Home / Journals / CMES / Vol.141, No.1, 2024
Special Issues
Table of Content
  • Open AccessOpen Access

    EDITORIAL

    Introduction to the Special Issue on Computer-Aided Uncertainty Modeling and Reliability Evaluation for Complex Engineering Structures

    Debiao Meng1,*, Abílio Manuel Pinho de Jesus2, Zeng Meng3
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 1-5, 2024, DOI:10.32604/cmes.2024.056319
    (This article belongs to the Special Issue: Computer-Aided Uncertainty Modeling and Reliability Evaluation for Complex Engineering Structures)
    Abstract This article has no abstract. More >

  • Open AccessOpen Access

    EDITORIAL

    Introduction to the Special Issue on Machine Learning-Guided Intelligent Modeling with Its Industrial Applications

    Xiong Luo1,*, Yongqiang Cheng2, Zhifang Liao3
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 7-11, 2024, DOI:10.32604/cmes.2024.056214
    (This article belongs to the Special Issue: Machine Learning-Guided Intelligent Modeling with Its Industrial Applications)
    Abstract This article has no abstract. More >

  • Open AccessOpen Access

    REVIEW

    An Investigation on Open-RAN Specifications: Use Cases, Security Threats, Requirements, Discussions

    Heejae Park1, Tri-Hai Nguyen2, Laihyuk Park1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 13-41, 2024, DOI:10.32604/cmes.2024.052394
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract The emergence of various technologies such as terahertz communications, Reconfigurable Intelligent Surfaces (RIS), and AI-powered communication services will burden network operators with rising infrastructure costs. Recently, the Open Radio Access Network (O-RAN) has been introduced as a solution for growing financial and operational burdens in Beyond 5G (B5G) and 6G networks. O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs. By disaggregating conventional Base Band Units (BBUs) into O-RAN Distributed Units (O-DU) and O-RAN Centralized Units (O-CU), O-RAN offers greater flexibility for upgrades and network automation. However, this openness introduces new security More >

  • Open AccessOpen Access

    REVIEW

    Unlocking the Potential: A Comprehensive Systematic Review of ChatGPT in Natural Language Processing Tasks

    Ebtesam Ahmad Alomari*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 43-85, 2024, DOI:10.32604/cmes.2024.052256
    (This article belongs to the Special Issue: Emerging Artificial Intelligence Technologies and Applications)
    Abstract As Natural Language Processing (NLP) continues to advance, driven by the emergence of sophisticated large language models such as ChatGPT, there has been a notable growth in research activity. This rapid uptake reflects increasing interest in the field and induces critical inquiries into ChatGPT’s applicability in the NLP domain. This review paper systematically investigates the role of ChatGPT in diverse NLP tasks, including information extraction, Name Entity Recognition (NER), event extraction, relation extraction, Part of Speech (PoS) tagging, text classification, sentiment analysis, emotion recognition and text annotation. The novelty of this work lies in its… More >

  • Open AccessOpen Access

    ARTICLE

    Convolution-Transformer for Image Feature Extraction

    Lirong Yin1, Lei Wang1, Siyu Lu2,*, Ruiyang Wang2, Youshuai Yang2, Bo Yang2, Shan Liu2, Ahmed AlSanad3, Salman A. AlQahtani3, Zhengtong Yin4, Xiaolu Li5, Xiaobing Chen6, Wenfeng Zheng3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 87-106, 2024, DOI:10.32604/cmes.2024.051083
    Abstract This study addresses the limitations of Transformer models in image feature extraction, particularly their lack of inductive bias for visual structures. Compared to Convolutional Neural Networks (CNNs), the Transformers are more sensitive to different hyperparameters of optimizers, which leads to a lack of stability and slow convergence. To tackle these challenges, we propose the Convolution-based Efficient Transformer Image Feature Extraction Network (CEFormer) as an enhancement of the Transformer architecture. Our model incorporates E-Attention, depthwise separable convolution, and dilated convolution to introduce crucial inductive biases, such as translation invariance, locality, and scale invariance, into the Transformer… More >

  • Open AccessOpen Access

    ARTICLE

    Magneto-Photo-Thermoelastic Excitation Rotating Semiconductor Medium Based on Moisture Diffusivity

    Khaled Lotfy1,2, A. M. S. Mahdy3,*, Alaa A. El-Bary4, E. S. Elidy1
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 107-126, 2024, DOI:10.32604/cmes.2024.053199
    Abstract In this research, we focus on the free-surface deformation of a one-dimensional elastic semiconductor medium as a function of magnetic field and moisture diffusivity. The problem aims to analyze the interconnection between plasma and moisture diffusivity processes, as well as thermo-elastic waves. The study examines the photo-thermoelasticity transport process while considering the impact of moisture diffusivity. By employing Laplace’s transformation technique, we derive the governing equations of the photo-thermo-elastic medium. These equations include the equations for carrier density, elastic waves, moisture transport, heat conduction, and constitutive relationships. Mechanical stresses, thermal conditions, and plasma boundary conditions More >

  • Open AccessOpen Access

    ARTICLE

    Bio-Inspired Intelligent Routing in WSN: Integrating Mayfly Optimization and Enhanced Ant Colony Optimization for Energy-Efficient Cluster Formation and Maintenance

    V. G. Saranya*, S. Karthik
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 127-150, 2024, DOI:10.32604/cmes.2024.053825
    Abstract Wireless Sensor Networks (WSNs) are a collection of sensor nodes distributed in space and connected through wireless communication. The sensor nodes gather and store data about the real world around them. However, the nodes that are dependent on batteries will ultimately suffer an energy loss with time, which affects the lifetime of the network. This research proposes to achieve its primary goal by reducing energy consumption and increasing the network’s lifetime and stability. The present technique employs the hybrid Mayfly Optimization Algorithm-Enhanced Ant Colony Optimization (MFOA-EACO), where the Mayfly Optimization Algorithm (MFOA) is used to… More >

  • Open AccessOpen Access

    ARTICLE

    Updated Lagrangian Particle Hydrodynamics (ULPH) Modeling of Natural Convection Problems

    Junsong Xiong1, Zhen Wang2, Shaofan Li3, Xin Lai1,*, Lisheng Liu2,*, Xiang Liu2
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 151-169, 2024, DOI:10.32604/cmes.2024.053078
    Abstract Natural convection is a heat transfer mechanism driven by temperature or density differences, leading to fluid motion without external influence. It occurs in various natural and engineering phenomena, influencing heat transfer, climate, and fluid mixing in industrial processes. This work aims to use the Updated Lagrangian Particle Hydrodynamics (ULPH) theory to address natural convection problems. The Navier-Stokes equation is discretized using second-order nonlocal differential operators, allowing a direct solution of the Laplace operator for temperature in the energy equation. Various numerical simulations, including cases such as natural convection in square cavities and two concentric cylinders, More >

  • Open AccessOpen Access

    ARTICLE

    PDE Standardization Analysis and Solution of Typical Mechanics Problems

    Ningjie Wang1, Yihao Wang1, Yongle Pei2, Luxian Li1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 171-186, 2024, DOI:10.32604/cmes.2024.053520
    Abstract A numerical approach is an effective means of solving boundary value problems (BVPs). This study focuses on physical problems with general partial differential equations (PDEs). It investigates the solution approach through the standard forms of the PDE module in COMSOL. Two typical mechanics problems are exemplified: The deflection of a thin plate, which can be addressed with the dedicated finite element module, and the stress of a pure bending beam that cannot be tackled. The procedure for the two problems regarding the three standard forms required by the PDE module is detailed. The results were More >

  • Open AccessOpen Access

    ARTICLE

    A Microseismic Signal Denoising Algorithm Combining VMD and Wavelet Threshold Denoising Optimized by BWOA

    Dijun Rao1,2,3,4, Min Huang1,2,3,5, Xiuzhi Shi4, Zhi Yu6,*, Zhengxiang He7
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 187-217, 2024, DOI:10.32604/cmes.2024.051402
    (This article belongs to the Special Issue: Bio-inspired Optimization in Engineering and Sciences)
    Abstract The denoising of microseismic signals is a prerequisite for subsequent analysis and research. In this research, a new microseismic signal denoising algorithm called the Black Widow Optimization Algorithm (BWOA) optimized Variational Mode Decomposition (VMD) joint Wavelet Threshold Denoising (WTD) algorithm (BVW) is proposed. The BVW algorithm integrates VMD and WTD, both of which are optimized by BWOA. Specifically, this algorithm utilizes VMD to decompose the microseismic signal to be denoised into several Band-Limited Intrinsic Mode Functions (BLIMFs). Subsequently, these BLIMFs whose correlation coefficients with the microseismic signal to be denoised are higher than a threshold… More >

  • Open AccessOpen Access

    ARTICLE

    BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems

    Farouq Zitouni1,*, Saad Harous2, Abdulaziz S. Almazyad3, Ali Wagdy Mohamed4,5, Guojiang Xiong6, Fatima Zohra Khechiba1, Khadidja Kherchouche1
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 219-265, 2024, DOI:10.32604/cmes.2024.052001
    (This article belongs to the Special Issue: Meta-heuristic Algorithms in Materials Science and Engineering)
    Abstract Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems. This approach aims to leverage the strengths of multiple algorithms, enhancing solution quality, convergence speed, and robustness, thereby offering a more versatile and efficient means of solving intricate real-world optimization tasks. In this paper, we introduce a hybrid algorithm that amalgamates three distinct metaheuristics: the Beluga Whale Optimization (BWO), the Honey Badger Algorithm (HBA), and the Jellyfish Search (JS) optimizer. The proposed hybrid algorithm will be referred to as BHJO. Through this fusion, the BHJO algorithm aims to… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Extended Fisher-Kolmogorov Equation in 2D Utilizing the Generalized Finite Difference Method with Supplementary Nodes

    Bingrui Ju1,2, Wenxiang Sun2, Wenzhen Qu1,2,*, Yan Gu2
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 267-280, 2024, DOI:10.32604/cmes.2024.052159
    (This article belongs to the Special Issue: New Trends on Meshless Method and Numerical Analysis)
    Abstract In this study, we propose an efficient numerical framework to attain the solution of the extended Fisher-Kolmogorov (EFK) problem. The temporal derivative in the EFK equation is approximated by utilizing the Crank-Nicolson scheme. Following temporal discretization, the generalized finite difference method (GFDM) with supplementary nodes is utilized to address the nonlinear boundary value problems at each time node. These supplementary nodes are distributed along the boundary to match the number of boundary nodes. By incorporating supplementary nodes, the resulting nonlinear algebraic equations can effectively satisfy the governing equation and boundary conditions of the EFK equation. More >

  • Open AccessOpen Access

    ARTICLE

    A Collocation Technique via Pell-Lucas Polynomials to Solve Fractional Differential Equation Model for HIV/AIDS with Treatment Compartment

    Gamze Yıldırım1,2, Şuayip Yüzbaşı3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 281-310, 2024, DOI:10.32604/cmes.2024.052181
    (This article belongs to the Special Issue: Mathematical Aspects of Computational Biology and Bioinformatics-II)
    Abstract In this study, a numerical method based on the Pell-Lucas polynomials (PLPs) is developed to solve the fractional order HIV/AIDS epidemic model with a treatment compartment. The HIV/AIDS mathematical model with a treatment compartment is divided into five classes, namely, susceptible patients (S), HIV-positive individuals (I), individuals with full-blown AIDS but not receiving ARV treatment (A), individuals being treated (T), and individuals who have changed their sexual habits sufficiently (R). According to the method, by utilizing the PLPs and the collocation points, we convert the fractional order HIV/AIDS epidemic model with a treatment compartment into… More >

  • Open AccessOpen Access

    ARTICLE

    Numerical Analysis of Bacterial Meningitis Stochastic Delayed Epidemic Model through Computational Methods

    Umar Shafique1,*, Mohamed Mahyoub Al-Shamiri2, Ali Raza3, Emad Fadhal4,*, Muhammad Rafiq5,6, Nauman Ahmed5,7
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 311-329, 2024, DOI:10.32604/cmes.2024.052383
    (This article belongs to the Special Issue: Mathematical Aspects of Computational Biology and Bioinformatics-II)
    Abstract Based on the World Health Organization (WHO), Meningitis is a severe infection of the meninges, the membranes covering the brain and spinal cord. It is a devastating disease and remains a significant public health challenge. This study investigates a bacterial meningitis model through deterministic and stochastic versions. Four-compartment population dynamics explain the concept, particularly the susceptible population, carrier, infected, and recovered. The model predicts the nonnegative equilibrium points and reproduction number, i.e., the Meningitis-Free Equilibrium (MFE), and Meningitis-Existing Equilibrium (MEE). For the stochastic version of the existing deterministic model, the two methodologies studied are transition… More >

  • Open AccessOpen Access

    ARTICLE

    A Linked List Encryption Scheme for Image Steganography without Embedding

    Pengbiao Zhao1, Qi Zhong2, Jingxue Chen1, Xiaopei Wang3, Zhen Qin1, Erqiang Zhou1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 331-352, 2024, DOI:10.32604/cmes.2024.050148
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract Information steganography has received more and more attention from scholars nowadays, especially in the area of image steganography, which uses image content to transmit information and makes the existence of secret information undetectable. To enhance concealment and security, the Steganography without Embedding (SWE) method has proven effective in avoiding image distortion resulting from cover modification. In this paper, a novel encrypted communication scheme for image SWE is proposed. It reconstructs the image into a multi-linked list structure consisting of numerous nodes, where each pixel is transformed into a single node with data and pointer domains.… More >

  • Open AccessOpen Access

    ARTICLE

    Image Steganography by Pixel-Value Differencing Using General Quantization Ranges

    Da-Chun Wu*, Zong-Nan Shih
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 353-383, 2024, DOI:10.32604/cmes.2024.050813
    (This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
    Abstract A new steganographic method by pixel-value differencing (PVD) using general quantization ranges of pixel pairs’ difference values is proposed. The objective of this method is to provide a data embedding technique with a range table with range widths not limited to powers of 2, extending PVD-based methods to enhance their flexibility and data-embedding rates without changing their capabilities to resist security attacks. Specifically, the conventional PVD technique partitions a grayscale image into 1 × 2 non-overlapping blocks. The entire range [0, 255] of all possible absolute values of the pixel pairs’ grayscale differences in the… More >

  • Open AccessOpen Access

    ARTICLE

    Incorporating Lasso Regression to Physics-Informed Neural Network for Inverse PDE Problem

    Meng Ma1,2,*, Liu Fu1,2, Xu Guo3, Zhi Zhai1,2
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 385-399, 2024, DOI:10.32604/cmes.2024.052585
    (This article belongs to the Special Issue: Machine Learning Based Computational Mechanics)
    Abstract Partial Differential Equation (PDE) is among the most fundamental tools employed to model dynamic systems. Existing PDE modeling methods are typically derived from established knowledge and known phenomena, which are time-consuming and labor-intensive. Recently, discovering governing PDEs from collected actual data via Physics Informed Neural Networks (PINNs) provides a more efficient way to analyze fresh dynamic systems and establish PED models. This study proposes Sequentially Threshold Least Squares-Lasso (STLasso), a module constructed by incorporating Lasso regression into the Sequentially Threshold Least Squares (STLS) algorithm, which can complete sparse regression of PDE coefficients with the constraints More >

  • Open AccessOpen Access

    ARTICLE

    Explainable Artificial Intelligence (XAI) Model for Cancer Image Classification

    Amit Singhal1, Krishna Kant Agrawal2, Angeles Quezada3, Adrian Rodriguez Aguiñaga4, Samantha Jiménez4, Satya Prakash Yadav5,,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 401-441, 2024, DOI:10.32604/cmes.2024.051363
    (This article belongs to the Special Issue: Intelligent Medical Decision Support Systems: Methods and Applications)
    Abstract The use of Explainable Artificial Intelligence (XAI) models becomes increasingly important for making decisions in smart healthcare environments. It is to make sure that decisions are based on trustworthy algorithms and that healthcare workers understand the decisions made by these algorithms. These models can potentially enhance interpretability and explainability in decision-making processes that rely on artificial intelligence. Nevertheless, the intricate nature of the healthcare field necessitates the utilization of sophisticated models to classify cancer images. This research presents an advanced investigation of XAI models to classify cancer images. It describes the different levels of explainability… More >

  • Open AccessOpen Access

    ARTICLE

    Integrating Transformer and Bidirectional Long Short-Term Memory for Intelligent Breast Cancer Detection from Histopathology Biopsy Images

    Prasanalakshmi Balaji1,*, Omar Alqahtani1, Sangita Babu2, Mousmi Ajay Chaurasia3, Shanmugapriya Prakasam4
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 443-458, 2024, DOI:10.32604/cmes.2024.053158
    (This article belongs to the Special Issue: Intelligent Medical Decision Support Systems: Methods and Applications)
    Abstract Breast cancer is a significant threat to the global population, affecting not only women but also a threat to the entire population. With recent advancements in digital pathology, Eosin and hematoxylin images provide enhanced clarity in examining microscopic features of breast tissues based on their staining properties. Early cancer detection facilitates the quickening of the therapeutic process, thereby increasing survival rates. The analysis made by medical professionals, especially pathologists, is time-consuming and challenging, and there arises a need for automated breast cancer detection systems. The upcoming artificial intelligence platforms, especially deep learning models, play an More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Progressively Type-II Inverted Generalized Gamma Censored Data and Its Engineering Application

    Refah Alotaibi1, Sanku Dey2, Ahmed Elshahhat3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 459-489, 2024, DOI:10.32604/cmes.2024.053255
    (This article belongs to the Special Issue: Incomplete Data Test, Analysis and Fusion Under Complex Environments)
    Abstract A novel inverted generalized gamma (IGG) distribution, proposed for data modelling with an upside-down bathtub hazard rate, is considered. In many real-world practical situations, when a researcher wants to conduct a comparative study of the life testing of items based on cost and duration of testing, censoring strategies are frequently used. From this point of view, in the presence of censored data compiled from the most well-known progressively Type-II censoring technique, this study examines different parameters of the IGG distribution. From a classical point of view, the likelihood and product of spacing estimation methods are… More >

  • Open AccessOpen Access

    ARTICLE

    An Updated Lagrangian Particle Hydrodynamics (ULPH)-NOSBPD Coupling Approach for Modeling Fluid-Structure Interaction Problem

    Zhen Wang1, Junsong Xiong1, Shaofan Li2, Xin Lai1,3,*, Xiang Liu3, Lisheng Liu1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 491-523, 2024, DOI:10.32604/cmes.2024.052923
    (This article belongs to the Special Issue: Peridynamic Theory and Multi-physical/Multiscale Methods for Complex Material Behavior)
    Abstract A fluid-structure interaction approach is proposed in this paper based on Non-Ordinary State-Based Peridynamics (NOSB-PD) and Updated Lagrangian Particle Hydrodynamics (ULPH) to simulate the fluid-structure interaction problem with large geometric deformation and material failure and solve the fluid-structure interaction problem of Newtonian fluid. In the coupled framework, the NOSB-PD theory describes the deformation and fracture of the solid material structure. ULPH is applied to describe the flow of Newtonian fluids due to its advantages in computational accuracy. The framework utilizes the advantages of NOSB-PD theory for solving discontinuous problems and ULPH theory for solving fluid… More >

  • Open AccessOpen Access

    ARTICLE

    Artificial Intelligence Prediction of One-Part Geopolymer Compressive Strength for Sustainable Concrete

    Mohamed Abdel-Mongy1, Mudassir Iqbal2, M. Farag3, Ahmed. M. Yosri1,*, Fahad Alsharari1, Saif Eldeen A. S. Yousef4
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 525-543, 2024, DOI:10.32604/cmes.2024.052505
    (This article belongs to the Special Issue: Recent Advances in Computational Methods for Performance Assessment of Engineering Structures and Materials against Dynamic Loadings)
    Abstract Alkali-activated materials/geopolymer (AAMs), due to their low carbon emission content, have been the focus of recent studies on ecological concrete. In terms of performance, fly ash and slag are preferred materials for precursors for developing a one-part geopolymer. However, determining the optimum content of the input parameters to obtain adequate performance is quite challenging and scarcely reported. Therefore, in this study, machine learning methods such as artificial neural networks (ANN) and gene expression programming (GEP) models were developed using MATLAB and GeneXprotools, respectively, for the prediction of compressive strength under variable input materials and content… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes

    Yongjin Jeon, Seungjun Baek#, Jongsung Kim*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 545-561, 2024, DOI:10.32604/cmes.2024.052374
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract Quantum computers accelerate many algorithms based on the superposition principle of quantum mechanics. The Grover algorithm provides significant performance to malicious users attacking symmetric key systems. Since the performance of attacks using quantum computers depends on the efficiency of the quantum circuit of the encryption algorithms, research research on the implementation of quantum circuits is essential. This paper presents a new framework to construct quantum circuits of substitution boxes (S-boxes) using system modeling. We model the quantum circuits of S-boxes using two layers: Toffoli and linear layers. We generate vector spaces based on the values… More >

  • Open AccessOpen Access

    ARTICLE

    Malware Detection Using Dual Siamese Network Model

    ByeongYeol An1, JeaHyuk Yang2, Seoyeon Kim2, Taeguen Kim3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 563-584, 2024, DOI:10.32604/cmes.2024.052403
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract This paper proposes a new approach to counter cyberattacks using the increasingly diverse malware in cyber security. Traditional signature detection methods that utilize static and dynamic features face limitations due to the continuous evolution and diversity of new malware. Recently, machine learning-based malware detection techniques, such as Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN), have gained attention. While these methods demonstrate high performance by leveraging static and dynamic features, they are limited in detecting new malware or variants because they learn based on the characteristics of existing malware. To overcome these limitations, malware… More >

  • Open AccessOpen Access

    ARTICLE

    Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction

    Min-Gyu Kim1, Hwankuk Kim2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 585-607, 2024, DOI:10.32604/cmes.2024.051221
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract In the IoT (Internet of Things) domain, the increased use of encryption protocols such as SSL/TLS, VPN (Virtual Private Network), and Tor has led to a rise in attacks leveraging encrypted traffic. While research on anomaly detection using AI (Artificial Intelligence) is actively progressing, the encrypted nature of the data poses challenges for labeling, resulting in data imbalance and biased feature extraction toward specific nodes. This study proposes a reconstruction error-based anomaly detection method using an autoencoder (AE) that utilizes packet metadata excluding specific node information. The proposed method omits biased packet metadata such as… More >

  • Open AccessOpen Access

    ARTICLE

    FedAdaSS: Federated Learning with Adaptive Parameter Server Selection Based on Elastic Cloud Resources

    Yuwei Xu, Baokang Zhao*, Huan Zhou, Jinshu Su
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 609-629, 2024, DOI:10.32604/cmes.2024.053462
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract The rapid expansion of artificial intelligence (AI) applications has raised significant concerns about user privacy, prompting the development of privacy-preserving machine learning (ML) paradigms such as federated learning (FL). FL enables the distributed training of ML models, keeping data on local devices and thus addressing the privacy concerns of users. However, challenges arise from the heterogeneous nature of mobile client devices, partial engagement of training, and non-independent identically distributed (non-IID) data distribution, leading to performance degradation and optimization objective bias in FL training. With the development of 5G/6G networks and the integration of cloud computing… More >

  • Open AccessOpen Access

    ARTICLE

    A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments

    Borja Bordel Sánchez1,*, Ramón Alcarria2, Tomás Robles1
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 631-654, 2024, DOI:10.32604/cmes.2024.050349
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract Future 6G communications are envisioned to enable a large catalogue of pioneering applications. These will range from networked Cyber-Physical Systems to edge computing devices, establishing real-time feedback control loops critical for managing Industry 5.0 deployments, digital agriculture systems, and essential infrastructures. The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised. While full automation will enhance industrial efficiency significantly, it concurrently introduces new cyber risks and vulnerabilities. In particular, unattended systems are highly susceptible to trust issues: malicious nodes and false information can be easily introduced into… More >

  • Open AccessOpen Access

    ARTICLE

    MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

    Arpita Dinesh Sarang1, Mohsen Ali Alawami2, Ki-Woong Park3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 655-669, 2024, DOI:10.32604/cmes.2024.053434
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract Nowadays, the use of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes. Therefore, the Avatar and Metaverse are being developed with a new theory, application, and design, necessitating the association of more personal data and devices of targeted users every day. This Avatar and Metaverse technology explosion raises privacy and security concerns, leading to cyber attacks. MV-Honeypot, or Metaverse-Honeypot, as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities, should be developed. To fill this gap, we study user’s More >

    Graphic Abstract

    MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

  • Open AccessOpen Access

    ARTICLE

    Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System

    Youngho Park1, Su Jin Shin2, Sang Uk Shin3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 671-688, 2024, DOI:10.32604/cmes.2024.052378
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract Data trading enables data owners and data requesters to sell and purchase data. With the emergence of blockchain technology, research on blockchain-based data trading systems is receiving a lot of attention. Particularly, to reduce the on-chain storage cost, a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform. Moreover, the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace. In the data marketplace, it is a challenge how to trade the data securely… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Communication Accessibility: UrSL-CNN Approach to Urdu Sign Language Translation for Hearing-Impaired Individuals

    Khushal Das1, Fazeel Abid2, Jawad Rasheed3,4,*, Kamlish5, Tunc Asuroglu6,*, Shtwai Alsubai7, Safeeullah Soomro8
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 689-711, 2024, DOI:10.32604/cmes.2024.051335
    (This article belongs to the Special Issue: Artificial Intelligence Emerging Trends and Sustainable Applications in Image Processing and Computer Vision)
    Abstract Deaf people or people facing hearing issues can communicate using sign language (SL), a visual language. Many works based on rich source language have been proposed; however, the work using poor resource language is still lacking. Unlike other SLs, the visuals of the Urdu Language are different. This study presents a novel approach to translating Urdu sign language (UrSL) using the UrSL-CNN model, a convolutional neural network (CNN) architecture specifically designed for this purpose. Unlike existing works that primarily focus on languages with rich resources, this study addresses the challenge of translating a sign language… More >

  • Open AccessOpen Access

    ARTICLE

    Two-Layer Attention Feature Pyramid Network for Small Object Detection

    Sheng Xiang1, Junhao Ma1, Qunli Shang1, Xianbao Wang1,*, Defu Chen1,2
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 713-731, 2024, DOI:10.32604/cmes.2024.052759
    (This article belongs to the Special Issue: Artificial Intelligence Emerging Trends and Sustainable Applications in Image Processing and Computer Vision)
    Abstract Effective small object detection is crucial in various applications including urban intelligent transportation and pedestrian detection. However, small objects are difficult to detect accurately because they contain less information. Many current methods, particularly those based on Feature Pyramid Network (FPN), address this challenge by leveraging multi-scale feature fusion. However, existing FPN-based methods often suffer from inadequate feature fusion due to varying resolutions across different layers, leading to suboptimal small object detection. To address this problem, we propose the Two-layer Attention Feature Pyramid Network (TA-FPN), featuring two key modules: the Two-layer Attention Module (TAM) and the… More >

    Graphic Abstract

    Two-Layer Attention Feature Pyramid Network for Small Object Detection

  • Open AccessOpen Access

    ARTICLE

    AI-Based Helmet Violation Detection for Traffic Management System

    Yahia Said1,*, Yahya Alassaf2, Refka Ghodhbani3, Yazan Ahmad Alsariera4, Taoufik Saidani3, Olfa Ben Rhaiem4, Mohamad Khaled Makhdoum1, Manel Hleili5
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 733-749, 2024, DOI:10.32604/cmes.2024.052369
    (This article belongs to the Special Issue: Artificial Intelligence Emerging Trends and Sustainable Applications in Image Processing and Computer Vision)
    Abstract Enhancing road safety globally is imperative, especially given the significant portion of traffic-related fatalities attributed to motorcycle accidents resulting from non-compliance with helmet regulations. Acknowledging the critical role of helmets in rider protection, this paper presents an innovative approach to helmet violation detection using deep learning methodologies. The primary innovation involves the adaptation of the PerspectiveNet architecture, transitioning from the original Res2Net to the more efficient EfficientNet v2 backbone, aimed at bolstering detection capabilities. Through rigorous optimization techniques and extensive experimentation utilizing the India driving dataset (IDD) for training and validation, the system demonstrates exceptional More >

  • Open AccessOpen Access

    ARTICLE

    A Pooling Method Developed for Use in Convolutional Neural Networks

    İsmail Akgül*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 751-770, 2024, DOI:10.32604/cmes.2024.052549
    (This article belongs to the Special Issue: Emerging Artificial Intelligence Technologies and Applications)
    Abstract In convolutional neural networks, pooling methods are used to reduce both the size of the data and the number of parameters after the convolution of the models. These methods reduce the computational amount of convolutional neural networks, making the neural network more efficient. Maximum pooling, average pooling, and minimum pooling methods are generally used in convolutional neural networks. However, these pooling methods are not suitable for all datasets used in neural network applications. In this study, a new pooling approach to the literature is proposed to increase the efficiency and success rates of convolutional neural… More >

  • Open AccessOpen Access

    ARTICLE

    DPAL-BERT: A Faster and Lighter Question Answering Model

    Lirong Yin1, Lei Wang1, Zhuohang Cai2, Siyu Lu2,*, Ruiyang Wang2, Ahmed AlSanad3, Salman A. AlQahtani3, Xiaobing Chen4, Zhengtong Yin5, Xiaolu Li6, Wenfeng Zheng2,3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 771-786, 2024, DOI:10.32604/cmes.2024.052622
    (This article belongs to the Special Issue: Emerging Artificial Intelligence Technologies and Applications)
    Abstract Recent advancements in natural language processing have given rise to numerous pre-training language models in question-answering systems. However, with the constant evolution of algorithms, data, and computing power, the increasing size and complexity of these models have led to increased training costs and reduced efficiency. This study aims to minimize the inference time of such models while maintaining computational performance. It also proposes a novel Distillation model for PAL-BERT (DPAL-BERT), specifically, employs knowledge distillation, using the PAL-BERT model as the teacher model to train two student models: DPAL-BERT-Bi and DPAL-BERT-C. This research enhances the dataset More >

  • Open AccessOpen Access

    ARTICLE

    Optimizing Connections: Applied Shortest Path Algorithms for MANETs

    Ibrahim Alameri1,*, Jitka Komarkova2, Tawfik Al-Hadhrami3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 787-807, 2024, DOI:10.32604/cmes.2024.052107
    (This article belongs to the Special Issue: Computer Modeling for Future Communications and Networks)
    Abstract This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks (MANETs) from dynamic topologies that pose great challenges because of the mobility of nodes. The main objective was to delve into and refine the application of the Dijkstra's algorithm in this context, a method conventionally esteemed for its efficiency in static networks. Thus, this paper has carried out a comparative theoretical analysis with the Bellman-Ford algorithm, considering adaptation to the dynamic network conditions that are typical for MANETs. This paper has shown through detailed algorithmic analysis that Dijkstra’s… More >

  • Open AccessOpen Access

    ARTICLE

    Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers (DID)

    Iuon-Chang Lin1, I-Ling Yeh1, Ching-Chun Chang2, Jui-Chuan Liu3, Chin-Chen Chang3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 809-822, 2024, DOI:10.32604/cmes.2024.051612
    (This article belongs to the Special Issue: Key Technologies and Applications of Blockchain Technology in Supply Chain Intelligence and Trust Establishment)
    Abstract Centralized storage and identity identification methods pose many risks, including hacker attacks, data misuse, and single points of failure. Additionally, existing centralized identity management methods face interoperability issues and rely on a single identity provider, leaving users without control over their identities. Therefore, this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers. The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity. Data is stored on InterPlanetary File System (IPFS) to avoid the risk of single More >

  • Open AccessOpen Access

    ARTICLE

    Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks

    Muaadh A. Alsoufi1,*, Maheyzah Md Siraj1, Fuad A. Ghaleb2, Muna Al-Razgan3, Mahfoudh Saeed Al-Asaly3, Taha Alfakih3, Faisal Saeed2
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 823-845, 2024, DOI:10.32604/cmes.2024.052112
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract The rapid growth of Internet of Things (IoT) devices has brought numerous benefits to the interconnected world. However, the ubiquitous nature of IoT networks exposes them to various security threats, including anomaly intrusion attacks. In addition, IoT devices generate a high volume of unstructured data. Traditional intrusion detection systems often struggle to cope with the unique characteristics of IoT networks, such as resource constraints and heterogeneous data sources. Given the unpredictable nature of network technologies and diverse intrusion methods, conventional machine-learning approaches seem to lack efficiency. Across numerous research domains, deep learning techniques have demonstrated… More >

  • Open AccessOpen Access

    ARTICLE

    Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain

    Zengxiang Li1, Yongchong Wu2, Alanoud Al Mazroa3, Donghua Jiang4, Jianhua Wu5, Xishun Zhu6,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 847-869, 2024, DOI:10.32604/cmes.2024.051762
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract Hidden capacity, concealment, security, and robustness are essential indicators of hiding algorithms. Currently, hiding algorithms tend to focus on algorithmic capacity, concealment, and security but often overlook the robustness of the algorithms. In practical applications, the container can suffer from damage caused by noise, cropping, and other attacks during transmission, resulting in challenging or even impossible complete recovery of the secret image. An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms. In this proposed algorithm, a secret… More >

  • Open AccessOpen Access

    ARTICLE

    Determination of the Pile Drivability Using Random Forest Optimized by Particle Swarm Optimization and Bayesian Optimizer

    Shengdong Cheng1, Juncheng Gao1,*, Hongning Qi2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 871-892, 2024, DOI:10.32604/cmes.2024.052830
    (This article belongs to the Special Issue: Computational Intelligent Systems for Solving Complex Engineering Problems: Principles and Applications-II)
    Abstract Driven piles are used in many geological environments as a practical and convenient structural component. Hence, the determination of the drivability of piles is actually of great importance in complex geotechnical applications. Conventional methods of predicting pile drivability often rely on simplified physical models or empirical formulas, which may lack accuracy or applicability in complex geological conditions. Therefore, this study presents a practical machine learning approach, namely a Random Forest (RF) optimized by Bayesian Optimization (BO) and Particle Swarm Optimization (PSO), which not only enhances prediction accuracy but also better adapts to varying geological environments… More >

    Graphic Abstract

    Determination of the Pile Drivability Using Random Forest Optimized by Particle Swarm Optimization and Bayesian Optimizer

  • Open AccessOpen Access

    ARTICLE

    Marine Predators Algorithm with Deep Learning-Based Leukemia Cancer Classification on Medical Images

    Sonali Das1, Saroja Kumar Rout2, Sujit Kumar Panda1, Pradyumna Kumar Mohapatra3, Abdulaziz S. Almazyad4, Muhammed Basheer Jasser5,6,*, Guojiang Xiong7, Ali Wagdy Mohamed8,9
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 893-916, 2024, DOI:10.32604/cmes.2024.051856
    (This article belongs to the Special Issue: Advances in Swarm Intelligence Algorithms)
    Abstract In blood or bone marrow, leukemia is a form of cancer. A person with leukemia has an expansion of white blood cells (WBCs). It primarily affects children and rarely affects adults. Treatment depends on the type of leukemia and the extent to which cancer has established throughout the body. Identifying leukemia in the initial stage is vital to providing timely patient care. Medical image-analysis-related approaches grant safer, quicker, and less costly solutions while ignoring the difficulties of these invasive processes. It can be simple to generalize Computer vision (CV)-based and image-processing techniques and eradicate human… More >

  • Open AccessOpen Access

    ARTICLE

    A Hermitian C Differential Reproducing Kernel Interpolation Meshless Method for the 3D Microstructure-Dependent Static Flexural Analysis of Simply Supported and Functionally Graded Microplates

    Chih-Ping Wu*, Ruei-Syuan Chang
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 917-949, 2024, DOI:10.32604/cmes.2024.052307
    (This article belongs to the Special Issue: Theoretical and Computational Modeling of Advanced Materials and Structures-II)
    Abstract This work develops a Hermitian C differential reproducing kernel interpolation meshless (DRKIM) method within the consistent couple stress theory (CCST) framework to study the three-dimensional (3D) microstructure-dependent static flexural behavior of a functionally graded (FG) microplate subjected to mechanical loads and placed under full simple supports. In the formulation, we select the transverse stress and displacement components and their first- and second-order derivatives as primary variables. Then, we set up the differential reproducing conditions (DRCs) to obtain the shape functions of the Hermitian C differential reproducing kernel (DRK) interpolant’s derivatives without using direct differentiation. The interpolant’s… More >

Per Page:

Share Link