Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (384)
  • Open Access

    REVIEW

    Blockchain Security Threats and Collaborative Defense: A Literature Review

    Xiulai Li1,2,3,4, Jieren Cheng1,3,*, Zhaoxin Shi2,3, Jingxin Liu2,3, Bin Zhang1,3, Xinbing Xu2,3, Xiangyan Tang1,3, Victor S. Sheng5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2597-2629, 2023, DOI:10.32604/cmc.2023.040596

    Abstract As a distributed database, the system security of the blockchain is of great significance to prevent tampering, protect privacy, prevent double spending, and improve credibility. Due to the decentralized and trustless nature of blockchain, the security defense of the blockchain system has become one of the most important measures. This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense, and we first introduce the overview, classification, and threat assessment process of blockchain security threats. Then, we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators… More >

  • Open Access

    ARTICLE

    Research on Multi-Blockchain Electronic Archives Sharing Model

    Fang Yu1, Wenbin Bi2, Ning Cao3,*, Jun Luo4, Diantang An5, Liqiang Ding4, Russell Higgs6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3921-3931, 2023, DOI:10.32604/cmc.2023.028330

    Abstract The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption. Aiming at the problem of dynamic permission management in common access control methods, a new access control method based on smart contract under blockchain is proposed, which improves the intelligence level under blockchain technology. Firstly, the Internet attribute access control model based on smart contract is established. For the dynamic access of heterogeneous devices, the management contract, permission judgment contract and access control contract are designed; Secondly,… More >

  • Open Access

    ARTICLE

    Study on Comprehensive Efficiency Evaluation of Rural Power Grid under Rural Revitalization Strategy Considering Regional Differences

    Huiru Zhao1, Manyu Yao1,*, Zhenqi Bai1, Yue Zhang2, Zhihua Ding3, Zhenda Hu4

    Energy Engineering, Vol.120, No.10, pp. 2211-2231, 2023, DOI:10.32604/ee.2023.029371

    Abstract As an essential infrastructure, the rural power grid is vital in promoting agricultural and rural carbon sequestration and improving rural energy electrification. It is necessary to carry out in-depth research on its comprehensive efficiency. Based on the requirements of “double carbon” and rural revitalization strategy for the rural Power Grid, this paper focuses on the modernization and low-carbon transformation of the rural Power Grid. It constructs an input-output index system for the investment efficiency of the rural Power Grid in China under the new situation. It uses the primary data of the rural Power Grid of 30 prefecture-level cities in… More >

  • Open Access

    ARTICLE

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

    Xiaofang Kang1,*, Jian Wu1, Xinqi Wang1, Shancheng Lei2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 551-593, 2024, DOI:10.32604/cmes.2023.029044

    Abstract In order to improve the seismic performance of adjacent buildings, two types of tuned inerter damper (TID) damping systems for adjacent buildings are proposed, which are composed of springs, inerter devices and dampers in serial or in parallel. The dynamic equations of TID adjacent building damping systems were derived, and the H2 norm criterion was used to optimize and adjust them, so that the system had the optimum damping performance under white noise random excitation. Taking TID frequency ratio and damping ratio as optimization parameters, the optimum analytical solutions of the displacement frequency response of the undamped structure under white… More > Graphic Abstract

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

  • Open Access

    ARTICLE

    Evaluation of the Air Leakage Flowrate in Sintering Processes

    Jin Cai1, Xiangwei Kong1,*, Mingzhu Yu1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.11, pp. 2791-2812, 2023, DOI:10.32604/fdmp.2023.029692

    Abstract Iron ore sintering is a pre-treatment technology by which ore fines are converted into porous and permeable sinters, which are the used in blast furnaces. This process can be adversely affected by air leakage phenomena of various types. As experimental measurements are relatively difficult and often scarcely reliable, here a theoretical model based on typical fluid-dynamic concepts and relationships is elaborated. Through the analysis of two extreme cases, namely, those in which leakage is due to a small hole or a full rupture, a generalized hole-bed model is introduced, which for the first time also includes a complete bed permeability… More > Graphic Abstract

    Evaluation of the Air Leakage Flowrate in Sintering Processes

  • Open Access

    ARTICLE

    Evaluation of Pre-Harvest Sprouting (PHS) Resistance and Screening of High-Quality Varieties from Thirty-Seven Quinoa (Chenopodium quinoa Willd.) Resources in Chengdu Plain

    Xin Pan, Ya Gao, Fang Zeng, Chunmei Zheng, Wenxuan Ge, Yan Wan, Yanxia Sun, Xiaoyong Wu*

    Phyton-International Journal of Experimental Botany, Vol.92, No.10, pp. 2921-2936, 2023, DOI:10.32604/phyton.2023.029853

    Abstract Pre-harvest sprouting (PHS) will have a serious effect both on the yield and quality of quinoa (Chenopodium quinoa Willd.). It is crucial to select and breed quinoa varieties with PHS resistance and excellent agronomic traits for guidance production and utilization of quinoa. A comprehensive evaluation of the PHS resistance and agronomic traits of 37 species of quinoa resources was conducted in Chengdu Plain. The evaluation used various methods, including grain germination rate (GR), grain germination index (GI), total spike germination rate (SR), total grain germination index (SI), grey correlation analysis (GCA), cluster analysis and correlation analysis. Results showed significant differences… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Three-Dimensional UWB Real-Time Locating Auto-Positioning System for Fire Rescue

    Hang Yang1,2,3,*, Xunbo Li1, Witold Pedrycz2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3039-3058, 2023, DOI:10.32604/iasc.2023.040412

    Abstract Fire rescue challenges and solutions have evolved from straightforward plane rescue to encompass 3D space due to the rise of high-rise city buildings. Hence, this study facilitates a system with quick and simplified on-site launching and generates real-time location data, enabling fire rescuers to arrive at the intended spot faster and correctly for effective and precise rescue. Auto-positioning with step-by-step instructions is proposed when launching the locating system, while no extra measuring instrument like Total Station (TS) is needed. Real-time location tracking is provided via a 3D space real-time locating system (RTLS) constructed using Ultra-wide Bandwidth technology (UWB), which requires… More >

  • Open Access

    ARTICLE

    An Overview of Seismic Risk Management for Italian Architectural Heritage

    Lucio Nobile*

    Structural Durability & Health Monitoring, Vol.17, No.5, pp. 353-368, 2023, DOI:10.32604/sdhm.2023.028247

    Abstract The frequent occurrence of seismic events in Italy poses a strategic problem that involves either the culture of preservation of historical heritage or the civil protection action aimed to reduce the risk to people and goods (buildings, bridges, dams, slopes, etc.). Most of the Italian architectural heritage is vulnerable to earthquakes, identifying the vulnerability as the inherent predisposition of the masonry building to suffer damage and collapse during an earthquake. In fact, the structural concept prevailing in these ancient masonry buildings is aimed at ensuring prevalent resistance to vertical gravity loads. Rarely do these ancient masonry structures offer relevant resistance… More >

  • Open Access

    PROCEEDINGS

    Evaluation of Blast Mitigation Effects of Cylindrical Explosion Containment Vessels Based on Foam

    Lei Yang1, Guangyan Huang1,2,*, Tao Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.4, pp. 1-2, 2023, DOI:10.32604/icces.2023.09759

    Abstract In order to evaluate the blast mitigation effect of polyurethane foam in cylindrical explosion containment vessels (CECVs), a three-dimensional numerical simulation model was established. The Structured Arbitrary Lagrange-Euler (S-ALE) algorithm was applied in current simulations to define the coupling contact between TNT and Lagrange algorithm. The numerical model was verified by comparing the dynamic deformation and permanent deformation of the experiments. Based on the numerical simulation model after verification, the influence of polyurethane foam filling inside CECVs on the mitigation effect was investigated. The results revealed that compared with the ALE algorithm, the numerical simulations based on the S-ALE algorithm… More >

  • Open Access

    ARTICLE

    MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

    Yi Qing1, Xiangyu Liu2, Yanhui Du2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2095-2119, 2023, DOI:10.32604/cmc.2023.039980

    Abstract Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT… More >

Displaying 31-40 on page 4 of 384. Per Page