Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (117)
  • Open Access

    ARTICLE

    Efficient Group Blind Signature for Medical Data Anonymous Authentication in Blockchain-Enabled IoMT

    Chaoyang Li*, Bohao Jiang, Yanbu Guo, Xiangjun Xin

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 591-606, 2023, DOI:10.32604/cmc.2023.038129 - 08 June 2023

    Abstract Blockchain technology promotes the development of the Internet of medical things (IoMT) from the centralized form to distributed trust mode as blockchain-based Internet of medical things (BIoMT). Although blockchain improves the cross-institution data sharing ability, there still exist the problems of authentication difficulty and privacy leakage. This paper first describes the architecture of the BIoMT system and designs an anonymous authentication model for medical data sharing. This BIoMT system is divided into four layers: perceptual, network, platform, and application. The model integrates an anonymous authentication scheme to guarantee secure data sharing in the network ledger.… More >

  • Open Access

    ARTICLE

    OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification

    M. Muzaffar Hameed1,2, Rodina Ahmad1,*, Laiha Mat Kiah1, Ghulam Murtaza3, Noman Mazhar1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1267-1289, 2023, DOI:10.32604/cmc.2023.035063 - 08 June 2023

    Abstract Offline signature verification (OfSV) is essential in preventing the falsification of documents. Deep learning (DL) based OfSVs require a high number of signature images to attain acceptable performance. However, a limited number of signature samples are available to train these models in a real-world scenario. Several researchers have proposed models to augment new signature images by applying various transformations. Others, on the other hand, have used human neuromotor and cognitive-inspired augmentation models to address the demand for more signature samples. Hence, augmenting a sufficient number of signatures with variations is still a challenging task. This… More >

  • Open Access

    ARTICLE

    The correlation of miRNA expression and tumor mutational burden in uterine corpus endometrial carcinoma

    YANYA CHEN1,#, HONGYUAN WU2,#, RUISI ZHOU5,#, HELING DONG4, XUEFANG ZHANG2, XUEWEI WU1, WENSHAN CHEN1, YANTING YOU5,*, YIFEN WU3,*

    BIOCELL, Vol.47, No.6, pp. 1353-1364, 2023, DOI:10.32604/biocell.2023.027346 - 19 May 2023

    Abstract Background: The relationship between microRNA (miRNA) expression patterns and tumor mutation burden (TMB) in uterine corpus endometrial carcinoma (UCEC) was investigated in this study. Methods: The UCEC dataset from The Cancer Genome Atlas (TCGA) database was used to identify the miRNAs that differ in expression between high TMB and low TMB sample sets. The total sample sets were divided into a training set and a test set. TMB levels were predicted using miRNA-based signature classifiers developed by Lasso Cox regression. Test sets were used to validate the classifier. This study investigated the relationship between a miRNA-based signature… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309 - 23 April 2023

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.… More >

  • Open Access

    ARTICLE

    Solute carrier-related signature for assessing prognosis and immunity in patients with clear-cell renal cell carcinoma

    WEI BAO1,#, QIANGUANG HAN2,#, XIAO GUAN3, ZIJIE WANG2, MIN GU1,2,*

    Oncology Research, Vol.31, No.2, pp. 181-192, 2023, DOI:10.32604/or.2023.028051 - 10 April 2023

    Abstract Background: Clear-cell renal cell carcinoma (ccRCC) is the most common malignant kidney cancer. However, the tumor microenvironment and crosstalk involved in metabolic reprogramming in ccRCC are not well-understood. Methods: We used The Cancer Genome Atlas to obtain ccRCC transcriptome data and clinical information. The E-MTAB-1980 cohort was used for external validation. The GENECARDS database contains the first 100 solute carrier (SLC)-related genes. The predictive value of SLC-related genes for ccRCC prognosis and treatment was assessed using univariate Cox regression analysis. An SLC-related predictive signature was developed through Lasso regression analysis and used to determine the risk… More >

  • Open Access

    ARTICLE

    An inflammatory-related genes signature based model for prognosis prediction in breast cancer

    JINGYUE FU, RUI CHEN, ZHIZHENG ZHANG, JIANYI ZHAO, TIANSONG XIA*

    Oncology Research, Vol.31, No.2, pp. 157-167, 2023, DOI:10.32604/or.2023.027972 - 10 April 2023

    Abstract Background: Breast cancer has become the most common malignant tumor in the world. It is vital to discover novel prognostic biomarkers despite the fact that the majority of breast cancer patients have a good prognosis because of the high heterogeneity of breast cancer, which causes the disparity in prognosis. Recently, inflammatory-related genes have been proven to play an important role in the development and progression of breast cancer, so we set out to investigate the predictive usefulness of inflammatory-related genes in breast malignancies. Methods: We assessed the connection between Inflammatory-Related Genes (IRGs) and breast cancer by… More > Graphic Abstract

    An inflammatory-related genes signature based model for prognosis prediction in breast cancer

  • Open Access

    ARTICLE

    Quantum Secure Undeniable Signature for Blockchain-Enabled Cold-Chain Logistics System

    Chaoyang Li, Hongxue Shen, Xiayang Shi, Hui Liang*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3941-3956, 2023, DOI:10.32604/cmc.2023.037796 - 31 March 2023

    Abstract Data security and user privacy are two main security concerns in the cold-chain logistics system (CCLS). Many security issues exist in traditional CCLS, destroying data security and user privacy. The digital signature can provide data verification and identity authentication based on the mathematical difficulty problem for logistics data sharing in CCLS. This paper first established a blockchain-enabled cold-chain logistics system (BCCLS) based on union blockchain technology, which can provide secure data sharing among different logistics nodes and guarantee logistics data security with the untampered blockchain ledger. Meanwhile, a lattice-based undeniable signature scheme is designed to… More >

  • Open Access

    ARTICLE

    Blockchain Mobile Wallet with Secure Offline Transactions

    Raed Saeed Rasheed1, Khalil Hamdi Ateyeh Al-Shqeerat2,*, Ahmed Salah Ghorab3, Fuad Salama AbuOwaimer4, Aiman Ahmed AbuSamra1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2905-2919, 2023, DOI:10.32604/cmc.2023.036691 - 31 March 2023

    Abstract There has been an increase in the adoption of mobile payment systems worldwide in the past few years. However, poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technologies. On top of that, there are significant problems with the currently available offline wallets; for instance, the payee cannot verify the number of coins received without access to the Internet. Additionally, it has been demonstrated that some existing systems are susceptible to false token generation, and some do not even permit the user to divide the offline token… More >

  • Open Access

    ARTICLE

    Multi-Path Attention Inverse Discrimination Network for Offline Signature Verification

    Xiaorui Zhang1,2,3,4,*, Yingying Wang1, Wei Sun4,5, Qi Cui6, Xindong Wei7

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3057-3071, 2023, DOI:10.32604/iasc.2023.033578 - 15 March 2023

    Abstract Signature verification, which is a method to distinguish the authenticity of signature images, is a biometric verification technique that can effectively reduce the risk of forged signatures in financial, legal, and other business environments. However, compared with ordinary images, signature images have the following characteristics: First, the strokes are slim, i.e., there is less effective information. Second, the signature changes slightly with the time, place, and mood of the signer, i.e., it has high intraclass differences. These challenges lead to the low accuracy of the existing methods based on convolutional neural networks (CNN). This study… More >

  • Open Access

    ARTICLE

    A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things

    Caifen Wang1,*, Bin Wu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1857-1878, 2023, DOI:10.32604/cmes.2023.026153 - 06 February 2023

    Abstract The mushroom growth of IoT has been accompanied by the generation of massive amounts of data. Subject to the limited storage and computing capabilities of most IoT devices, a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing. One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results. Linearly homomorphic proxy signature (LHPS) is a desirable solution to ensure the reliability of outsourcing computing in the case of… More >

Displaying 41-50 on page 5 of 117. Per Page