Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    Identity-Based Edge Computing Anonymous Authentication Protocol

    Naixin Kang1, Zhenhu Ning1,*, Shiqiang Zhang1, Sadaqat ur Rehman2, Muhammad Waqas1,3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3931-3943, 2023, DOI:10.32604/cmc.2023.029711

    Abstract With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based… More >

  • Open Access

    ARTICLE

    B Class Floral Homeotic Genes are Involved in the Petal Identity and Flower Meristem Determinations in Chrysanthemum morifolium

    Jiayou Liu, Lian Ding, Xue Zhang, Song Li, Yunxiao Guan, Diwen Jia, Aiping Song, Jiafu Jiang, Fadi Chen*

    Phyton-International Journal of Experimental Botany, Vol.92, No.2, pp. 311-331, 2023, DOI:10.32604/phyton.2022.023896

    Abstract Chrysanthemum morifolium, an ornamental crop with diverse forms of inflorescence, is a good model for studying flower development in Asteraceae. However, the genetic background is complex and the mechanisms of regulating flower development are still unclear. Here, we identified two natural mutant lines of chrysanthemum and named them M1 and M2 according to the severity of the phenotype. Both lines showed defects in petal identity, and the petals of the M1 line had a mild phenotype: partially loss of petal identity and conversion of petals into green, leaf-like organs. The M2 line had severe phenotypes: in addition to severe petal… More >

  • Open Access

    ARTICLE

    A Novel Fusion System Based on Iris and Ear Biometrics for E-exams

    S. A. Shaban*, Hosnia M. M. Ahmed, D. L. Elsheweikh

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3295-3315, 2023, DOI:10.32604/iasc.2023.030237

    Abstract With the rapid spread of the coronavirus epidemic all over the world, educational and other institutions are heading towards digitization. In the era of digitization, identifying educational e-platform users using ear and iris based multimodal biometric systems constitutes an urgent and interesting research topic to preserve enterprise security, particularly with wearing a face mask as a precaution against the new coronavirus epidemic. This study proposes a multimodal system based on ear and iris biometrics at the feature fusion level to identify students in electronic examinations (E-exams) during the COVID-19 pandemic. The proposed system comprises four steps. The first step is… More >

  • Open Access

    ARTICLE

    Partial Bell Polynomials, Falling and Rising Factorials, Stirling Numbers, and Combinatorial Identities

    Siqintuya Jin1, Bai-Ni Guo2,*, Feng Qi3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 781-799, 2022, DOI:10.32604/cmes.2022.019941

    Abstract In the paper, the authors collect, discuss, and find out several connections, equivalences, closed-form formulas, and combinatorial identities concerning partial Bell polynomials, falling factorials, rising factorials, extended binomial coefficients, and the Stirling numbers of the first and second kinds. These results are new, interesting, important, useful, and applicable in combinatorial number theory. More >

  • Open Access

    ARTICLE

    College Students’ Academic Stressors on Mental Health during the COVID-19 Pandemic: A Comparison between Graduating Students and Non-Graduating Students

    Jiaqi Yang1, Yanwen Zhang2, Peng Li2,3,4, Huan Zhang2,3,4, Tour Liu2,3,4,*

    International Journal of Mental Health Promotion, Vol.24, No.4, pp. 603-618, 2022, DOI:10.32604/ijmhp.2022.019406

    Abstract The study aimed to investigate the influence of academic stressors on mental health and the mediating effect of social support and self-identity among college students and further studied the difference between the graduating students and non-graduating students during the COVID-19 Pandemic. Recruiting 900 college students as subjects, used the college students’ academic stressors questionnaire, social support questionnaire, self-identity scale and depression anxiety stress scales (DASS-21). The results showed that: (1) The college students’ academic stressor positively predicted mental health; (2) Social support and self-identity mediated the relationship; (3) The model also held when academic stressors was replaced by work stressor,… More >

  • Open Access

    ARTICLE

    Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

    A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1693-1706, 2022, DOI:10.32604/iasc.2022.024714

    Abstract In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based technology is used in… More >

  • Open Access

    ARTICLE

    FPGA Implementation of 5G NR Primary and Secondary Synchronization

    Aytha Ramesh Kumar1,*, K. Lal Kishore2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1585-1600, 2022, DOI:10.32604/cmc.2022.021573

    Abstract The 5G communication systems are widely established for high-speed data processing to meet users demands. The 5G New Radio (NR) communications comprise a network of ultra-low latency, high processing speeds, high throughput and rapid synchronization with a time frame of 10 ms. Synchronization between User Equipment (UE) and 5G base station known as gNB is a fundamental procedure in a cellular system and it is performed by a synchronization signal. In 5G NR system, Primary Synchronization Signal (PSS) and Secondary Synchronization Signal (SSS) are used to detect the best serving base station with the help of a cell search procedure.… More >

  • Open Access

    ARTICLE

    Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing

    Amjad Alsirhani, Mohamed Ezz, Ayman Mohamed Mostafa*

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 967-984, 2022, DOI:10.32604/csse.2022.024854

    Abstract Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Security by Revocable KUNodes-Storage with Identity-Based Encryption

    S. Saravanakumar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 985-996, 2022, DOI:10.32604/csse.2022.019508

    Abstract Cloud storage is a service involving cloud service providers providing storage space to customers. Cloud storage services have numerous advantages, including convenience, high computation, and capacity, thereby attracting users to outsource data in the cloud. However, users outsource data directly via cloud stage services that are unsafe when outsourcing data is sensitive for users. Therefore, cipher text-policy attribute-based encryption is a promising cryptographic solution in a cloud environment, and can be drawn up for access control by data owners (DO) to define access policy. Unfortunately, an outsourced architecture applied with attribute-based encryption introduces numerous challenges, including revocation. This issue is… More >

  • Open Access

    ARTICLE

    Unidirectional Identity-Based Proxy Re-Signature with Key Insulation in EHR Sharing System

    Yanan Chen1,2,3,4, Ting Yao1,4,*, Haiping Ren2, Zehao Gan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1497-1513, 2022, DOI:10.32604/cmes.2022.019589

    Abstract The introduction of the electronic medical record (EHR) sharing system has made a great contribution to the management and sharing of healthcare data. Considering referral treatment for patients, the original signature needs to be converted into a re-signature that can be verified by the new organization. Proxy re-signature (PRS) can be applied to this scenario so that authenticity and nonrepudiation can still be insured for data. Unfortunately, the existing PRS schemes cannot realize forward and backward security. Therefore, this paper proposes the first PRS scheme that can provide key-insulated property, which can guarantee both the forward and backward security of… More >

Displaying 11-20 on page 2 of 51. Per Page