Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (189)
  • Open Access

    ARTICLE

    Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters

    Jin Wang1, Ying Liu1, Shuying Rao1, R. Simon Sherratt2, Jinbin Hu1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3849-3865, 2023, DOI:10.32604/cmc.2023.037150

    Abstract Data security and user privacy have become crucial elements in multi-tenant data centers. Various traffic types in the multi-tenant data center in the cloud environment have their characteristics and requirements. In the data center network (DCN), short and long flows are sensitive to low latency and high throughput, respectively. The traditional security processing approaches, however, neglect these characteristics and requirements. This paper proposes a fine-grained security enhancement mechanism (SEM) to solve the problem of heterogeneous traffic and reduce the traffic completion time (FCT) of short flows while ensuring the security of multi-tenant traffic transmission. Specifically, for short flows in DCN,… More >

  • Open Access

    ARTICLE

    A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing

    Muhammad Usman Sana1,*, Zhanli Li1, Tayybah Kiren2, Hannan Bin Liaqat3, Shahid Naseem3, Atif Saeed4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2741-2757, 2023, DOI:10.32604/cmc.2023.036093

    Abstract Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being deployed. In cloud computation, data processing, storage, and transmission can be done through laptops and mobile devices. Data Storing in cloud facilities is expanding each day and data is the most significant asset of clients. The important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s data. They have to be… More >

  • Open Access

    ARTICLE

    Secure and Efficient Data Transmission Scheme Based on Physical Mechanism

    Ping Zhang1, Haoran Zhu1, Wenjun Li2, Osama Alfarraj3, Amr Tolba3, Gwang-jun Kim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3589-3605, 2023, DOI:10.32604/cmc.2023.032097

    Abstract Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply, which are not suitable for traditional security technology. The security technology based on the physical mechanism has attracted extensive attention. How to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical mechanism. In this paper, superlattice technology is introduced to the security field of Internet of things, and a high-speed symmetric key generation scheme based on superlattice for Internet of things is proposed. In order to ensure the… More >

  • Open Access

    ARTICLE

    Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3387-3404, 2023, DOI:10.32604/iasc.2023.035249

    Abstract With the emergence of cloud technologies, the services of healthcare systems have grown. Simultaneously, machine learning systems have become important tools for developing matured and decision-making computer applications. Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services. However, in some areas, these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease (DKD) while ensuring privacy preservation of the medical data. To address the cloud data privacy problem, we proposed a DKD prediction module in a framework using cloud computing services and a data… More >

  • Open Access

    ARTICLE

    STPGTN–A Multi-Branch Parameters Identification Method Considering Spatial Constraints and Transient Measurement Data

    Shuai Zhang, Liguo Weng*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2635-2654, 2023, DOI:10.32604/cmes.2023.025405

    Abstract Transmission line (TL) Parameter Identification (PI) method plays an essential role in the transmission system. The existing PI methods usually have two limitations: (1) These methods only model for single TL, and can not consider the topology connection of multiple branches for simultaneous identification. (2) Transient bad data is ignored by methods, and the random selection of terminal section data may cause the distortion of PI and have serious consequences. Therefore, a multi-task PI model considering multiple TLs’ spatial constraints and massive electrical section data is proposed in this paper. The Graph Attention Network module is used to draw a… More > Graphic Abstract

    STPGTN–A Multi-Branch Parameters Identification Method Considering Spatial Constraints and Transient Measurement Data

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A hidden message is first included… More >

  • Open Access

    ARTICLE

    Multi-Layer Fog-Cloud Architecture for Optimizing the Placement of IoT Applications in Smart Cities

    Mohammad Aldossary*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 633-649, 2023, DOI:10.32604/cmc.2023.035414

    Abstract In the smart city paradigm, the deployment of Internet of Things (IoT) services and solutions requires extensive communication and computing resources to place and process IoT applications in real time, which consumes a lot of energy and increases operational costs. Usually, IoT applications are placed in the cloud to provide high-quality services and scalable resources. However, the existing cloud-based approach should consider the above constraints to efficiently place and process IoT applications. In this paper, an efficient optimization approach for placing IoT applications in a multi-layer fog-cloud environment is proposed using a mathematical model (Mixed-Integer Linear Programming (MILP)). This approach… More >

  • Open Access

    ARTICLE

    Novel Double-Damped Tuned AC Filters in HVDC Systems

    Rana Shaheer Mehmood1, Asif Hussain1, Usman Ali2, Muhammad Tariq Mahmood3,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1467-1482, 2023, DOI:10.32604/cmc.2023.033280

    Abstract This paper presents a performance analysis of novel double-damped tuned alternating current (AC) filters in high voltage direct current (HVDC) systems. The proposed double-damped tuned AC filters offer the advantages of improved performance of HVDC systems in terms of better power quality, high power factor, and lower total harmonic distortion (THD). The system under analysis consists of an 878 km long HVDC transmission line connecting converter stations at Matiari and Lahore, two major cities in Pakistan. The main focus of this research is to design a novel AC filter using the equivalent impedance method of two single-tuned and double-damped tuned… More >

  • Open Access

    ARTICLE

    Moderating Mechanism in the Relationship between Social Isolation and Mental Health among College Students during High-Risk Period of COVID-19 Transmission in Hubei, China

    Dong Yang1, Chia Ching Tu1, Zhengyan Guo2, Xiao Dai1, Chia Feng Tu3,*

    International Journal of Mental Health Promotion, Vol.25, No.2, pp. 193-206, 2023, DOI:10.32604/ijmhp.2022.022130

    Abstract This study explored the effect of perceived social isolation on the mental health of college students during the high-risk period of COVID-19 transmission in Hubei, China and the role of social support from online friends in alleviating this effect. The questionnaire responses of 213 college students from four universities in Hubei were included. Measurement and structural models were constructed using structural equation modeling. The findings revealed that perceived social isolation while under home quarantine was a negative predictor of the mental health of college students in Hubei. Low social support from online friends may lead to a relatively strong relationship… More >

  • Open Access

    ARTICLE

    Theoretical and Experimental Analysis of Heat Transfer and Condensation in Micro-Ribbed Tubes

    Daoming Shen1,*, Jinhong Xia1, Chao Gui1, Songtao Xue2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1411-1424, 2023, DOI:10.32604/fdmp.2023.024924

    Abstract The thermal transmission coefficient for a micro-ribbed tube has been determined using theoretical relationships and the outcomes of such calculations have been compared with experiments conducted using a R1234yf refrigerant undergoing condensation. In particular four theoretical single-phase flow and three multi-phase flow models have been used in this regard. The experimental results show that: the Oliver et al. criterion equation overestimates the experimental results as its accuracy is significantly affected by the specific conditions realized inside micro-fin tubes; the Miyara et al. criterion equation prediction error is less than 15%; the Cavallini et al. approach gives the highest prediction accuracy;… More >

Displaying 41-50 on page 5 of 189. Per Page