Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (251)
  • Open Access

    ARTICLE

    DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection

    Yuanyuan Ma1, Ang Chen1, Cunzhi Hou1, Ruixia Jin2, Jinghui Zhang1, Ruixiang Li3,4,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3301-3323, 2024, DOI:10.32604/cmc.2024.056854 - 18 November 2024

    Abstract Currently, telecom fraud is expanding from the traditional telephone network to the Internet, and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights. However, existing telecom fraud identification methods based on blacklists, reputation, content and behavioral characteristics have good identification performance in the telephone network, but it is difficult to apply to the Internet where IP (Internet Protocol) addresses change dynamically. To address this issue, we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise) clustering (DC-FIPD). First, we… More >

  • Open Access

    PROCEEDINGS

    Integrated Optimization of Macroscopic Topology and Microscopic Configuration of the Graded Functional Cellular Structures

    Yu Guo1, Lianxiong Chen1, Hui Liu1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.3, pp. 1-1, 2024, DOI:10.32604/icces.2024.011187

    Abstract In the topology optimization of the multiscale structure, ensuring connectivity between adjacent microstructures, controlling the design space of microstructures, and reducing calculation amount and improving calculation efficiency are three basic challenging issues currently faced. To address this, this paper presents a data-driven approach for the integrated optimization of macroscopic topology and microscopic configuration of graded functional cellular structures. At the macro level, a topological description function is introduced to realize the topological control of the macro structure. At the micro level, several cutting functions are used to realize the control of the configuration and size… More >

  • Open Access

    PROCEEDINGS

    A Fail-Safe Topology Optimization for Multiscale Structures

    Jianghong Yang1, Yingjun Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.2, pp. 1-1, 2024, DOI:10.32604/icces.2024.011249

    Abstract Multiscale structures can be more robust to partial damage than solid structures. Inspired by this, a novel fail-safe topology optimization method is proposed for multiscale structures. Computational cost is reduced by simplifying the partial damage of the truss-like microstructure and polynomial function is used to fit the effective elasticity tensor obtained via the homogenization method. Moreover, Heaviside projection is applied to speed up the convergence and yield a relatively clear configuration. Numerical examples are tested to demonstrate the advantages of the optimized multiscale structures. Numerical examples are tested to demonstrate that the optimized multiscale structures More >

  • Open Access

    PROCEEDINGS

    Influence of Inhomogeneous Geotechnical Media on the Working Mechanical Properties of Anchors

    Huan Zhu1, Gang Bi2, Yue Hu1, Xin Jiang1, Long Yang2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.012443

    Abstract Anchoring of geotechnical soil is an important means of stability control for major geotechnical and underground projects. Scientific research on the specific mechanical behavior of the anchor during the work is essential to ensure the quality of the project and construction safety, most of the existing theoretical studies are based on the assumption that the anchor anchoring object is a homogeneous material, while in most cases the medium composition of the rock and soil in the anchoring area is complex and variable, and there are great differences in the physical and mechanical properties, which will… More >

  • Open Access

    PROCEEDINGS

    Simple but Effective Heat Treatment on Hot Isostatic Press Diffusion Bonded Ni60A Hardfacing Layer

    Lei Yu1,2, Yingjie Yan1,2, Hao Dong3,4, Suk-Chun Moon5,*, Zhengyi Jiang5,*, Rui Cao1,2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.4, pp. 1-2, 2024, DOI:10.32604/icces.2024.011941

    Abstract Ni60A hardfacing alloy, as one of the highest-alloy grades and hardest alloy of Ni-Cr-B-Si alloys, is expected to be used as hardfacing alloy for thrust discs in nuclear main pumps to reduce friction, corrosion and erosion. Since mechanical properties of Ni-Cr-B-Si alloys are very sensitive to their defects and microstructures, heat treatment/remelting methods have been used to eliminate porosity and to modify microstructural heterogeneity. In our previous research, Ni60A hardfacing layer with high micro-hardness and excellent bonding strength has been fabricated onto 0Cr18Ni10Ti austenitic stainless steel using hot isostatic press diffusion bonding technique. However, some… More >

  • Open Access

    ARTICLE

    An Efficient Technique for One-Dimensional Fractional Diffusion Equation Model for Cancer Tumor

    Daasara Keshavamurthy Archana1, Doddabhadrappla Gowda Prakasha1, Pundikala Veeresha2, Kottakkaran Sooppy Nisar3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1347-1363, 2024, DOI:10.32604/cmes.2024.053916 - 27 September 2024

    Abstract This study intends to examine the analytical solutions to the resulting one-dimensional differential equation of a cancer tumor model in the frame of time-fractional order with the Caputo-fractional operator employing a highly efficient methodology called the -homotopy analysis transform method. So, the preferred approach effectively found the analytic series solution of the proposed model. The procured outcomes of the present framework demonstrated that this method is authentic for obtaining solutions to a time-fractional-order cancer model. The results achieved graphically specify that the concerned paradigm is dependent on arbitrary order and parameters and also disclose the More >

  • Open Access

    ARTICLE

    An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking

    Cong Shen1,*, Wei Zhang1,2,*, Tanping Zhou1,2, Yiming Zhang1, Lingling Zhang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4729-4748, 2024, DOI:10.32604/cmc.2024.054434 - 12 September 2024

    Abstract With the increasing awareness of privacy protection and the improvement of relevant laws, federal learning has gradually become a new choice for cross-agency and cross-device machine learning. In order to solve the problems of privacy leakage, high computational overhead and high traffic in some federated learning schemes, this paper proposes a multiplicative double privacy mask algorithm which is convenient for homomorphic addition aggregation. The combination of homomorphic encryption and secret sharing ensures that the server cannot compromise user privacy from the private gradient uploaded by the participants. At the same time, the proposed TQRR (Top-Q-Random-R) More >

  • Open Access

    ARTICLE

    Radiation Effect on Heat Transfer Analysis of MHD Flow of Upper Convected Maxwell Fluid between a Porous and a Moving Plate

    P. Pai Nityanand, B. Devaki, G. Bhat Pareekshith, V. S. Sampath Kumar*

    Frontiers in Heat and Mass Transfer, Vol.22, No.2, pp. 655-673, 2024, DOI:10.32604/fhmt.2024.050237 - 20 May 2024

    Abstract The study in this manuscript aims to analyse the impact of thermal radiation on the two-dimensional magnetohydrodynamic flow of upper convected Maxwell (UCM) fluid between parallel plates. The lower plate is porous and stationary, while the top plate is impermeable and moving. The equations that describe the flow are transformed into non-linear ordinary differential equations with boundary conditions by employing similarity transformations. The Homotopy Perturbation Method (HPM) is then employed to approach the obtained non-linear ordinary differential equations and get an approximate analytical solution. The analysis includes plotting the velocity profile for different Reynolds number… More >

  • Open Access

    ARTICLE

    FL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption

    Hao Sun*, Xiubo Chen, Kaiguo Yuan

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2361-2373, 2024, DOI:10.32604/cmc.2024.049159 - 15 May 2024

    Abstract Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext data. However, there is still a potential risk of privacy leakage, for example, attackers can obtain the original data through model inference attacks. Therefore, safeguarding the privacy of model parameters becomes crucial. One proposed solution involves incorporating homomorphic encryption algorithms into the federated learning process. However, the existing federated learning privacy protection scheme based on homomorphic encryption will greatly reduce the efficiency and robustness when there are performance differences between parties or abnormal nodes. To solve the above… More >

  • Open Access

    ARTICLE

    Efficient Unsupervised Image Stitching Using Attention Mechanism with Deep Homography Estimation

    Chunbin Qin*, Xiaotian Ran

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1319-1334, 2024, DOI:10.32604/cmc.2024.048850 - 25 April 2024

    Abstract Traditional feature-based image stitching techniques often encounter obstacles when dealing with images lacking unique attributes or suffering from quality degradation. The scarcity of annotated datasets in real-life scenes severely undermines the reliability of supervised learning methods in image stitching. Furthermore, existing deep learning architectures designed for image stitching are often too bulky to be deployed on mobile and peripheral computing devices. To address these challenges, this study proposes a novel unsupervised image stitching method based on the YOLOv8 (You Only Look Once version 8) framework that introduces deep homography networks and attention mechanisms. The methodology… More >

Displaying 1-10 on page 1 of 251. Per Page