Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25)
  • Open Access

    ARTICLE

    Numerical Investigation on Air Distribution of Cabinet with Backplane Air Conditioning in Data Center

    Yiming Rongyang1, Chengyu Ji1, Xiangdong Ding2,*, Jun Gao1, Jianjian Wei2,3

    Frontiers in Heat and Mass Transfer, Vol.23, No.2, pp. 685-701, 2025, DOI:10.32604/fhmt.2025.063785 - 25 April 2025

    Abstract The effect of gradient exhaust strategy and blind plate installation on the inhibition of backflow and thermal stratification in data center cabinets is systematically investigated in this study through numerical methods. The validated Re-Normalization Group (RNG) k-ε turbulence model was used to analyze airflow patterns within cabinet structures equipped with backplane air conditioning. Key findings reveal that server-generated thermal plumes induce hot air accumulation at the cabinet apex, creating a 0.8°C temperature elevation at the top server’s inlet compared to the ideal situation (23°C). Strategic increases in backplane fan exhaust airflow rates reduce server 1’s inlet… More >

  • Open Access

    ARTICLE

    An Efficient Anti-Quantum Blind Signature with Forward Security for Blockchain-Enabled Internet of Medical Things

    Gang Xu1,2,6, Xinyu Fan1, Xiu-Bo Chen2, Xin Liu4, Zongpeng Li5, Yanhui Mao6,7, Kejia Zhang3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2293-2309, 2025, DOI:10.32604/cmc.2024.057882 - 17 February 2025

    Abstract Blockchain-enabled Internet of Medical Things (BIoMT) has attracted significant attention from academia and healthcare organizations. However, the large amount of medical data involved in BIoMT has also raised concerns about data security and personal privacy protection. To alleviate these concerns, blind signature technology has emerged as an effective method to solve blindness and unforgeability. Unfortunately, most existing blind signature schemes suffer from the security risk of key leakage. In addition, traditional blind signature schemes are also vulnerable to quantum computing attacks. Therefore, it remains a crucial and ongoing challenge to explore the construction of key-secure,… More >

  • Open Access

    ARTICLE

    Efficient Group Blind Signature for Medical Data Anonymous Authentication in Blockchain-Enabled IoMT

    Chaoyang Li*, Bohao Jiang, Yanbu Guo, Xiangjun Xin

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 591-606, 2023, DOI:10.32604/cmc.2023.038129 - 08 June 2023

    Abstract Blockchain technology promotes the development of the Internet of medical things (IoMT) from the centralized form to distributed trust mode as blockchain-based Internet of medical things (BIoMT). Although blockchain improves the cross-institution data sharing ability, there still exist the problems of authentication difficulty and privacy leakage. This paper first describes the architecture of the BIoMT system and designs an anonymous authentication model for medical data sharing. This BIoMT system is divided into four layers: perceptual, network, platform, and application. The model integrates an anonymous authentication scheme to guarantee secure data sharing in the network ledger.… More >

  • Open Access

    ARTICLE

    Smart Shoes Safety System for the Blind People Based on (IoT) Technology

    Ammar Almomani1,2,*, Mohammad Alauthman3, Amal Malkawi2, Hadeel Shwaihet2, Batool Aldigide2, Donia Aldabeek2, Karmen Abu Hamoodeh2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 415-436, 2023, DOI:10.32604/cmc.2023.036266 - 08 June 2023

    Abstract People’s lives have become easier and simpler as technology has proliferated. This is especially true with the Internet of Things (IoT). The biggest problem for blind people is figuring out how to get where they want to go. People with good eyesight need to help these people. Smart shoes are a technique that helps blind people find their way when they walk. So, a special shoe has been made to help blind people walk safely without worrying about running into other people or solid objects. In this research, we are making a new safety system… More >

  • Open Access

    ARTICLE

    Determined Reverberant Blind Source Separation of Audio Mixing Signals

    Senquan Yang1, Fan Ding1, Jianjun Liu1, Pu Li1,2, Songxi Hu1,2,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3309-3323, 2023, DOI:10.32604/iasc.2023.035051 - 15 March 2023

    Abstract Audio signal separation is an open and challenging issue in the classical “Cocktail Party Problem”. Especially in a reverberation environment, the separation of mixed signals is more difficult separated due to the influence of reverberation and echo. To solve the problem, we propose a determined reverberant blind source separation algorithm. The main innovation of the algorithm focuses on the estimation of the mixing matrix. A new cost function is built to obtain the accurate demixing matrix, which shows the gap between the prediction and the actual data. Then, the update rule of the demixing matrix More >

  • Open Access

    ARTICLE

    Five-year outcomes for Aquablation therapy compared to TURP: results from a double-blind, randomized trial in men with LUTS due to BPH

    Peter J. Gilling1, Neil Barber2, Mohamed Bidair3, Paul Anderson4, Mark Sutton5, Tev Aho6, Eugene Kramolowsky7, Andrew Thomas8, Ronald P. Kaufman, Jr.9, Gopal Badlani10, Mark Plante11, Mihir Desai12, Leo Doumanian12, Alexis E. Te13, Claus G Roehrborn14

    Canadian Journal of Urology, Vol.29, No.1, pp. 10960-10968, 2022

    Abstract Introduction: To determine if Aquablation therapy can maintain long term effectiveness in treating men with moderate to severe lower urinary tract symptoms (LUTS) due to benign prostatic hyperplasia (BPH) with a baseline prostate volume between 30 and 80 mL at 5 years compared to TURP.
    Materials and methods: In a double-blinded, multicenter prospective randomized controlled trial, 181 patients with moderate to severe LUTS secondary to BPH underwent TURP or Aquablation. The primary efficacy endpoint was reduction in International Prostate Symptom Score (IPSS) at 6 months. The primary safety endpoint was the occurrence of Clavien-Dindo persistent Grade 1… More >

  • Open Access

    ARTICLE

    A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection

    Jie Chen1, Chengsheng Yuan1,2,*, Chen Cui2, Zhihua Xia1, Xingming Sun1,3, Thangarajah Akilan4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 719-733, 2022, DOI:10.32604/cmc.2022.027984 - 18 May 2022

    Abstract Fingerprint identification systems have been widely deployed in many occasions of our daily life. However, together with many advantages, they are still vulnerable to the presentation attack (PA) by some counterfeit fingerprints. To address challenges from PA, fingerprint liveness detection (FLD) technology has been proposed and gradually attracted people's attention. The vast majority of the FLD methods directly employ convolutional neural network (CNN), and rarely pay attention to the problem of over-parameterization and over-fitting of models, resulting in large calculation force of model deployment and poor model generalization. Aiming at filling this gap, this paper… More >

  • Open Access

    ARTICLE

    Security Analysis for a VANET Privacy Protection Scheme

    Yuzhen Liu1,2, Xiaoliang Wang1,2,*, Zhoulei Cao1,2, Frank Jiang3

    Journal of Cyber Security, Vol.4, No.1, pp. 57-64, 2022, DOI:10.32604/jcs.2022.028792 - 05 May 2022

    Abstract Vehicular ad hoc network (VANET) is a self-organizing wireless sensor network model, which is extensively used in the existing traffic. Due to the openness of wireless channel and the sensitivity of traffic information, data transmission process in VANET is vulnerable to leakage and attack. Authentication of vehicle identity while protecting vehicle privacy information is an advantageous way to improve the security of VANET. We propose a scheme based on fair blind signature and secret sharing algorithm. In this paper, we prove that the scheme is feasible through security analysis. More >

  • Open Access

    ARTICLE

    Securing Copyright Using 3D Objects Blind Watermarking Scheme

    Hussein Abulkasim1,*, Mona Jamjoom2, Safia Abbas2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5969-5983, 2022, DOI:10.32604/cmc.2022.027999 - 21 April 2022

    Abstract Recently, securing Copyright has become a hot research topic due to rapidly advancing information technology. As a host cover, watermarking methods are used to conceal or embed sensitive information messages in such a manner that it was undetectable to a human observer in contemporary times. Digital media covers may often take any form, including audio, video, photos, even DNA data sequences. In this work, we present a new methodology for watermarking to hide secret data into 3-D objects. The technique of blind extraction based on reversing the steps of the data embedding process is used.… More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100 - 10 November 2021

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of… More >

Displaying 1-10 on page 1 of 25. Per Page