Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the… More >

  • Open Access

    ARTICLE

    A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts

    Xiaohui Yang, Kun Zhang*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1843-1859, 2024, DOI:10.32604/cmc.2023.047660

    Abstract Data is regarded as a valuable asset, and sharing data is a prerequisite for fully exploiting the value of data. However, the current medical data sharing scheme lacks a fair incentive mechanism, and the authenticity of data cannot be guaranteed, resulting in low enthusiasm of participants. A fair and trusted medical data trading scheme based on smart contracts is proposed, which aims to encourage participants to be honest and improve their enthusiasm for participation. The scheme uses zero-knowledge range proof for trusted verification, verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,… More >

  • Open Access

    ARTICLE

    A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain

    Yurong Luo, Wei You*, Chao Shang, Xiongpeng Ren, Jin Cao, Hui Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2237-2260, 2024, DOI:10.32604/cmes.2023.045679

    Abstract The dynamic landscape of the Internet of Things (IoT) is set to revolutionize the pace of interaction among entities, ushering in a proliferation of applications characterized by heightened quality and diversity. Among the pivotal applications within the realm of IoT, as a significant example, the Smart Grid (SG) evolves into intricate networks of energy deployment marked by data integration. This evolution concurrently entails data interchange with other IoT entities. However, there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem. In this paper, we introduce a hierarchical secure data-sharing platform empowered… More >

  • Open Access

    ARTICLE

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    Xiangmin Guo1,2, Guangjun Liang1,2,*, Jiayin Liu1,2, Xianyi Chen3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3305-3323, 2023, DOI:10.32604/cmc.2023.044529

    Abstract Cloud storage is widely used by large companies to store vast amounts of data and files, offering flexibility, financial savings, and security. However, information shoplifting poses significant threats, potentially leading to poor performance and privacy breaches. Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms, ensuring businesses can focus on business development. To ensure data security in cloud platforms, this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing (HD2C) model. However, the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of Things (IoT) in the cloud.… More >

  • Open Access

    ARTICLE

    Chicken Swarm Optimization with Deep Learning Based Packaged Rooftop Units Fault Diagnosis Model

    G. Anitha1, N. Supriya2, Fayadh Alenezi3, E. Laxmi Lydia4, Gyanendra Prasad Joshi5, Jinsang You6,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 221-238, 2023, DOI:10.32604/csse.2023.036479

    Abstract Rooftop units (RTUs) were commonly employed in small commercial buildings that represent that can frequently do not take the higher level maintenance that chillers receive. Fault detection and diagnosis (FDD) tools can be employed for RTU methods to ensure essential faults are addressed promptly. In this aspect, this article presents an Optimal Deep Belief Network based Fault Detection and Classification on Packaged Rooftop Units (ODBNFDC-PRTU) model. The ODBNFDC-PRTU technique considers fault diagnosis as a multi-class classification problem and is handled using DL models. For fault diagnosis in RTUs, the ODBNFDC-PRTU model exploits the deep belief network (DBN) classification model, which… More >

  • Open Access

    ARTICLE

    An Effective Security Comparison Protocol in Cloud Computing

    Yuling Chen1,2, Junhong Tao1, Tao Li1,*, Jiangyuan Cai3, Xiaojun Ren4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5141-5158, 2023, DOI:10.32604/cmc.2023.037783

    Abstract With the development of cloud computing technology, more and more data owners upload their local data to the public cloud server for storage and calculation. While this can save customers’ operating costs, it also poses privacy and security challenges. Such challenges can be solved using secure multi-party computation (SMPC), but this still exposes more security issues. In cloud computing using SMPC, clients need to process their data and submit the processed data to the cloud server, which then performs the calculation and returns the results to each client. Each client and server must be honest. If there is cooperation or… More >

  • Open Access

    ARTICLE

    In vitro polymerization of the dopamine-borate melanin precursor: A proof-of-concept regarding boron neutron-capture therapy for melanoma

    JUAN C. STOCKERT1,2,*, SILVINA A. ROMERO1, MARCELO N. FELIX-POZZI3, ALFONSO BLÁZQUEZ-CASTRO4

    BIOCELL, Vol.47, No.4, pp. 919-928, 2023, DOI:10.32604/biocell.2023.026631

    Abstract

    The 10boron neutron-capture therapy (BNCT) is an emerging antitumoral method that shows increasing biomedical interest. BNCT is based on the selective accumulation of the 10boron isotope within the tumor, which is then irradiated with low-energy thermal neutrons, generating nuclear fission that produces 7lithium, 4helium, and γ rays. Simple catechol-borate esters have been rather overlooked as precursors of melanin biosynthesis, and therefore, a proof-of-concept approach for using dopamine-borate (DABO) as a suitable boron-containing candidate for potential BNCT is presented here. DABO can spontaneously oxidize and autopolymerize in vitro, giving a soluble, eumelanin-like brown-black poly-DABO product. Melanotic melanoma cell cultures treated with… More >

  • Open Access

    ARTICLE

    Experimental Investigation on the Effect of Seal Presence on the Behavior of Double-Deck Floating Roofs in Cylindrical Steel Storage Tanks

    Alireza Doustvandi, Mehrzad Tahamouli Roudsari*, Behnoush Niazi

    Structural Durability & Health Monitoring, Vol.17, No.1, pp. 55-70, 2023, DOI:10.32604/sdhm.2022.017458

    Abstract Liquid storage, particularly oil and petrochemical products which are considered hazardous liquid, are an important part of the oil industry. Thin-walled vertical cylindrical steel storage tanks are widely used in recent years. Due to high sensitivity of these structures in an earthquake and other external excitations may lead to catastrophic consequences. For instance, huge economic losses, environmental damages, and casualities, many studies have been done about these structures. past studies showed that liquid storage tanks, equipped with a floating roof, are potentially vulnerable while subjected to seismic loads and earthquake has been considered as one of the most destructive natural… More >

  • Open Access

    ARTICLE

    Energy Loss Analysis of Distributed Rooftop Photovoltaics in Industrial Parks

    Yu Xiao1,2, Kai Li1,2, Hongqiao Huang1,2, Haibo Tan1,2, Hua Li3,*

    Energy Engineering, Vol.120, No.2, pp. 511-527, 2023, DOI:10.32604/ee.2023.022750

    Abstract The analysis of the loss of distributed photovoltaic power generation systems involves the interests of energy users, energy-saving service companies, and power grid companies, so it has always been the focus of the industry and society in some manner or another. However, the related analysis for an actual case that considers different cooperative corporations’ benefits is lacking in the presently available literature. This paper takes the distributed rooftop photovoltaic power generation project in an industrial park as the object, studies the analysis and calculation methods of line loss and transformer loss, analyzes the change of transformer loss under different temperatures… More >

  • Open Access

    ARTICLE

    Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain

    Jin Wang1, Wei Ou1, Osama Alfarraj2, Amr Tolba2, Gwang-Jun Kim3,*, Yongjun Ren4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1805-1819, 2023, DOI:10.32604/csse.2023.029622

    Abstract Since transactions in blockchain are based on public ledger verification, this raises security concerns about privacy protection. And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification, when the whole transaction on the chain is verified. In order to improve the efficiency and privacy protection of block data verification, this paper proposes an efficient block verification mechanism with privacy protection based on zero-knowledge proof (ZKP), which not only protects the privacy of users but also improves the speed of data block verification. There is no need to put the whole… More >

Displaying 1-10 on page 1 of 34. Per Page