Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (93)
  • Open Access

    ARTICLE

    Research on Variable Condition Properties and Experimental Verification of a Variable Cross-Section Scroll Expander

    Junying Wei1, Guangxian Yin2, Jihao Zhang2, Wenwen Chang2, Chenrui Zhang2, Zhengyi Li1, Long Chang1, Minghan Peng3,*

    Frontiers in Heat and Mass Transfer, Vol.23, No.4, pp. 1185-1201, 2025, DOI:10.32604/fhmt.2025.067244 - 29 August 2025

    Abstract The scroll expander, as the core component of the micro-compressed air energy storage and power generation system, directly affects the output efficiency of the system. Meanwhile, the scroll profile plays a central role in determining the output performance of the scroll expander. In this study, in order to investigate the output characteristics of a variable cross-section scroll expander, numerical simulation and experimental studies were conducted by using Computational Fluid Dynamics (CFD) methods and dynamic mesh techniques. The impact of critical parameters on the output performance of the scroll expander was analyzed through the utilization of… More >

  • Open Access

    ARTICLE

    Semantic Knowledge Based Reinforcement Learning Formalism for Smart Learning Environments

    Taimoor Hassan1, Ibrar Hussain1,*, Hafiz Mahfooz Ul Haque2, Hamid Turab Mirza3, Muhammad Nadeem Ali4, Byung-Seo Kim4,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2071-2094, 2025, DOI:10.32604/cmc.2025.068533 - 29 August 2025

    Abstract Smart learning environments have been considered as vital sources and essential needs in modern digital education systems. With the rapid proliferation of smart and assistive technologies, smart learning processes have become quite convenient, comfortable, and financially affordable. This shift has led to the emergence of pervasive computing environments, where user’s intelligent behavior is supported by smart gadgets; however, it is becoming more challenging due to inconsistent behavior of Artificial intelligence (AI) assistive technologies in terms of networking issues, slow user responses to technologies and limited computational resources. This paper presents a context-aware predictive reasoning based… More >

  • Open Access

    ARTICLE

    Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi

    Ahmed I. Alutaibi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 875-903, 2025, DOI:10.32604/cmc.2025.067078 - 29 August 2025

    Abstract The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes, particularly in Decentralized Finance (DeFi) systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification. This paper proposes a quantum-resilient, blockchain-based identity verification framework designed to address critical challenges in privacy preservation, scalability, and post-quantum security. The proposed model integrates Post-quantum Cryptography (PQC), specifically lattice-based cryptographic primitives, with Decentralized Identifiers (DIDs) and Zero-knowledge Proofs (ZKPs) to ensure verifiability, anonymity, and resistance to quantum attacks. A dual-layer architecture is introduced, comprising an identity layer for credential generation and validation,… More >

  • Open Access

    ARTICLE

    Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification

    Rim Amdouni1,2,*, Mahdi Madani3, Mohamed Ali Hajjaji1,4, El Bay Bourennane3, Mohamed Atri5

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5527-5553, 2025, DOI:10.32604/cmc.2025.065356 - 30 July 2025

    Abstract Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector. In the context of security, this paper proposes a novel encryption algorithm that integrates Blockchain technology, aiming to improve the security and privacy of transmitted data. The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps: The logistic Map, the Tent Map, and the Henon Map used to generate three encryption keys. The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.… More >

  • Open Access

    ARTICLE

    C-BIVM: A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities

    Radhika Kumari1, Kiranbir Kaur1, Ahmad Almogren2, Ayman Altameem3, Salil Bharany4,*, Yazeed Yasin Ghadi5, Ateeq Ur Rehman6,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5509-5525, 2025, DOI:10.32604/cmc.2025.064247 - 30 July 2025

    Abstract The exponential growth of the Internet of Things (IoT) has revolutionized various domains such as healthcare, smart cities, and agriculture, generating vast volumes of data that require secure processing and storage in cloud environments. However, reliance on cloud infrastructure raises critical security challenges, particularly regarding data integrity. While existing cryptographic methods provide robust integrity verification, they impose significant computational and energy overheads on resource-constrained IoT devices, limiting their applicability in large-scale, real-time scenarios. To address these challenges, we propose the Cognitive-Based Integrity Verification Model (C-BIVM), which leverages Belief-Desire-Intention (BDI) cognitive intelligence and algebraic signatures to… More >

  • Open Access

    ARTICLE

    Blockchain-Based Electronic Health Passport for Secure Storage and Sharing of Healthcare Data

    Yogendra P. S. Maravi*, Nishchol Mishra

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5517-5537, 2025, DOI:10.32604/cmc.2025.063964 - 19 May 2025

    Abstract The growing demand for international travel has highlighted the critical need for reliable tools to verify travelers’ healthcare status and meet entry requirements. Personal health passports, while essential, face significant challenges related to data silos, privacy protection, and forgery risks in global sharing. To address these issues, this study proposes a blockchain-based solution designed for the secure storage, sharing, and verification of personal health passports. This innovative approach combines on-chain and off-chain storage, leveraging searchable encryption to enhance data security and optimize blockchain storage efficiency. By reducing the storage burden on the blockchain, the system… More >

  • Open Access

    ARTICLE

    A Secure Storage and Verification Framework Based on Consortium Blockchain for Engineering Education Accreditation Data

    Yuling Luo1,2, Xiaoguang Lin1,2, Junxiu Liu1,2,*, Qiang Fu1,2, Sheng Qin1,2, Zhen Min1,2, Tinghua Hu1,2

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5323-5343, 2025, DOI:10.32604/cmc.2025.063860 - 19 May 2025

    Abstract The majors accredited by the Engineering Education Accreditation (EEA) reflect the accreditation agency’s recognition of the school’s engineering programs. Excellent accreditation management holds significant importance for the advancement of engineering education programs. However, the traditional engineering education system framework suffers from the opacity of raw education data and the difficulty for accreditation bodies to forensically examine the self-assessment reports. To solve these issues, an EEA framework based on Hyperledger Fabric blockchain technology is proposed in this work. Firstly, all relevant stakeholders and information interactions occur within the blockchain network, ensuring the authenticity of educational data More >

  • Open Access

    ARTICLE

    Enhanced Kinship Verification through Ear Images: A Comparative Study of CNNs, Attention Mechanisms, and MLP Mixer Models

    Thien-Tan Cao, Huu-Thanh Duong, Viet-Tuan Le, Hau Nguyen Trung, Vinh Truong Hoang, Kiet Tran-Trung*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4373-4391, 2025, DOI:10.32604/cmc.2025.061583 - 19 May 2025

    Abstract Kinship verification is a key biometric recognition task that determines biological relationships based on physical features. Traditional methods predominantly use facial recognition, leveraging established techniques and extensive datasets. However, recent research has highlighted ear recognition as a promising alternative, offering advantages in robustness against variations in facial expressions, aging, and occlusions. Despite its potential, a significant challenge in ear-based kinship verification is the lack of large-scale datasets necessary for training deep learning models effectively. To address this challenge, we introduce the EarKinshipVN dataset, a novel and extensive collection of ear images designed specifically for kinship… More >

  • Open Access

    ARTICLE

    Life-Cycle Bearing Capacity for Pre-Stressed T-beams Based on Full-Scale Destructive Test

    Yushan Ye1, Tao Gao1, Liankun Wang2, Junjie Ma2, Yingchun Cai2, Heng Liu2,*, Xiaoge Liu2

    Structural Durability & Health Monitoring, Vol.19, No.1, pp. 145-166, 2025, DOI:10.32604/sdhm.2024.053756 - 15 November 2024

    Abstract To investigate the evolution of load-bearing characteristics of pre-stressed beams throughout their service life and to provide a basis for accurately assessing the actual working state of damaged pre-stressed concrete T-beams, destructive tests were conducted on full-scale pre-stressed concrete beams. Based on the measurement and analysis of beam deflection, strain, and crack development under various loading levels during the research tests, combined with the verification coefficient indicators specified in the codes, the verification coefficients of bridges at different stages of damage can be examined. The results indicate that the T-beams experience complete, incomplete linear, and… More >

  • Open Access

    ARTICLE

    Modification and Experimental Verification of the Performance Improvement of Domestic Dehumidifiers

    Xin Qi1,2, Xingtao Shi1, Yingwen Liu1,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.6, pp. 1661-1678, 2024, DOI:10.32604/fhmt.2024.058959 - 19 December 2024

    Abstract After optimizing the compressor design, condenser tube diameter, and tube row arrangement, air supply volumetric flow rate, and refrigerant charge of the domestic dehumidifier. The optimized design schemes were obtained from the original combinations by non-dominated sorting, and the optimized design schemes were experimentally verified under three environmental conditions according to the test method of T/CAS 342-2020 to obtain a complete idea of dehumidifier multi-component improvement. The results show that the dehumidifying capacity of Scheme 5 is slightly increased by 2.5% at 27°C/60% RH, and its energy factor is significantly increased by 24.6%. When the… More >

Displaying 11-20 on page 2 of 93. Per Page