Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Arbuscular Mycorrhizal Fungi Improve Drought Tolerance of Quinoa Grown in Compost-Amended Soils by Altering Primary and Secondary Metabolite Levels

    Wissal Benaffari1,2,3, Fatima-Ezzahra Soussani1,2,4, Abderrahim Boutasknit1,2,5, Salma Toubali1,2,3, Abir Ben Hassine3, Hala Ben Ahmed3, Rachid Lahlali7,*, Abdelilah Meddich1,2,6,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.9, pp. 2285-2302, 2024, DOI:10.32604/phyton.2024.055052 - 30 September 2024

    Abstract Quinoa (Chenopodium quinoa) has recently gained popularity as a pseudo-cereal cultivated in various countries due to the nutritional and antioxidant benefits of its seeds, and its capacity to persist in water-stressed environments. Our study aimed to assess the effects of native arbuscular mycorrhizal fungi (AMF) and local organic amendments on the metabolic responses and antioxidant activity of quinoa seeds under water-stressed conditions. To this end, quinoa plants were grown in soils inoculated with an indigenous mycorrhizal consortium AMF and amended with two types of compost from horse manure (HM) and green waste (GW) under two water… More >

  • Open Access

    ARTICLE

    Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management

    Lizhe Zhang1,2,*, Yongqiang Huang2, Jia Nie2, Kenian Wang1,2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1467-1488, 2023, DOI:10.32604/cmc.2023.042305 - 29 November 2023

    Abstract System-wide information management (SWIM) is a complex distributed information transfer and sharing system for the next generation of Air Transportation System (ATS). In response to the growing volume of civil aviation air operations, users accessing different authentication domains in the SWIM system have problems with the validity, security, and privacy of SWIM-shared data. In order to solve these problems, this paper proposes a SWIM cross-domain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication. The scheme uses a consistent hash algorithm with virtual… More >

  • Open Access

    ARTICLE

    Consortium Chain Consensus Vulnerability and Chain Generation Mechanism

    Rui Qiao, Shi Dong*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2505-2527, 2023, DOI:10.32604/cmc.2023.043476 - 29 November 2023

    Abstract Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains. Therefore, this paper proposes a new consortium chain generation model, deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes, and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security. Furthermore, the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is… More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920 - 23 April 2023

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a… More >

  • Open Access

    ARTICLE

    Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems

    T. Haritha, A. Anitha*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3923-3939, 2023, DOI:10.32604/cmc.2023.036278 - 31 March 2023

    Abstract In crowded cities, searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’ time, increases air pollution, and traffic congestion. Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement. But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number, personal identity, and desired destination. This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’ security… More >

  • Open Access

    ARTICLE

    Task-Attribute-Based Access Control Scheme for IoT via Blockchain

    Hao Chen1, Wunan Wan1, *, Jinyue Xia2, *, Shibin Zhang1, Jinquan Zhang1, Xizi Peng1, Xingjie Fan1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2441-2453, 2020, DOI:10.32604/cmc.2020.011824 - 16 September 2020

    Abstract As a new form of network, the Internet of things (IoT) is becoming more widely used in people’s lives. In this paper, related theoretical research and practical applications of the IoT are explored. The security of the IoT has become a hot research topic. Access controls are methods that control reasonable allocations of data and resources and ensure the security of the IoT. However, most access control systems do not dynamically assign users’ rights. Additionally, with some access control systems, there is a risk of overstepping other user’s authority, and there may exist a central… More >

  • Open Access

    ARTICLE

    Multi-strain Inoculation with PGPR Producing ACC Deaminase is More Effective Than Single-strain Inoculation to Improve Wheat (Triticum aestivum) Growth and Yield

    Muhammad Zafar-ul-Hye1,*, Misbah Batool Zahra1, Subhan Danish1, Mazhar Abbas2, Abdur Rehim1, Muhammad Naeem Akbar1, Ayesha Iftikhar1, Mehreen Gul1, Ifat Nazir1, Maria Abid1, Muhammad Tahzeeb-ul-Hassan1, Maria Murtaza3

    Phyton-International Journal of Experimental Botany, Vol.89, No.2, pp. 405-413, 2020, DOI:10.32604/phyton.2020.08918 - 22 April 2020

    Abstract Rhizosphere bacteria that colonize plant roots and confer beneficial effects are referred as plant growth promoting rhizobacteria (PGPR). Among all PGPR, some rhizobacteria have an ability to produce ACC deaminase enzyme. This enzyme catalyzes stress ACC into a-ketobutyrate and ammonia instead of letting it to be converted to ethylene. Ethylene level rises in plants under stress conditions i.e., drought, salinity, poor soil fertility etc. As poor soil fertility is a big hurdle to achieve the optimum yield of crops, inoculation of ACC deaminase PGPR can overcome this problem to some extent. The aim of the… More >

  • Open Access

    ARTICLE

    Secure Model of Medical Data Sharing for Complex Scenarios

    Wei She1, Yue Hu2, Zhao Tian1, Guoning Liu3, Bo Wang4, Wei Liu1, 2, *

    Journal of Cyber Security, Vol.1, No.1, pp. 11-17, 2019, DOI:10.32604/jcs.2019.05856

    Abstract In order to secure the massive heterogeneous medical data for the complex scenarios and improve the information sharing efficiency in healthcare system, a distributed medical data ledger model (DMDL) is proposed in this paper. This DMDL model has adopted the blockchain technology including the function decoupling, the distributed consensus, smart contract as well as multi-channel communication structure of consortium blockchain. The DMDL model not only has high adaptability, but also meets the requirements of the medical treatment processes which generally involve multi-entities, highly private information and secure transaction. The steps for processing the medical data More >

Displaying 1-10 on page 1 of 8. Per Page