Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    Vulnerability Analysis of MEGA Encryption Mechanism

    Qingbing Ji1,2,*, Zhihong Rao1,2, Lvlin Ni2, Wei Zhao2, Jing Fu3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 817-829, 2022, DOI:10.32604/cmc.2022.026949

    Abstract MEGA is an end-to-end encrypted cloud storage platform controlled by users. Moreover, the communication between MEGA client and server is carried out under the protection of Transport Layer Security (TLS) encryption, it is difficult to intercept the key data packets in the process of MEGA registration, login, file data upload, and download. These characteristics of MEGA have brought great difficulties to its forensics. This paper presents a method to attack MEGA to provide an effective method for MEGA’s forensics. By debugging the open-source code of MEGA and analyzing the security white paper published, this paper first clarifies the encryption mechanism… More >

  • Open Access

    ARTICLE

    CNTFET Based Grounded Active Inductor for Broadband Applications

    Muhammad I. Masud1,2,*, Nasir Shaikh-Husin2, Iqbal A. Khan1, Abu K. Bin A’Ain2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2135-2149, 2022, DOI:10.32604/cmc.2022.026831

    Abstract A new carbon nanotube field effect transistor (CNTFET) based grounded active inductor (GAI) circuit is presented in this work. The suggested GAI offers a tunable inductance with a very wide inductive bandwidth, high quality factor (QF) and low power dissipation. The tunability of the realized circuit is achieved through CNTFET based varactor. The proposed topology shows inductive behavior in the frequency range of 0.1–101 GHz and achieves to a maximum QF of 9125. The GAI operates at 0.7 V with 0.337 mW of power consumption. To demonstrate the performance of GAI, a broadband low noise amplifier (LNA) circuit is designed by utilizing… More >

  • Open Access

    ARTICLE

    Autonomous Unmanned Aerial Vehicles Based Decision Support System for Weed Management

    Ashit Kumar Dutta1,*, Yasser Albagory2, Abdul Rahaman Wahab Sait3, Ismail Mohamed Keshta1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 899-915, 2022, DOI:10.32604/cmc.2022.026783

    Abstract Recently, autonomous systems become a hot research topic among industrialists and academicians due to their applicability in different domains such as healthcare, agriculture, industrial automation, etc. Among the interesting applications of autonomous systems, their applicability in agricultural sector becomes significant. Autonomous unmanned aerial vehicles (UAVs) can be used for suitable site-specific weed management (SSWM) to improve crop productivity. In spite of substantial advancements in UAV based data collection systems, automated weed detection still remains a tedious task owing to the high resemblance of weeds to the crops. The recently developed deep learning (DL) models have exhibited effective performance in several… More >

  • Open Access

    ARTICLE

    Impact of Accumulated Temperature on Wetland Vegetation Area in Poyang Lake

    Xin Yao1, Junyu Zhu1, Hong Zeng2, Wenzheng Yu1,*, Hanxiaoya Zhang3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1915-1926, 2022, DOI:10.32604/cmc.2022.026777

    Abstract Accumulated temperature, which is now widely used in agronomy, is an important ecological factor to the growth of plants, but few relative studies have been found on the vegetation area of floodplain grasslands in Poyang Lake. This research used the classification and regression tree (CART) to classify normalized vegetation area index derived from MODIS LAI (Moderate Resolution Imaging Spectroradiometer Leaf Area Index) images from 2008 to 2014, according to different climate indexes, such as mean daily air temperature (n), accumulated temperature (jw), daily maximum temperature (g), daily minimum temperature (d), accumulative precipitation (j), water level (s) and average water level… More >

  • Open Access

    ARTICLE

    A TMA-Seq2seq Network for Multi-Factor Time Series Sea Surface Temperature Prediction

    Qi He1, Wenlong Li1, Zengzhou Hao2, Guohua Liu3, Dongmei Huang1, Wei Song1,*, Huifang Xu4, Fayez Alqahtani5, Jeong-Uk Kim6

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 51-67, 2022, DOI:10.32604/cmc.2022.026771

    Abstract Sea surface temperature (SST) is closely related to global climate change, ocean ecosystem, and ocean disaster. Accurate prediction of SST is an urgent and challenging task. With a vast amount of ocean monitoring data are continually collected, data-driven methods for SST time-series prediction show promising results. However, they are limited by neglecting complex interactions between SST and other ocean environmental factors, such as air temperature and wind speed. This paper uses multi-factor time series SST data to propose a sequence-to-sequence network with two-module attention (TMA-Seq2seq) for long-term time series SST prediction. Specifically, TMA-Seq2seq is an LSTM-based encoder-decoder architecture facilitated by… More >

  • Open Access

    ARTICLE

    Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search

    Hyun Sook Rhee*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 69-85, 2022, DOI:10.32604/cmc.2022.026751

    Abstract As the use of cloud storage for various services increases, the amount of private personal information along with data stored in the cloud storage is also increasing. To remotely use the data stored on the cloud storage, the data to be stored needs to be encrypted for this reason. Since “searchable encryption” is enable to search on the encrypted data without any decryption, it is one of convenient solutions for secure data management. A public key encryption with keyword search (for short, PEKS) is one of searchable encryptions. Abdalla et al. firstly defined IND-CCA security for PEKS to enhance it’s… More >

  • Open Access

    ARTICLE

    Evolutionary Intelligence and Deep Learning Enabled Diabetic Retinopathy Classification Model

    Bassam A. Y. Alqaralleh1,*, Fahad Aldhaban1, Anas Abukaraki2, Esam A. AlQaralleh3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 87-101, 2022, DOI:10.32604/cmc.2022.026729

    Abstract Diabetic Retinopathy (DR) has become a widespread illness among diabetics across the globe. Retinal fundus images are generally used by physicians to detect and classify the stages of DR. Since manual examination of DR images is a time-consuming process with the risks of biased results, automated tools using Artificial Intelligence (AI) to diagnose the disease have become essential. In this view, the current study develops an Optimal Deep Learning-enabled Fusion-based Diabetic Retinopathy Detection and Classification (ODL-FDRDC) technique. The intention of the proposed ODL-FDRDC technique is to identify DR and categorize its different grades using retinal fundus images. In addition, ODL-FDRDC… More >

  • Open Access

    ARTICLE

    Reference Selection for Offline Hybrid Siamese Signature Verification Systems

    Tsung-Yu Lu1, Mu-En Wu2, Er-Hao Chen3, Yeong-Luh Ueng4,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 935-952, 2022, DOI:10.32604/cmc.2022.026717

    Abstract This paper presents an off-line handwritten signature verification system based on the Siamese network, where a hybrid architecture is used. The Residual neural Network (ResNet) is used to realize a powerful feature extraction model such that Writer Independent (WI) features can be effectively learned. A single-layer Siamese Neural Network (NN) is used to realize a Writer Dependent (WD) classifier such that the storage space can be minimized. For the purpose of reducing the impact of the high intraclass variability of the signature and ensuring that the Siamese network can learn more effectively, we propose a method of selecting a reference… More >

  • Open Access

    ARTICLE

    Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data

    Taek-Young Youn1, Nam-Su Jho2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 151-164, 2022, DOI:10.32604/cmc.2022.026653

    Abstract

    Due to the development of 5G communication, many aspects of information technology (IT) services are changing. With the development of communication technologies such as 5G, it has become possible to provide IT services that were difficult to provide in the past. One of the services made possible through this change is cloud-based collaboration. In order to support secure collaboration over cloud, encryption technology to securely manage dynamic data is essential. However, since the existing encryption technology is not suitable for encryption of dynamic data, a new technology that can provide encryption for dynamic data is required for secure cloud-based collaboration.… More >

  • Open Access

    ARTICLE

    Two-Stage High-Efficiency Encryption Key Update Scheme for LoRaWAN Based IoT Environment

    Kun-Lin Tsai1,2,*, Li-Woei Chen3, Fang-Yie Leu4,5, Chuan-Tian Wu1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 547-562, 2022, DOI:10.32604/cmc.2022.026557

    Abstract Secure data communication is an essential requirement for an Internet of Things (IoT) system. Especially in Industrial Internet of Things (IIoT) and Internet of Medical Things (IoMT) systems, when important data are hacked, it may induce property loss or life hazard. Even though many IoT-related communication protocols are equipped with secure policies, they still have some security weaknesses in their IoT systems. LoRaWAN is one of the low power wide-area network protocols, and it adopts Advanced Encryption Standard (AES) to provide message integrity and confidentiality. However, LoRaWAN's encryption key update scheme can be further improved. In this paper, a Two-stage… More >

Displaying 1771-1780 on page 178 of 5350. Per Page