Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (144)
  • Open Access

    ARTICLE

    Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance

    Linghong Kuang1,2, Wenlong Shi1,2, Jing Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3193-3219, 2024, DOI:10.32604/cmc.2024.054377

    Abstract The Advanced Metering Infrastructure (AMI), as a crucial subsystem in the smart grid, is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers. However, with the advancement of information and communication technology, new security and privacy challenges have emerged for AMI. To address these challenges and enhance the security and privacy of user data in the smart grid, a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance (HPPM-AMICFA) is proposed in this paper. The proposed model integrates cloud and fog computing… More >

  • Open Access

    REVIEW

    Wood By-Products as UV Protection: A Consequence Review

    Naglaa Salem El‑Sayed, Mohamed Hasanin, Samir Kamel*

    Journal of Renewable Materials, Vol.12, No.4, pp. 699-720, 2024, DOI:10.32604/jrm.2024.049118

    Abstract In recent decades, the ozone layer has suffered considerable damage, increasing the entry of ultraviolet (UV) light into the atmosphere and reaching the earth’s surface, negatively affecting life. Accordingly, researchers aimed to solve this problem by synthesizing advanced UV-shielding materials. On the other hand, developing an easy and green strategy to prepare functional materials with outstanding properties based on naturally abundant and environmentally friendly raw materials is highly desirable for sustainable development. Because biomass-derived materials are sustainable and biodegradable, they present a promising substitute for petroleum-based polymers. The three main structural constituents of the plant More > Graphic Abstract

    Wood By-Products as UV Protection: A Consequence Review

  • Open Access

    REVIEW

    Molecular and cellular mechanisms of neuroprotection by oligopeptides from snake venoms

    CARLOS ALBERTO-SILVA*, BRENDA RUFINO DA SILVA

    BIOCELL, Vol.48, No.6, pp. 897-904, 2024, DOI:10.32604/biocell.2024.050443

    Abstract Venom snake-derived peptides have multiple biochemical, pharmacological, and toxicological profiles, allowing for the discovery of new medicinal products and therapeutic applications. This review specifically examines the fundamental elements of neuroprotection offered by different oligopeptides derived from snake venom. It also includes a brief evaluation of short peptides that are being considered as potential therapeutic agents. Proline-rich peptides and tryptophyllin family peptides isolated from the crude venom of Viperidae family snakes, specifically Bothrops atrox, Bothrops jararaca, and Bothrops moojeni, have been shown to have pro-survival properties, the ability to reduce oxidative stress, and the ability to promote cell viability More >

  • Open Access

    ARTICLE

    Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies

    Muhammad Ahmad Nawaz Ul Ghani1, Kun She1,*, Muhammad Arslan Rauf1, Shumaila Khan2, Javed Ali Khan3, Eman Abdullah Aldakheel4, Doaa Sami Khafaga4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2609-2623, 2024, DOI:10.32604/cmc.2024.049611

    Abstract The use of privacy-enhanced facial recognition has increased in response to growing concerns about data security and privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a variety of industries, including access control, law enforcement, surveillance, and internet communication. However, the growing usage of face recognition technology has created serious concerns about data monitoring and user privacy preferences, especially in context-aware systems. In response to these problems, this study provides a novel framework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain, and distributed computing… More >

  • Open Access

    ARTICLE

    VKFQ: A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain

    Youlin Ji, Bo Yin*, Ke Gu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4205-4223, 2024, DOI:10.32604/cmc.2024.049086

    Abstract With its untameable and traceable properties, blockchain technology has been widely used in the field of data sharing. How to preserve individual privacy while enabling efficient data queries is one of the primary issues with secure data sharing. In this paper, we study verifiable keyword frequency (KF) queries with local differential privacy in blockchain. Both the numerical and the keyword attributes are present in data objects; the latter are sensitive and require privacy protection. However, prior studies in blockchain have the problem of trilemma in privacy protection and are unable to handle KF queries. We… More >

  • Open Access

    ARTICLE

    A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism

    Nannan Wu1, Xianyi Chen1,*, James Msughter Adeke2, Junjie Zhao2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3001-3019, 2024, DOI:10.32604/cmc.2023.045311

    Abstract Recently, deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding. However, these approaches have some limitations. For example, a cover image lacks self-adaptability, information leakage, or weak concealment. To address these issues, this study proposes a universal and adaptable image-hiding method. First, a domain attention mechanism is designed by combining the Atrous convolution, which makes better use of the relationship between the secret image domain and the cover image domain. Second, to improve perceived human similarity, perceptual loss is incorporated into the training process. The experimental results are promising, with More >

  • Open Access

    ARTICLE

    Enhancing Identity Protection in Metaverse-Based Psychological Counseling System

    Jun Lee1, Hanna Lee2, Seong Chan Lee2, Hyun Kwon3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 617-632, 2024, DOI:10.32604/cmc.2023.045768

    Abstract Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regarding client identity. However, these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions, such as facial cues, to the counselor. This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling. The proposed system incorporates a voice modulation function that instantly modifies/masks the client’s voice to safeguard their identity. Additionally, it employs real-time client facial expression recognition using an ensemble of decision… More >

  • Open Access

    ARTICLE

    Multi-Scale Design and Optimization of Composite Material Structure for Heavy-Duty Truck Protection Device

    Yanhui Zhang1, Lianhua Ma1, Hailiang Su1,2,3,*, Jirong Qin2, Zhining Chen2, Kaibiao Deng1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1961-1980, 2024, DOI:10.32604/cmes.2023.045570

    Abstract In this paper, to present a lightweight-developed front underrun protection device (FUPD) for heavy-duty trucks, plain weave carbon fiber reinforced plastic (CFRP) is used instead of the original high-strength steel. First, the mechanical and structural properties of plain carbon fiber composite anti-collision beams are comparatively analyzed from a multi-scale perspective. For studying the design capability of carbon fiber composite materials, we investigate the effects of TC-33 carbon fiber diameter (D), fiber yarn width (W) and height (H), and fiber yarn density (N) on the front underrun protective beam of carbon fiber composite materials. Based on… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed More >

  • Open Access

    ARTICLE

    Wave Reflection by Rectangular Breakwaters for Coastal Protection

    Hasna Akarni*, Hamza Mabchour, Laila El Aarabi, Soumia Mordane

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.3, pp. 579-593, 2024, DOI:10.32604/fdmp.2023.043080

    Abstract In this study, we focus on the numerical modelling of the interaction between waves and submerged structures in the presence of a uniform flow current. Both the same and opposite senses of wave propagation are considered. The main objective is an understanding of the effect of the current and various geometrical parameters on the reflection coefficient. The wave used in the study is based on potential theory, and the submerged structures consist of two rectangular breakwaters positioned at a fixed distance from each other and attached to the bottom of a wave flume. The numerical More >

Displaying 1-10 on page 1 of 144. Per Page