Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (194)
  • Open Access

    ARTICLE

    Performance Analysis of a Profile Control Agent for Waste Drilling Fluid Treatment

    Xueyu Zhao*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.7, pp. 1897-1905, 2023, DOI:10.32604/fdmp.2023.025247 - 08 March 2023

    Abstract A method for the treatment of hazardous waste drilling fluids, potentially leading to environmental pollution, is considered. The waste drilling fluid is treated with an inorganic flocculant, an organic flocculant, and a pH regulator. The profile control agent consists of partially hydrolyzed polyacrylamide, formaldehyde, hexamethylenetetramine, resorcinol, phenol, and the treated waste drilling fluid itself. For a waste drilling fluid concentration of 2500 mg/L, the gelling time of the profile control agent is 25 h, and the gelling strength is 32,000 mPa.s. Compared with the profile control agent prepared by recirculated water under the same conditions, the present More >

  • Open Access

    ARTICLE

    PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context

    Miaomiao Yang1,2, Guosheng Huang1,2, Junwei Liu3, Yanshuang Gui1,2, Qixu Wang1,2,*, Xingshu Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1879-1898, 2023, DOI:10.32604/cmes.2023.026371 - 06 February 2023

    Abstract With the advantages of lightweight and high resource utilization, cloud-native technology with containers as the core is gradually becoming the mainstream technical architecture for information infrastructure. However, malware attacks such as Doki and Symbiote threaten the container runtime’s security. Malware initiates various types of runtime anomalies based on process form (e.g., modifying the process of a container, and opening the external ports). Fortunately, dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime. Nevertheless, the current routine dynamic monitoring mechanisms for baseline data protection are still… More >

  • Open Access

    ARTICLE

    Zero Watermarking Algorithm for Medical Image Based on Resnet50-DCT

    Mingshuai Sheng1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2,3, Jing Liu4, Mengxing Huang1,5, Yen-Wei Chen6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 293-309, 2023, DOI:10.32604/cmc.2023.036438 - 06 February 2023

    Abstract Medical images are used as a diagnostic tool, so protecting their confidentiality has long been a topic of study. From this, we propose a Resnet50-DCT-based zero watermarking algorithm for use with medical images. To begin, we use Resnet50, a pre-training network, to draw out the deep features of medical images. Then the deep features are transformed by DCT transform and the perceptual hash function is used to generate the feature vector. The original watermark is chaotic scrambled to get the encrypted watermark, and the watermark information is embedded into the original medical image by XOR… More >

  • Open Access

    ARTICLE

    A Dynamic Multi-Attribute Resource Bidding Mechanism with Privacy Protection in Edge Computing

    Shujuan Tian1,2,3, Wenjian Ding1,2,3, Gang Liu4, Yuxia Sun5, Saiqin Long5, Jiang Zhu1,2,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 373-391, 2023, DOI:10.32604/cmc.2023.034770 - 06 February 2023

    Abstract In edge computing, a reasonable edge resource bidding mechanism can enable edge providers and users to obtain benefits in a relatively fair fashion. To maximize such benefits, this paper proposes a dynamic multi-attribute resource bidding mechanism (DMRBM). Most of the previous work mainly relies on a third-party agent to exchange information to gain optimal benefits. It is worth noting that when edge providers and users trade with third-party agents which are not entirely reliable and trustworthy, their sensitive information is prone to be leaked. Moreover, the privacy protection of edge providers and users must be… More >

  • Open Access

    ARTICLE

    A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks

    Yuhang Meng1, Xianyi Chen1,*, Xingming Sun1, Yu Liu1, Guo Wei2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 831-844, 2023, DOI:10.32604/cmc.2023.033700 - 06 February 2023

    Abstract Image processing networks have gained great success in many fields, and thus the issue of copyright protection for image processing networks has become a focus of attention. Model watermarking techniques are widely used in model copyright protection, but there are two challenges: (1) designing universal trigger sample watermarking for different network models is still a challenge; (2) existing methods of copyright protection based on trigger s watermarking are difficult to resist forgery attacks. In this work, we propose a dual model watermarking framework for copyright protection in image processing networks. The trigger sample watermark is… More >

  • Open Access

    ARTICLE

    Optimization of Anti-Collapse Drilling Fluid Systems with High Potassium Content

    Yu Xia1, Jian Guan4, Yong Gao5, Shanfa Tang1,2,3,*, Jialuo Rong1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1609-1622, 2023, DOI:10.32604/fdmp.2023.025263 - 30 January 2023

    Abstract The ash mudstone in some oil formations is highly water-sensitive. The oil formation is fractured, and the risk of well leakage and collapse is not negligible. This study presents a countermeasure for well collapse prevention, based on a “force-chemistry synergistic balance” approach and the utilization of environmentally friendly and efficient hydration inhibitors. The relevance of this approach is demonstrated considering a drilling fluid system with the high potassium content. The analysis shows that the system can maintain good rheological properties, filtration loss and suspension stability even after aging at 130°C for 16 h. The primary More >

  • Open Access

    ARTICLE

    Innovative Hetero-Associative Memory Encoder (HAMTE) for Palmprint Template Protection

    Eslam Hamouda1, Mohamed Ezz1,*, Ayman Mohamed Mostafa1, Murtada K. Elbashir1, Meshrif Alruily1, Mayada Tarek2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 619-636, 2023, DOI:10.32604/csse.2023.035830 - 20 January 2023

    Abstract Many types of research focus on utilizing Palmprint recognition in user identification and authentication. The Palmprint is one of biometric authentication (something you are) invariable during a person’s life and needs careful protection during enrollment into different biometric authentication systems. Accuracy and irreversibility are critical requirements for securing the Palmprint template during enrollment and verification. This paper proposes an innovative HAMTE neural network model that contains Hetero-Associative Memory for Palmprint template translation and projection using matrix multiplication and dot product multiplication. A HAMTE-Siamese network is constructed, which accepts two Palmprint templates and predicts whether these… More >

  • Open Access

    ARTICLE

    Adversarial Examples Protect Your Privacy on Speech Enhancement System

    Mingyu Dong, Diqun Yan*, Rangding Wang

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1-12, 2023, DOI:10.32604/csse.2023.034568 - 20 January 2023

    Abstract Speech is easily leaked imperceptibly. When people use their phones, the personal voice assistant is constantly listening and waiting to be activated. Private content in speech may be maliciously extracted through automatic speech recognition (ASR) technology by some applications on phone devices. To guarantee that the recognized speech content is accurate, speech enhancement technology is used to denoise the input speech. Speech enhancement technology has developed rapidly along with deep neural networks (DNNs), but adversarial examples can cause DNNs to fail. Considering that the vulnerability of DNN can be used to protect the privacy in… More >

  • Open Access

    ARTICLE

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

    Ze Xu, Sanxing Cao*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 861-881, 2023, DOI:10.32604/cmes.2023.025159 - 05 January 2023

    Abstract Multi-Source data plays an important role in the evolution of media convergence. Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data. However, it also faces serious problems in terms of protecting user and data privacy. Many privacy protection methods have been proposed to solve the problem of privacy leakage during the process of data sharing, but they suffer from two flaws: 1) the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;… More > Graphic Abstract

    Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain

  • Open Access

    ARTICLE

    A Double-Ended Protection Principle for an LCC-VSC-MTDC System with Strong Anti-Interference Ability

    Chuanjian Wu, Dahai Zhang*, Jinghan He

    Energy Engineering, Vol.120, No.2, pp. 299-316, 2023, DOI:10.32604/ee.2023.023532 - 29 November 2022

    Abstract The DC grid technology of multi-power supply and multi-drop-point power reception is an effective solution for large-scale renewable energy integration into the power grid. Line-commutated converter-Voltage source converter (LCC-VSC) power grids are one of the more important developmental directions of the future power grid that have occured in recent years. But the multi-terminal high voltage direct current system has the problems of inconsistent boundary characteristics, inconsistent control, and fault response characteristics, which puts higher requirements on the protection scheme. Thus, a completely new protection principle is proposed in this paper. Firstly, the fault characteristics of… More >

Displaying 81-90 on page 9 of 194. Per Page