Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem

    Guojun Wang1,2, Qi Liu3,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4471-4488, 2024, DOI:10.32604/cmc.2024.047669

    Abstract With the rapid advancement in exploring perceptual interactions and digital twins, metaverse technology has emerged to transcend the constraints of space-time and reality, facilitating remote AI-based collaboration. In this dynamic metasystem environment, frequent information exchanges necessitate robust security measures, with Authentication and Key Agreement (AKA) serving as the primary line of defense to ensure communication security. However, traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse. To address this challenge and enable nearly latency-free interactions, a novel low-latency AKA protocol based on chaotic maps is proposed. This protocol not only ensures mutual… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is a challenging task in small… More >

  • Open Access

    ARTICLE

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

    Zhuo Chen1,*, Ningning Wang2, Wenbo Jin3, Dui Li1

    Energy Engineering, Vol.121, No.4, pp. 1007-1026, 2024, DOI:10.32604/ee.2023.045270

    Abstract A hard problem that hinders the movement of waxy crude oil is wax deposition in oil pipelines. To ensure the safe operation of crude oil pipelines, an accurate model must be developed to predict the rate of wax deposition in crude oil pipelines. Aiming at the shortcomings of the ENN prediction model, which easily falls into the local minimum value and weak generalization ability in the implementation process, an optimized ENN prediction model based on the IRSA is proposed. The validity of the new model was confirmed by the accurate prediction of two sets of experimental data on wax deposition… More > Graphic Abstract

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

  • Open Access

    ARTICLE

    Prediction on Failure Pressure of Pipeline Containing Corrosion Defects Based on ISSA-BPNN Model

    Qi Zhuang1,*, Dong Liu2, Zhuo Chen3

    Energy Engineering, Vol.121, No.3, pp. 821-834, 2024, DOI:10.32604/ee.2023.044054

    Abstract Oil and gas pipelines are affected by many factors, such as pipe wall thinning and pipeline rupture. Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety management. Aiming at the shortcomings of the BP Neural Network (BPNN) model, such as low learning efficiency, sensitivity to initial weights, and easy falling into a local optimal state, an Improved Sparrow Search Algorithm (ISSA) is adopted to optimize the initial weights and thresholds of BPNN, and an ISSA-BPNN failure pressure prediction model for corroded pipelines is established. Taking 61 sets of pipelines blasting test data… More >

  • Open Access

    ARTICLE

    Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM

    Luoyin Feng1,*, Jize Du2, Chong Fu1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1645-1662, 2023, DOI:10.32604/cmc.2023.042630

    Abstract In the era of network communication, digital image encryption (DIE) technology is critical to ensure the security of image data. However, there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images. So, this paper addresses this gap by studying the generation of pseudo-random sequences (PRS) chaotic signals using dual logistic chaotic maps. These signals are then predicted using long and short-term memory (LSTM) networks, resulting in the reconstruction of a new chaotic signal. During the research process, it was discovered that there are numerous training parameters associated with the LSTM… More >

  • Open Access

    ARTICLE

    An Improved Honey Badger Algorithm through Fusing Multi-Strategies

    Zhiwei Ye1, Tao Zhao1, Chun Liu1,*, Daode Zhang1, Wanfang Bai2

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1479-1495, 2023, DOI:10.32604/cmc.2023.038787

    Abstract The Honey Badger Algorithm (HBA) is a novel meta-heuristic algorithm proposed recently inspired by the foraging behavior of honey badgers. The dynamic search behavior of honey badgers with sniffing and wandering is divided into exploration and exploitation in HBA, which has been applied in photovoltaic systems and optimization problems effectively. However, HBA tends to suffer from the local optimum and low convergence. To alleviate these challenges, an improved HBA (IHBA) through fusing multi-strategies is presented in the paper. It introduces Tent chaotic mapping and composite mutation factors to HBA, meanwhile, the random control parameter is improved, moreover, a diversified updating… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access

    ARTICLE

    An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity

    Akshaykumar Meshram1,2, Monia Hadj Alouane-Turki3, N. M. Wazalwar2, Chandrashekhar Meshram4,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5337-5353, 2023, DOI:10.32604/cmc.2023.037324

    Abstract Internet of Things (IoT) applications can be found in various industry areas, including critical infrastructure and healthcare, and IoT is one of several technological developments. As a result, tens of billions or possibly hundreds of billions of devices will be linked together. These smart devices will be able to gather data, process it, and even come to decisions on their own. Security is the most essential thing in these situations. In IoT infrastructure, authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit (e.g., via client identification and provision of secure communication).… More >

  • Open Access

    ARTICLE

    Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition

    Meng Yang1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Yen-Wei Chen3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5539-5554, 2023, DOI:10.32604/cmc.2023.036904

    Abstract With the development of digitalization in healthcare, more and more information is delivered and stored in digital form, facilitating people’s lives significantly. In the meanwhile, privacy leakage and security issues come along with it. Zero watermarking can solve this problem well. To protect the security of medical information and improve the algorithm’s robustness, this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform (NSST) and Schur decomposition. Firstly, the low-frequency subband image of the original medical image is obtained by NSST and chunked. Secondly, the Schur decomposition of low-frequency blocks to get stable values, extracting… More >

  • Open Access

    ARTICLE

    A Novel Internet of Medical Thing Cryptosystem Based on Jigsaw Transformation and Ikeda Chaotic Map

    Sultan Almakdi1, Mohammed S. Alshehri1, Yousef Asiri1, Mimonah Al Qathrady2,*, Anas Ibrar3, Jawad Ahmad4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3017-3036, 2023, DOI:10.32604/csse.2023.037281

    Abstract Image encryption has attracted much interest as a robust security solution for preventing unauthorized access to critical image data. Medical picture encryption is a crucial step in many cloud-based and healthcare applications. In this study, a strong cryptosystem based on a 2D chaotic map and Jigsaw transformation is presented for the encryption of medical photos in private Internet of Medical Things (IoMT) and cloud storage. A disorganized three-dimensional map is the foundation of the proposed cipher. The dispersion of pixel values and the permutation of their places in this map are accomplished using a nonlinear encoding process. The suggested cryptosystem… More >

Displaying 1-10 on page 1 of 31. Per Page