Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (64)
  • Open Access

    ARTICLE

    Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

    Vincent Omollo Nyangaresi1,2, Arkan A. Ghaib3, Hend Muslim Jasim4, Zaid Ameen Abduljabbar4,5,6,*, Junchao Ma5,*, Mustafa A. Al Sibahee7,8, Abdulla J. Y. Aldarwish4, Ali Hasan Ali9,10, Husam A. Neamah11

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1029-1057, 2024, DOI:10.32604/cmc.2024.053854 - 15 October 2024

    Abstract Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some… More >

  • Open Access

    ARTICLE

    Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment

    Qiping Zou1, Zhong Ruan2,*, Huaning Song1

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1301-1328, 2024, DOI:10.32604/csse.2024.051796 - 13 September 2024

    Abstract As an important application of intelligent transportation system, Internet of Vehicles (IoV) provides great convenience for users. Users can obtain real-time traffic conditions through the IoV’s services, plan users' travel routes, and improve travel efficiency. However, in the IoV system, there are always malicious vehicle nodes publishing false information. Therefore, it is essential to ensure the legitimacy of the source. In addition, during the peak period of vehicle travel, the vehicle releases a large number of messages, and IoV authentication efficiency is prone to performance bottlenecks. Most existing authentication schemes have the problem of low… More >

  • Open Access

    ARTICLE

    Cartographie Automatique et Comptage des Arbres Oliviers A Partir de L’Imagerie de Drone par Un Reseau de Neurones Covolutionnel

    Oumaima Ameslek1,*, Hafida Zahir2, Soukaina Mitro2, El Mostafa Bachaoui1

    Revue Internationale de Géomatique, Vol.33, pp. 321-340, 2024, DOI:10.32604/rig.2024.054838 - 03 September 2024

    Abstract L’agriculture de précision (AP) est une stratégie de gestion agricole fondée sur l’observation, la mesure et la réponse à la variabilité des cultures inter/intra-champ. Il comprend des avancées en matière de collecte, d’analyse et de gestion des données, ainsi que des développements technologiques en matière de stockage et de récupération de données, de positionnement précis, de surveillance des rendements et de télédétection. Cette dernière offre une résolution spatiale, spectrale et temporelle sans précédent, mais peut également fournir des informations détaillées sur la hauteur de la végétation et diverses observations. Aujourd’hui, le succès des nouvelles technologies… More >

  • Open Access

    ARTICLE

    Variation in the Composition of the Essential Oil of Commercial Salvia officinalis L. Leaves Samples from Different Countries

    Ain Raal1,*, Anne Orav2, Tetiana Ilina3, Alla Kovalyova4, Taras Koliadzhyn3, Yuliia Avidzba5, Oleh Koshovyi1,4,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.8, pp. 2051-2062, 2024, DOI:10.32604/phyton.2024.052790 - 30 August 2024

    Abstract Salvia officinalis L. (Lamiaceae) leaves and its essential oil is used for mouth and throat disorders, skin disorders, minor wounds, and gastrointestinal disorders, and is widely used worldwide. The research aimed to conduct a comparative study of the composition of S. officinalis essential oils from commercial samples, and their main chemotypes. The volatile constituents from S. officinalis leaves were investigated using gas chromatography (GC). The commercial samples of sage leaves were obtained from retail pharmacies in nine mainly European countries. The yield of essential oil in S. officinalis commercial leaves was between 10.0 and 24.8 mL/kg. The principal components More > Graphic Abstract

    Variation in the Composition of the Essential Oil of Commercial <i>Salvia officinalis</i> L. Leaves Samples from Different Countries

  • Open Access

    ARTICLE

    Fake News Detection Based on Cross-Modal Message Aggregation and Gated Fusion Network

    Fangfang Shan1,2,*, Mengyao Liu1,2, Menghan Zhang1,2, Zhenyu Wang1,2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1521-1542, 2024, DOI:10.32604/cmc.2024.053937 - 18 July 2024

    Abstract Social media has become increasingly significant in modern society, but it has also turned into a breeding ground for the propagation of misleading information, potentially causing a detrimental impact on public opinion and daily life. Compared to pure text content, multmodal content significantly increases the visibility and share ability of posts. This has made the search for efficient modality representations and cross-modal information interaction methods a key focus in the field of multimodal fake news detection. To effectively address the critical challenge of accurately detecting fake news on social media, this paper proposes a fake… More >

  • Open Access

    ARTICLE

    A Multilayer Network Constructed for Herb and Prescription Efficacy Analysis

    Xindi Huang1, Liwei Liang1, Sakirin Tam2, Hao Liang3, Xiong Cai4, Changsong Ding1,5,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 691-704, 2024, DOI:10.32604/csse.2022.029970 - 20 May 2024

    Abstract Chinese Medicine (CM) has been widely used as an important avenue for disease prevention and treatment in China especially in the form of CM prescriptions combining sets of herbs to address patients’ symptoms and syndromes. However, the selection and compatibility of herbs are complex and abstract due to intrinsic relationships between herbal properties and their overall functions. Network analysis is applied to demonstrate the complex relationships between individual herbal efficacy and the overall function of CM prescriptions. To illustrate their connections and correlations, prescription function (PF), prescription herb (PH), and herbal efficacy (HE) intra-networks are… More >

  • Open Access

    ARTICLE

    Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs

    Norah Abdullah Al-Johany1,*, Sanaa Abdullah Sharaf1,2, Fathy Elbouraey Eassa1,2, Reem Abdulaziz Alnanih1,2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3139-3173, 2024, DOI:10.32604/cmc.2024.047392 - 15 May 2024

    Abstract The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed memory systems. However, MPI implementations can contain defects that impact the reliability and performance of parallel applications. Detecting and correcting these defects is crucial, yet there is a lack of published models specifically designed for correcting MPI defects. To address this, we propose a model for detecting and correcting MPI defects (DC_MPI), which aims to detect and correct defects in various types of MPI communication, including blocking point-to-point (BPTP), nonblocking point-to-point (NBPTP), and collective communication (CC). The defects addressed by… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534 - 26 March 2024

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is… More >

  • Open Access

    EDITORIAL

    Editorial: Welcome Message from Editor-in-Chief, Xuming Mo

    Xuming Mo*

    Congenital Heart Disease, Vol.19, No.1, pp. 1-3, 2024, DOI:10.32604/chd.2024.051192 - 20 March 2024

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault

    Syeda Wajiha Zahra1, Muhammad Nadeem2, Ali Arshad3,*, Saman Riaz3, Muhammad Abu Bakr4, Ashit Kumar Dutta5, Zaid Alzaid6, Badr Almutairi7, Sultan Almotairi8

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 589-616, 2024, DOI:10.32604/cmc.2023.042386 - 30 January 2024

    Abstract Various organizations store data online rather than on physical servers. As the number of user’s data stored in cloud servers increases, the attack rate to access data from cloud servers also increases. Different researchers worked on different algorithms to protect cloud data from replay attacks. None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack. This study presents the development of a TKN (Text, Key and Name) cryptographic algorithm aimed at protecting data from replay attacks. The program employs distinct ways to encrypt plain text [P], a user-defined Key… More >

Displaying 1-10 on page 1 of 64. Per Page