Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    B-Spline-Based Curve Fitting to Cam Pitch Curve Using Reinforcement Learning

    Zhiwei Lin1, Tianding Chen1,*, Yingtao Jiang2, Hui Wang1, Shuqin Lin1, Ming Zhu2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2145-2164, 2023, DOI:10.32604/iasc.2023.035555

    Abstract Directly applying the B-spline interpolation function to process plate cams in a computer numerical control (CNC) system may produce verbose tool-path codes and unsmooth trajectories. This paper is devoted to addressing the problem of B-spline fitting for cam pitch curves. Considering that the B-spline curve needs to meet the motion law of the follower to approximate the pitch curve, we use the radial error to quantify the effects of the fitting B-spline curve and the pitch curve. The problem thus boils down to solving a difficult global optimization problem to find the numbers and positions of the control points or… More >

  • Open Access

    ARTICLE

    A GDPR Compliant Approach to Assign Risk Levels to Privacy Policies

    Abdullah R. Alshamsan1, Shafique A. Chaudhry1,2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4631-4647, 2023, DOI:10.32604/cmc.2023.034039

    Abstract Data privacy laws require service providers to inform their customers on how user data is gathered, used, protected, and shared. The General Data Protection Regulation (GDPR) is a legal framework that provides guidelines for collecting and processing personal information from individuals. Service providers use privacy policies to outline the ways an organization captures, retains, analyzes, and shares customers’ data with other parties. These policies are complex and written using legal jargon; therefore, users rarely read them before accepting them. There exist a number of approaches to automating the task of summarizing privacy policies and assigning risk levels. Most of the… More >

  • Open Access

    ARTICLE

    An Improved Pairing-Free Ciphertext Policy Framework for IoT

    M. Amirthavalli*, S. Chithra, R. Yugha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3079-3095, 2023, DOI:10.32604/csse.2023.032486

    Abstract Internet of Things (IoT) enables devices to get connected to the internet. Once they are connected, they behave as smart devices thereby releasing sensitive data periodically. There is a necessity to preserve the confidentiality and integrity of this data during transmission in public communication channels and also permitting only legitimate users to access their data A key challenge of smart networks is to establish a secure end-to-end data communication architecture by addressing the security vulnerabilities of data users and smart devices. The objective of this research work is to create a framework encompassing Ciphertext policy Attribute-based Encryption scheme using block… More >

  • Open Access

    ARTICLE

    Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment

    Pooja Dhiman1, Santosh Kumar Henge1, Sartaj Singh1, Avinash Kaur2, Parminder Singh2,3, Mustapha Hadabou3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3297-3313, 2023, DOI:10.32604/cmc.2023.030558

    Abstract This research paper puts emphasis on using cloud computing with Blockchain (BC) to improve the security and privacy in a cloud. The security of data is not guaranteed as there is always a risk of leakage of users’ data. Blockchain can be used in a multi-tenant cloud environment (MTCE) to improve the security of data, as it is a decentralized approach. Data is saved in unaltered form. Also, Blockchain is not owned by a single organization. The encryption process can be done using a Homomorphic encryption (HE) algorithm along with hashing technique, hereby allowing computations on encrypted data without the… More >

  • Open Access

    ARTICLE

    Energy-Efficient Scheduling Based on Task Migration Policy Using DPM for Homogeneous MPSoCs

    Hamayun Khan1,*, Irfan Ud din2, Arshad Ali3, Sami Alshmrany3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 965-981, 2023, DOI:10.32604/cmc.2023.031223

    Abstract Increasing the life span and efficiency of Multiprocessor System on Chip (MPSoC) by reducing power and energy utilization has become a critical chip design challenge for multiprocessor systems. With the advancement of technology, the performance management of central processing unit (CPU) is changing. Power densities and thermal effects are quickly increasing in multi-core embedded technologies due to shrinking of chip size. When energy consumption reaches a threshold that creates a delay in complementary metal oxide semiconductor (CMOS) circuits and reduces the speed by 10%–15% because excessive on-chip temperature shortens the chip’s life cycle. In this paper, we address the scheduling… More >

  • Open Access

    ARTICLE

    Self-Triggered Consensus Filtering over Asynchronous Communication Sensor Networks

    Huiwen Xue1, Jiwei Wen1,*, Akshya Kumar Swain1, Xiaoli Luan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 857-871, 2023, DOI:10.32604/cmes.2022.020127

    Abstract In this paper, a self-triggered consensus filtering is developed for a class of discrete-time distributed filtering systems. Different from existing event-triggered filtering, the self-triggered one does not require to continuously judge the trigger condition at each sampling instant and can save computational burden while achieving good state estimation. The triggering policy is presented for pre-computing the next execution time for measurements according to the filter’s own data and the latest released data of its neighbors at the current time. However, a challenging problem is that data will be asynchronously transmitted within the filtering network because each node self-triggers independently. Therefore,… More >

  • Open Access

    ARTICLE

    Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3801-3813, 2023, DOI:10.32604/iasc.2023.032267

    Abstract Due to the mobility of users in an organization, inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). By considering this challenge; we focus to present dynamic time and location information in CP-ABE with multi-authorization. At first, along with the set of attributes of the users, their corresponding location is also embedded. Geohash is used to encode the latitude and longitude of the user’s position. Then, decrypt time period and access time period of users are defined using the new time tree (NTT) structure. The NTT sets the encrypted duration of… More >

  • Open Access

    ARTICLE

    Novel Approach to Energy Management via Performance Shaping Factors in Power Plants

    Ahmed Ali Ajmi1,2, Noor Shakir Mahmood1,2, Khairur Rijal Jamaludin1,*, Hayati Habibah Abdul Talib1, Shamsul Sarip1, Hazilah Mad Kaidi1

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5025-5039, 2022, DOI:10.32604/cmc.2022.031239

    Abstract The literature that a lack of integration between the performance shaping factors (PSFs) and the energy management performance (EMP) is one of the critical problems that prevent performance improvement and reduces the power plant’s efficiency. To solve this problem, this article aims to achieve two main objectives: (1) Systematically investigate and identify the critical success factors (CSFs) for integration with PSFs and EMP; (2) Develop a novel modelling approach to predict the performance of power plants based on innovative integrated strategies. The research methodology is grounded on the theoretical and practical approach to improving performance. The Newcastle Ottawa Scale (NOS)… More >

  • Open Access

    ARTICLE

    Distributionally Robust Optimal Dispatch of Virtual Power Plant Based on Moment of Renewable Energy Resource

    Wenlu Ji, Yong Wang*, Xing Deng, Ming Zhang, Ting Ye

    Energy Engineering, Vol.119, No.5, pp. 1967-1983, 2022, DOI:10.32604/ee.2022.020011

    Abstract Virtual power plants can effectively integrate different types of distributed energy resources, which have become a new operation mode with substantial advantages such as high flexibility, adaptability, and economy. This paper proposes a distributionally robust optimal dispatch approach for virtual power plants to determine an optimal day-ahead dispatch under uncertainties of renewable energy sources. The proposed distributionally robust approach characterizes probability distributions of renewable power output by moments. In this regard, the faults of stochastic optimization and traditional robust optimization can be overcome. Firstly, a second-order cone-based ambiguity set that incorporates the first and second moments of renewable power output… More >

  • Open Access

    ARTICLE

    Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography

    K. Saranya*, K. Premalatha

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2029-2042, 2023, DOI:10.32604/iasc.2023.027949

    Abstract Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy. In this background, several authentication and accessibility issues emerge with an intention to protect the sensitive details of the patients over getting published in open domain. To solve this problem, Multi Attribute Case based Privacy Preservation (MACPP) technique is proposed in this study to enhance the security of privacy-preserving data. Private information can be any attribute information which is categorized as sensitive logs in a patient’s records. The semantic relation between transactional patient records and access rights… More >

Displaying 11-20 on page 2 of 47. Per Page