Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Novelty of Different Distance Approach for Multi-Criteria Decision-Making Challenges Using q-Rung Vague Sets

    Murugan Palanikumar1, Nasreen Kausar2,*, Dragan Pamucar3,4, Seifedine Kadry5,6,7,*, Chomyong Kim8, Yunyoung Nam9

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3353-3385, 2024, DOI:10.32604/cmes.2024.031439 - 11 March 2024

    Abstract In this article, multiple attribute decision-making problems are solved using the vague normal set (VNS). It is possible to generalize the vague set (VS) and q-rung fuzzy set (FS) into the q-rung vague set (VS). A log q-rung normal vague weighted averaging (log q-rung NVWA), a log q-rung normal vague weighted geometric (log q-rung NVWG), a log generalized q-rung normal vague weighted averaging (log Gq-rung NVWA), and a log generalized q-rung normal vague weighted geometric (log Gq-rung NVWG) operator are discussed in this article. A description is provided of the scoring function, accuracy function and operational laws of the log q-rung… More >

  • Open Access

    ARTICLE

    A Quantum Algorithm for Evaluating the Hamming Distance

    Mohammed Zidan1,2,*, Manal G. Eldin3, Mahmoud Y. Shams4, Mohamed Tolan5,6, Ayman Abd-Elhamed2,7, Mahmoud Abdel-Aty8

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1065-1078, 2022, DOI:10.32604/cmc.2022.020103 - 03 November 2021

    Abstract We present a novel quantum algorithm to evaluate the hamming distance between two unknown oracles via measuring the degree of entanglement between two ancillary qubits. In particular, we use the power of the entanglement degree based quantum computing model that preserves at most the locality of interactions within the quantum model structure. This model uses one of two techniques to retrieve the solution of a quantum computing problem at hand. In the first technique, the solution of the problem is obtained based on whether there is an entanglement between the two ancillary qubits or not.… More >

  • Open Access

    ARTICLE

    Novel Ransomware Hiding Model Using HEVC Steganography Approach

    Iman Almomani1,2,*, Aala AlKhayer1, Walid El-Shafai1,3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1209-1228, 2022, DOI:10.32604/cmc.2022.018631 - 07 September 2021

    Abstract Ransomware is considered one of the most threatening cyberattacks. Existing solutions have focused mainly on discriminating ransomware by analyzing the apps themselves, but they have overlooked possible ways of hiding ransomware apps and making them difficult to be detected and then analyzed. Therefore, this paper proposes a novel ransomware hiding model by utilizing a block-based High-Efficiency Video Coding (HEVC) steganography approach. The main idea of the proposed steganography approach is the division of the secret ransomware data and cover HEVC frames into different blocks. After that, the Least Significant Bit (LSB) based Hamming Distance (HD)… More >

  • Open Access

    ARTICLE

    Achieving Privacy-Preserving Iris Identification Via El Gamal

    Yong Ding1, Lei Tian1, Bo Han2, Huiyong Wang2,*, Yujue Wang1, James Xi Zheng3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 727-738, 2019, DOI:10.32604/cmc.2019.06220

    Abstract Currently, many biometric systems maintain the user’s biometrics and templates in plaintext format, which brings great privacy risk to uses’ biometric information. Biometrics are unique and almost unchangeable, which means it is a great concern for users on whether their biometric information would be leaked. To address this issue, this paper proposes a confidential comparison algorithm for iris feature vectors with masks, and develops a privacy-preserving iris verification scheme based on the El Gamal encryption scheme. In our scheme, the multiplicative homomorphism of encrypted features is used to compare of iris features and their mask More >

Displaying 1-10 on page 1 of 4. Per Page