Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,317)
  • Open Access

    ARTICLE

    Moment Redistribution Effect of the Continuous Glass Fiber Reinforced Polymer-Concrete Composite Slabs Based on Static Loading Experiment

    Zhao-Jun Zhang1, Wen-Wei Wang1,2,*, Jing-Shui Zhen1, Bo-Cheng Li1, De-Cheng Cai1, Yang-Yang Du1, Hui Huang2

    Structural Durability & Health Monitoring, Vol.19, No.1, pp. 105-123, 2025, DOI:10.32604/sdhm.2024.052506 - 15 November 2024

    Abstract This study aimed to investigate the moment redistribution in continuous glass fiber reinforced polymer (GFRP)-concrete composite slabs caused by concrete cracking and steel bar yielding in the negative bending moment zone. An experimental bending moment redistribution test was conducted on continuous GFRP-concrete composite slabs, and a calculation method based on the conjugate beam method was proposed. The composite slabs were formed by combining GFRP profiles with a concrete layer and supported on steel beams to create two-span continuous composite slab specimens. Two methods, epoxy resin bonding, and stud connection, were used to connect the composite… More >

  • Open Access

    ARTICLE

    Performance Analysis of Machine Learning-Based Intrusion Detection with Hybrid Feature Selection

    Mohammad Al-Omari1, Qasem Abu Al-Haija2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1537-1555, 2024, DOI:10.32604/csse.2024.056257 - 22 November 2024

    Abstract More businesses are deploying powerful Intrusion Detection Systems (IDS) to secure their data and physical assets. Improved cyber-attack detection and prevention in these systems requires machine learning (ML) approaches. This paper examines a cyber-attack prediction system combining feature selection (FS) and ML. Our technique’s foundation was based on Correlation Analysis (CA), Mutual Information (MI), and recursive feature reduction with cross-validation. To optimize the IDS performance, the security features must be carefully selected from multiple-dimensional datasets, and our hybrid FS technique must be extended to validate our methodology using the improved UNSW-NB 15 and TON_IoT datasets. More >

  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT

    Arar Al Tawil1,*, Laiali Almazaydeh2, Doaa Qawasmeh3, Baraah Qawasmeh4, Mohammad Alshinwan1,5, Khaled Elleithy6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3395-3412, 2024, DOI:10.32604/cmc.2024.057279 - 18 November 2024

    Abstract Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information, a practice known as phishing. This study utilizes three distinct methodologies, Term Frequency-Inverse Document Frequency, Word2Vec, and Bidirectional Encoder Representations from Transformers, to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks. The study uses feature extraction methods to assess the performance of Logistic Regression, Decision Tree, Random Forest, and Multilayer Perceptron algorithms. The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron (Precision: 0.98, Recall: 0.98, F1-score: 0.98, Accuracy: 0.98). Word2Vec’s More >

  • Open Access

    ARTICLE

    Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking

    Hira Akhtar Butt1, Khoula Said Al Harthy2, Mumtaz Ali Shah3, Mudassar Hussain2,*, Rashid Amin4,*, Mujeeb Ur Rehman1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3003-3031, 2024, DOI:10.32604/cmc.2024.057185 - 18 November 2024

    Abstract Detecting sophisticated cyberattacks, mainly Distributed Denial of Service (DDoS) attacks, with unexpected patterns remains challenging in modern networks. Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking (SDN) environments. While Machine Learning (ML) models can distinguish between benign and malicious traffic, their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining. In this paper, we propose a novel DDoS detection framework that combines Machine Learning (ML) and Ensemble Learning (EL) techniques to improve DDoS attack detection and mitigation in SDN environments. Our model… More >

  • Open Access

    ARTICLE

    TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

    Isha Sood*, Varsha Sharma

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2791-2818, 2024, DOI:10.32604/cmc.2024.055463 - 18 November 2024

    Abstract Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method More >

  • Open Access

    ARTICLE

    A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments

    Bassam Mohammad Elzaghmouri1, Yosef Hasan Fayez Jbara2, Said Elaiwat3, Nisreen Innab4,*, Ahmed Abdelgader Fadol Osman5, Mohammed Awad Mohammed Ataelfadiel5, Farah H. Zawaideh6, Mouiad Fadeil Alawneh7, Asef Al-Khateeb8, Marwan Abu-Zanona8

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2299-2316, 2024, DOI:10.32604/cmc.2024.054836 - 18 November 2024

    Abstract As the Internet of Things (IoT) continues to expand, incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats, necessitating robust defense mechanisms. This paper presents an innovative hybrid deep learning architecture that excels at detecting IoT threats in real-world settings. Our proposed model combines Convolutional Neural Networks (CNN), Bidirectional Long Short-Term Memory (BLSTM), Gated Recurrent Units (GRU), and Attention mechanisms into a cohesive framework. This integrated structure aims to enhance the detection and classification of complex cyber threats while accommodating the operational constraints of diverse IoT systems.… More >

  • Open Access

    ARTICLE

    Identification of M2 macrophage-related genes for establishing a prognostic model in pancreatic cancer: FCGR3A as key gene

    ZHEN WANG1, JUN FU1, SAISAI ZHU1, HAODONG TANG2, KUI SHI1, JIHUA YANG3, MENG WANG3, MENGGE WU1, DUNFENG QI1,*

    Oncology Research, Vol.32, No.12, pp. 1851-1866, 2024, DOI:10.32604/or.2024.055286 - 13 November 2024

    Abstract Background: Pancreatic ductal adenocarcinoma (PDAC) has a rich and complex tumor immune microenvironment (TIME). M2 macrophages are among the most extensively infiltrated immune cells in the TIME and are necessary for the growth and migration of cancers. However, the mechanisms and targets mediating M2 macrophage infiltration in pancreatic cancer remain elusive. Methods: The M2 macrophage infiltration score of patients was assessed using the xCell algorithm. Using weighted gene co-expression network analysis (WGCNA), module genes associated with M2 macrophages were identified, and a predictive model was designed. The variations in immunological cell patterns, cancer mutations, and… More > Graphic Abstract

    Identification of M2 macrophage-related genes for establishing a prognostic model in pancreatic cancer: <i>FCGR3A</i> as key gene

  • Open Access

    PROCEEDINGS

    Characterization and Numerical Simulation of Delamination Propagation Behavior in Carbon Fiber Reinforced Composite Laminates

    Yu Gong1,*, Jianyu Zhang1, Libin Zhao2, Ning Hu2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.3, pp. 1-2, 2024, DOI:10.32604/icces.2024.011451

    Abstract Advanced carbon fiber reinforced composite materials are increasingly being used in aerospace and other fields. Composite laminate structure is one of the commonly used configurations, but due to weak interlayer performance, interlayer delamination is prone to occur [1]. The occurrence and growth of delamination will seriously affect the overall integrity and safety of composite structures, making it a focus of attention in the design of laminated structures. Accurately characterizing the delamination mechanical properties of composite laminates and simulating delamination propagation behavior is the basis for damage tolerance design and analysis of composite structures with delamination… More >

  • Open Access

    PROCEEDINGS

    Strengthening Mechanical Performance with Robust and Efficient Machine Learning-Assisted Path Planning for Additive Manufacturing of Continuous Fiber Composites

    Xinmeng Zha1, Huilin Ren1,*, Yi Xiong1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.3, pp. 1-1, 2024, DOI:10.32604/icces.2024.011371

    Abstract Additive manufacturing of continuous fiber composites is an emerging field that enables the tunable mechanical performance of composite structure by flexibly controlling the spatial layout of continuous fibers. Transverse isotropic strengthening is advantageous property of continuous fiber, which is favorable to align with the principal stress orientation. However, the accuracy and efficiency of traditional methods for calculating principal stress field are unguaranteed due to the inherent complexity and variability of geometries, material properties, and operational conditions in additive manufacturing. Therefore, a machine learning-assisted path planning method is proposed to robustly and efficiently generate the continuous… More >

Displaying 1-10 on page 1 of 1317. Per Page