Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access

    ARTICLE

    Intervention Research and Support Systems for People Affected by Cancer and Their Families: Results of a Descriptive Analysis

    Recherche interventionnelle et dispositifs de soutien aux personnes touchées par un cancer et leur entourage : résultats d’une analyse descriptive

    Anne-Fleur Guillemin, Iris Cervenka, Jérôme Foucaud*

    Psycho-Oncologie, Vol.17, No.3, pp. 113-121, 2023, DOI:10.32604/po.2023.045035

    Abstract Population health intervention research (PHIR) was initiated in the field of primary prevention by proposing a research paradigm focusing on intervention and the theory of solutions. The intervention was coconstructed with the stakeholders as part of a global approach until its deployment in the local area. The development of PHIR raises the question of its application to tertiary prevention. This study proposes some initial thoughts on the similarities and specificities of PHIR projects-funded by the French National Cancer Institute (INCa)-of support systems for people affected by cancer and their families, which were based on a descriptive analysis. The selected projects… More >

  • Open Access

    ARTICLE

    Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization

    Youngho Park1, Mi Hyeon Jeon2, Sang Uk Shin3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1871-1890, 2023, DOI:10.32604/cmc.2023.039462

    Abstract These days, data is regarded as a valuable asset in the era of the data economy, which demands a trading platform for buying and selling data. However, online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other. Therefore, in this paper, a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption. The proposed system enables bilateral authorization, where data trading between a seller and a buyer is accomplished only if their policies, required by each other, are… More >

  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy Ciphertext-Policy… More >

  • Open Access

    ARTICLE

    SMINER: Detecting Unrestricted and Misimplemented Behaviors of Software Systems Based on Unit Test Cases

    Kyungmin Sim, Jeong Hyun Yi, Haehyun Cho*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3257-3274, 2023, DOI:10.32604/cmc.2023.036695

    Abstract Despite the advances in automated vulnerability detection approaches, security vulnerabilities caused by design flaws in software systems are continuously appearing in real-world systems. Such security design flaws can bring unrestricted and misimplemented behaviors of a system and can lead to fatal vulnerabilities such as remote code execution or sensitive data leakage. Therefore, it is an essential task to discover unrestricted and misimplemented behaviors of a system. However, it is a daunting task for security experts to discover such vulnerabilities in advance because it is time-consuming and error-prone to analyze the whole code in detail. Also, most of the existing vulnerability… More >

  • Open Access

    ARTICLE

    An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing

    Ratih Hikmah Puspita1, Jehad Ali1,*, Byeong-hee Roh2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4611-4631, 2023, DOI:10.32604/cmc.2023.033598

    Abstract 5G use cases, for example enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and an ultra-reliable low latency communication (URLLC), need a network architecture capable of sustaining stringent latency and bandwidth requirements; thus, it should be extremely flexible and dynamic. Slicing enables service providers to develop various network slice architectures. As users travel from one coverage region to another area, the call must be routed to a slice that meets the same or different expectations. This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks. Rules of thumb which indicates the accuracy… More >

  • Open Access

    ARTICLE

    A Time Pattern-Based Intelligent Cache Optimization Policy on Korea Advanced Research Network

    Waleed Akbar, Afaq Muhammad, Wang-Cheol Song*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3743-3759, 2023, DOI:10.32604/iasc.2023.036440

    Abstract Data is growing quickly due to a significant increase in social media applications. Today, billions of people use an enormous amount of data to access the Internet. The backbone network experiences a substantial load as a result of an increase in users. Users in the same region or company frequently ask for similar material, especially on social media platforms. The subsequent request for the same content can be satisfied from the edge if stored in proximity to the user. Applications that require relatively low latency can use Content Delivery Network (CDN) technology to meet their requirements. An edge and the… More >

  • Open Access

    ARTICLE

    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the… More >

  • Open Access

    ARTICLE

    B-Spline-Based Curve Fitting to Cam Pitch Curve Using Reinforcement Learning

    Zhiwei Lin1, Tianding Chen1,*, Yingtao Jiang2, Hui Wang1, Shuqin Lin1, Ming Zhu2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2145-2164, 2023, DOI:10.32604/iasc.2023.035555

    Abstract Directly applying the B-spline interpolation function to process plate cams in a computer numerical control (CNC) system may produce verbose tool-path codes and unsmooth trajectories. This paper is devoted to addressing the problem of B-spline fitting for cam pitch curves. Considering that the B-spline curve needs to meet the motion law of the follower to approximate the pitch curve, we use the radial error to quantify the effects of the fitting B-spline curve and the pitch curve. The problem thus boils down to solving a difficult global optimization problem to find the numbers and positions of the control points or… More >

  • Open Access

    ARTICLE

    A GDPR Compliant Approach to Assign Risk Levels to Privacy Policies

    Abdullah R. Alshamsan1, Shafique A. Chaudhry1,2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4631-4647, 2023, DOI:10.32604/cmc.2023.034039

    Abstract Data privacy laws require service providers to inform their customers on how user data is gathered, used, protected, and shared. The General Data Protection Regulation (GDPR) is a legal framework that provides guidelines for collecting and processing personal information from individuals. Service providers use privacy policies to outline the ways an organization captures, retains, analyzes, and shares customers’ data with other parties. These policies are complex and written using legal jargon; therefore, users rarely read them before accepting them. There exist a number of approaches to automating the task of summarizing privacy policies and assigning risk levels. Most of the… More >

  • Open Access

    ARTICLE

    An Improved Pairing-Free Ciphertext Policy Framework for IoT

    M. Amirthavalli*, S. Chithra, R. Yugha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3079-3095, 2023, DOI:10.32604/csse.2023.032486

    Abstract Internet of Things (IoT) enables devices to get connected to the internet. Once they are connected, they behave as smart devices thereby releasing sensitive data periodically. There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices. The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block… More >

Displaying 1-10 on page 1 of 44. Per Page