Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (182)
  • Open Access

    ARTICLE

    Designing Pair of Nonlinear Components of a Block Cipher over Gaussian Integers

    Muhammad Sajjad1,*, Tariq Shah1, Robinson Julian Serna2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5287-5305, 2023, DOI:10.32604/cmc.2023.035347

    Abstract In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with the purpose of inducing confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves has been published. The main purpose of these studies is to hide data and improve the security levels of crypto algorithms. In this work, we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers (GI). The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters. But the prime… More >

  • Open Access

    ARTICLE

    STUDY OF SUBSTRATE CONDUCTANCE EFFECT ON THE COOLING OF ELECTRONIC COMPONENTS

    Shankar Durgam

    Frontiers in Heat and Mass Transfer, Vol.18, pp. 1-10, 2022, DOI:10.5098/hmt.18.49

    Abstract This article explores experimentally and numerically the effect of conductance on cooling of electronic chips by forced air flow in a vertical channel for thermal control. Experiments are conducted using substrates of FR4, bakelite, copper clad board (single layer) equipped with aluminum heat sources at uniform heat fluxes of 1000, 2000, and 3000 W/m2 at 500 ≤ Re ≤ 1500. Computer simulations are performed to validate experimental results using a finite element method based COMSOL Multiphysics 4.3b software and the results are in agreements of below 10%. The temperatures obtained showed high thermal conductance copper clad boards (CCBs) are very… More >

  • Open Access

    ARTICLE

    Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning

    Zibo Wang1,3, Chaobin Huo2, Yaofang Zhang1,3, Shengtao Cheng1,3, Yilu Chen1,3, Xiaojie Wei5, Chao Li4, Bailing Wang1,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2957-2979, 2023, DOI:10.32604/cmc.2023.035694

    Abstract With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an… More >

  • Open Access

    ARTICLE

    Data Masking for Chinese Electronic Medical Records with Named Entity Recognition

    Tianyu He1, Xiaolong Xu1,*, Zhichen Hu1, Qingzhan Zhao2, Jianguo Dai2, Fei Dai3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3657-3673, 2023, DOI:10.32604/iasc.2023.036831

    Abstract With the rapid development of information technology, the electronification of medical records has gradually become a trend. In China, the population base is huge and the supporting medical institutions are numerous, so this reality drives the conversion of paper medical records to electronic medical records. Electronic medical records are the basis for establishing a smart hospital and an important guarantee for achieving medical intelligence, and the massive amount of electronic medical record data is also an important data set for conducting research in the medical field. However, electronic medical records contain a large amount of private patient information, which must… More >

  • Open Access

    ARTICLE

    A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net

    P. Shanmuga Prabha*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3101-3119, 2023, DOI:10.32604/iasc.2023.034885

    Abstract Today, securing devices connected to the internet is challenging as security threats are generated through various sources. The protection of cyber-physical systems from external attacks is a primary task. The presented method is planned on the prime motive of detecting cybersecurity attacks and their impacted parameters. The proposed architecture employs the LYSIS dataset and formulates Multi Variant Exploratory Data Analysis (MEDA) through Principle Component Analysis (PCA) and Singular Value Decomposition (SVD) for the extraction of unique parameters. The feature mappings are analyzed with Recurrent 2 Convolutional Neural Network (R2CNN) and Gradient Boost Regression (GBR) to identify the maximum correlation. Novel… More >

  • Open Access

    ARTICLE

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

    Feisha Hu1, Qi Wang1,*, Haijian Shao1,2, Shang Gao1, Hualong Yu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2405-2424, 2023, DOI:10.32604/cmes.2023.026732

    Abstract Unmanned Aerial Vehicles (UAVs) are widely used and meet many demands in military and civilian fields. With the continuous enrichment and extensive expansion of application scenarios, the safety of UAVs is constantly being challenged. To address this challenge, we propose algorithms to detect anomalous data collected from drones to improve drone safety. We deployed a one-class kernel extreme learning machine (OCKELM) to detect anomalies in drone data. By default, OCKELM uses the radial basis (RBF) kernel function as the kernel function of the model. To improve the performance of OCKELM, we choose a Triangular Global Alignment Kernel (TGAK) instead of… More > Graphic Abstract

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

  • Open Access

    ARTICLE

    Numerical Simulation of Low Cycle Fatigue Behavior of Ti2AlNb Alloy Subcomponents

    Yanju Wang1, Zhenyu Zhu2, Aixue Sha1, Wenfeng Hao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2655-2676, 2023, DOI:10.32604/cmes.2023.025749

    Abstract Many titanium alloy subcomponents are subjected to fatigue loading in aerospace engineering, resulting in fatigue failure. The fatigue behavior of Ti2AlNb alloy subcomponents was investigated based on the Seeger fatigue life theory and the improved Lemaitre damage evolution theory. Firstly, the finite element models of the standard openhole specimen and Y-section subcomponents have been established by ABAQUS. The damage model parameters were determined by fatigue tests, and the reliability of fatigue life simulation results of the Ti2AlNb alloy standard open-hole specimen was verified. Meanwhile, the fatigue life of Ti2AlNb alloy Y-section subcomponents was predicted. Under the same initial conditions, the… More >

  • Open Access

    ARTICLE

    Interaction of Foam and Microemulsion Components in Low-Tension-Gas Flooding

    Jing Zhao, Jun Yang*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.7, pp. 1951-1961, 2023, DOI:10.32604/fdmp.2023.026115

    Abstract Low-Tension-Foam (LTF) flooding is an emerging enhanced oil recovery technique for low-permeability carbonate reservoirs. Foam capacity is closely related to the salinity environment (or, equivalently, the phase behavior of the oil/water/surfactant system). Therefore, the interactions between microemulsion and foam components are of primary importance in the LTF process. In this study, the phase behavior of an oil/water/surfactant system under equilibrium is analyzed, firstly by assuming perfect mixing. Meanwhile, the formation kinetics of microemulsion are monitored through a novel low-field NMR technique, which is able to provide quantitative assessment on the microemulsion evolution characteristics. Then, foam stability is examined in the… More >

  • Open Access

    ARTICLE

    Short Term Traffic Flow Prediction Using Hybrid Deep Learning

    Mohandu Anjaneyulu, Mohan Kubendiran*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1641-1656, 2023, DOI:10.32604/cmc.2023.035056

    Abstract Traffic flow prediction in urban areas is essential in the Intelligent Transportation System (ITS). Short Term Traffic Flow (STTF) prediction impacts traffic flow series, where an estimation of the number of vehicles will appear during the next instance of time per hour. Precise STTF is critical in Intelligent Transportation System. Various extinct systems aim for short-term traffic forecasts, ensuring a good precision outcome which was a significant task over the past few years. The main objective of this paper is to propose a new model to predict STTF for every hour of a day. In this paper, we have proposed… More >

  • Open Access

    ARTICLE

    Home Automation-Based Health Assessment Along Gesture Recognition via Inertial Sensors

    Hammad Rustam1, Muhammad Muneeb1, Suliman A. Alsuhibany2, Yazeed Yasin Ghadi3, Tamara Al Shloul4, Ahmad Jalal1, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2331-2346, 2023, DOI:10.32604/cmc.2023.028712

    Abstract Hand gesture recognition (HGR) is used in a numerous applications, including medical health-care, industrial purpose and sports detection. We have developed a real-time hand gesture recognition system using inertial sensors for the smart home application. Developing such a model facilitates the medical health field (elders or disabled ones). Home automation has also been proven to be a tremendous benefit for the elderly and disabled. Residents are admitted to smart homes for comfort, luxury, improved quality of life, and protection against intrusion and burglars. This paper proposes a novel system that uses principal component analysis, linear discrimination analysis feature extraction, and… More >

Displaying 21-30 on page 3 of 182. Per Page