Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    Design and Analysis of a Small Sewage Source Heat Pump Triple Supply System

    Chunxue Gao1,*, Yu Hao1, Qiuxin Liu1,2

    Energy Engineering, Vol.118, No.3, pp. 667-678, 2021, DOI:10.32604/EE.2021.014703

    Abstract Based on the characteristics of sewage from beauty salons, a simulation model of a small sewage source heat pump triple supply system that can be applied to such places is established to optimize the operating conditions of the system. The results show that with the increase of sewage temperature and flow, the performance of the system also increases. In summer conditions, the system provides cooling, recovers waste heat and condensed heat from sewage, with a COP value of 8.97; in winter conditions, the system heats and produces hot water, with a COP value of 2.44; in transitional seasons, only hot… More >

  • Open Access

    ARTICLE

    IPv6 Cryptographically Generated Address: Analysis, Optimization and Protection

    Amjed Sid Ahmed1,*, Rosilah Hassan2, Faizan Qamar3, Mazhar Malik1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 247-265, 2021, DOI:10.32604/cmc.2021.014233

    Abstract In networking, one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers. To resolve this issue, the use of self-certifying addresses have become a highly popular and standardized method, of which Cryptographically Generated Addresses (CGA) is a prime example. CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership. Even though the CGA technique is highly effective, this method is still subject to several vulnerabilities with respect to… More >

  • Open Access

    ARTICLE

    Hybrid Multimodal Biometric Template Protection

    Naima Bousnina1, Sanaa Ghouzali2,*, Mounia Mikram1,3, Maryam Lafkih1, Ohoud Nafea4, Muna Al-Razgan2, Wadood Abdul4

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 35-51, 2021, DOI:10.32604/iasc.2021.014694

    Abstract Biometric template disclosure starts gaining an important concern in deploying practical biometric authentication systems, where an assailant compromises the database for illegitimate access. To protect biometric templates from disclosure attacks, biometric authentication systems should meet these four requirements: security, diversity, revocability, and performance. Different methods have been suggested in the literature such as feature transformation techniques and biometric cryptosystems. However, no single method could satisfy the four requirements, giving rise to the deployment of hybrid mechanisms. In this context, the current paper proposes a hybrid system for multimodal biometric template protection to provide robustness against template database attacks. Herein, a… More >

  • Open Access

    ARTICLE

    A Pursuit of Sustainable Privacy Protection in Big Data Environment by an Optimized Clustered-Purpose Based Algorithm

    Norjihan Binti Abdul Ghani1, Muneer Ahmad1, Zahra Mahmoud1, Raja Majid Mehmood2,*

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1217-1231, 2020, DOI:10.32604/iasc.2020.011731

    Abstract Achievement of sustainable privacy preservation is mostly very challenging in a resource shared computer environment. This challenge demands a dedicated focus on the exponential growth of big data. Despite the existence of specific privacy preservation policies at the organizational level, still sustainable protection of a user’s data at various levels, i.e., data collection, utilization, reuse, and disclosure, etc. have not been implemented to its spirit. For every personal data being collected and used, organizations must ensure that they are complying with their defined obligations. We are proposing a new clustered-purpose based access control for users’ sustainable data privacy protection in… More >

  • Open Access

    ARTICLE

    An Analysis of the Operation Mechanism of Chemical Industry Park Ecosystem Based on Theory of Ecological Organization

    Bilin Xu, Mei Han*

    Energy Engineering, Vol.118, No.2, pp. 323-339, 2021, DOI:10.32604/EE.2021.013384

    Abstract Based on the theory of ecological organization, this paper analyzes the operation mechanism of chemical industry park (CIP) ecosystem by means of dynamic simulation. The research shows that the CIP ecosystem is a complex ecological system whose operation mechanism includes two levels, namely individual enterprises and ecosystem. At the level of individual enterprise, there are competition, symbiosis, invasion and other interactions between enterprises in the CIP ecosystem. Through the pre-determined judgment of the competition effect coefficient and the symbiosis effect coefficient, we calculate how the enterprises influence each other, and then generate their respective operation paths, and finally realize the… More >

  • Open Access

    ARTICLE

    Slow Pyrolysis of Sugarcane Bagasse for the Production of Char and the Potential of Its By-Product for Wood Protection

    Febrina Dellarose Boer1,2,3, Jérémy Valette1,2, Jean-Michel Commandré1,2, Mériem Fournier3,4, Marie-France Thévenon1,2,*

    Journal of Renewable Materials, Vol.9, No.1, pp. 97-117, 2021, DOI:10.32604/jrm.2021.013147

    Abstract Sugarcane bagasse was pyrolyzed using a laboratory fixed bed reactor to produce char and its by-product (pyrolysis liquid). The pyrolysis experiments were carried out using different temperatures (400°C and 500°C), heating rate (1 °C/min and 10 °C/min), and holding time (30 min and 60 min). Char was characterized according to its thermal properties, while the pyrolysis liquid was tested for its anti-fungal and anti-termite activities. Pyrolysis temperature and heating rate had a significant influence on the char properties and the yield of char and pyrolysis liquid, where a high-quality char and high yield of pyrolysis liquid can be obtained at… More >

  • Open Access

    ARTICLE

    Efficient Routing Protection Algorithm in Large-Scale Networks

    Haijun Geng1,2,*, Han Zhang3, Yangyang Zhang4

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1733-1744, 2021, DOI:10.32604/cmc.2020.013355

    Abstract With an increasing urgent demand for fast recovery routing mechanisms in large-scale networks, minimizing network disruption caused by network failure has become critical. However, a large number of relevant studies have shown that network failures occur on the Internet inevitably and frequently. The current routing protocols deployed on the Internet adopt the reconvergence mechanism to cope with network failures. During the reconvergence process, the packets may be lost because of inconsistent routing information, which reduces the network’s availability greatly and affects the Internet service provider’s (ISP’s) service quality and reputation seriously. Therefore, improving network availability has become an urgent problem.… More >

  • Open Access

    ARTICLE

    Time-Domain Protection for Transmission Lines Connected to Wind Power Plant based on Model Matching and Hausdorff Distance

    Hongchun Shu1,2, Xiaohan Jiang1,2,*, Pulin Cao2, Na An2, Xincui Tian2, Bo Yang2

    Energy Engineering, Vol.118, No.1, pp. 53-71, 2021, DOI:10.32604/EE.2020.012381

    Abstract The system impedance instability, high-order harmonics, and frequency offset are main fault characteristics of wind power system. Moreover, the measurement angle of faulty phase is affected by rotation speed frequency component, which causes traditional directional protections based on angle comparison between voltage and current to operate incorrectly. In this paper, a time-domain protection for connected to wind power plant based on model matching is proposed, which compares the calculated current and the measured current to identify internal faults and external faults. Under external faults, the calculated current and measured current waveform are quite similar because the protected transmission lines is… More >

  • Open Access

    ARTICLE

    Blockchain Data Privacy Access Control Based on Searchable Attribute Encryption

    Tao Feng1,*, Hongmei Pei1, Rong Ma1, Youliang Tian2, Xiaoqin Feng3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 871-890, 2021, DOI:10.32604/cmc.2020.012146

    Abstract Data privacy is important to the security of our society, and enabling authorized users to query this data efficiently is facing more challenge. Recently, blockchain has gained extensive attention with its prominent characteristics as public, distributed, decentration and chronological characteristics. However, the transaction information on the blockchain is open to all nodes, the transaction information update operation is even more transparent. And the leakage of transaction information will cause huge losses to the transaction party. In response to these problems, this paper combines hierarchical attribute encryption with linear secret sharing, and proposes a blockchain data privacy protection control scheme based… More >

  • Open Access

    ARTICLE

    An Effective Non-Commutative Encryption Approach with Optimized Genetic Algorithm for Ensuring Data Protection in Cloud Computing

    S. Jerald Nirmal Kumar1,*, S. Ravimaran2, M. M. Gowthul Alam3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 671-697, 2020, DOI:10.32604/cmes.2020.09361

    Abstract Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated using Diffie Hellman (DH) to certify secured key generation at reduced time complexity. Moreover, a non-commutative approach is used, which effectively allows the users to store… More >

Displaying 91-100 on page 10 of 140. Per Page