Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    Visual Protection Using RC5 Selective Encryption in Telemedicine

    Osama S. Faragallah1,*, Ahmed I. Sallam2, Hala S. El-sayed3

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 177-190, 2022, DOI:10.32604/iasc.2022.019348

    Abstract The dissemination of the COVID-19 viruses now extends the usage of video consultations to share perspectives and virtual medical consultations, save expenses and health procedures, track the success of care proposals with detail, consistency, and ease from moment to time. The research aims to study the security of video consultations. We will also present the advantages and disadvantages of video consultations and the complications of their implementation. This paper mainly proposes a practical, high-efficiency video encoding technique for the new video encoding technique (HEVC) used in video consultations. The technology offered uses the RC5 block encryption algorithm for encrypting the… More >

  • Open Access

    ARTICLE

    Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study

    Sajid Habib Gill1, Mirza Abdur Razzaq1, Muneer Ahmad2, Fahad M. Almansour3, Ikram Ul Haq4, NZ Jhanjhi5,*, Malik Zaib Alam6, Mehedi Masud7

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 117-128, 2022, DOI:10.32604/iasc.2022.016597

    Abstract The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing. Cloud computing is showing remarkable potential to provide flexible, cost-effective, and powerful resources across the internet, and is a driving force in today’s most prominent computing technologies. The cloud offers the means to remotely access and store data while virtual machines access data over a network resource. Furthermore, cloud computing plays a leading role in the fourth industrial revolution. Everyone uses the cloud daily life when accessing Dropbox, various Google services, and Microsoft Office 365. While there are many advantages… More >

  • Open Access

    ARTICLE

    Towards Privacy-Preserving Cloud Storage: A Blockchain Approach

    Jia-Shun Zhang1, Gang Xu2,*, Xiu-Bo Chen1, Haseeb Ahmad3, Xin Liu4, Wen Liu5,6,7

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2903-2916, 2021, DOI:10.32604/cmc.2021.017227

    Abstract With the rapid development of cloud computing technology, cloud services have now become a new business model for information services. The cloud server provides the IT resources required by customers in a self-service manner through the network, realizing business expansion and rapid innovation. However, due to the insufficient protection of data privacy, the problem of data privacy leakage in cloud storage is threatening cloud computing. To address the problem, we propose BC-PECK, a data protection scheme based on blockchain and public key searchable encryption. Firstly, all the data is protected by the encryption algorithm. The privacy data is encrypted and… More >

  • Open Access

    ARTICLE

    Research on the Novel Honeycomb-Like Cabin Based on Computer Simulation

    Yong Wang, Yongyan Wang*, Songmei Li, Nan Qin, Peng Du, Tongtong Zhou

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 179-195, 2021, DOI:10.32604/csse.2021.014469

    Abstract The antiknock capability and thermal protection performance of rescue capsules mainly depend on the structural design of the cabin. By designing a new type of cabin structure, it can resist the impact of explosion shock waves and thermal shocks. In this paper, a new honeycomb-like cabin is proposed; the model has a novel thermal insulation layer design. Then, the antiknock capabilities and thermal protection analysis are carried out by using computer software. The “Autodyn” analysis module in ANSYS Workbench 17.0 has been used to simulate the explosion of TNT with a certain quality in a single room. The pressure map… More >

  • Open Access

    REVIEW

    Effect of Cardioplegia for Myocardial Protection in Pediatric Cardiac Surgery: A Network Meta-Analysis

    Ke Zhou1, Dongyu Li1, Xintong Zhang2, Wensheng Wang1, Shusen Li1, Guang Song2,*

    Congenital Heart Disease, Vol.16, No.6, pp. 609-645, 2021, DOI:10.32604/CHD.2021.016396

    Abstract Cardioplegia has been widely used to reduce myocardial injury during pediatric cardiac surgery; however, which cardioplegia solution has the best protective effect has not been established. Thus, we compared the myocardial protective effects of different cardioplegia solutions used in pediatric cardiac surgery. Seven databases were searched to identify the relevant randomized controlled trials. A network meta-analysis with a Bayesian framework was conducted. The outcomes included the following biochemical and clinical outcomes: serum concentrations of the creatine kinase-myocardial band at 6 h postoperatively; cardiac troponin I (cTnI) at 4, 12, and 24 h postoperatively; spontaneous beating after declamping; postoperative arrhythmias; inotropic… More >

  • Open Access

    ARTICLE

    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the master recovery timer (MRT) for… More >

  • Open Access

    ARTICLE

    Corrosion Protection of 5083 AA in Saline Water by Polyacrylonitrile Nanofibers

    Enas H. Ali, Juman A. Naser*, Zainab W. Ahmed, Taki A. Himdan

    Journal of Renewable Materials, Vol.9, No.11, pp. 1927-1939, 2021, DOI:10.32604/jrm.2021.015624

    Abstract Polymeric nanofibers are a promising technology to protect the metal surfaces from corrosion. Through the literature search, the use of polyacrylonitrile nanofibres (PANNFs) as a corrosion inhibitor coating for aluminum alloys has not been evaluated. This work includes the development of a new, lightweight, high surface area and efficient coating of PANNFs that produced using electrospinning process to resist the corrosion of aluminum alloys (AA5083) which immersed in 0.6 M NaCl at alkaline medium (pH = 12) and acidic medium (pH = 1) at a range of temperatures (293–323) K. The PANNFs coating was successfully deposited on AA 5083 specimens,… More >

  • Open Access

    ARTICLE

    XGBoost Algorithm under Differential Privacy Protection

    Yuanmin Shi1,2, Siran Yin1,2, Ze Chen1,2, Leiming Yan1,2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 9-16, 2021, DOI:10.32604/jihpp.2021.012193

    Abstract Privacy protection is a hot research topic in information security field. An improved XGBoost algorithm is proposed to protect the privacy in classification tasks. By combining with differential privacy protection, the XGBoost can improve the classification accuracy while protecting privacy information. When using CART regression tree to build a single decision tree, noise is added according to Laplace mechanism. Compared with random forest algorithm, this algorithm can reduce computation cost and prevent overfitting to a certain extent. The experimental results show that the proposed algorithm is more effective than other traditional algorithms while protecting the privacy information in training data. More >

  • Open Access

    ARTICLE

    Discrete Element Modelling of Dynamic Behaviour of Rockfills for Resisting High Speed Projectile Penetration

    Tingting Zhao1, Y. T. Feng2,*, Jie Zhang1, Zhihua Wang1, Zhiyong Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.2, pp. 721-735, 2021, DOI:10.32604/cmes.2021.015913

    Abstract This paper presents a convex polyhedral based discrete element method for modelling the dynamic behaviour of rockfills for resisting high speed projectile penetration. The contact between two convex polyhedra is defined by the Minkowski overlap and determined by the GJK and EPA algorithm. The contact force is calculated by a Minkowski overlap based normal model. The rotational motion of polyhedral particles is solved by employing a quaternion based orientation representation scheme. The energy-conserving nature of the polyhedral DEM method ensures a robust and effective modelling of convex particle systems. The method is applied to simulate the dynamic behaviour of a… More >

  • Open Access

    ARTICLE

    Internet of Things: Protection of Medical Data through Decentralized Ledgers

    Abdalla Alameen*

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 593-602, 2021, DOI:10.32604/iasc.2021.016950

    Abstract It is forecasted that billions of Internet of Things (IoT) and sensor devices will be installed worldwide by 2020. These devices can provide infrastructure-based services for various applications such as in smart hospitals, smart industry, smart grids, and smart industrial towns. Among them, the hospital service system needs to authenticate devices, and medical data are recorded for diagnostic purposes. In general, digital signatures are employed, but the computational power and their huge numbers pose many challenges to the digital signature system. To solve such problems, we developed a ledger system for authenticating IoT medical devices. It is a centralized ledger… More >

Displaying 81-90 on page 9 of 140. Per Page