Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (989)
  • Open Access

    REVIEW

    A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges

    Muhammad Muntasir Yakubu1,2,*, Mohd Fadzil B Hassan1,3, Kamaluddeen Usman Danyaro1, Aisha Zahid Junejo4, Muhammed Siraj5, Saidu Yahaya1, Shamsuddeen Adamu1, Kamal Abdulsalam6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1437-1481, 2024, DOI:10.32604/csse.2024.054556 - 22 November 2024

    Abstract This study conducts a systematic literature review (SLR) of blockchain consensus mechanisms, an essential protocols that maintain the integrity, reliability, and decentralization of distributed ledger networks. The aim is to comprehensively investigate prominent mechanisms’ security features and vulnerabilities, emphasizing their security considerations, applications, challenges, and future directions. The existing literature offers valuable insights into various consensus mechanisms’ strengths, limitations, and security vulnerabilities and their real-world applications. However, there remains a gap in synthesizing and analyzing this knowledge systematically. Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’ security and vulnerabilities comprehensively. The… More >

  • Open Access

    REVIEW

    AI-Powered Innovations in High-Tech Research and Development: From Theory to Practice

    Mitra Madanchian1,*, Hamed Taherdoost1,2,3,4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2133-2159, 2024, DOI:10.32604/cmc.2024.057094 - 18 November 2024

    Abstract This comparative review explores the dynamic and evolving landscape of artificial intelligence (AI)-powered innovations within high-tech research and development (R&D). It delves into both theoretical models and practical applications across a broad range of industries, including biotechnology, automotive, aerospace, and telecommunications. By examining critical advancements in AI algorithms, machine learning, deep learning models, simulations, and predictive analytics, the review underscores the transformative role AI has played in advancing theoretical research and shaping cutting-edge technologies. The review integrates both qualitative and quantitative data derived from academic studies, industry reports, and real-world case studies to showcase the… More >

  • Open Access

    ARTICLE

    Enhanced Growth Optimizer and Its Application to Multispectral Image Fusion

    Jeng-Shyang Pan1,2, Wenda Li1, Shu-Chuan Chu1,*, Xiao Sui1, Junzo Watada3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3033-3062, 2024, DOI:10.32604/cmc.2024.056310 - 18 November 2024

    Abstract The growth optimizer (GO) is an innovative and robust metaheuristic optimization algorithm designed to simulate the learning and reflective processes experienced by individuals as they mature within the social environment. However, the original GO algorithm is constrained by two significant limitations: slow convergence and high memory requirements. This restricts its application to large-scale and complex problems. To address these problems, this paper proposes an innovative enhanced growth optimizer (eGO). In contrast to conventional population-based optimization algorithms, the eGO algorithm utilizes a probabilistic model, designated as the virtual population, which is capable of accurately replicating the… More >

  • Open Access

    ARTICLE

    A Shuffling-Steganography Algorithm to Protect Data of Drone Applications

    Ahamad B. Alkodre1, Nour Mahmoud Bahbouh2, Sandra Sendra3, Adnan Ahmed Abi Sen4,*, Yazed Alsaawy1, Saad Said Alqahtany1, Abdallah Namoun1, Hani Almoamari1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2727-2751, 2024, DOI:10.32604/cmc.2024.053706 - 18 November 2024

    Abstract In Saudi Arabia, drones are increasingly used in different sensitive domains like military, health, and agriculture to name a few. Typically, drone cameras capture aerial images of objects and convert them into crucial data, alongside collecting data from distributed sensors supplemented by location data. The interception of the data sent from the drone to the station can lead to substantial threats. To address this issue, highly confidential protection methods must be employed. This paper introduces a novel steganography approach called the Shuffling Steganography Approach (SSA). SSA encompasses five fundamental stages and three proposed algorithms, designed… More >

  • Open Access

    REVIEW

    Impact of nanoparticles on immune cells and their potential applications in cancer immunotherapy

    JYOTHI B. NAIR1,2, ANU MARY JOSEPH3, SANOOP P.4, MANU M. JOSEPH5,*

    BIOCELL, Vol.48, No.11, pp. 1579-1602, 2024, DOI:10.32604/biocell.2024.054879 - 07 November 2024

    Abstract Nanoparticles represent a heterogeneous collection of materials, whether natural or synthetic, with dimensions aligning in the nanoscale. Because of their intense manifestation with the immune system, they can be harvested for numerous bio-medical and biotechnological advancements mainly in cancer treatment. This review article aims to scrutinize various types of nanoparticles that interact differently with immune cells like macrophages, dendritic cells, T lymphocytes, and natural killer (NK) cells. It also underscores the importance of knowing how nanoparticles influence immune cell functions, such as the production of cytokines and the presentation of antigens which are crucial for… More >

  • Open Access

    PROCEEDINGS

    Over-Deterministic Method and Its Application in Fracture Mechanics

    Cheng Hou1, Xiaochao Jin2, Xueling Fan2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.4, pp. 1-1, 2024, DOI:10.32604/icces.2024.012325

    Abstract The over-deterministic method (ODM) is dedicated to calculate a small set of unknown coefficients from a large system of equations, by making use of a large number of data points. A displacement over-deterministic method (DODM) developed by Ayatollahi et al. [1] has been employed by for calculating the stress intensity factors (SIFs) as well as the coefficients of the higher-order terms in the Williams’ series expansions for cracked bodies. The ODM provides a great idea to easily obtain fracture parameters, combine with finite element method (FEM).
    In our work, a stress over-deterministic method (SODM) has been… More >

  • Open Access

    PROCEEDINGS

    Mechanism, Manipulation and Application of the Bubble Micromotor

    Leilei Wang1, Li Chen2, Haihang Cui2, Xu Zheng1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.2, pp. 1-2, 2024, DOI:10.32604/icces.2024.011434

    Abstract The emerging technique of artificial micro/nano-motors [1] provides a vivid example of the idea using tiny machines to finish jobs in microscopic world. Among many micro/nano-motors, microbubble driven micromotor is a unique type that can reach the highest propulsion speed [2, 3], owing to the high surface energy of the bubble and the focused hydrodynamic jet during bubble collapse that can significantly enhance micromotor’s propulsion. Recent progress has demonstrated that the microbubble itself can implement new functions for the micromotor based on bubble dynamics and induced hydrodynamic flow, rather than merely providing energy. For instance,… More >

  • Open Access

    ARTICLE

    Using the Novel Wolverine Optimization Algorithm for Solving Engineering Applications

    Tareq Hamadneh1, Belal Batiha2, Omar Alsayyed3, Frank Werner4,*, Zeinab Monrazeri5, Mohammad Dehghani5,*, Kei Eguchi6

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2253-2323, 2024, DOI:10.32604/cmes.2024.055171 - 31 October 2024

    Abstract This paper introduces the Wolverine Optimization Algorithm (WoOA), a biomimetic method inspired by the foraging behaviors of wolverines in their natural habitats. WoOA innovatively integrates two primary strategies: scavenging and hunting, mirroring the wolverine’s adeptness in locating carrion and pursuing live prey. The algorithm’s uniqueness lies in its faithful simulation of these dual strategies, which are mathematically structured to optimize various types of problems effectively. The effectiveness of WoOA is rigorously evaluated using the Congress on Evolutionary Computation (CEC) 2017 test suite across dimensions of 10, 30, 50, and 100. The results showcase WoOA’s robust… More >

  • Open Access

    REVIEW

    Analyzing Real-Time Object Detection with YOLO Algorithm in Automotive Applications: A Review

    Carmen Gheorghe*, Mihai Duguleana, Razvan Gabriel Boboc, Cristian Cezar Postelnicu

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 1939-1981, 2024, DOI:10.32604/cmes.2024.054735 - 31 October 2024

    Abstract Identifying objects in real-time is a technology that is developing rapidly and has a huge potential for expansion in many technical fields. Currently, systems that use image processing to detect objects are based on the information from a single frame. A video camera positioned in the analyzed area captures the image, monitoring in detail the changes that occur between frames. The You Only Look Once (YOLO) algorithm is a model for detecting objects in images, that is currently known for the accuracy of the data obtained and the fast-working speed. This study proposes a comprehensive More >

  • Open Access

    ARTICLE

    IQAOA for Two Routing Problems: A Methodological Contribution with Application to TSP and VRP

    Eric Bourreau1, Gérard Fleury2, Philippe Lacomme2,*

    Journal of Quantum Computing, Vol.6, pp. 25-51, 2024, DOI:10.32604/jqc.2024.048792 - 25 October 2024

    Abstract The paper presents a novel quantum method for addressing two fundamental routing problems: the Traveling Salesman Problem (TSP) and the Vehicle Routing Problem (VRP), both central to routing challenges. The proposed method, named the Indirect Quantum Approximate Optimization Algorithm (IQAOA), leverages an indirect solution representation using ranking. Our contribution focuses on two main areas: 1) the indirect representation of solutions, and 2) the integration of this representation into an extended version of QAOA, called IQAOA. This approach offers an alternative to QAOA and includes the following components: 1) a quantum parameterized circuit designed to simulate… More >

Displaying 1-10 on page 1 of 989. Per Page