Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    Sec-Auditor: A Blockchain-Based Data Auditing Solution for Ensuring Integrity and Semantic Correctness

    Guodong Han, Hecheng Li*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2121-2137, 2024, DOI:10.32604/cmc.2024.053077 - 15 August 2024

    Abstract Currently, there is a growing trend among users to store their data in the cloud. However, the cloud is vulnerable to persistent data corruption risks arising from equipment failures and hacker attacks. Additionally, when users perform file operations, the semantic integrity of the data can be compromised. Ensuring both data integrity and semantic correctness has become a critical issue that requires attention. We introduce a pioneering solution called Sec-Auditor, the first of its kind with the ability to verify data integrity and semantic correctness simultaneously, while maintaining a constant communication cost independent of the audited… More >

  • Open Access

    ARTICLE

    Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives

    Maher Alharby*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2449-2463, 2024, DOI:10.32604/cmc.2024.050425 - 15 May 2024

    Abstract Cloud computing has emerged as a viable alternative to traditional computing infrastructures, offering various benefits. However, the adoption of cloud storage poses significant risks to data secrecy and integrity. This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology, smart contracts, and cryptographic primitives. The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data. To preserve data secrecy, symmetric encryption systems are employed to encrypt user data before outsourcing it. An extensive More >

  • Open Access

    ARTICLE

    A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

    Fauziyah1, Zhaoshun Wang1,*, Mujahid Tabassum2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4417-4452, 2024, DOI:10.32604/cmc.2024.046797 - 26 March 2024

    Abstract In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method… More >

  • Open Access

    ARTICLE

    Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity

    Abdulwahab Alazeb*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2995-3014, 2023, DOI:10.32604/cmc.2023.043173 - 26 December 2023

    Abstract Data protection in databases is critical for any organization, as unauthorized access or manipulation can have severe negative consequences. Intrusion detection systems are essential for keeping databases secure. Advancements in technology will lead to significant changes in the medical field, improving healthcare services through real-time information sharing. However, reliability and consistency still need to be solved. Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption. Disruptions to data items can propagate throughout the database, making it crucial to reverse fraudulent transactions without delay, especially in… More >

  • Open Access

    ARTICLE

    Low-Strain Damage Imaging Detection Experiment for Model Pile Integrity Based on HHT

    Ziyang Jiang1, Ziping Wang1,*, Kan Feng1, Yang Zhang2, Rahim Gorgin1

    Structural Durability & Health Monitoring, Vol.17, No.6, pp. 557-569, 2023, DOI:10.32604/sdhm.2023.042393 - 17 November 2023

    Abstract With the advancement of computer and mathematical techniques, significant progress has been made in the 3D modeling of foundation piles. Existing methods include the 3D semi-analytical model for non-destructive low-strain integrity assessment of large-diameter thin-walled pipe piles and the 3D soil-pile dynamic interaction model. However, these methods have complex analysis procedures and substantial limitations. This paper introduces an innovative and streamlined 3D imaging technique tailored for the detection of pile damage. The approach harnesses the power of an eight-channel ring array transducer to capture internal reflection signals within foundation piles. The acquired signals are subsequently… More >

  • Open Access

    ARTICLE

    Security Test Case Prioritization through Ant Colony Optimization Algorithm

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Mohd Waris Khan4,*, Mohd Faizan4, Alka Agrawal5, Dhirendra Pandey5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3165-3195, 2023, DOI:10.32604/csse.2023.040259 - 09 November 2023

    Abstract Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems. One of the challenges in software security testing is test case prioritization, which aims to reduce redundancy in fault occurrences when executing test suites. By effectively applying test case prioritization, both the time and cost required for developing secure software can be reduced. This paper proposes a test case prioritization technique based on the Ant Colony Optimization (ACO) algorithm, a metaheuristic approach. The performance of the ACO-based technique is evaluated using More >

  • Open Access

    ARTICLE

    Intrusion Detection in 5G Cellular Network Using Machine Learning

    Ishtiaque Mahmood1, Tahir Alyas2, Sagheer Abbas3, Tariq Shahzad4, Qaiser Abbas5,6, Khmaies Ouahada7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2439-2453, 2023, DOI:10.32604/csse.2023.033842 - 28 July 2023

    Abstract Attacks on fully integrated servers, apps, and communication networks via the Internet of Things (IoT) are growing exponentially. Sensitive devices’ effectiveness harms end users, increases cyber threats and identity theft, raises costs, and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods. Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security. Following the 1, 2, 3, and 4G cellular networks, the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as… More >

  • Open Access

    ARTICLE

    A Three-Dimensional Model for the Formation Pressure in Wellbores under Uncertainty

    Jiawei Zhang*, Qing Wang, Hongchun Huang, Haige Wang, Guodong Ji, Meng Cui, Hongyuan Zhang

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.9, pp. 2305-2314, 2023, DOI:10.32604/fdmp.2023.026304 - 16 May 2023

    Abstract Formation pressure is the key parameter for the analysis of wellbore safety. With increasing drilling depth, however, the behavior of this variable becomes increasingly complex. In this work, a 3D model of the formation pressure under uncertainty is presented. Moreover a relevant algorithm is elaborated. First, the logging data of regional key drilling wells are collected and a one-dimensional formation pressure profile along the well depth is determined. Then, a 3D model of regional formation pressure of the hierarchical group layer is defined by using the Kriging interpolation algorithm relying on a support vector machine… More >

  • Open Access

    ARTICLE

    Calcitriol induces post-thawed bovine sperm capacitation

    ANA CECILIA LIAUDAT, FRANCISCA EBEL, BIANCA ANA OPIZZO, MARINA AURORA GONZALEZ, DAMIÁN BLOIS, PABLO BOSCH#, NANCY RODRIGUEZ#,*

    BIOCELL, Vol.47, No.5, pp. 1135-1143, 2023, DOI:10.32604/biocell.2023.027628 - 10 April 2023

    Abstract Background: Capacitation is a set of physiological changes sperms undergo to acquire fertilizing capacity. In vivo, this process is directly associated with high calcium levels in sperm cytoplasm. Calcitriol, the vitamin D hypercalcemic metabolite, is related to human sperm motility, capacitation, and acrosome reaction. This work aimed to study the effect of calcitriol on bull sperm quality parameters and capacitation. Methods: One million freeze-thawed spermatozoa were obtained from different bulls and treated with 20 nM of calcitriol for 30 min. Untreated cells (negative control) and treated ones with calcitriol or heparin (100 µg/mL, positive capacitation control) were… More >

  • Open Access

    ARTICLE

    Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3387-3404, 2023, DOI:10.32604/iasc.2023.035249 - 15 March 2023

    Abstract With the emergence of cloud technologies, the services of healthcare systems have grown. Simultaneously, machine learning systems have become important tools for developing matured and decision-making computer applications. Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services. However, in some areas, these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease (DKD) while ensuring privacy preservation of the medical data. To address the cloud data privacy problem, we proposed a DKD prediction module in a framework using cloud… More >

Displaying 1-10 on page 1 of 56. Per Page