Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    A Conditionally Anonymous Linkable Ring Signature for Blockchain Privacy Protection

    Quan Zhou1,*, Yulong Zheng1, Minhui Chen2, Kaijun Wei2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2851-2867, 2023, DOI:10.32604/csse.2023.039908

    Abstract In recent years, the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention. To ensure privacy protection for both sides of the transaction, many researchers are using ring signature technology instead of the original signature technology. However, in practice, identifying the signer of an illegal blockchain transaction once it has been placed on the chain necessitates a signature technique that offers conditional anonymity. Some illegals can conduct illegal transactions and evade the law using ring signatures, which offer perfect anonymity. This paper firstly constructs a conditionally anonymous linkable ring signature using the Diffie-Hellman key… More >

  • Open Access

    ARTICLE

    Fast and Accurate Detection of Masked Faces Using CNNs and LBPs

    Sarah M. Alhammad1, Doaa Sami Khafaga1,*, Aya Y. Hamed2, Osama El-Koumy3, Ehab R. Mohamed3, Khalid M. Hosny3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2939-2952, 2023, DOI:10.32604/csse.2023.041011

    Abstract Face mask detection has several applications, including real-time surveillance, biometrics, etc. Identifying face masks is also helpful for crowd control and ensuring people wear them publicly. With monitoring personnel, it is impossible to ensure that people wear face masks; automated systems are a much superior option for face mask detection and monitoring. This paper introduces a simple and efficient approach for masked face detection. The architecture of the proposed approach is very straightforward; it combines deep learning and local binary patterns to extract features and classify them as masked or unmasked. The proposed system requires hardware with minimal power consumption… More >

  • Open Access

    ARTICLE

    MBE: A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing

    Jianmao Xiao1, Ridong Huang1, Jiangyu Wang1, Zhean Zhong1, Chenyu Liu1, Yuanlong Cao1,*, Chuying Ouyang2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2815-2834, 2023, DOI:10.32604/csse.2023.039716

    Abstract Audio copyright is a crucial issue in the music industry, as it protects the rights and interests of creators and distributors. This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on “blockchain + edge computing mode,” abbreviated as MBE, by integrating edge computing into the Hyperledger Fabric system. MBE framework compresses and splits the audio into small chunks, performs Fast Fourier Transform (FFT) to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information. After being confirmed by various nodes on the Fabric alliance… More >

  • Open Access

    ARTICLE

    Operation Control Method of Relay Protection in Flexible DC Distribution Network Compatible with Distributed Power Supply

    Zihan Qi*

    Energy Engineering, Vol.120, No.11, pp. 2547-2563, 2023, DOI:10.32604/ee.2023.027045

    Abstract A novel operation control method for relay protection in flexible DC distribution networks with distributed power supply is proposed to address the issue of inaccurate fault location during relay protection, leading to poor performance. The method combines a fault-tolerant fault location method based on long-term and short-term memory networks to accurately locate the fault section. Then, an operation control method for relay protection based on adaptive weight and whale optimization algorithm (WOA) is used to construct an objective function considering the shortest relay protection action time and the smallest impulse current. The adaptive weight and WOA are employed to obtain… More >

  • Open Access

    ARTICLE

    Detecting Phishing Using a Multi-Layered Social Engineering Framework

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable

    Journal of Cyber Security, Vol.5, pp. 13-32, 2023, DOI:10.32604/jcs.2023.043359

    Abstract As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A web application system and browser… More >

  • Open Access

    ARTICLE

    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    Raheem Ogla1,*, Eman Shakar Mahmood1, Rasha I. Ahmed1, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3075-3096, 2023, DOI:10.32604/cmc.2023.039818

    Abstract The transmission of video content over a network raises various issues relating to copyright authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a significant issue in the video industry, and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media. However, there are still many unresolved challenges. This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos, which can help prove the credibility of video content by detecting any fake objects inserted by hackers. The… More >

  • Open Access

    ARTICLE

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

    Xiaofang Kang1,*, Jian Wu1, Xinqi Wang1, Shancheng Lei2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 551-593, 2024, DOI:10.32604/cmes.2023.029044

    Abstract In order to improve the seismic performance of adjacent buildings, two types of tuned inerter damper (TID) damping systems for adjacent buildings are proposed, which are composed of springs, inerter devices and dampers in serial or in parallel. The dynamic equations of TID adjacent building damping systems were derived, and the H2 norm criterion was used to optimize and adjust them, so that the system had the optimum damping performance under white noise random excitation. Taking TID frequency ratio and damping ratio as optimization parameters, the optimum analytical solutions of the displacement frequency response of the undamped structure under white… More > Graphic Abstract

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

  • Open Access

    ARTICLE

    A Lightweight ABE Security Protection Scheme in Cloud Environment Based on Attribute Weight

    Lihong Guo*, Jie Yang, Haitao Wu

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1929-1946, 2023, DOI:10.32604/cmc.2023.039170

    Abstract Attribute-based encryption (ABE) is a technique used to encrypt data, it has the flexibility of access control, high security, and resistance to collusion attacks, and especially it is used in cloud security protection. However, a large number of bilinear mappings are used in ABE, and the calculation of bilinear pairing is time-consuming. So there is the problem of low efficiency. On the other hand, the decryption key is not uniquely associated with personal identification information, if the decryption key is maliciously sold, ABE is unable to achieve accountability for the user. In practical applications, shared message requires hierarchical sharing in… More >

  • Open Access

    ARTICLE

    FedNRM: A Federal Personalized News Recommendation Model Achieving User Privacy Protection

    Shoujian Yu1, Zhenchi Jie1, Guowen Wu1, Hong Zhang1, Shigen Shen2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1729-1751, 2023, DOI:10.32604/iasc.2023.039911

    Abstract In recent years, the type and quantity of news are growing rapidly, and it is not easy for users to find the news they are interested in the massive amount of news. A news recommendation system can score and predict the candidate news, and finally recommend the news with high scores to users. However, existing user models usually only consider users’ long-term interests and ignore users’ recent interests, which affects users’ usage experience. Therefore, this paper introduces gated recurrent unit (GRU) sequence network to capture users’ short-term interests and combines users’ short-term interests and long-term interests to characterize users. While… More >

  • Open Access

    ARTICLE

    LONG-TERM ON-ORBIT THERMAL PERFORMANCE OF AEROGEL INSULATION

    Kevin W. Iricka , Sally M. Smithb , Andrew D. Williamsb,* , Derek W. Hengeveldc , Joy M. Steinb

    Frontiers in Heat and Mass Transfer, Vol.12, pp. 1-5, 2019, DOI:10.5098/hmt.12.30

    Abstract This paper provides an analysis of the thermal performance of aerogel insulation used during a long-term International Space Station (ISS) flight experiment aboard Space Test Program – Houston 3 (STP-H3). The Variable emissivity device Aerogel insulation blanket, Dual zone thermal control Experiment suite for Responsive space (VADER) investigation tested a variable emissivity radiator and a new form of multi-layer insulation that used aerogel as the thermal isolator. An effort was made to evaluate the performance of the aerogel insulation over the active flight period. The available flight temperature data shows no evidence of deterioration or change in the aerogel insulation’s… More >

Displaying 11-20 on page 2 of 140. Per Page