Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (156)
  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks, with a focus on developing… More >

  • Open Access

    ARTICLE

    A Novel Non-Isolated Cubic DC-DC Converter with High Voltage Gain for Renewable Energy Power Generation System

    Qin Yao, Yida Zeng*, Qingui Jia

    Energy Engineering, Vol.121, No.1, pp. 221-241, 2024, DOI:10.32604/ee.2023.041028

    Abstract In recent years, switched inductor (SL) technology, switched capacitor (SC) technology, and switched inductor-capacitor (SL-SC) technology have been widely applied to optimize and improve DC-DC boost converters, which can effectively enhance voltage gain and reduce device stress. To address the issue of low output voltage in current renewable energy power generation systems, this study proposes a novel non-isolated cubic high-gain DC-DC converter based on the traditional quadratic DC-DC boost converter by incorporating a SC and a SL-SC unit. Firstly, the proposed converter’s details are elaborated, including its topology structure, operating mode, voltage gain, device stress, and power loss. Subsequently, a… More >

  • Open Access

    REVIEW

    New perspectives on biology, disease progression, and therapy response of head and neck cancer gained from single cell RNA sequencing and spatial transcriptomics

    GERWIN HELLER1,*, THORSTEN FUEREDER1, ALEXANDER MICHAEL GRANDITS1, ROTRAUD WIESER1,2,*

    Oncology Research, Vol.32, No.1, pp. 1-17, 2024, DOI:10.32604/or.2023.044774

    Abstract Head and neck squamous cell carcinoma (HNSCC) is one of the most frequent cancers worldwide. The main risk factors are consumption of tobacco products and alcohol, as well as infection with human papilloma virus. Approved therapeutic options comprise surgery, radiation, chemotherapy, targeted therapy through epidermal growth factor receptor inhibition, and immunotherapy, but outcome has remained unsatisfactory due to recurrence rates of ~50% and the frequent occurrence of second primaries. The availability of the human genome sequence at the beginning of the millennium heralded the omics era, in which rapid technological progress has advanced our knowledge of the molecular biology of… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of different key performance indicators (KPIs)… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things

    Muhammad Ali Khan1, Rao Naveed Bin Rais2,*, Osman Khalid1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 827-843, 2023, DOI:10.32604/cmc.2023.040756

    Abstract The Internet of Things (IoT) comprises numerous resource-constrained devices that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such as easily spoofed IP and MAC addresses, pose significant security challenges. Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations. Therefore, the Routing Protocol for Low-Power and Lossy Networks (RPL) is widely used in IoT systems. However, the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks, including Sybil attacks. To address these issues, this paper proposes a centralized and collaborative approach for… More >

  • Open Access

    ARTICLE

    Honeypot Game Theory against DoS Attack in UAV Cyber

    Shangting Miao1, Yang Li2,*, Quan Pan2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2745-2762, 2023, DOI:10.32604/cmc.2023.037257

    Abstract A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of service (DoS) attack is a standard network attack method, especially suitable for attacking the UAV cyber. It is a robust security risk for UAV cyber and has recently become an active research area. Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network. In addition, the honeypot, an effective security vulnerability defense mechanism, has not been widely adopted or modeled for defense against DoS attack… More >

  • Open Access

    ARTICLE

    VeriFace: Defending against Adversarial Attacks in Face Verification Systems

    Awny Sayed1, Sohair Kinlany2, Alaa Zaki2, Ahmed Mahfouz2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3151-3166, 2023, DOI:10.32604/cmc.2023.040256

    Abstract Face verification systems are critical in a wide range of applications, such as security systems and biometric authentication. However, these systems are vulnerable to adversarial attacks, which can significantly compromise their accuracy and reliability. Adversarial attacks are designed to deceive the face verification system by adding subtle perturbations to the input images. These perturbations can be imperceptible to the human eye but can cause the system to misclassify or fail to recognize the person in the image. To address this issue, we propose a novel system called VeriFace that comprises two defense mechanisms, adversarial detection, and adversarial removal. The first… More >

  • Open Access

    ARTICLE

    Comparative transcriptome analysis provides insights into the molecular mechanism of the anti-nematode role of Arachis hypogaea (Fabales: Fabaceae) against Meloidogyne incognita (Tylenchida: Heteroderidae)

    XUEJIN YANG1,2,#, YUANYUAN ZHOU1,#, XINYI PENG1, XIAOHONG FU1, JIANQING MA1, JIANFENG LIU1,*, DANDAN CAO1,2,*

    BIOCELL, Vol.47, No.9, pp. 2101-2113, 2023, DOI:10.32604/biocell.2023.029581

    Abstract Background: Plant root-knot nematode (RKN) disease is a serious threat to agricultural production across the world. Meloidogyne incognita is the most prominent pathogen to the vegetables and cash crops cultivated. Arachis hypogaea can effectively inhibit M. incognita, but the underlying defense mechanism is still unclear. Methods: In our study, the chemotaxis and infestation of the second-stage juveniles (J2s) of M. incognita to A. hypogaea root tips were observed by the Pluronic F-127 system and stained with sodium hypochlorite acid fuchsin, respectively. The transcriptome data of A. hypogaea roots with non-infected or infected by J2s were analyzed. Results: The J2s could… More >

  • Open Access

    ARTICLE

    A Stroke-Limitation AMD Control System with Variable Gain and Limited Area for High-Rise Buildings

    Zuo-Hua Li1, Qing-Gui Wu1,*, Jun Teng1,*, Chao-Jun Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 865-884, 2024, DOI:10.32604/cmes.2023.029927

    Abstract Collisions between a moving mass and an anti-collision device increase structural responses and threaten structural safety. An active mass damper (AMD) with stroke limitations is often used to avoid collisions. However, a stroke-limited AMD control system with a fixed limited area shortens the available AMD stroke and leads to significant control power. To solve this problem, the design approach with variable gain and limited area (VGLA) is proposed in this study. First, the boundary of variable-limited areas is calculated based on the real-time status of the moving mass. The variable gain (VG) expression at the variable limited area is deduced… More >

  • Open Access

    ARTICLE

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    Ying Zhang1,*, Weiming Niu2, Leibing Yan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 885-902, 2024, DOI:10.32604/cmes.2023.029234

    Abstract In this paper, we consider mobile edge computing (MEC) networks against proactive eavesdropping. To maximize the transmission rate, IRS assisted UAV communications are applied. We take the joint design of the trajectory of UAV, the transmitting beamforming of users, and the phase shift matrix of IRS. The original problem is strong non-convex and difficult to solve. We first propose two basic modes of the proactive eavesdropper, and obtain the closed-form solution for the boundary conditions of the two modes. Then we transform the original problem into an equivalent one and propose an alternating optimization (AO) based method to obtain a… More >

Displaying 1-10 on page 1 of 156. Per Page