Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Seed Priming and Foliar Supplementation with β-aminobutyric Acid Alleviates Drought Stress through Mitigation of Oxidative Stress and Enhancement of Antioxidant Defense in Linseed (Linum usitatissimum L.)

    Tauqeer Ahmad Yasir1,2, Muhammad Ateeq1,3, Allah Wasaya1,2,*, Mubshar Hussain2, Naeem Sarwar2, Khuram Mubeen4, Mudassir Aziz4, Muhammad Aamir Iqbal5, Chukwuma C. Ogbaga6, Ibrahim Al-Ashkar7, Md Atikur Rahman8, Ayman El Sabagh9,10,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.11, pp. 3113-3131, 2023, DOI:10.32604/phyton.2023.029502 - 24 October 2023

    Abstract Drought is one of the critical limitations to agricultural soils and crop plants. Scarcity of water is increasing due to climate change that lead to increasing threats to global food security. Therefore, ecofriendly and cost effective strategies are highly desirable for mitigating drought stress along with sustainable and smart agricultural production. The aim of the study was to mitigate DS using seed priming and exogenous supplementation of β-aminobutyric acid (BABA) in linseed (Linum usitatissimum L.). Different doses (0, 50, 100 and 150 µM) of BABA were used for seed priming agent and foliar spraying under three… More >

  • Open Access

    ARTICLE

    A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions

    Oliva Debnath1, Saptarshi Debnath1, Sreyashi Karmakar2, MD Tausif Mallick3, Himadri Nath Saha4,*

    Journal on Internet of Things, Vol.5, pp. 13-43, 2023, DOI:10.32604/jiot.2023.039391 - 22 September 2023

    Abstract The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of… More >

  • Open Access

    PROCEEDINGS

    Evaluation of Blast Mitigation Effects of Cylindrical Explosion Containment Vessels Based on Foam

    Lei Yang1, Guangyan Huang1,2,*, Tao Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.4, pp. 1-2, 2023, DOI:10.32604/icces.2023.09759

    Abstract In order to evaluate the blast mitigation effect of polyurethane foam in cylindrical explosion containment vessels (CECVs), a three-dimensional numerical simulation model was established. The Structured Arbitrary Lagrange-Euler (S-ALE) algorithm was applied in current simulations to define the coupling contact between TNT and Lagrange algorithm. The numerical model was verified by comparing the dynamic deformation and permanent deformation of the experiments. Based on the numerical simulation model after verification, the influence of polyurethane foam filling inside CECVs on the mitigation effect was investigated. The results revealed that compared with the ALE algorithm, the numerical simulations… More >

  • Open Access

    ARTICLE

    Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model

    U. Sakthivelu, C. N. S. Vinoth Kumar*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3691-3707, 2023, DOI:10.32604/iasc.2023.036946 - 15 March 2023

    Abstract The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s livelihood. Several cyber-attacks lead to the compromise of data security. The proposed system offers complete data protection from Advanced Persistent Threat (APT) attacks with attack detection and defence mechanisms. The modified lateral movement detection algorithm detects the APT attacks, while the defence is achieved by the Dynamic Deception system that makes use of the belief update algorithm. Before termination, every cyber-attack undergoes multiple stages, with the most prominent stage being Lateral Movement (LM). The LM uses… More >

  • Open Access

    ARTICLE

    Modelling and Optimization of Clean and Affordable Electricity Solution for Small-Scale Savings and Credit Cooperatives (SACCOs)

    Xiaomei Lin1, Samuel Bimenyimana2,*, Chen Wang2, Godwin Norense Osarumwensa Asemota3,4, Jeanne Paula Ihirwe5, Aphrodis Nduwamungu3, Etienne Ntagwirumugara6, Athanase Gace6, Changfu Yuan7, Yaowen Chen7, Changtai Li8, Shilpi Bora9, YiYi Mo10, Jiyu Lai11, Mabao Wu7, Yong Tang12, Merit M. Huang13

    Energy Engineering, Vol.120, No.4, pp. 791-810, 2023, DOI:10.32604/ee.2023.026746 - 13 February 2023

    Abstract Renewable energy exploitation is among the development strategies set by the government of Rwanda on the roadmap to 2023/2024 universal electricity access and the United Nations plans by 2030. Numerous previous studies on clean energy technologies in Rwanda have mostly focused on households’ usage but there are currently no studies describing the feasibility of clean energy technologies for financial institutions. The skepticism on renewable energy in Africa was previously reported by some personnel. Having realized that most SACCOs (Savings and Credit Co-Operatives) in Rwanda use diesel technology for backup/emergency electricity supply, taking consideration of abundant… More >

  • Open Access

    ARTICLE

    Optimized Model Based Controller with Model Plant Mismatch for NMP Mitigation in Boost Converter

    R. Prasanna1,*, Uma Govindarajan1, N. S. Bhuvaneswari2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1961-1979, 2023, DOI:10.32604/csse.2023.032424 - 09 February 2023

    Abstract In this paper, an optimized Genetic Algorithm (GA) based internal model controller-proportional integral derivative (IMC-PID) controller has been designed for the control variable to output variable transfer function of dc-dc boost converter to mitigate the effect of non-minimum phase (NMP) behavior due to the presence of a right-half plane zero (RHPZ). This RHPZ limits the dynamic performance of the converter and leads to internal instability. The IMC PID is a streamlined counterpart of the standard feedback controller and easily achieves optimal set point and load change performance with a single filter tuning parameter λ. Also, More >

  • Open Access

    ARTICLE

    RMCARTAM For DDoS Attack Mitigation in SDN Using Machine Learning

    M. Revathi, V. V. Ramalingam*, B. Amutha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3023-3036, 2023, DOI:10.32604/csse.2023.033600 - 21 December 2022

    Abstract The impact of a Distributed Denial of Service (DDoS) attack on Software Defined Networks (SDN) is briefly analyzed. Many approaches to detecting DDoS attacks exist, varying on the feature being considered and the method used. Still, the methods have a deficiency in the performance of detecting DDoS attacks and mitigating them. To improve the performance of SDN, an efficient Real-time Multi-Constrained Adaptive Replication and Traffic Approximation Model (RMCARTAM) is sketched in this article. The RMCARTAM considers different parameters or constraints in running different controllers responsible for handling incoming packets. The model is designed with multiple… More >

  • Open Access

    ARTICLE

    NDN Content Poisoning Mitigation Using Bird Swarm Optimization and Trust Value

    S. V. Vijaya Karthik*, J. Arputha Vijaya Selvi

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 833-847, 2023, DOI:10.32604/iasc.2023.025404 - 29 September 2022

    Abstract Information-Centric Networking (ICN) is considered a viable strategy for regulating Internet consumption using the Internet’s underlying architecture. Although Named Data Networking (NDN) and its reference-based implementation, the NDN Forwarding Daemon (NFD), are the most established ICN solutions, their vulnerability to the Content Poisoning Attack (CPA) is regarded as a severe threat that might dramatically impact this architecture. Content Poisoning can significantly minimize the impact of NDN’s universal data caching. Using verification signatures to protect against content poisoning attacks may be impractical due to the associated costs and the volume of messages sent across the network,… More >

  • Open Access

    ARTICLE

    Harmonics Mitigation Using MMC Based UPFC and Particle Swarm Optimization

    C. Gnana Thilaka*, M. Mary Linda

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3429-3445, 2023, DOI:10.32604/iasc.2023.024028 - 17 August 2022

    Abstract The application of non-linear loads in the power electronic device causes serious harmonic issues in the power system since it has the intrinsic property of retrieving harmonic current and reactive power from Alternating Current (AC) supply that leads to voltage instability. To maintain a reliable power flow in the power system, an innovative Unified Power Flow Converter (UPFC) is utilized in this proposed approach. The conventional series converter is replaced with the Modular Multilevel Converter (MMC) that improves the power handling capability and achieves higher modular level with minimized distortions. The shunt compensator assists in… More >

  • Open Access

    ARTICLE

    Cross-Tier Interference Mitigation in 3D HetNets for LTE and Wi-Fi Access

    M. Rekha1,*, M. Bhuvaneswari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1211-1227, 2023, DOI:10.32604/iasc.2023.027368 - 06 June 2022

    Abstract Due to the unprecedented rate of transformation in the field of wireless communication industry, there is a need to prioritise the coverage, network power and throughput as preconditions. In Heterogeneous Networks (HetNets) the low power node inclusion like Femto and Pico cells creates a network of Multi-Tier (M-Tier) which is regarded as the most significant strategy for enhancing the coverage, throughput, 4G Long Term Evolution (LTE) ability. This work mainly focuses on M-Tier 3D Heterogeneous Networks Energy Efficiency (EE) based Carrier Aggregation (CA) scheme for streaming real-time huge data like images. At first, M-Tier 3D… More >

Displaying 21-30 on page 3 of 47. Per Page