Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure

    Mohammad Hafiz Mohd Yusof1,*, Abdullah Mohd Zin2, Nurhizam Safie Mohd Satar2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2445-2466, 2022, DOI:10.32604/cmc.2022.023571

    Abstract Due to polymorphic nature of malware attack, a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature of malware attacks. On the other hand, state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model. This is unlikely to be the case in production network as the dataset is unstructured and has no label. Hence an unsupervised learning is recommended. Behavioral study is one of the techniques to elicit traffic pattern. However, studies have shown that existing behavioral intrusion detection model had a few issues which had been parameterized into its common… More >

  • Open Access

    ARTICLE

    IoT and Blockchain-Based Mask Surveillance System for COVID-19 Prevention Using Deep Learning

    Wahidur Rahman1, Naif Al Mudawi2,*, Abdulwahab Alazeb2, Muhammad Minoar Hossain1, Saima Siddique Tashfia1, Md. Tarequl Islam1, Shisir Mia1, Mohammad Motiur Rahman1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2033-2053, 2022, DOI:10.32604/cmc.2022.025025

    Abstract On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide. Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate. Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes, and offices needs to be enforced. This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain. The absence or displacement of… More >

  • Open Access

    ARTICLE

    On the Selection of a Composite Material for Two-Wheeler Foot Bracket Failure Prevention through Simulation and Mathematical Modeling

    S. M. Sivagami1, A. Bovas Herbert Bejaxhin2,*, R. Gayathri1, T. Raja Vijay1, K. Punitharani3, P. Keerthi Vasan1, M. Meignanamoorthy4

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.3, pp. 521-536, 2022, DOI:10.32604/fdmp.2022.018752

    Abstract A foot bracket is a metal panel bracket used to mount and support the footrest in two-wheeler systems. It holds the footrest in place while rigidly supporting it. In working conditions, this element has often been observed to fail when specific load-fluctuation conditions are established at its rear end. Appropriate materials therefore need to be identified to overcome such a recurring failure. To address these issues, the present study has been implemented with the specific objective to determine the response of selected Al6061-T6 and Al7075-T6 Hybrid Metal Matrix Composites (HMMC). The results, obtained using the ANSYS Software, show that the… More >

  • Open Access

    ARTICLE

    Secretome-microRNA and anti-proliferative APRO family proteins as cancer prevention and stem cell research strategies

    YUKA IKEDA, NOZOMI NAGASE, AI TSUJI, KURUMI TANIGUCHI, YASUKO KITAGISHI, SATORU MATSUDA*

    BIOCELL, Vol.46, No.5, pp. 1163-1167, 2022, DOI:10.32604/biocell.2022.018177

    Abstract Stemness of cancer cells contains limitless self-renewal proliferation. For the purpose of proliferation, secretome might exert its effects via the paracrine signaling. Specific microRNAs enclosed in the secretome of cancer stem cells could regulate the expression of anti-proliferative APRO family proteins. The biological functions of APRO family proteins seems to be quite intricate, however, which might be a key modulator of microRNAs, then could regulate the proliferation of cancer cells. In addition to affecting proliferation/differentiation during cellular development, APRO family proteins might also play an imperious role on keeping homeostasis in healthy stem cells under a physiological condition. Therefore, relationship… More >

  • Open Access

    ARTICLE

    Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

    Gowdham Chinnaraju*, S. Nithyanandam

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 373-386, 2022, DOI:10.32604/csse.2022.020993

    Abstract Wireless Sensor Networks (WSNs) gained wide attention in the past decade, thanks to its attractive features like flexibility, monitoring capability, and scalability. It overcomes the crucial problems experienced in network management and facilitates the development of diverse network architectures. The existence of dynamic and adaptive routing features facilitate the quick formation of such networks. But flexible architecture also makes it highly vulnerable to different sorts of attacks, for instance, Denial of Service (DoS). Grey Hole Attack (GHA) is the most crucial attack types since it creates a heavy impact upon the components of WSN and eventually degrades the performance of… More >

  • Open Access

    ARTICLE

    Calcium supplementation in colorectal cancer prevention: A systematic meta-analysis of adverse events

    XUE MEI LUO1, SHAHANAVAJ KHAN2,3,4,*, ABDUL MALIK2, FAHAD M. ALDAKHEEL5, ANIS AHMAD CHAUDHARY6, SHOUKI BAZARBASHI7, FATEMEH TABATABAIE8

    BIOCELL, Vol.46, No.3, pp. 759-767, 2022, DOI:10.32604/biocell.2022.016586

    Abstract Despite the multiple systematic reviews and meta-analyses accumulating evidence on the preventive effect of calcium supplementation for colorectal cancer, most of the associated adverse effects are not systematically analyzed. The aim of the study is evaluating adverse events associated with calcium supplementation for colorectal cancer prevention through a systematic meta-analysis. We searched Medline, PubMed Central, EMBASE (Excerpta Medica database), Scopus, Cochrane Central Register of Controlled Trials, and Web of Science published in English from database inception up to 31 July 2019. In the current systematic meta-analysis, we included human studies (including cohort studies, clinical trials, case-control studies) on supplementation of… More >

  • Open Access

    ARTICLE

    Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning

    M. Prabhavathy1,*, S. UmaMaheswari2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 101-114, 2022, DOI:10.32604/iasc.2022.018257

    Abstract Cloud computing utilizes various Internet-based technologies to enhance the Internet user experience. Cloud systems are on the rise, as this technology has completely revolutionized the digital industry. Currently, many users rely on cloud-based solutions to acquire business information and knowledge. As a result, cloud computing services such as SaaS and PaaS store a warehouse of sensitive and valuable information, which has turned the cloud systems into the obvious target for many malware creators and hackers. These malicious attackers attempt to gain illegal access to a myriad of valuable information such as user personal information, password, credit/debit card numbers, etc., from… More >

  • Open Access

    ARTICLE

    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    Mohamed Ali1, Ibrahim A. Abd El-Moghith2, Mohamed N. El-Derini3, Saad M. Darwish2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6127-6140, 2022, DOI:10.32604/cmc.2022.021305

    Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious node attacks. As a consequence… More >

  • Open Access

    ARTICLE

    Efficient Autonomous Defense System Using Machine Learning on Edge Device

    Jaehyuk Cho*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3565-3588, 2022, DOI:10.32604/cmc.2022.020826

    Abstract As a large amount of data needs to be processed and speed needs to be improved, edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm. These changes can lead to new cyber risks, and should therefore be considered for a security threat model. To this end, we constructed an edge system to study security in two directions, hardware and software. First, on the hardware side, we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array (FPGA) which is suitable for edge computing and identifying communication status to… More >

  • Open Access

    ARTICLE

    Real-Time Network Intrusion Prevention System Using Incremental Feature Generation

    Yeongje Uhm1, Wooguil Pak2,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1631-1648, 2022, DOI:10.32604/cmc.2022.019667

    Abstract Security measures are urgently required to mitigate the recent rapid increase in network security attacks. Although methods employing machine learning have been researched and developed to detect various network attacks effectively, these are passive approaches that cannot protect the network from attacks, but detect them after the end of the session. Since such passive approaches cannot provide fundamental security solutions, we propose an active approach that can prevent further damage by detecting and blocking attacks in real time before the session ends. The proposed technology uses a two-level classifier structure: the first-stage classifier supports real-time classification, and the second-stage classifier… More >

Displaying 21-30 on page 3 of 47. Per Page