Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (190)
  • Open Access

    ARTICLE

    Design and Development of Composite Plywood that Integrates Fire Resistance, Water Resistance and Wear Resistance

    Xingyu Liang1, Xiaoyu Gu1, Myint Myint Paing Hsu2, Yuhang He1, Rongzhuo Zhang1, Conghui Cai3, Zheng Wang1,*

    Journal of Renewable Materials, Vol.11, No.5, pp. 2333-2344, 2023, DOI:10.32604/jrm.2023.026137

    Abstract In order to improve the fire resistance, water resistance and wear resistance of ordinary plywood products in the wood processing industry, three composite structures of plywood products S1, S2 and S3 were designed in this paper, and a reasonable production process was proposed. Through the physical and mechanical properties and fire resistance testing and technical and economic analysis, the applicability of composite plywood was evaluated. The results of the study showed that the physical mechanics of the three kinds of composite structure plywood met the standard requirements, and their fire resistance was far better than that of ordinary plywood. Among… More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an Aquila Optimizer with Parameter Tuned… More >

  • Open Access

    ARTICLE

    Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things

    Ahmad O. Aseeri1, Sajjad Hussain Chauhdary2,*, Mohammed Saeed Alkatheiri3, Mohammed A. Alqarni4, Yu Zhuang5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1901-1918, 2023, DOI:10.32604/cmc.2023.028777

    Abstract IoT devices rely on authentication mechanisms to render secure message exchange. During data transmission, scalability, data integrity, and processing time have been considered challenging aspects for a system constituted by IoT devices. The application of physical unclonable functions (PUFs) ensures secure data transmission among the internet of things (IoT) devices in a simplified network with an efficient time-stamped agreement. This paper proposes a secure, lightweight, cost-efficient reinforcement machine learning framework (SLCR-MLF) to achieve decentralization and security, thus enabling scalability, data integrity, and optimized processing time in IoT devices. PUF has been integrated into SLCR-MLF to improve the security of the… More >

  • Open Access

    ARTICLE

    An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications

    Qiang Zhi1, Xiang Jiang1, Hangying Zhang2, Zhengshu Zhou3, Jianguo Ren1, Tong Huang4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 389-402, 2023, DOI:10.32604/csse.2023.035576

    Abstract The lightweight encryption algorithm based on Add-Rotation-XOR (ARX) operation has attracted much attention due to its high software affinity and fast operation speed. However, lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm. The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost. This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes. Firstly, we specify a hierarchical security framework by quantitatively… More >

  • Open Access

    ARTICLE

    A Spacecraft Equipment Layout Optimization Method for Diverse and Competitive Design

    Wei Cong, Yong Zhao*, Bingxiao Du*, Senlin Huo, Xianqi Chen

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 621-654, 2023, DOI:10.32604/cmes.2023.025143

    Abstract The spacecraft equipment layout optimization design (SELOD) problems with complicated performance constraints and diversity are studied in this paper. The previous literature uses the gradient-based algorithm to obtain optimized non-overlap layout schemes from randomly initialized cases effectively. However, these local optimal solutions are too difficult to jump out of their current relative geometry relationships, significantly limiting their further improvement in performance indicators. Therefore, considering the geometric diversity of layout schemes is put forward to alleviate this limitation. First, similarity measures, including modified cosine similarity and gaussian kernel function similarity, are introduced into the layout optimization process. Then the optimization produces… More >

  • Open Access

    ARTICLE

    Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach

    Yanqiu Chen, Xiaopeng Ji*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 531-553, 2023, DOI:10.32604/cmes.2023.024531

    Abstract Non-orthogonal multiple access technology (NOMA), as a potentially promising technology in the 5G/B5G era, suffers from ubiquitous security threats due to the broadcast nature of the wireless medium. In this paper, we focus on artificial-signal-assisted and relay-assisted secure downlink transmission schemes against external eavesdropping in the context of physical layer security, respectively. To characterize the non-cooperative confrontation around the secrecy rate between the legitimate communication party and the eavesdropper, their interactions are modeled as a two-person zero-sum game. The existence of the Nash equilibrium of the proposed game models is proved, and the pure strategy Nash equilibrium and mixed-strategy Nash… More >

  • Open Access

    ARTICLE

    A Novel Secure Scan Design Based on Delayed Physical Unclonable Function

    Weizheng Wang1,2, Xingxing Gong1, Xiangqi Wang3, Gwang-jun Kim4,*, Fayez Alqahtani5, Amr Tolba6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6605-6622, 2023, DOI:10.32604/cmc.2023.031617

    Abstract The advanced integrated circuits have been widely used in various situations including the Internet of Things, wireless communication, etc. But its manufacturing process exists unreliability, so cryptographic chips must be rigorously tested. Due to scan testing provides high test coverage, it is applied to the testing of cryptographic integrated circuits. However, while providing good controllability and observability, it also provides attackers with a backdoor to steal keys. In the text, a novel protection scheme is put forward to resist scan-based attacks, in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuse-antifuse structures… More >

  • Open Access

    ARTICLE

    A Study on the Physical Properties of Banana Straw Based on the Discrete Element Method

    Sen Zhang1, Jie Jiang2,3,*, Yuedong Wang4

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.5, pp. 1159-1172, 2023, DOI:10.32604/fdmp.2022.024070

    Abstract To improve the application of discrete element models (DEM) to the design of agricultural crushers, in this study a new highly accurate model is elaborated. The model takes into account the fiber structure, porous nature of the material and the leaf sheath coating structure. Dedicated experimental tests are conducted to determine the required “intrinsic” and basic contact parameters of the considered banana straw materials. A large number of bonding parameters are examined in relation to the particle aggregation model in order to characterize different actual banana straws. Using the particle surface energy contact model, the viscosity characteristics of the crushed… More > Graphic Abstract

    A Study on the Physical Properties of Banana Straw Based on the Discrete Element Method

  • Open Access

    ARTICLE

    Unsteady Heat Transfer in Bilayer, and Three-Layer Materials

    Toufik Sahabi1,*, Smain Balaska2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.4, pp. 977-990, 2023, DOI:10.32604/fdmp.2022.022059

    Abstract The heat transfer equation is used to determine the heat flow by conduction through a composite material along the real axis. An analytical dimensionless analysis is implemented in the framework of a separation of variables method (SVM). This approach leads to an Eigenvalues problem that is solved by the Newton’s method. Two types of dynamics are found: An unsteady condition (in the form of jumps or drops in temperatures depending on the considered case), and a permanent equilibrium (tending to the ambient temperature). The validity and effectiveness of the proposed approach for any number of adjacent layers is also discussed.… More > Graphic Abstract

    Unsteady Heat Transfer in Bilayer, and Three-Layer Materials

  • Open Access

    ARTICLE

    Novel Optimized Feature Selection Using Metaheuristics Applied to Physical Benchmark Datasets

    Doaa Sami Khafaga1, El-Sayed M. El-kenawy2, Fadwa Alrowais1,*, Sunil Kumar3, Abdelhameed Ibrahim4, Abdelaziz A. Abdelhamid5,6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4027-4041, 2023, DOI:10.32604/cmc.2023.033039

    Abstract In data mining and machine learning, feature selection is a critical part of the process of selecting the optimal subset of features based on the target data. There are 2n potential feature subsets for every n features in a dataset, making it difficult to pick the best set of features using standard approaches. Consequently, in this research, a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm (ASSOA) has been proposed. When using metaheuristics to pick features, it is common for the selection of features to vary across runs, which can lead to instability. Because of… More >

Displaying 41-50 on page 5 of 190. Per Page