Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (190)
  • Open Access

    ARTICLE

    Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis

    Sumit Kumar1,*, S. Indu2, Gurjit Singh Walia1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1035-1051, 2023, DOI:10.32604/iasc.2023.024469

    Abstract Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad of fields. The increased popularity of the android platform entices malware developers to design malicious apps to achieve their malevolent intents. Also, static analysis approaches fail to detect run-time behaviors of malicious apps. To address these issues, an optimal unification of static and dynamic features for smartphone security analysis is proposed. The proposed solution exploits both static and dynamic features for generating a highly distinct unified feature vector using graph based cross-diffusion strategy. Further, a unified feature is subjected to the fuzzy-based classification… More >

  • Open Access

    ARTICLE

    Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller

    Mohammad Adnan Aladaileh, Mohammed Anbar*, Iznan H. Hasbullah, Abdullah Ahmed Bahashwan, Shadi Al-Sarawn

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1403-1416, 2022, DOI:10.32604/cmc.2022.029369

    Abstract The emergence of a new network architecture, known as Software Defined Networking (SDN), in the last two decades has overcome some drawbacks of traditional networks in terms of performance, scalability, reliability, security, and network management. However, the SDN is vulnerable to security threats that target its controller, such as low-rate Distributed Denial of Service (DDoS) attacks, The low-rate DDoS attack is one of the most prevalent attacks that poses a severe threat to SDN network security because the controller is a vital architecture component. Therefore, there is an urgent need to propose a detection approach for this type of attack… More >

  • Open Access

    ARTICLE

    Research on Known Vulnerability Detection Method Based on Firmware Analysis

    Wenjing Wang1, Tengteng Zhao1, Xiaolong Li1,*, Lei Huang1, Wei Zhang1, Hui Guo2

    Journal of Cyber Security, Vol.4, No.1, pp. 1-15, 2022, DOI:10.32604/jcs.2022.026816

    Abstract At present, the network security situation is becoming more and more serious. Malicious network attacks such as computer viruses, Trojans and hacker attacks are becoming more and more rampant. National and group network attacks such as network information war and network terrorism have a serious damage to the production and life of the whole society. At the same time, with the rapid development of Internet of Things and the arrival of 5G era, IoT devices as an important part of industrial Internet system, have become an important target of infiltration attacks by hostile forces. This paper describes the challenges facing… More >

  • Open Access

    ARTICLE

    Influence of a Winglet Combined with a Groove Tip on the Performances of a Variable-Pitch Axial Flow Fan

    Fei Zhou, Yu Zhou*, Xuemin Ye

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.4, pp. 1025-1037, 2022, DOI:10.32604/fdmp.2022.020196

    Abstract Taking a two-stage variable-pitch axial fan as the research object, five schemes, including a single counter-flow rib layout grooved tip, are numerically simulated using the fluent software. The results indicate that, compared with the original blade tip, the total pressure rise and efficiency of the four proposed schemes have been improved to various degrees, with Scheme 4 (groove tip with double counterflow ribs) displaying the best performances. The total pressure and efficiency are increased by 113.44 Pa and 0.955%, respectively. The blade tip leakage flow is reduced to varying degrees under different schemes, according to the following order: Scheme 1, Scheme… More >

  • Open Access

    ARTICLE

    Comprehensive Energy-Saving Optimization Model of Asynchronous Motor for Voltage Regulation Based on Static Synchronous Compensator

    Shuqiao Dan*

    Energy Engineering, Vol.119, No.3, pp. 1047-1057, 2022, DOI:10.32604/ee.2022.015594

    Abstract There are several problems existing in the direct starting of asynchronous motor such as large starting current, reactive power absorption from network side and weak interference-resistance, etc. Aiming at this, a comprehensive energy-saving optimization model of asynchronous motor for voltage regulation based on static synchronous compensator (STATCOM) is put forward. By analyzing the working principle and operation performance of static synchronous compensator regulating voltage, a new energy-efficient optimization method for asynchronous motor is proposed based on the voltage regulator model to achieve soft start, continuous dynamic reactive power compensation and the terminal voltage stability control. The multi-objective optimal operation of… More >

  • Open Access

    ARTICLE

    A Real-World Study on Oral Vinorelbine for the Treatment of Metastatic Breast Cancer

    Jiayi Huang1, Xue Bai1, Xiaofeng Xie1, Liping Chen1, Xiaofeng Lan1, Qiuyi Zhang1, Lin Song1, Pengjiao Hong2,3, Caiwen Du1,*

    Oncologie, Vol.24, No.1, pp. 131-145, 2022, DOI:10.32604/oncologie.2022.019881

    Abstract Background: Vinorelbine can be used to treat metastatic breast cancer as a single agent or in combination with other chemotherapy agents, although there is little real-world data for its use, particularly the oral form, in China. The current study aimed to explore the efficacy and safety of oral vinorelbine in patients with metastatic breast cancer in real-world clinical practice. Methods: A total of 194 patients with metastatic breast cancer received oral vinorelbine as a treatment between February 2017 and January 2021 at the National Cancer Center/National Clinical Research Center for Cancer/Cancer Hospital & Shenzhen Hospital, Chinese Academy of Medical Sciences… More >

  • Open Access

    ARTICLE

    Process Tolerant and Power Efficient SRAM Cell for Internet of Things Applications

    T. G. Sargunam1,2,*, Lim Way Soong1, C. M. R. Prabhu1, Ajay Kumar Singh3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3425-3446, 2022, DOI:10.32604/cmc.2022.023452

    Abstract The use of Internet of Things (IoT) applications become dominant in many systems. Its on-chip data processing and computations are also increasing consistently. The battery enabled and low leakage memory system at subthreshold regime is a critical requirement for these IoT applications. The cache memory designed on Static Random-Access Memory (SRAM) cell with features such as low power, high speed, and process tolerance are highly important for the IoT memory system. Therefore, a process tolerant SRAM cell with low power, improved delay and better stability is presented in this research paper. The proposed cell comprises 11 transistors designed with symmetric… More >

  • Open Access

    ARTICLE

    Energy-Efficient Static Data Collector-based Scheme in Smart Cities

    Adel D. Rajab*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2077-2092, 2022, DOI:10.32604/cmc.2022.025736

    Abstract In the Internet of Things (IoT)-based smart city applications, employing the Data Collectors (DC) as the data brokers between the nodes and Base Station (BS) can be a promising solution to enhance the energy efficiency of energy-constrained IoT sensor nodes. There are several schemes that utilize mobile DCs to collect the data packets from sensor nodes. However, moving DCs along the hundreds of thousands of sensors sparsely distributed across a smart city is considered a design challenge in such schemes. Another concern lies in how these mobile DCs are being powered. Therefore, to overcome these limitations, we exploit multiple energy-limited… More >

  • Open Access

    ARTICLE

    Strategy for Creating AR Applications in Static and Dynamic Environments Using SLAM- and Marker Detector-Based Tracking

    Chanho Park1,2, Hyunwoo Cho1, Sangheon Park1, Sung-Uk Jung1, Suwon Lee3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 529-549, 2022, DOI:10.32604/cmes.2022.019214

    Abstract Recently, simultaneous localization and mapping (SLAM) has received considerable attention in augmented reality (AR) libraries and applications. Although the assumption of scene rigidity is common in most visual SLAMs, this assumption limits the possibilities of AR applications in various real-world environments. In this paper, we propose a new tracking system that integrates SLAM with a marker detection module for real-time AR applications in static and dynamic environments. Because the proposed system assumes that the marker is movable, SLAM performs tracking and mapping of the static scene except for the marker, and the marker detector estimates the 3-dimensional pose of the… More >

  • Open Access

    ARTICLE

    Multi-Environmental Genetic Analysis of Grain Size Traits Based on Chromosome Segment Substitution Line in Rice (Oryza sativa L.)

    Yujia Leng1,#, Shuilian Wang1,2,3,#, Ruoan Wang2,#, Tao Tao1, Shuwen Jia1,2, Tao Song2,3, Lina Xu1,2, Xiuling Cai1,2, Sukui Jin1,2,*, Jiping Gao1,2,4,*

    Phyton-International Journal of Experimental Botany, Vol.91, No.5, pp. 943-958, 2022, DOI:10.32604/phyton.2022.018707

    Abstract Grain size traits are critical agronomic traits which directly determine grain yield, but the genetic bases of these traits are still not well understood. In this study, a total of 154 chromosome segment substitution lines (CSSLs) population derived from a cross between a japonica variety Koshihikari and an indica variety Nona Bokra was used to investigate grain length (GL), grain width (GW), length-width ratio (LWR), grain perimeter (GP), grain area (GA), and thousand grain weight (TGW) under four environments. QTL mapping analysis of six grain size traits was performed by QTL IciMapping 4.2 with an inclusive composite interval mapping (ICIM)… More >

Displaying 41-50 on page 5 of 190. Per Page