Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    Impact of Different Rooftop Coverings on Photovoltaic Panel Temperature

    Aws Al-Akam1,*, Ahmed A. Abduljabbar2, Ali Jaber Abdulhamed1

    Energy Engineering, Vol.121, No.12, pp. 3761-3777, 2024, DOI:10.32604/ee.2024.055198 - 22 November 2024

    Abstract Photovoltaic (PV) panels are essential to the global transition towards sustainable energy, offering a clean, renewable source that reduces reliance on fossil fuels and mitigates climate change. High temperatures can significantly affect the performance of photovoltaic (PV) panels by reducing their efficiency and power output. This paper explores the consequential effect of various rooftop coverings on the thermal performance of photovoltaic (PV) panels. It investigates the relationship between the type of rooftop covering materials and the efficiency of PV panels, considering the thermal performance and its implications for enhancing their overall performance and sustainability. The… More >

  • Open Access

    REVIEW

    A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges

    Muhammad Muntasir Yakubu1,2,*, Mohd Fadzil B Hassan1,3, Kamaluddeen Usman Danyaro1, Aisha Zahid Junejo4, Muhammed Siraj5, Saidu Yahaya1, Shamsuddeen Adamu1, Kamal Abdulsalam6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1437-1481, 2024, DOI:10.32604/csse.2024.054556 - 22 November 2024

    Abstract This study conducts a systematic literature review (SLR) of blockchain consensus mechanisms, an essential protocols that maintain the integrity, reliability, and decentralization of distributed ledger networks. The aim is to comprehensively investigate prominent mechanisms’ security features and vulnerabilities, emphasizing their security considerations, applications, challenges, and future directions. The existing literature offers valuable insights into various consensus mechanisms’ strengths, limitations, and security vulnerabilities and their real-world applications. However, there remains a gap in synthesizing and analyzing this knowledge systematically. Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’ security and vulnerabilities comprehensively. The… More >

  • Open Access

    ARTICLE

    Physio-Mechanical Characterization of Recycled Polyethylene Terephthalate and Soda-Lime Glass Waste Composite for Roof Tile Application

    Yusuf Olanrewaju Busari1,2,*, Issah Sadiq Ibrahim1, Kabir S. Ajao1, Norliana Mohd Abbas2, James Obafemi Adegbola1, Hassan Kobe Ibrahim3, Abdallah Reghioua4, Yusuf Lanre Shuaib-Babata1, Rachael Oluwatoyosi Idowu1

    Journal of Polymer Materials, Vol.41, No.3, pp. 117-129, 2024, DOI:10.32604/jpm.2024.055895 - 30 September 2024

    Abstract The research paper focuses on manufacturing composite materials from waste polyethylene terephthalate (PET) reinforced with soda-lime glass to provide a lightweight, less brittle, and high rust resistance when exposed to hazardous environment. In developing nations such as Nigeria, there is a significant surge in the volume of bottled water and other packaging materials used in households, leading to a rapid accumulation of biodegradable waste, that presents concerns such as the creation of landfills and health issues. PET are thermoplastic polymer that can be melted and shaped into various objects. This study involves the incorporation of… More >

  • Open Access

    ARTICLE

    Performance of Thermal Insulation of Different Composite Walls and Roofs Materials Used for Energy Efficient Building Construction in Iraq

    Ahmed Mustaffa Saleem, Abdullah A. Badr, Bahjat Hassan Alyas, Omar Rafae Alomar*

    Frontiers in Heat and Mass Transfer, Vol.22, No.4, pp. 1231-1244, 2024, DOI:10.32604/fhmt.2024.053770 - 30 August 2024

    Abstract This study numerically involves the performance of thermal insulation of different types of composite walls and roofs to demonstrate the best model that can be used for energy-efficient building construction in Iraq. The mathematical model is solved by building its code using the Transmission Matrix Method in MATLAB software. The weather data of 21st July 2022 in Baghdad City/Iraq is selected as a test day. The wall types are selected: the first type consists of cement mortar, brick, and gypsum, the second type consists of cement mortar, brick, gypsum, and plaster and the third type… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233 - 18 July 2024

    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233 - 18 July 2024

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615 - 26 March 2024

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of… More >

  • Open Access

    ARTICLE

    A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts

    Xiaohui Yang, Kun Zhang*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1843-1859, 2024, DOI:10.32604/cmc.2023.047660 - 27 February 2024

    Abstract Data is regarded as a valuable asset, and sharing data is a prerequisite for fully exploiting the value of data. However, the current medical data sharing scheme lacks a fair incentive mechanism, and the authenticity of data cannot be guaranteed, resulting in low enthusiasm of participants. A fair and trusted medical data trading scheme based on smart contracts is proposed, which aims to encourage participants to be honest and improve their enthusiasm for participation. The scheme uses zero-knowledge range proof for trusted verification, verifies the authenticity of the patient’s data and the specific attributes of… More >

  • Open Access

    ARTICLE

    A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain

    Yurong Luo, Wei You*, Chao Shang, Xiongpeng Ren, Jin Cao, Hui Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2237-2260, 2024, DOI:10.32604/cmes.2023.045679 - 29 January 2024

    Abstract The dynamic landscape of the Internet of Things (IoT) is set to revolutionize the pace of interaction among entities, ushering in a proliferation of applications characterized by heightened quality and diversity. Among the pivotal applications within the realm of IoT, as a significant example, the Smart Grid (SG) evolves into intricate networks of energy deployment marked by data integration. This evolution concurrently entails data interchange with other IoT entities. However, there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem. In this paper, we introduce a More >

  • Open Access

    ARTICLE

    Blockchain-Based Cognitive Computing Model for Data Security on a Cloud Platform

    Xiangmin Guo1,2, Guangjun Liang1,2,*, Jiayin Liu1,2, Xianyi Chen3,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3305-3323, 2023, DOI:10.32604/cmc.2023.044529 - 26 December 2023

    Abstract Cloud storage is widely used by large companies to store vast amounts of data and files, offering flexibility, financial savings, and security. However, information shoplifting poses significant threats, potentially leading to poor performance and privacy breaches. Blockchain-based cognitive computing can help protect and maintain information security and privacy in cloud platforms, ensuring businesses can focus on business development. To ensure data security in cloud platforms, this research proposed a blockchain-based Hybridized Data Driven Cognitive Computing (HD2C) model. However, the proposed HD2C framework addresses breaches of the privacy information of mixed participants of the Internet of… More >

Displaying 1-10 on page 1 of 40. Per Page