Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    Performance Analysis of a Profile Control Agent for Waste Drilling Fluid Treatment

    Xueyu Zhao*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.7, pp. 1897-1905, 2023, DOI:10.32604/fdmp.2023.025247

    Abstract A method for the treatment of hazardous waste drilling fluids, potentially leading to environmental pollution, is considered. The waste drilling fluid is treated with an inorganic flocculant, an organic flocculant, and a pH regulator. The profile control agent consists of partially hydrolyzed polyacrylamide, formaldehyde, hexamethylenetetramine, resorcinol, phenol, and the treated waste drilling fluid itself. For a waste drilling fluid concentration of 2500 mg/L, the gelling time of the profile control agent is 25 h, and the gelling strength is 32,000 mPa.s. Compared with the profile control agent prepared by recirculated water under the same conditions, the present profile control agent displays better… More >

  • Open Access

    ARTICLE

    Application of the BASNEF Model in Safety Training in Automobile Manufacturing Plants

    Fereydoon Laal1,2, Amir Hossein Khoshakhlagh3, Esmaeil Zarei4,5, Rohollah Fallah Madvari6, Somayeh Farhang Dehghan7,*

    Sound & Vibration, Vol.56, No.4, pp. 297-306, 2022, DOI:10.32604/sv.2022.028255

    Abstract After controls, including engineering and management, the final way to control noise is to use hearing protection devices. Due to the lack of a standardized questionnaire regarding investigating workers’ use of hearing protection devices on the basis of the BASNEF behavioral model, the present study was conducted to investigate the effect of health education based on the BASNEF model on the use of hearing protection devices in workers of an automobile manufacturing plant in Iran. This quasi-experimental and prospective intervention study was performed on 80 workers at an automobile manufacturing plant who are exposed to noise levels above 85 decibels… More >

  • Open Access

    ARTICLE

    PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

    Miaomiao Yang1,2, Guosheng Huang1,2, Junwei Liu3, Yanshuang Gui1,2, Qixu Wang1,2,*, Xingshu Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1879-1898, 2023, DOI:10.32604/cmes.2023.026371

    Abstract With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime’s security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.… More >

  • Open Access

    ARTICLE

    Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT

    Mingshuai Sheng1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2,3, Jing Liu4, Mengxing Huang1,5, Yen-Wei Chen6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 293-309, 2023, DOI:10.32604/cmc.2023.036438

    Abstract Medical images are used as a diagnostic tool, so protecting their confidentiality has long been a topic of study. From this, we propose a Resnet50-DCT-based zero watermarking algorithm for use with medical images. To begin, we use Resnet50, a pre-training network, to draw out the deep features of medical images. Then the deep features are transformed by DCT transform and the perceptual hash function is used to generate the feature vector. The original watermark is chaotic scrambled to get the encrypted watermark, and the watermark information is embedded into the original medical image by XOR operation, and the logical key… More >

  • Open Access

    ARTICLE

    A Dynamic Multi-Attribute Resource Bidding Mechanism with Privacy Protection in Edge Computing

    Shujuan Tian1,2,3, Wenjian Ding1,2,3, Gang Liu4, Yuxia Sun5, Saiqin Long5, Jiang Zhu1,2,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 373-391, 2023, DOI:10.32604/cmc.2023.034770

    Abstract In edge computing, a reasonable edge resource bidding mechanism can enable edge providers and users to obtain benefits in a relatively fair fashion. To maximize such benefits, this paper proposes a dynamic multi-attribute resource bidding mechanism (DMRBM). Most of the previous work mainly relies on a third-party agent to exchange information to gain optimal benefits. It is worth noting that when edge providers and users trade with third-party agents which are not entirely reliable and trustworthy, their sensitive information is prone to be leaked. Moreover, the privacy protection of edge providers and users must be considered in the dynamic pricing/transaction… More >

  • Open Access

    ARTICLE

    A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks

    Yuhang Meng1, Xianyi Chen1,*, Xingming Sun1, Yu Liu1, Guo Wei2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 831-844, 2023, DOI:10.32604/cmc.2023.033700

    Abstract Image processing networks have gained great success in many fields, and thus the issue of copyright protection for image processing networks has become a focus of attention. Model watermarking techniques are widely used in model copyright protection, but there are two challenges: (1) designing universal trigger sample watermarking for different network models is still a challenge; (2) existing methods of copyright protection based on trigger s watermarking are difficult to resist forgery attacks. In this work, we propose a dual model watermarking framework for copyright protection in image processing networks. The trigger sample watermark is embedded in the training process… More >

  • Open Access

    ARTICLE

    Optimization of Anti-Collapse Drilling Fluid Systems with High Potassium Content

    Yu Xia1, Jian Guan4, Yong Gao5, Shanfa Tang1,2,3,*, Jialuo Rong1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1609-1622, 2023, DOI:10.32604/fdmp.2023.025263

    Abstract The ash mudstone in some oil formations is highly water-sensitive. The oil formation is fractured, and the risk of well leakage and collapse is not negligible. This study presents a countermeasure for well collapse prevention, based on a “force-chemistry synergistic balance” approach and the utilization of environmentally friendly and efficient hydration inhibitors. The relevance of this approach is demonstrated considering a drilling fluid system with the high potassium content. The analysis shows that the system can maintain good rheological properties, filtration loss and suspension stability even after aging at 130°C for 16 h. The primary roll recovery of rock chips… More >

  • Open Access

    ARTICLE

    Innovative Hetero-Associative Memory Encoder (HAMTE) for Palmprint Template Protection

    Eslam Hamouda1, Mohamed Ezz1,*, Ayman Mohamed Mostafa1, Murtada K. Elbashir1, Meshrif Alruily1, Mayada Tarek2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 619-636, 2023, DOI:10.32604/csse.2023.035830

    Abstract Many types of research focus on utilizing Palmprint recognition in user identification and authentication. The Palmprint is one of biometric authentication (something you are) invariable during a person’s life and needs careful protection during enrollment into different biometric authentication systems. Accuracy and irreversibility are critical requirements for securing the Palmprint template during enrollment and verification. This paper proposes an innovative HAMTE neural network model that contains Hetero-Associative Memory for Palmprint template translation and projection using matrix multiplication and dot product multiplication. A HAMTE-Siamese network is constructed, which accepts two Palmprint templates and predicts whether these two templates belong to the… More >

  • Open Access

    ARTICLE

    Adversarial Examples Protect Your Privacy on Speech Enhancement System

    Mingyu Dong, Diqun Yan*, Rangding Wang

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1-12, 2023, DOI:10.32604/csse.2023.034568

    Abstract Speech is easily leaked imperceptibly. When people use their phones, the personal voice assistant is constantly listening and waiting to be activated. Private content in speech may be maliciously extracted through automatic speech recognition (ASR) technology by some applications on phone devices. To guarantee that the recognized speech content is accurate, speech enhancement technology is used to denoise the input speech. Speech enhancement technology has developed rapidly along with deep neural networks (DNNs), but adversarial examples can cause DNNs to fail. Considering that the vulnerability of DNN can be used to protect the privacy in speech. In this work, we… More >

  • Open Access

    ARTICLE

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

    Ze Xu, Sanxing Cao*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 861-881, 2023, DOI:10.32604/cmes.2023.025159

    Abstract Multi-Source data plays an important role in the evolution of media convergence. Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data. However, it also faces serious problems in terms of protecting user and data privacy. Many privacy protection methods have been proposed to solve the problem of privacy leakage during the process of data sharing, but they suffer from two flaws: 1) the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain; 2) the inability to solve… More > Graphic Abstract

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

Displaying 31-40 on page 4 of 140. Per Page