Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (54)
  • Open Access


    A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

    Fauziyah1, Zhaoshun Wang1,*, Mujahid Tabassum2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4417-4452, 2024, DOI:10.32604/cmc.2024.046797

    Abstract In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning… More >

  • Open Access


    Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity

    Abdulwahab Alazeb*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2995-3014, 2023, DOI:10.32604/cmc.2023.043173

    Abstract Data protection in databases is critical for any organization, as unauthorized access or manipulation can have severe negative consequences. Intrusion detection systems are essential for keeping databases secure. Advancements in technology will lead to significant changes in the medical field, improving healthcare services through real-time information sharing. However, reliability and consistency still need to be solved. Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption. Disruptions to data items can propagate throughout the database, making it crucial to reverse fraudulent transactions without delay, especially in the healthcare industry, where real-time… More >

  • Open Access


    Low-Strain Damage Imaging Detection Experiment for Model Pile Integrity Based on HHT

    Ziyang Jiang1, Ziping Wang1,*, Kan Feng1, Yang Zhang2, Rahim Gorgin1

    Structural Durability & Health Monitoring, Vol.17, No.6, pp. 557-569, 2023, DOI:10.32604/sdhm.2023.042393

    Abstract With the advancement of computer and mathematical techniques, significant progress has been made in the 3D modeling of foundation piles. Existing methods include the 3D semi-analytical model for non-destructive low-strain integrity assessment of large-diameter thin-walled pipe piles and the 3D soil-pile dynamic interaction model. However, these methods have complex analysis procedures and substantial limitations. This paper introduces an innovative and streamlined 3D imaging technique tailored for the detection of pile damage. The approach harnesses the power of an eight-channel ring array transducer to capture internal reflection signals within foundation piles. The acquired signals are subsequently processed using the Hilbert-Huang Transform… More >

  • Open Access


    Security Test Case Prioritization through Ant Colony Optimization Algorithm

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Mohd Waris Khan4,*, Mohd Faizan4, Alka Agrawal5, Dhirendra Pandey5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3165-3195, 2023, DOI:10.32604/csse.2023.040259

    Abstract Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems. One of the challenges in software security testing is test case prioritization, which aims to reduce redundancy in fault occurrences when executing test suites. By effectively applying test case prioritization, both the time and cost required for developing secure software can be reduced. This paper proposes a test case prioritization technique based on the Ant Colony Optimization (ACO) algorithm, a metaheuristic approach. The performance of the ACO-based technique is evaluated using the Average Percentage of Fault… More >

  • Open Access


    Intrusion Detection in 5G Cellular Network Using Machine Learning

    Ishtiaque Mahmood1, Tahir Alyas2, Sagheer Abbas3, Tariq Shahzad4, Qaiser Abbas5,6, Khmaies Ouahada7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2439-2453, 2023, DOI:10.32604/csse.2023.033842

    Abstract Attacks on fully integrated servers, apps, and communication networks via the Internet of Things (IoT) are growing exponentially. Sensitive devices’ effectiveness harms end users, increases cyber threats and identity theft, raises costs, and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods. Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security. Following the 1, 2, 3, and 4G cellular networks, the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as the global advancement of cellular… More >

  • Open Access


    A Three-Dimensional Model for the Formation Pressure in Wellbores under Uncertainty

    Jiawei Zhang*, Qing Wang, Hongchun Huang, Haige Wang, Guodong Ji, Meng Cui, Hongyuan Zhang

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.9, pp. 2305-2314, 2023, DOI:10.32604/fdmp.2023.026304

    Abstract Formation pressure is the key parameter for the analysis of wellbore safety. With increasing drilling depth, however, the behavior of this variable becomes increasingly complex. In this work, a 3D model of the formation pressure under uncertainty is presented. Moreover a relevant algorithm is elaborated. First, the logging data of regional key drilling wells are collected and a one-dimensional formation pressure profile along the well depth is determined. Then, a 3D model of regional formation pressure of the hierarchical group layer is defined by using the Kriging interpolation algorithm relying on a support vector machine (SVM) and the formation pressure… More >

  • Open Access


    Calcitriol induces post-thawed bovine sperm capacitation


    BIOCELL, Vol.47, No.5, pp. 1135-1143, 2023, DOI:10.32604/biocell.2023.027628

    Abstract Background: Capacitation is a set of physiological changes sperms undergo to acquire fertilizing capacity. In vivo, this process is directly associated with high calcium levels in sperm cytoplasm. Calcitriol, the vitamin D hypercalcemic metabolite, is related to human sperm motility, capacitation, and acrosome reaction. This work aimed to study the effect of calcitriol on bull sperm quality parameters and capacitation. Methods: One million freeze-thawed spermatozoa were obtained from different bulls and treated with 20 nM of calcitriol for 30 min. Untreated cells (negative control) and treated ones with calcitriol or heparin (100 µg/mL, positive capacitation control) were evaluated for motility,… More >

  • Open Access


    Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3387-3404, 2023, DOI:10.32604/iasc.2023.035249

    Abstract With the emergence of cloud technologies, the services of healthcare systems have grown. Simultaneously, machine learning systems have become important tools for developing matured and decision-making computer applications. Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services. However, in some areas, these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease (DKD) while ensuring privacy preservation of the medical data. To address the cloud data privacy problem, we proposed a DKD prediction module in a framework using cloud computing services and a data… More >

  • Open Access


    PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

    Miaomiao Yang1,2, Guosheng Huang1,2, Junwei Liu3, Yanshuang Gui1,2, Qixu Wang1,2,*, Xingshu Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1879-1898, 2023, DOI:10.32604/cmes.2023.026371

    Abstract With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime’s security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.… More >

  • Open Access


    Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

    A. Ramachandran1,*, P. Ramadevi2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2055-2070, 2023, DOI:10.32604/iasc.2023.032942

    Abstract Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly convenient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentication process. Blockchain technology is utilized in this study to enable… More >

Displaying 1-10 on page 1 of 54. Per Page