CMES: The Application Channel for the 2022 Young Researcher Award is now Open
Empowering Human Decision-Making in AI Models: The Path to Trust and Transparency
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4933-4950, 2023, DOI:10.32604/cmc.2023.034148
Abstract With the rapid development of information technology, the development of blockchain technology has also been deeply impacted. When performing block verification in the blockchain network, if all transactions are verified on the chain, this will cause the accumulation of data on the chain, resulting in data storage problems. At the same time, the security of data is also challenged, which will put enormous pressure on the block, resulting in extremely low communication efficiency of the block. The traditional blockchain system uses the Merkle Tree method to store data. While verifying the integrity and correctness of the data, the amount of… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6429-6444, 2023, DOI:10.32604/cmc.2023.031817
Abstract The exponential growth of data necessitates an effective data storage scheme, which helps to effectively manage the large quantity of data. To accomplish this, Deoxyribonucleic Acid (DNA) digital data storage process can be employed, which encodes and decodes binary data to and from synthesized strands of DNA. Vector quantization (VQ) is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression efficiency. This article introduces a new DNA Computing with Water Strider Algorithm based Vector Quantization (DNAC-WSAVQ) technique for Data Storage Systems. The proposed DNAC-WSAVQ technique enables encoding data using… More >
Open Access
REVIEW
CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1565-1595, 2023, DOI:10.32604/cmes.2022.021198
Abstract The emergence of power dispatching automation systems has greatly improved the efficiency of power industry operations and promoted the rapid development of the power industry. However, with the convergence and increase in power data flow, the data dispatching network and the main station dispatching automation system have encountered substantial pressure. Therefore, the method of online data resolution and rapid problem identification of dispatching automation systems has been widely investigated. In this paper, we perform a comprehensive review of automated dispatching of massive dispatching data from the perspective of intelligent identification, discuss unresolved research issues and outline future directions in this… More >
Open Access
ARTICLE
Journal of Cyber Security, Vol.4, No.2, pp. 95-107, 2022, DOI:10.32604/jcs.2022.029451
Abstract Due to its unique security, blockchain technology is widely used in the financial field. Under the background of the rapid development of information technology and the rapid improvement of medical level, it is also a general trend to integrate blockchain technology into the medical field. According to the characteristics of blockchain and the research contents of many scholars on the application of blockchain in the medical field, this paper analyzes and summarizes the problems existing in the current development of blockchain, puts forward corresponding solutions, and looks forward to the further application of blockchain technology in the medical field. More >
Open Access
ARTICLE
Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1603-1615, 2022, DOI:10.32604/iasc.2022.026049
Abstract The cloud storage is essential environment for users to access high confidential data. Every single data is most valued by users. If we count, day by day information as well as, memory storage are increasing gradually. Cost of memory will increase when data increases with demand for storage. At present data duplication or redundant data storing in the cloud became hard for storage provider. Also, it makes security issue if repeated data from various users stored in the server. It makes data duplication, which is very efficient for intruders. Also, when same data stored in cloud, there will be a… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 519-534, 2022, DOI:10.32604/cmc.2022.021269
Abstract Many organizations apply cloud computing to store and effectively process data for various applications. The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity. In this research, an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data. Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data. Merkle Hash tree provides the efficient mapping of data and easily… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 2019-2035, 2022, DOI:10.32604/cmc.2022.021797
Abstract Cloud computing technology is the culmination of technical advancements in computer networks, hardware and software capabilities that collectively gave rise to computing as a utility. It offers a plethora of utilities to its clients worldwide in a very cost-effective way and this feature is enticing users/companies to migrate their infrastructure to cloud platform. Swayed by its gigantic capacity and easy access clients are uploading replicated data on cloud resulting in an unnecessary crunch of storage in datacenters. Many data compression techniques came to rescue but none could serve the purpose for the capacity as large as a cloud, hence, researches… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.41, No.1, pp. 373-387, 2022, DOI:10.32604/csse.2022.020452
Abstract Multi-level searching is called Drill down search. Right now, no drill down search feature is available in the existing search engines like Google, Yahoo, Bing and Baidu. Drill down search is very much useful for the end user to find the exact search results among the huge paginated search results. Higher level of drill down search with category based search feature leads to get the most accurate search results but it increases the number and size of the file system. The purpose of this manuscript is to implement a big data storage reduction binary file system model for category based… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.41, No.1, pp. 83-94, 2022, DOI:10.32604/csse.2022.020071
Abstract The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an attack from the cloud server's… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3781-3801, 2022, DOI:10.32604/cmc.2022.020510
Abstract On average, every two years, the amount of data existing globally doubles. Software development will be affected and improved by Cyber-Physical Systems (CPS). The number of problems remained even though developments helped Information Technology experts extract better value from their storage investments. Because of poor interoperability between different vendors and devices, countless numbers of Storage Area Networks were created. Network setup used for data storage includes a complex and rigid arrangement of routers, switch, hosts/servers, storage arrays. We have evaluated the performance of routing protocol Transmission Control Protocol (TCP) and Fibre Channel Protocol (FCP) under different network scenario by Network… More >