Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (329)
  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1881-1895, 2024, DOI:10.32604/cmc.2023.047243

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust clustering algorithm. We perform feature… More >

  • Open Access

    ARTICLE

    Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder

    S. Abinaya*, K. Uttej Kumar

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2269-2286, 2024, DOI:10.32604/cmc.2024.047167

    Abstract A Recommender System (RS) is a crucial part of several firms, particularly those involved in e-commerce. In conventional RS, a user may only offer a single rating for an item-that is insufficient to perceive consumer preferences. Nowadays, businesses in industries like e-learning and tourism enable customers to rate a product using a variety of factors to comprehend customers’ preferences. On the other hand, the collaborative filtering (CF) algorithm utilizing AutoEncoder (AE) is seen to be effective in identifying user-interested items. However, the cost of these computations increases nonlinearly as the number of items and users increases. To triumph over the… More >

  • Open Access

    ARTICLE

    Improved Data Stream Clustering Method: Incorporating KD-Tree for Typicality and Eccentricity-Based Approach

    Dayu Xu1,#, Jiaming Lü1,#, Xuyao Zhang2, Hongtao Zhang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2557-2573, 2024, DOI:10.32604/cmc.2024.045932

    Abstract Data stream clustering is integral to contemporary big data applications. However, addressing the ongoing influx of data streams efficiently and accurately remains a primary challenge in current research. This paper aims to elevate the efficiency and precision of data stream clustering, leveraging the TEDA (Typicality and Eccentricity Data Analysis) algorithm as a foundation, we introduce improvements by integrating a nearest neighbor search algorithm to enhance both the efficiency and accuracy of the algorithm. The original TEDA algorithm, grounded in the concept of “Typicality and Eccentricity Data Analytics”, represents an evolving and recursive method that requires no prior knowledge. While the… More >

  • Open Access

    ARTICLE

    C-CORE: Clustering by Code Representation to Prioritize Test Cases in Compiler Testing

    Wei Zhou1, Xincong Jiang2,*, Chuan Qin2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2069-2093, 2024, DOI:10.32604/cmes.2023.043248

    Abstract Edge devices, due to their limited computational and storage resources, often require the use of compilers for program optimization. Therefore, ensuring the security and reliability of these compilers is of paramount importance in the emerging field of edge AI. One widely used testing method for this purpose is fuzz testing, which detects bugs by inputting random test cases into the target program. However, this process consumes significant time and resources. To improve the efficiency of compiler fuzz testing, it is common practice to utilize test case prioritization techniques. Some researchers use machine learning to predict the code coverage of test… More >

  • Open Access

    ARTICLE

    Flag-Based Vehicular Clustering Scheme for Vehicular Ad-Hoc Networks

    Fady Samann1,*, Shavan Askar2

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2715-2734, 2023, DOI:10.32604/cmc.2023.043580

    Abstract Clustering schemes in vehicular networks organize vehicles into logical groups. They are vital for improving network performance, accessing the medium, and enabling efficient data dissemination. Most schemes rely on periodically broadcast hello messages to provide up-to-date information about the vehicles. However, the periodic exchange of messages overwhelms the system and reduces efficiency. This paper proposes the Flag-based Vehicular Clustering (FVC) scheme. The scheme leverages a combination of Fitness Score (FS), Link Expiration Time (LET), and clustering status flags to enable efficient cluster formation in a hybrid manner. The FVC relies on the periodic broadcast of the basic safety message in… More >

  • Open Access

    ARTICLE

    Optical Fibre Communication Feature Analysis and Small Sample Fault Diagnosis Based on VMD-FE and Fuzzy Clustering

    Xiangqun Li1,*, Jiawen Liang2, Jinyu Zhu2, Shengping Shi2, Fangyu Ding2, Jianpeng Sun2, Bo Liu2

    Energy Engineering, Vol.121, No.1, pp. 203-219, 2024, DOI:10.32604/ee.2023.029295

    Abstract To solve the problems of a few optical fibre line fault samples and the inefficiency of manual communication optical fibre fault diagnosis, this paper proposes a communication optical fibre fault diagnosis model based on variational modal decomposition (VMD), fuzzy entropy (FE) and fuzzy clustering (FC). Firstly, based on the OTDR curve data collected in the field, VMD is used to extract the different modal components (IMF) of the original signal and calculate the fuzzy entropy (FE) values of different components to characterize the subtle differences between them. The fuzzy entropy of each curve is used as the feature vector, which… More >

  • Open Access

    ARTICLE

    Examining the Use of Scott’s Formula and Link Expiration Time Metric for Vehicular Clustering

    Fady Samann1,*, Shavan Askar2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2421-2444, 2024, DOI:10.32604/cmes.2023.031265

    Abstract Implementing machine learning algorithms in the non-conducive environment of the vehicular network requires some adaptations due to the high computational complexity of these algorithms. K-clustering algorithms are simplistic, with fast performance and relative accuracy. However, their implementation depends on the initial selection of clusters number (K), the initial clusters’ centers, and the clustering metric. This paper investigated using Scott’s histogram formula to estimate the K number and the Link Expiration Time (LET) as a clustering metric. Realistic traffic flows were considered for three maps, namely Highway, Traffic Light junction, and Roundabout junction, to study the effect of road layout on… More >

  • Open Access

    ARTICLE

    Automatic Aggregation Enhanced Affinity Propagation Clustering Based on Mutually Exclusive Exemplar Processing

    Zhihong Ouyang*, Lei Xue, Feng Ding, Yongsheng Duan

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 983-1008, 2023, DOI:10.32604/cmc.2023.042222

    Abstract Affinity propagation (AP) is a widely used exemplar-based clustering approach with superior efficiency and clustering quality. Nevertheless, a common issue with AP clustering is the presence of excessive exemplars, which limits its ability to perform effective aggregation. This research aims to enable AP to automatically aggregate to produce fewer and more compact clusters, without changing the similarity matrix or customizing preference parameters, as done in existing enhanced approaches. An automatic aggregation enhanced affinity propagation (AAEAP) clustering algorithm is proposed, which combines a dependable partitioning clustering approach with AP to achieve this purpose. The partitioning clustering approach generates an additional set… More >

  • Open Access

    ARTICLE

    Identification of High-Risk Scenarios for Cascading Failures in New Energy Power Grids Based on Deep Embedding Clustering Algorithms

    Xueting Cheng1, Ziqi Zhang2,*, Yueshuang Bao1, Huiping Zheng1

    Energy Engineering, Vol.120, No.11, pp. 2517-2529, 2023, DOI:10.32604/ee.2023.042633

    Abstract At present, the proportion of new energy in the power grid is increasing, and the random fluctuations in power output increase the risk of cascading failures in the power grid. In this paper, we propose a method for identifying high-risk scenarios of interlocking faults in new energy power grids based on a deep embedding clustering (DEC) algorithm and apply it in a risk assessment of cascading failures in different operating scenarios for new energy power grids. First, considering the real-time operation status and system structure of new energy power grids, the scenario cascading failure risk indicator is established. Based on… More >

Displaying 11-20 on page 2 of 329. Per Page