Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,501)
  • Open Access

    ARTICLE

    Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm

    Bijeta Seth1, Surjeet Dalal1, Dac-Nhuong Le2,3,*, Vivek Jaglan4, Neeraj Dahiya1, Akshat Agrawal5, Mayank Mohan Sharma6, Deo Prakash7, K. D. Verma8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 779-798, 2021, DOI:10.32604/cmc.2021.014466 - 12 January 2021

    Abstract Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically reconfigured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blowfish and Paillier encryption algorithms has been presented and its strength compared with… More >

  • Open Access

    ARTICLE

    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam1,*, Asif Ali1, Tariq Shah1, Ghazanfar Farooq2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442 - 12 January 2021

    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the… More >

  • Open Access

    ARTICLE

    Automatic Segmentation of Liver from Abdominal Computed Tomography Images Using Energy Feature

    Prabakaran Rajamanickam1, Shiloah Elizabeth Darmanayagam1,*, Sunil Retmin Raj Cyril Raj2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 709-722, 2021, DOI:10.32604/cmc.2021.014347 - 12 January 2021

    Abstract Liver Segmentation is one of the challenging tasks in detecting and classifying liver tumors from Computed Tomography (CT) images. The segmentation of hepatic organ is more intricate task, owing to the fact that it possesses a sizeable quantum of vascularization. This paper proposes an algorithm for automatic seed point selection using energy feature for use in level set algorithm for segmentation of liver region in CT scans. The effectiveness of the method can be determined when used in a model to classify the liver CT images as tumorous or not. This involves segmentation of the… More >

  • Open Access

    ARTICLE

    Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

    Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1207-1224, 2021, DOI:10.32604/cmc.2021.014293 - 12 January 2021

    Abstract With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images… More >

  • Open Access

    ARTICLE

    On Computing the Suitability of Non-Human Resources for Business Process Analysis

    Abid Sohail1,*, Khurram Shahzad2, P. D. D. Dominic3, Muhammad Arif Butt2, Muhammad Arif4, Muhammad Imran Tariq5

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 303-319, 2021, DOI:10.32604/cmc.2021.014201 - 12 January 2021

    Abstract Business process improvement is a systematic approach used by several organizations to continuously improve their quality of service. Integral to that is analyzing the current performance of each task of the process and assigning the most appropriate resources to each task. In continuation of our previous work, we categorize resources into human and non-human resources. For instance, in the healthcare domain, human resources include doctors, nurses, and other associated staff responsible for the execution of healthcare activities; whereas the non-human resources include surgical and other equipment needed for execution. In this study, we contend that… More >

  • Open Access

    ARTICLE

    Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City

    Muhammad Usman Tariq1, Muhammad Babar2, Mian Ahmad Jan3,4,5,*, Akmal Saeed Khattak6, Mohammad Dahman Alshehri7, Abid Yahya8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 625-639, 2021, DOI:10.32604/cmc.2021.014165 - 12 January 2021

    Abstract The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, More >

  • Open Access

    ARTICLE

    A Weighted Spatially Constrained Finite Mixture Model for Image Segmentation

    Mohammad Masroor Ahmed1,*, Saleh Al Shehri2, Jawad Usman Arshed3, Mahmood Ul Hassan4, Muzammil Hussain5, Mehtab Afzal6

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 171-185, 2021, DOI:10.32604/cmc.2021.014141 - 12 January 2021

    Abstract Spatially Constrained Mixture Model (SCMM) is an image segmentation model that works over the framework of maximum a-posteriori and Markov Random Field (MAP-MRF). It developed its own maximization step to be used within this framework. This research has proposed an improvement in the SCMM’s maximization step for segmenting simulated brain Magnetic Resonance Images (MRIs). The improved model is named as the Weighted Spatially Constrained Finite Mixture Model (WSCFMM). To compare the performance of SCMM and WSCFMM, simulated T1-Weighted normal MRIs were segmented. A region of interest (ROI) was extracted from segmented images. The similarity level More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007 - 12 January 2021

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field… More >

  • Open Access

    ARTICLE

    Intelligent Breast Cancer Prediction Empowered with Fusion and Deep Learning

    Shahan Yamin Siddiqui1,2, Iftikhar Naseer3, Muhammad Adnan Khan4, Muhammad Faheem Mushtaq5, Rizwan Ali Naqvi6,*, Dildar Hussain7, Amir Haider8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1033-1049, 2021, DOI:10.32604/cmc.2021.013952 - 12 January 2021

    Abstract Breast cancer is the most frequently detected tumor that eventually could result in a significant increase in female mortality globally. According to clinical statistics, one woman out of eight is under the threat of breast cancer. Lifestyle and inheritance patterns may be a reason behind its spread among women. However, some preventive measures, such as tests and periodic clinical checks can mitigate its risk thereby, improving its survival chances substantially. Early diagnosis and initial stage treatment can help increase the survival rate. For that purpose, pathologists can gather support from nondestructive and efficient computer-aided diagnosis… More >

  • Open Access

    ARTICLE

    Automatic Text Summarization Using Genetic Algorithm and Repetitive Patterns

    Ebrahim Heidary1, Hamïd Parvïn2,3,4,*, Samad Nejatian5,6, Karamollah Bagherifard1,6, Vahideh Rezaie6,7, Zulkefli Mansor8, Kim-Hung Pho9

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1085-1101, 2021, DOI:10.32604/cmc.2021.013836 - 12 January 2021

    Abstract Taking into account the increasing volume of text documents, automatic summarization is one of the important tools for quick and optimal utilization of such sources. Automatic summarization is a text compression process for producing a shorter document in order to quickly access the important goals and main features of the input document. In this study, a novel method is introduced for selective text summarization using the genetic algorithm and generation of repetitive patterns. One of the important features of the proposed summarization is to identify and extract the relationship between the main features of the… More >

Displaying 3241-3250 on page 325 of 4501. Per Page