Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (53)
  • Open Access

    ARTICLE

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications

    Li-Woei Chen1, Kun-Lin Tsai2,*, Fang-Yie Leu3, Wen-Cheng Jiang2, Shih-Ting Tseng2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2779-2794, 2024, DOI:10.32604/cmes.2024.052124

    Abstract Various mobile devices and applications are now used in daily life. These devices require high-speed data processing, low energy consumption, low communication latency, and secure data transmission, especially in 5G and 6G mobile networks. High-security cryptography guarantees that essential data can be transmitted securely; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE) algorithm based on the Advanced Encryption Standard (AES) for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things (IoT) devices. In the proposed LEDE algorithm, the system time More >

  • Open Access

    ARTICLE

    Cross-Modal Consistency with Aesthetic Similarity for Multimodal False Information Detection

    Weijian Fan1,*, Ziwei Shi2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2723-2741, 2024, DOI:10.32604/cmc.2024.050344

    Abstract With the explosive growth of false information on social media platforms, the automatic detection of multimodal false information has received increasing attention. Recent research has significantly contributed to multimodal information exchange and fusion, with many methods attempting to integrate unimodal features to generate multimodal news representations. However, they still need to fully explore the hierarchical and complex semantic correlations between different modal contents, severely limiting their performance detecting multimodal false information. This work proposes a two-stage detection framework for multimodal false information detection, called ASMFD, which is based on image aesthetic similarity to segment and… More >

  • Open Access

    ARTICLE

    CMAES-WFD: Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy

    Di Wang, Yuefei Zhu, Jinlong Fei*, Maohua Guo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2253-2276, 2024, DOI:10.32604/cmc.2024.049504

    Abstract Website fingerprinting, also known as WF, is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination, even when using the Tor anonymity network. While advanced attacks based on deep neural network (DNN) can perform feature engineering and attain accuracy rates of over 98%, research has demonstrated that DNN is vulnerable to adversarial samples. As a result, many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success. However, these methods suffer from high bandwidth overhead or require access to the target… More >

  • Open Access

    ARTICLE

    Physiological and Transcriptome Analysis Illuminates the Molecular Mechanisms of the Drought Resistance Improved by Alginate Oligosaccharides in Triticum aestivum L.

    Yunhong Zhang1,2,*, Yonghui Yang1,2, Jiawei Mao1,2

    Phyton-International Journal of Experimental Botany, Vol.93, No.2, pp. 185-212, 2024, DOI:10.32604/phyton.2023.046811

    Abstract Alginate oligosaccharides (AOS) enhance drought resistance in wheat (Triticum aestivum L.), but the definite mechanisms remain largely unknown. The physiological and transcriptome responses of wheat seedlings treated with AOS were analyzed under drought stress simulated with polyethylene glycol-6000. The results showed that AOS promoted the growth of wheat seedlings and reduced oxidative damage by improving peroxidase and superoxide dismutase activities under drought stress. A total of 10,064 and 15,208 differentially expressed unigenes (DEGs) obtained from the AOS treatment and control samples at 24 and 72 h after dehydration, respectively, were mainly enriched in the biosynthesis of… More >

  • Open Access

    ARTICLE

    Hybrid Dynamic Optimization for Multilevel Security System in Disseminating Confidential Information

    Shahina Anwarul1, Sunil Kumar2, Ashok Bhansali3, Hammam Alshazly4,*, Hany S. Hussein5,6

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3145-3163, 2023, DOI:10.32604/csse.2023.041061

    Abstract Security systems are the need of the hour to protect data from unauthorized access. The dissemination of confidential information over the public network requires a high level of security. The security approach such as steganography ensures confidentiality, authentication, integrity, and non-repudiation. Steganography helps in hiding the secret data inside the cover media so that the attacker can be confused during the transmission process of secret data between sender and receiver. Therefore, we present an efficient hybrid security model that provides multifold security assurance. To this end, a rectified Advanced Encryption Standard (AES) algorithm is proposed More >

  • Open Access

    ARTICLE

    Improving Quantitative and Qualitative Characteristics of Wheat (Triticum aestivum L.) through Nitrogen Application under Semiarid Conditions

    Muhammad Rafiq1, Muhammad Saqib1,*, Husnain Jawad1, Talha Javed2, Sadam Hussain3,*, Muhammad Arif1, Baber Ali4, Muhammad Sultan Ali Bazmi5, Ghulam Abbas1, Marjan Aziz6, Mohammad Khalid Al-Sadoon7, Aneela Gulnaz8, Sobhi F. Lamlom9, Muhammad Azeem Sabir10, Jameel Akhtar6

    Phyton-International Journal of Experimental Botany, Vol.92, No.4, pp. 1001-1017, 2023, DOI:10.32604/phyton.2023.025781

    Abstract

    Nitrogen (N), the building block of plant proteins and enzymes, is an essential macronutrient for plant functions. A field experiment was conducted to investigate the impact of different N application rates (28, 57, 85, 114, 142, 171, and 200 kg ha−1) on the performance of spring wheat (cv. Ujala-2016) during the 2017–2018 and 2018–2019 growing seasons. A control without N application was kept for comparison. Two years mean data showed optimum seed yield (5,461.3 kg ha−1) for N-application at 142 kg ha−1 whereas application of lower and higher rates of N did not result in significant and

    More >

  • Open Access

    ARTICLE

    Implementation of VLSI on Signal Processing-Based Digital Architecture Using AES Algorithm

    Mohanapriya Marimuthu1, Santhosh Rajendran2, Reshma Radhakrishnan2, Kalpana Rengarajan3, Shahzada Khurram4, Shafiq Ahmad5, Abdelaty Edrees Sayed5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4729-4745, 2023, DOI:10.32604/cmc.2023.033020

    Abstract Continuous improvements in very-large-scale integration (VLSI) technology and design software have significantly broadened the scope of digital signal processing (DSP) applications. The use of application-specific integrated circuits (ASICs) and programmable digital signal processors for many DSP applications have changed, even though new system implementations based on reconfigurable computing are becoming more complex. Adaptable platforms that combine hardware and software programmability efficiency are rapidly maturing with discrete wavelet transformation (DWT) and sophisticated computerized design techniques, which are much needed in today’s modern world. New research and commercial efforts to sustain power optimization, cost savings, and improved… More >

  • Open Access

    ARTICLE

    Salt Stress Affects the Growth and Yield of Wheat (Triticum aestivum L.) by Altering the Antioxidant Machinery and Expression of Hormones and Stress-Specific Genes

    Shahid Hussain1, Rui Zhang1, Shuli Liu1, Yang Wang1, Irshad Ahmad2, Yinglong Chen1, Hongyan Hou3, Qigen Dai1,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.3, pp. 861-881, 2023, DOI:10.32604/phyton.2023.025487

    Abstract

    Understanding physiological responses in saline agriculture may facilitate wheat breeding programs. Based on a screening test, the Ningmai-14 (NM-14) and Yangmai-23 (YM-23) wheat cultivars were selected for further experiments to understand the underlying salinity tolerance mechanism. This study investigated the effects of five salinity levels such as Control (CK) = 0 (without NaCl stress), S1 = 0.20%, S2 = 0.25%, S3 = 0.30% and S4 = 0.35% of NaCl concentrations of soil on wheat plants. The results showed that increased salinity concentration reduced the growth and yield of wheat cultivars (NM-14 and YM-23). However, YM-23 (12.7%)

    More >

  • Open Access

    ARTICLE

    Proposed Privacy Preservation Technique for Color Medical Images

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Noha A. El-Hag4, Ashraf A. M. Khalaf3, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 719-732, 2023, DOI:10.32604/iasc.2023.031079

    Abstract Nowadays, the security of images or information is very important. This paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image security. First, the secret medical image is encrypted using Advanced Encryption Standard (AES) algorithm. Then, the secret report of the patient is embedded into the encrypted secret medical image with the Least Significant Bit (LSB) watermarking algorithm. After that, the encrypted secret medical image with the secret report is concealed in a cover medical image, using Kekre’s Median Codebook Generation (KMCG) algorithm. Afterwards, the stego-image obtained is split into 16 parts.… More >

  • Open Access

    ARTICLE

    Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

    Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838

    Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the… More >

Displaying 1-10 on page 1 of 53. Per Page