Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,155)
  • Open Access

    ARTICLE

    Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

    Bin Wu1,2, Xianyi Chen3, Jinzhou Huang4,*, Caicai Zhang5, Jing Wang6, Jing Yu1,2, Zhiqiang Zhao7, Zhuolin Mei1,2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3177-3194, 2024, DOI:10.32604/cmc.2023.047147

    Abstract In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in… More >

  • Open Access

    ARTICLE

    A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

    Fauziyah1, Zhaoshun Wang1,*, Mujahid Tabassum2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4417-4452, 2024, DOI:10.32604/cmc.2024.046797

    Abstract In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning… More >

  • Open Access

    REVIEW

    A Review on the Recent Trends of Image Steganography for VANET Applications

    Arshiya S. Ansari*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2865-2892, 2024, DOI:10.32604/cmc.2024.045908

    Abstract Image steganography is a technique of concealing confidential information within an image without dramatically changing its outside look. Whereas vehicular ad hoc networks (VANETs), which enable vehicles to communicate with one another and with roadside infrastructure to enhance safety and traffic flow provide a range of value-added services, as they are an essential component of modern smart transportation systems. VANETs steganography has been suggested by many authors for secure, reliable message transfer between terminal/hope to terminal/hope and also to secure it from attack for privacy protection. This paper aims to determine whether using steganography is possible to improve data security… More >

  • Open Access

    ARTICLE

    Resilience-Oriented Load Restoration Method and Repair Strategies for Regional Integrated Electricity-Natural Gas System

    Keqiang Wang1, Pengyang Zhao1, Changjian Wang2, Zimeng Zhang1, Yu Zhang1, Jia Lu1, Zedong Yang2,*

    Energy Engineering, Vol.121, No.4, pp. 1091-1108, 2024, DOI:10.32604/ee.2023.044016

    Abstract The rising frequency of extreme disaster events seriously threatens the safe and secure operation of the regional integrated electricity-natural gas system (RIENGS). With the growing level of coupling between electric and natural gas systems, it is critical to enhance the load restoration capability of both systems. This paper proposes a coordinated optimization strategy for resilience-enhanced RIENGS load restoration and repair scheduling and transforms it into a mixed integer second-order cone programming (MISOCP) model. The proposed model considers the distribution network reconfiguration and the coordinated repair strategy between the two systems, minimizing the total system load loss cost and repair time.… More >

  • Open Access

    ARTICLE

    Optimal Bidding Strategies of Microgrid with Demand Side Management for Economic Emission Dispatch Incorporating Uncertainty and Outage of Renewable Energy Sources

    Mousumi Basu1, Chitralekha Jena2, Baseem Khan3,4,*, Ahmed Ali4

    Energy Engineering, Vol.121, No.4, pp. 849-867, 2024, DOI:10.32604/ee.2024.043294

    Abstract In the restructured electricity market, microgrid (MG), with the incorporation of smart grid technologies, distributed energy resources (DERs), a pumped-storage-hydraulic (PSH) unit, and a demand response program (DRP), is a smarter and more reliable electricity provider. DER consists of gas turbines and renewable energy sources such as photovoltaic systems and wind turbines. Better bidding strategies, prepared by MG operators, decrease the electricity cost and emissions from upstream grid and conventional and renewable energy sources (RES). But it is inefficient due to the very high sporadic characteristics of RES and the very high outage rate. To solve these issues, this study… More >

  • Open Access

    ARTICLE

    SYSTEMATIC STRATEGY FOR MODELING AND OPTIMIZATION OF THERMAL SYSTEMS WITH DESIGN UNCERTAINTIES

    Po Ting Lin, Hae Chang Gea, Yogesh Jaluria*

    Frontiers in Heat and Mass Transfer, Vol.1, No.1, pp. 1-20, 2010, DOI:10.5098/hmt.v1.1.3003

    Abstract Thermal systems play significant roles in the engineering practice and our lives. To improve those thermal systems, it is necessary to model and optimize the design and the operating conditions. More importantly, the design uncertainties should be considered because the failures of the thermal systems may be very dangerous and produce large loss. This review paper focuses on a systematic strategy of modeling and optimizing of the thermal systems with the considerations of the design uncertainties. To demonstrate the proposed strategy, one of the complicated thermal systems, Chemical Vapor Deposition (CVD), is simulated, parametrically modeled, and optimized. The operating conditions,… More >

  • Open Access

    REVIEW

    Exploring the molecular mechanisms and potential therapeutic strategies of ferroptosis in ovarian cancer

    LISHA MA1,#, WANQI SHAO1,#, WEILI ZHU2,*

    BIOCELL, Vol.48, No.3, pp. 379-386, 2024, DOI:10.32604/biocell.2024.047812

    Abstract The morbidity rate of ovarian cancer, a malignant tumour in gynaecological tumours, is rising, and it is considered to be the most lethal cancer. The majority of patients are typically diagnosed during the advanced stages of the illness due to the elusive characteristics of ovarian cancer and an absence of highly sensitive and specific diagnostic indicators. Surgical excision of the lesions, along with chemotherapy, is the conventional treatment for ovarian cancer; however, resistance to platinum-based chemotherapeutic drugs and molecular targeted therapies frequently arises. Improving the survival rate and prognosis of patients with end-stage or recurring ovarian cancer requires the identification… More >

  • Open Access

    REVIEW

    The heterogeneity of tumor-associated macrophages and strategies to target it

    HAO LV1, BO ZHU1,2, DEGAO CHEN1,2,*

    BIOCELL, Vol.48, No.3, pp. 363-378, 2024, DOI:10.32604/biocell.2023.046367

    Abstract Tumor-associated macrophages (TAMs) are emerging as targets for tumor therapy because of their primary role in promoting tumor progression. Several studies have been conducted to target TAMs by reducing their infiltration, depleting their numbers, and reversing their phenotypes to suppress tumor progression, leading to the development of drugs in preclinical and clinical trials. However, the heterogeneous characteristics of TAMs, including their ontogenetic and functional heterogeneity, limit their targeting. Therefore, in-depth exploration of the heterogeneity of TAMs, combined with immune checkpoint therapy or other therapeutic modalities could improve the efficiency of tumor treatment. This review focuses on the heterogeneous ontogeny and… More >

  • Open Access

    ARTICLE

    Transparent and Accurate COVID-19 Diagnosis: Integrating Explainable AI with Advanced Deep Learning in CT Imaging

    Mohammad Mehedi Hassan1,*, Salman A. AlQahtani2, Mabrook S. AlRakhami1, Ahmed Zohier Elhendi3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3101-3123, 2024, DOI:10.32604/cmes.2024.047940

    Abstract In the current landscape of the COVID-19 pandemic, the utilization of deep learning in medical imaging, especially in chest computed tomography (CT) scan analysis for virus detection, has become increasingly significant. Despite its potential, deep learning’s “black box” nature has been a major impediment to its broader acceptance in clinical environments, where transparency in decision-making is imperative. To bridge this gap, our research integrates Explainable AI (XAI) techniques, specifically the Local Interpretable Model-Agnostic Explanations (LIME) method, with advanced deep learning models. This integration forms a sophisticated and transparent framework for COVID-19 identification, enhancing the capability of standard Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    KSKV: Key-Strategy for Key-Value Data Collection with Local Differential Privacy

    Dan Zhao1, Yang You2, Chuanwen Luo3,*, Ting Chen4,*, Yang Liu5

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3063-3083, 2024, DOI:10.32604/cmes.2023.045400

    Abstract In recent years, the research field of data collection under local differential privacy (LDP) has expanded its focus from elementary data types to include more complex structural data, such as set-value and graph data. However, our comprehensive review of existing literature reveals that there needs to be more studies that engage with key-value data collection. Such studies would simultaneously collect the frequencies of keys and the mean of values associated with each key. Additionally, the allocation of the privacy budget between the frequencies of keys and the means of values for each key does not yield an optimal utility tradeoff.… More >

Displaying 11-20 on page 2 of 1155. Per Page