Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

    Vincent Omollo Nyangaresi1,2, Arkan A. Ghaib3, Hend Muslim Jasim4, Zaid Ameen Abduljabbar4,5,6,*, Junchao Ma5,*, Mustafa A. Al Sibahee7,8, Abdulla J. Y. Aldarwish4, Ali Hasan Ali9,10, Husam A. Neamah11

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1029-1057, 2024, DOI:10.32604/cmc.2024.053854 - 15 October 2024

    Abstract Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some… More >

  • Open Access

    ARTICLE

    Research and Application of Log Defect Detection and Visualization System Based on Dry Coupling Ultrasonic Method

    Yongning Yuan1, Dong Zhang2, Usama Sayed3, Hao Zhu1, Jun Wang4, Xiaojun Yang2, Zheng Wang2,*

    Journal of Renewable Materials, Vol.11, No.11, pp. 3917-3932, 2023, DOI:10.32604/jrm.2023.028764 - 31 October 2023

    Abstract In order to optimize the wood internal quality detection and evaluation system and improve the comprehensive utilization rate of wood, this paper invented a set of log internal defect detection and visualization system by using the ultrasonic dry coupling agent method. The detection and visualization analysis of internal log defects were realized through log specimen test. The main conclusions show that the accuracy, reliability and practicability of the system for detecting the internal defects of log specimens have been effectively verified. The system can make the edge of the detected image smooth by interpolation algorithm, More >

  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798 - 08 June 2023

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment… More >

  • Open Access

    ARTICLE

    The Influence of Saturated and Bilinear Incidence Functions on the Dynamical Behavior of HIV Model Using Galerkin Scheme Having a Polynomial of Order Two

    Attaullah1,*, Kamil Zeb1, Abdullah Mohamed2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1661-1685, 2023, DOI:10.32604/cmes.2023.023059 - 06 February 2023

    Abstract Mathematical modelling has been extensively used to measure intervention strategies for the control of contagious conditions. Alignment between different models is pivotal for furnishing strong substantiation for policymakers because the differences in model features can impact their prognostications. Mathematical modelling has been widely used in order to better understand the transmission, treatment, and prevention of infectious diseases. Herein, we study the dynamics of a human immunodeficiency virus (HIV) infection model with four variables: S (t), I (t), C (t), and A (t) the susceptible individuals; HIV infected individuals (with no clinical symptoms of AIDS); HIV… More >

  • Open Access

    ARTICLE

    State Estimation Moving Window Gradient Iterative Algorithm for Bilinear Systems Using the Continuous Mixed p-norm Technique

    Wentao Liu, Junxia Ma, Weili Xiong*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 873-892, 2023, DOI:10.32604/cmes.2022.020565 - 31 August 2022

    Abstract This paper studies the parameter estimation problems of the nonlinear systems described by the bilinear state space models in the presence of disturbances. A bilinear state observer is designed for deriving identification algorithms to estimate the state variables using the input-output data. Based on the bilinear state observer, a novel gradient iterative algorithm is derived for estimating the parameters of the bilinear systems by means of the continuous mixed p-norm cost function. The gain at each iterative step adapts to the data quality so that the algorithm has good robustness to the noise disturbance. Furthermore, to More >

  • Open Access

    ARTICLE

    End-to-end Handwritten Chinese Paragraph Text Recognition Using Residual Attention Networks

    Yintong Wang1,2,*, Yingjie Yang2, Haiyan Chen3, Hao Zheng1, Heyou Chang1

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 371-388, 2022, DOI:10.32604/iasc.2022.027146 - 15 April 2022

    Abstract Handwritten Chinese recognition which involves variant writing style, thousands of character categories and monotonous data mark process is a long-term focus in the field of pattern recognition research. The existing methods are facing huge challenges including the complex structure of character/line-touching, the discriminate ability of similar characters and the labeling of training datasets. To deal with these challenges, an end-to-end residual attention handwritten Chinese paragraph text recognition method is proposed, which uses fully convolutional neural networks as the main structure of feature extraction and employs connectionist temporal classification as a loss function. The novel residual… More >

  • Open Access

    ARTICLE

    Cost Effective Decentralized Key Management Framework for IoT

    Raja Lavanya*, K. Sundarakantham, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1057-1070, 2022, DOI:10.32604/csse.2022.021052 - 10 November 2021

    Abstract Security is a primary concern in communication for reliable transfer of information between the authenticated members, which becomes more complex in a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique with Multicast and Unicast key management protocol (BMU-IOT) for decentralized networks has been proposed. The first part of the proposed work is to divide the network into clusters where sensors are connected to and is administered by cluster head. Each sensor securely shares its secret keys with the cluster head using unicast. Based More >

  • Open Access

    ARTICLE

    Plant Disease Classification Using Deep Bilinear CNN

    D. Srinivasa Rao1, Ramesh Babu Ch2, V. Sravan Kiran1, N. Rajasekhar3,*, Kalyanapu Srinivas4, P. Shilhora Akshay1, G. Sai Mohan1, B. Lalith Bharadwaj1

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 161-176, 2022, DOI:10.32604/iasc.2022.017706 - 03 September 2021

    Abstract

    Plant diseases have become a major threat in farming and provision of food. Various plant diseases have affected the natural growth of the plants and the infected plants are the leading factors for loss of crop production. The manual detection and identification of the plant diseases require a careful and observative examination through expertise. To overcome manual testing procedures an automated identification and detection can be implied which provides faster, scalable and precisive solutions. In this research, the contributions of our work are threefold. Firstly, a bi-linear convolution neural network (Bi-CNNs) for plant leaf disease

    More >

  • Open Access

    ARTICLE

    Implementation of Legendre Neural Network to Solve Time-Varying Singular Bilinear Systems

    V. Murugesh1, B. Saravana Balaji2,*, Habib Sano Aliy3, J. Bhuvana4, P. Saranya5, Andino Maseleno6, K. Shankar7, A. Sasikala8

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3685-3692, 2021, DOI:10.32604/cmc.2021.017836 - 24 August 2021

    Abstract Bilinear singular systems can be used in the investigation of different types of engineering systems. In the past decade, considerable attention has been paid to analyzing and synthesizing singular bilinear systems. Their importance lies in their real world application such as economic, ecological, and socioeconomic processes. They are also applied in several biological processes, such as population dynamics of biological species, water balance, temperature regulation in the human body, carbon dioxide control in lungs, blood pressure, immune system, cardiac regulation, etc. Bilinear singular systems naturally represent different physical processes such as the fundamental law of… More >

  • Open Access

    ARTICLE

    Parameters Calibration of the Combined Hardening Rule through Inverse Analysis for Nylock Nut Folding Simulation

    İlyas Kacar*

    CMES-Computer Modeling in Engineering & Sciences, Vol.128, No.1, pp. 87-108, 2021, DOI:10.32604/cmes.2021.015227 - 28 June 2021

    Abstract Locking nuts are widely used in industry and any defects from their manufacturing may cause loosening of the connection during their service life. In this study, simulations of the folding process of a nut’s flange made from AISI 1040 steel are performed. Besides the bilinear isotropic hardening rule, Chaboche’s nonlinear kinematic hardening rule is employed with associated flow rule and Hill48 yield criterion to set a plasticity model. The bilinear isotropic hardening rule’s parameters are determined by means of a monotonic tensile test. The Chaboche’s parameters are determined by using a low cycle tension/compression test… More >

Displaying 1-10 on page 1 of 13. Per Page