Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (54)
  • Open Access

    ARTICLE

    An Investigation into the Effects of Oil-Well Cement Expansion Agent on the Integrity of Cement Sheath

    Chunqin Tan1, Shenglai Guo2,3,*, Juanjuan Huang4

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.5, pp. 1291-1300, 2023, DOI:10.32604/fdmp.2022.022233

    Abstract Generally, the so-called expansion agent is very effective in eliminating all the micro-annuli that exist between the casing and the cement sheath or between the cement sheath and the formation. However, this approach can detrimentally affect the sealing ability of cement sheath if the expansion agent is used in an unreasonable way. For these reasons, in the present work, numerical simulations have been conducted to analyze the effect of elasticity modulus of cement sheath, the elasticity modulus of formation, the expansion rate of cement, the geo-stress on the micro-annulus caused by cement expansion, and the cement sheath expansion on the… More >

  • Open Access

    ARTICLE

    Integrity and Failure Analysis of Cement Sheath Subjected to Coalbed Methane Fracturing

    Lingyun Zhao1,2, Heng Yang3,4,*, Yuanlong Wei1,2,*, Yuhuan Bu3,4, Shaorui Jing3,4, Peiming Zhou1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 329-344, 2023, DOI:10.32604/fdmp.2022.020216

    Abstract Perforation and fracturing are typically associated with the development of coalbed methane wells. As the cement sheath is prone to failure during this process, in this work, the effects of the casing pressure, elastic modulus of the cement, elastic modulus of the formation, and casing eccentricity on the resulting stresses are analyzed in the frame of a finite element method. Subsequently, sensitivity response curves of the cement sheath stress are plotted by normalizing all factors. The results show that the maximum circumferential stress and Mises stress of the cement sheath increase with the casing internal pressure, elastic modulus of the… More > Graphic Abstract

    Integrity and Failure Analysis of Cement Sheath Subjected to Coalbed Methane Fracturing

  • Open Access

    ARTICLE

    Blockchain-Based Privacy-Preserving Public Auditing for Group Shared Data

    Yining Qi1,2,*, Yubo Luo3, Yongfeng Huang1,2, Xing Li1,2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2603-2618, 2023, DOI:10.32604/iasc.2023.030191

    Abstract Cloud storage has been widely used to team work or cooperation development. Data owners set up groups, generating and uploading their data to cloud storage, while other users in the groups download and make use of it, which is called group data sharing. As all kinds of cloud service, data group sharing also suffers from hardware/software failures and human errors. Provable Data Possession (PDP) schemes are proposed to check the integrity of data stored in cloud without downloading. However, there are still some unmet needs lying in auditing group shared data. Researchers propose four issues necessary for a secure group… More >

  • Open Access

    ARTICLE

    Blockchain-based Privacy-Preserving Group Data Auditing with Secure User Revocation

    Yining Qi1,2,*, Yubo Luo3, Yongfeng Huang1,2, Xing Li1,2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 183-199, 2023, DOI:10.32604/csse.2023.031030

    Abstract Progress in cloud computing makes group data sharing in outsourced storage a reality. People join in group and share data with each other, making team work more convenient. This new application scenario also faces data security threats, even more complex. When a user quit its group, remaining data block signatures must be re-signed to ensure security. Some researchers noticed this problem and proposed a few works to relieve computing overhead on user side. However, considering the privacy and security need of group auditing, there still lacks a comprehensive solution to implement secure group user revocation, supporting identity privacy preserving and… More >

  • Open Access

    ARTICLE

    Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography

    K. Saranya*, K. Premalatha

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2029-2042, 2023, DOI:10.32604/iasc.2023.027949

    Abstract Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy. In this background, several authentication and accessibility issues emerge with an intention to protect the sensitive details of the patients over getting published in open domain. To solve this problem, Multi Attribute Case based Privacy Preservation (MACPP) technique is proposed in this study to enhance the security of privacy-preserving data. Private information can be any attribute information which is categorized as sensitive logs in a patient’s records. The semantic relation between transactional patient records and access rights… More >

  • Open Access

    VIEWPOINT

    Osteocyte pericellular and perilacunar matrices as markers of bone–implant mechanical integrity

    RéMY GAUTHIER1,*, HéLèNE FOLLET2, ANA-MARIA TRUNFIO-SFARGHIU3, DELPHINE FARLAY2, NINA ATTIK4,5, SYLVAIN MEILLE1, JéRôME CHEVALIER1, DAVID MITTON6

    BIOCELL, Vol.46, No.10, pp. 2209-2216, 2022, DOI:10.32604/biocell.2022.022290

    Abstract To develop durable bone healing strategies through improved control of bone repair, it is of critical importance to understand the mechanisms of bone mechanical integrity when in contact with biomaterials and implants. Bone mechanical integrity is defined here as the adaptation of structural properties of remodeled bone in regard to an applied mechanical loading. Accordingly, the authors present why future investigations in bone repair and regeneration should emphasize on the matrix surrounding the osteocytes. Osteocytes are mechanosensitive cells considered as the orchestrators of bone remodeling, which is the biological process involved in bone homeostasis. These bone cells are trapped in… More >

  • Open Access

    ARTICLE

    Consensus Mechanism of Blockchain Based on PoR with Data Deduplication

    Wei Zhou1, Hao Wang2, Ghulam Mohiuddin3, Dan Chen4,*, Yongjun Ren1

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1473-1488, 2022, DOI:10.32604/iasc.2022.029657

    Abstract As the basis of cloud computing, distributed storage technology mainly studies how data centers store, organize and manage data. Blockchain has become the most secure solution for cloud storage due to its decentralization and immutability. Consensus mechanism is one of the core technologies of blockchain, which affects the transaction processing capability, security and scalability of blockchain. The current mainstream consensus algorithms such as Proof of Work, Proof of Stake, and Delegated Proof of Stake all have the problem of wasting resources. And with the explosive growth of data, cloud storage nodes store a large amount of redundant data, which inevitably… More >

  • Open Access

    ARTICLE

    Integrity Assurance Method of Multi-Keyword Query for Encrypted Outsourced Data

    Ling Wang1, Shan Ji2, Zhaokang Wang3, Xiaowan Wang4,*, Ghulam Mohiuddin5, Yongjun Ren1

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 221-234, 2022, DOI:10.32604/iasc.2022.027536

    Abstract As the data scale exceeds the petabyte level, more and more users outsource their local databases to third-party service providers to save local storage costs and avoid cumbersome local data management. However, because third-party service providers are not fully trusted, they may leak outsourced data and bring security risks to the personal privacy of data users. The service provider may also return incorrect or incomplete query results to the data user. Therefore, in this paper, we propose a Lightweight and Verifiable Multi-keyword Query Scheme for the integrity verification of multi-keyword query of outsourced data. This scheme supports multi-keyword query integrity… More >

  • Open Access

    ARTICLE

    Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts

    Tarig Mohamed Ahmed*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3849-3862, 2022, DOI:10.32604/cmc.2022.025582

    Abstract Mobile Agent has many benefits over traditional distributed systems such as reducing latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security problems. This paper focuses on mobile agent protection against malicious hosts. A new security mechanism called Checkpoints has been proposed. Checkpoint Mechanism (CPM) aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks. CPM assumes using a free-roaming mobility mechanism by Mobile agent systems. The main idea behind CPM is to generate multiple versions of Mobile Agent. The multiple version is used to recover Mobile Agent from Capturing and… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the “patch and… More >

Displaying 11-20 on page 2 of 54. Per Page