Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking

    Lulu Cui2,3,*, Yabin Xu1,2,3

    Journal on Big Data, Vol.2, No.2, pp. 53-62, 2020, DOI:10.32604/jbd.2020.010590

    Abstract In order to effectively solve the problem of copyright protection of materials genome engineering data, this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology. First, the important attribute values are selected from the materials genome engineering database; then, use the method of remainder to group the selected attribute values and extract eigenvalues; then, the eigenvalues sequence is obtained by the majority election method; finally, XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center. When a copyright dispute requires copyright authentication… More >

  • Open Access

    ARTICLE

    Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain

    Jieren Cheng1, Jun Li2, *, Naixue Xiong3, Meizhu Chen2, Hao Guo2, Xinzhi Yao2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2247-2262, 2020, DOI:10.32604/cmc.2020.011668

    Abstract Nowadays, as lightweight mobile clients become more powerful and widely used, more and more information is stored on lightweight mobile clients, user sensitive data privacy protection has become an urgent concern and problem to be solved. There has been a corresponding rise of security solutions proposed by researchers, however, the current security mechanisms on lightweight mobile clients are proven to be fragile. Due to the fact that this research field is immature and still unexplored in-depth, with this paper, we aim to provide a structured and comprehensive study on privacy protection using trusted execution environment (TEE) for lightweight mobile clients.… More >

  • Open Access

    ARTICLE

    Cochlear Synaptopathy Following Noise Exposure in Guinea Pigs: Its Electrophysiological and Histological Assessments

    Parvane Mahdi1, Akram Pourbakht1,*, Vahid Pirhajati Mahabadi2, Alireza Karimi Yazdi3, Mahtab Rabbani Anari3, Mohammad Kamali4

    Sound & Vibration, Vol.54, No.3, pp. 163-177, 2020, DOI:10.32604/sv.2020.09880

    Abstract Exposure to high level of noise, may cause the permanent cochlear synaptic degeneration. In present study, a model of noise induced cochlear synaptopathy was established and the electrophysiological and histological metrics for its assessment was designed. 6 guinea pigs were subjected to a synaptopathic noise (octave band of 4 kHz at 104 dB SPL, for 2-h). The amplitude growth curve of Auditory Brainstem Response (ABR) wave-I and wave-III latency shift in presence of noise were calculated. These indexes were considered in pre-exposure, 1 day post exposure (1DPE), 1 week post exposure (1WPE) and 1 month post exposure (1MPE) to noise.… More >

  • Open Access

    ARTICLE

    Construction of an International Digital Sharing Platform of Dongba Manuscripts and Dongba Hieroglyphs

    Xu Xiaoli1,∗, Li Dong1, Jiang Zhanglei1, Li Ning1, Wu Guoxin1, Wang Hongjun1, Zhang Xu2, Bai Feng2

    Computer Systems Science and Engineering, Vol.34, No.4, pp. 191-199, 2019, DOI:10.32604/csse.2019.34.191

    Abstract With the aim of protecting, bequeathing, and sharing globally the Dongba manuscripts of the Chinese Naxi minority, the memory and heritage of which is under threat, this paper proposes ideas and plans for building a digital sharing platform to fulfil this aim using computer technology, information processing, online dissemination, multimedia display and other technologies to build an international digital platform for the sharing of Dongba manuscripts. This platform provides digital resources comprising Dongba manuscripts and related literature, tools for deciphering Dongba manuscripts, an environment for undertaking and sharing research, and dynamic information on the research findings and inheritance. The platform… More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.5, pp. 361-368, 2018, DOI:10.32604/csse.2018.33.361

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >

  • Open Access

    ARTICLE

    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 149-155, 2018, DOI:10.32604/csse.2018.33.149

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >

  • Open Access

    ARTICLE

    Validating the Correct Wearing of Protection Mask by Taking a Selfie: Design of a Mobile Application “CheckYourMask” to Limit the Spread of COVID-19

    Karim Hammoudi1,2,*, Adnane Cabani3, Halim Benhabiles4, Mahmoud Melkemi1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1049-1059, 2020, DOI:10.32604/cmes.2020.011663

    Abstract In a context of a virus that is transmissive by sputtering, wearing masks appear necessary to protect the wearer and to limit the propagation of the disease. Currently, we are facing the 2019–2020 coronavirus pandemic. Coronavirus disease 2019 (COVID-19) is an infectious disease with first symptoms similar to the flu. The symptom of COVID-19 was reported first in China and very quickly spreads to the rest of the world. The COVID-19 contagiousness is known to be high by comparison with the flu. In this paper, we propose a design of a mobile application for permitting everyone having a smartphone and… More >

  • Open Access

    ARTICLE

    Numerical Simulation on Oil Spilling of Submarine Pipeline and Its Evolution on Sea Surface

    Yi Wang*, Mohan Lin

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 885-914, 2020, DOI:10.32604/cmes.2020.09810

    Abstract Due to the interaction and corrosion of the seawater, submarine pipelines are easy to be broken to spill oil. The special environment of subsea restricts the technical development of pipeline maintenance. Therefore, the study on the oil spilling model of submarine pipeline is very important for predicting the movement and diffusion of spilled oil, so that oil spilling traces and relating strategies can be determined. This paper aims to establish an oil spilling model of a submarine pipeline, study the movement characteristics of spilled oil in seawater by numerical simulation, and determine the traces, diffusion range, time to sea surface,… More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, including a mathematical formalization and… More >

  • Open Access

    ARTICLE

    A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX

    Jun Li1, 2, Jieren Cheng2, *, Naixue Xiong3, Lougao Zhan4, Yuan Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 723-741, 2020, DOI:10.32604/cmc.2020.011272

    Abstract Security and privacy issues have become a rapidly growing problem with the fast development of big data in public health. However, big data faces many ongoing serious challenges in the process of collection, storage, and use. Among them, data security and privacy problems have attracted extensive interest. In an effort to overcome this challenge, this article aims to present a distributed privacy preservation approach based on smart contracts and Intel Software Guard Extensions (SGX). First of all, we define SGX as a trusted edge computing node, design data access module, data protection module, and data integrity check module, to achieve… More >

Displaying 101-110 on page 11 of 140. Per Page