Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,231)
  • Open Access

    ARTICLE

    MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

    Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 875-896, 2024, DOI:10.32604/cmc.2024.051685

    Abstract In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using… More >

  • Open Access

    ARTICLE

    Fully Completed Spherical Fuzzy Approach-Based Z Numbers (PHI Model) for Enhanced Group Expert Consensus

    Phi-Hung Nguyen*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1655-1675, 2024, DOI:10.32604/cmc.2024.050713

    Abstract This study aims to establish an expert consensus and enhance the efficacy of decision-making processes by integrating Spherical Fuzzy Sets (SFSs) and Z-Numbers (SFZs). A novel group expert consensus technique, the PHI model, is developed to address the inherent limitations of both SFSs and the traditional Delphi technique, particularly in uncertain, complex scenarios. In such contexts, the accuracy of expert knowledge and the confidence in their judgments are pivotal considerations. This study provides the fundamental operational principles and aggregation operators associated with SFSs and Z-numbers, encompassing weighted geometric and arithmetic operators alongside fully developed operators… More >

  • Open Access

    ARTICLE

    A Machine Learning Approach to Cyberbullying Detection in Arabic Tweets

    Dhiaa Musleh1, Atta Rahman1,*, Mohammed Abbas Alkherallah1, Menhal Kamel Al-Bohassan1, Mustafa Mohammed Alawami1, Hayder Ali Alsebaa1, Jawad Ali Alnemer1, Ghazi Fayez Al-Mutairi1, May Issa Aldossary2, Dalal A. Aldowaihi1, Fahd Alhaidari3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1033-1054, 2024, DOI:10.32604/cmc.2024.048003

    Abstract With the rapid growth of internet usage, a new situation has been created that enables practicing bullying. Cyberbullying has increased over the past decade, and it has the same adverse effects as face-to-face bullying, like anger, sadness, anxiety, and fear. With the anonymity people get on the internet, they tend to be more aggressive and express their emotions freely without considering the effects, which can be a reason for the increase in cyberbullying and it is the main motive behind the current study. This study presents a thorough background of cyberbullying and the techniques used… More >

  • Open Access

    ARTICLE

    Abaca Fiber as a Potential Reinforcer for Acoustic Absorption Material at Middle-High Frequencies

    Susilo Indrawati*, Lila Yuwana, Suyatno, Mochamad Zainuri, Darminto*

    Journal of Renewable Materials, Vol.12, No.5, pp. 909-921, 2024, DOI:10.32604/jrm.2024.048452

    Abstract Recently, abaca fibers have become the focus of specialized research due to their intriguing characteristics, with their outstanding mechanical properties being a particularly notable. In the conducted study, the abaca fibers underwent a preliminary treatment process involving an alkaline solution, which was composed of 0.5% sodium hydroxide (NaOH) and 50% acetic acid (CHCOOH). This process entailed immersing each fiber in the solution for a period of one hour. This treatment led to a 52.36% reduction in lignin content compared to the levels before treatment, resulting in a dramatic decrease in the full width at half… More > Graphic Abstract

    Abaca Fiber as a Potential Reinforcer for Acoustic Absorption Material at Middle-High Frequencies

  • Open Access

    ARTICLE

    Performance Analysis of Plant Shells/PVC Composites under Corrosion and Aging Conditions

    Haoping Yao1, Xinyu Zhong2, Chunxia He1,*

    Journal of Renewable Materials, Vol.12, No.5, pp. 993-1006, 2024, DOI:10.32604/jrm.2024.047758

    Abstract To make full use of plant shell fibers (rice husk, walnut shell, chestnut shell), three kinds of wood-plastic composites of plant shell fibers and polyvinyl chloride (PVC) were prepared. X-ray diffraction analysis was carried out on three kinds of plant shell fibers to test their crystallinity. The aging process of the composites was conducted under 2 different conditions. One was artificial seawater immersion and xenon lamp irradiation, and the other one was deionized water spray and xenon lamp irradiation. The mechanical properties (tensile strength, flexural strength, impact strength), changes in color, water absorption, Fourier transform… More >

  • Open Access

    REVIEW

    Biometric Authentication System on Mobile Environment: A Review

    Qasem Abu Al-Haija1,*, Sara Othman Al-Salameen2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 897-914, 2024, DOI:10.32604/csse.2024.050846

    Abstract The paper discusses the importance of biometric verification systems in mobile environments and highlights the challenges and strategies used to overcome them in order to ensure the security of mobile devices. Emphasis is placed on evaluating the impact of illumination on the performance of biometric verification techniques and how to address this challenge using image processing techniques. The importance of accurate and reliable data collection to ensure the accuracy of verification processes is also discussed. The paper also highlights the importance of improving biometric verification techniques and directing research toward developing models aimed at reducing More >

  • Open Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

  • Open Access

    ARTICLE

    Numerical Investigations on Fluid Flow and Heat Transfer Characteristics of an Ultra-Thin Heat Pipe with Separated Wick Structures

    Yasushi Koito1,*, Akira Fukushima2

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 869-887, 2024, DOI:10.32604/fhmt.2024.050910

    Abstract Thermal and fluid-flow characteristics were numerically analyzed for ultra-thin heat pipes. Many studies have been conducted for ultra-thin heat pipes with a centered wick structure, but this study focused on separated wick structures to increase the evaporation/condensation surface areas within the heat pipe and to reduce the concentration of heat flux within the wick structure. A mathematical heat-pipe model was made in the three-dimensional coordinate system, and the model consisted of three regions: a vapor channel, liquid-wick, and container wall regions. The conservation equations for mass, momentum, and energy were solved numerically with boundary conditions… More >

  • Open Access

    ARTICLE

    Composite Fractional Trapezoidal Rule with Romberg Integration

    Iqbal M. Batiha1,2,*, Rania Saadeh3, Iqbal H. Jebril1, Ahmad Qazza3, Abeer A. Al-Nana4, Shaher Momani2,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2729-2745, 2024, DOI:10.32604/cmes.2024.051588

    Abstract The aim of this research is to demonstrate a novel scheme for approximating the Riemann-Liouville fractional integral operator. This would be achieved by first establishing a fractional-order version of the -point Trapezoidal rule and then by proposing another fractional-order version of the -composite Trapezoidal rule. In particular, the so-called divided-difference formula is typically employed to derive the -point Trapezoidal rule, which has accordingly been used to derive a more accurate fractional-order formula called the -composite Trapezoidal rule. Additionally, in order to increase the accuracy of the proposed approximations by reducing the true errors, we incorporate More >

Displaying 1-10 on page 1 of 1231. Per Page