Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (41)
  • Open Access

    ARTICLE

    LUAR: Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems

    Fei Tang1,*, Ping Wang1, Jiang Yu1, Huihui Zhu1, Mengxue Qin1, Ling Yang2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073423 - 12 January 2026

    Abstract Attribute-Based Encryption (ABE) has emerged as a fundamental access control mechanism in data sharing, enabling data owners to define flexible access policies. A critical aspect of ABE is key revocation, which plays a pivotal role in maintaining security. However, existing key revocation mechanisms face two major challenges: (1) High overhead due to ciphertext and key updates, primarily stemming from the reliance on revocation lists during attribute revocation, which increases computation and communication costs. (2) Limited universality, as many attribute revocation mechanisms are tailored to specific ABE constructions, restricting their broader applicability. To address these challenges,… More >

  • Open Access

    ARTICLE

    IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-Encryption

    Han-Yu Lin, Tung-Tso Tsai*, Yi-Chuan Wang

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073234 - 12 January 2026

    Abstract Cloud services, favored by many enterprises due to their high flexibility and easy operation, are widely used for data storage and processing. However, the high latency, together with transmission overheads of the cloud architecture, makes it difficult to quickly respond to the demands of IoT applications and local computation. To make up for these deficiencies in the cloud, fog computing has emerged as a critical role in the IoT applications. It decentralizes the computing power to various lower nodes close to data sources, so as to achieve the goal of low latency and distributed processing.… More >

  • Open Access

    ARTICLE

    Identification of Key Parameters for Temporary Guy Ropes in Sloping Central Tower Column and Brace Construction

    Renfei Chang1, Liqiang Jin1, Haihui Xie2,*, Kai Zhang3, Musheng Ye4

    Structural Durability & Health Monitoring, Vol.20, No.1, 2026, DOI:10.32604/sdhm.2025.063718 - 08 January 2026

    Abstract To investigate the impact of temporary structures on the mechanical behavior of shaped bridge towers during the construction process, the Dianbu River Special Bridge was selected as the engineering background. A finite element model of the middle tower column during the construction stage was established using ABAQUS to analyze the effects of key parameters, including the angle and pretension of temporary cables, as well as the wall thickness and diameter of temporary diagonal braces. The study examines how these parameters influence the stresses at the tower-girder consolidation. The results indicate that the angle of temporary More >

  • Open Access

    ARTICLE

    RC2DNet: Real-Time Cable Defect Detection Network Based on Small Object Feature Extraction

    Zilu Liu1,#, Hongjin Zhu2,#,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 681-694, 2025, DOI:10.32604/cmc.2025.064191 - 29 August 2025

    Abstract Real-time detection of surface defects on cables is crucial for ensuring the safe operation of power systems. However, existing methods struggle with small target sizes, complex backgrounds, low-quality image acquisition, and interference from contamination. To address these challenges, this paper proposes the Real-time Cable Defect Detection Network (RC2DNet), which achieves an optimal balance between detection accuracy and computational efficiency. Unlike conventional approaches, RC2DNet introduces a small object feature extraction module that enhances the semantic representation of small targets through feature pyramids, multi-level feature fusion, and an adaptive weighting mechanism. Additionally, a boundary feature enhancement module More >

  • Open Access

    ARTICLE

    Synergistic Effect of Silicone Macromolecular Charring Agent and Ammonium Polyphosphate on Improving Flame Retardancy and Mechanical Properties of Ethylene-Butyl Acrylate Copolymer Composites

    Xuan Huo1, Bingchen Wu1, Yuanmeng Lou1, Junlin Zhu1, Cui Li1, Lili Ma1, Ye-Tang Pan2, Chuncheng Hao1,*, Xin Wen1,*

    Journal of Polymer Materials, Vol.42, No.2, pp. 517-530, 2025, DOI:10.32604/jpm.2025.065320 - 14 July 2025

    Abstract Power cables are important pieces of equipment for energy transmission, but achieving a good balance between flame retardancy and mechanical properties of cable sheaths remains a challenge. In this work, a novel intumescent flame retardant (IFR) system containing silicone-containing macromolecular charring agent (Si-MCA) and ammonium polyphosphate (APP) was designed to synergistically improve the flame retardancy and mechanical properties of ethylene-butyl acrylate copolymer (EBA) composites. The optimal mass ratio of APP/Si-MCA was 3/1 in EBA composites (EBA/APP-Si-31), corresponding to the best flame retardancy with 31.2% of limited oxygen index (LOI), V-0 rating in UL-94 vertical burning More > Graphic Abstract

    Synergistic Effect of Silicone Macromolecular Charring Agent and Ammonium Polyphosphate on Improving Flame Retardancy and Mechanical Properties of Ethylene-Butyl Acrylate Copolymer Composites

  • Open Access

    ARTICLE

    Cable-Stayed Bridge Model Updating Based on Response Surface Method

    Yao Lu, Xintong Huo, Guangzhen Qu, Yanjun Li, Lei Wang*

    Structural Durability & Health Monitoring, Vol.19, No.4, pp. 919-935, 2025, DOI:10.32604/sdhm.2025.062537 - 30 June 2025

    Abstract A response surface method was utilized for the finite element model updating of a cable-stayed bridge in this paper to establish a baseline finite element model (FEM) that accurately reflects the characteristics of the actual bridge structure. Firstly, an initial FEM was established by the large-scale finite element software ANSYS, and the modal analysis was carried out on the dynamic response measured by the actual bridge structural health monitoring system. The initial error was obtained by comparing the dynamic characteristics of the measured data with those of the initial finite element model. Then, the second-order… More >

  • Open Access

    ARTICLE

    Study on the Mechanical Performance of Wet Concrete Joints in Large-Span Composite Steel-Concrete Cable-Stayed Bridges

    Yang Wang1, Zhe Wu2,*, Kaixing Zhang3, Youzhi Wang2,*

    Structural Durability & Health Monitoring, Vol.19, No.3, pp. 613-642, 2025, DOI:10.32604/sdhm.2024.058451 - 03 April 2025

    Abstract A steel-concrete composite cable-stayed bridge features integrated steel girders and concrete decks linked by shear connectors to support loads, but stress concentration in wet joints can lead to cracking. In-situ tests were conducted on key sections of steel-concrete composite cable-stayed bridges to analyze the stress-strain evolution of wet joints under environmental factors, constraints, and complex construction processes. The coordinated working performance of the bridge decks was also analyzed. The results indicate that temperature is the key factor affecting the stresses and strains in wet joint concrete. Approximately 7 days after casting the wet joint concrete, the… More >

  • Open Access

    ARTICLE

    Anti-Crack Analysis and Reinforcement Design of Transverse Diaphragm Based on Layered Modeling Analysis Method

    Yuanyin Song1, Wenwei Wang2,*

    Structural Durability & Health Monitoring, Vol.19, No.3, pp. 549-574, 2025, DOI:10.32604/sdhm.2024.055382 - 03 April 2025

    Abstract To meticulously dissect the cracking issue in the transverse diaphragm concrete, situated at the anchor point of a colossal large-span, single cable plane cable-stayed bridge, this research paper adopts an innovative layered modeling analysis methodology for numerical simulations. The approach is structured into three distinct layers, each tailored to address specific aspects of the cracking phenomenon. The foundational first layer model operates under the assumption of linear elasticity, adhering to the Saint Venant principle. It narrows its focus to the crucial zone between the Bp20 transverse diaphragm and the central axis of pier 4’s support,… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Damaged T-Beam Bridges with External Prestressing Reinforcement Based on Natural Frequencies

    Menghui Hao1, Shanshan Zhou1, Yongchao Han1, Zhanwei Zhu1, Qiang Yang2, Panxu Sun2,*, Jiajun Fan2

    Structural Durability & Health Monitoring, Vol.19, No.2, pp. 399-415, 2025, DOI:10.32604/sdhm.2024.056250 - 15 January 2025

    Abstract As an evaluation index, the natural frequency has the advantages of easy acquisition and quantitative evaluation. In this paper, the natural frequency is used to evaluate the performance of external cable reinforced bridges. Numerical examples show that compared with the natural frequencies of first-order modes, the natural frequencies of higher-order modes are more sensitive and can reflect the damage situation and external cable reinforcement effect of T-beam bridges. For damaged bridges, as the damage to the T-beam increases, the natural frequency value of the bridge gradually decreases. When the degree of local damage to the… More >

  • Open Access

    ARTICLE

    Cuckoo Search-Optimized Deep CNN for Enhanced Cyber Security in IoT Networks

    Brij B. Gupta1,2,3,4,*, Akshat Gaurav5, Varsha Arya6,7, Razaz Waheeb Attar8, Shavi Bansal9, Ahmed Alhomoud10, Kwok Tai Chui11

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4109-4124, 2024, DOI:10.32604/cmc.2024.056476 - 19 December 2024

    Abstract Phishing attacks seriously threaten information privacy and security within the Internet of Things (IoT) ecosystem. Numerous phishing attack detection solutions have been developed for IoT; however, many of these are either not optimally efficient or lack the lightweight characteristics needed for practical application. This paper proposes and optimizes a lightweight deep-learning model for phishing attack detection. Our model employs a two-fold optimization approach: first, it utilizes the analysis of the variance (ANOVA) F-test to select the optimal features for phishing detection, and second, it applies the Cuckoo Search algorithm to tune the hyperparameters (learning rate… More >

Displaying 1-10 on page 1 of 41. Per Page