exploration strategies based on Multi-Criteria Decision-Making (MCDM) using the standard SAW, COPRAS and TOPSIS methods are presented in the paper. Their performances are… More >

  • Open Access

    ARTICLE

    Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus

    Tehreem Aslam1, Ayesha Maqbool1, Maham Akhtar1, Alina Mirza2,*, Muhammad Anees Khan3, Wazir Zada Khan4, Shadab Alam5

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1089-1109, 2022, DOI:10.32604/cmc.2022.019416

    Abstract Enterprise Resource Planning (ERP) software is extensively used for the management of business processes. ERP offers a system of integrated applications with a shared central database. Storing all business-critical information in a central place raises various issues such as data integrity assurance and a single point of failure, which makes the database vulnerable. This paper investigates database and Blockchain integration, where the Blockchain network works in synchronization with the database system, and offers a mechanism to validate the transactions and ensure data integrity. Limited research exists on Blockchain-based solutions for the single point of failure in ERP. We established in… More >

  • Open Access

    ARTICLE

    Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

    Al Hussien Seddik Saad1,*, M. S. Mohamed2,3, E. H. Hafez4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2077-2091, 2021, DOI:10.32604/cmc.2021.015329

    Abstract Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels, creating the stego image. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. A coverless data hiding concept is proposed to solve this issue. Coverless does not mean that cover is not required, or the payload can be transmitted without a cover. Instead, the payload is embedded by cover generation or a secret message mapping between the cover file and the payload. In this paper, a… More >

Displaying 1-10 on page 1 of 14. Per Page