Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    DPIL-Traj: Differential Privacy Trajectory Generation Framework with Imitation Learning

    Huaxiong Liao1,2, Xiangxuan Zhong2, Xueqi Chen2, Yirui Huang3, Yuwei Lin2, Jing Zhang2,*, Bruce Gu4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-21, 2026, DOI:10.32604/cmc.2025.069208 - 10 November 2025

    Abstract The generation of synthetic trajectories has become essential in various fields for analyzing complex movement patterns. However, the use of real-world trajectory data poses significant privacy risks, such as location re-identification and correlation attacks. To address these challenges, privacy-preserving trajectory generation methods are critical for applications relying on sensitive location data. This paper introduces DPIL-Traj, an advanced framework designed to generate synthetic trajectories while achieving a superior balance between data utility and privacy preservation. Firstly, the framework incorporates Differential Privacy Clustering, which anonymizes trajectory data by applying differential privacy techniques that add noise, ensuring the… More >

  • Open Access

    ARTICLE

    Integrating Temporal Change Detection and Advanced Hybrid Modeling to Predict Urban Expansion in Jaipur, a UNESCO World Heritage City

    Saurabh Singh1,2, Sudip Pandey3,*, Ankush Kumar Jain1

    Revue Internationale de Géomatique, Vol.34, pp. 899-914, 2025, DOI:10.32604/rig.2025.071156 - 09 December 2025

    Abstract Urban expansion in semi-arid regions poses critical challenges for sustainable land management, ecological resilience, and heritage conservation. Jaipur, India—a United Nations Educational, Scientific and Cultural Organization (UNESCO) World Heritage City located in a semi-arid environment—faces rapid urbanization that threatens agricultural productivity, fragile ecosystems, and cultural assets. This study quantifies past and projects future land use/land cover (LULC) dynamics in Jaipur to support evidence-based planning. Using the Dynamic World dataset, we generated annual 10-m LULC maps from 2016 to 2025 within the municipal boundary. Temporal change detection was conducted through empirical transition probability analysis, and future… More >

  • Open Access

    ARTICLE

    Demographic Heterogeneities in a Stochastic Chikungunya Virus Model with Poisson Random Measures and Near-Optimal Control under Markovian Regime Switching

    Maysaa Al-Qurashi1, Ayesha Siddiqa2, Shazia Karim3, Yu-Ming Chu4,5,*, Saima Rashid2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2057-2129, 2025, DOI:10.32604/cmes.2025.071629 - 26 November 2025

    Abstract Chikungunya is a mosquito-borne viral infection caused by the chikungunya virus (CHIKV). It is characterized by acute onset of high fever, severe polyarthralgia, myalgia, headache, and maculopapular rash. The virus is rapidly spreading and may establish in new regions where competent mosquito vectors are present. This research analyzes the regulatory dynamics of a stochastic differential equation (SDE) model describing the transmission of the CHIKV, incorporating seasonal variations, immunization efforts, and environmental fluctuations modeled through Poisson random measure noise under demographic heterogeneity. The model guarantees the existence of a global positive solution and demonstrates periodic dynamics… More >

  • Open Access

    ARTICLE

    Research on Flexible Load Aggregation and Coordinated Control Methods Considering Dynamic Demand Response

    Chun Xiao1,2,*

    Energy Engineering, Vol.122, No.7, pp. 2719-2750, 2025, DOI:10.32604/ee.2025.063782 - 27 June 2025

    Abstract In contemporary power systems, delving into the flexible regulation potential of demand-side resources is of paramount significance for the efficient operation of power grids. This research puts forward an innovative multivariate flexible load aggregation control approach that takes dynamic demand response into full consideration. In the initial stage, using generalized time-domain aggregation modelling for a wide array of heterogeneous flexible loads, including temperature-controlled loads, electric vehicles, and energy storage devices, a novel calculation method for their maximum adjustable capacities is devised. Distinct from conventional methods, this newly developed approach enables more precise and adaptable quantification… More >

  • Open Access

    ARTICLE

    Application Research on Two-Layer Threat Prediction Model Based on Event Graph

    Shuqin Zhang, Xinyu Su*, Yunfei Han, Tianhui Du, Peiyu Shi

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3993-4023, 2023, DOI:10.32604/cmc.2023.044526 - 26 December 2023

    Abstract Advanced Persistent Threat (APT) is now the most common network assault. However, the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks. They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats. To address the above problems, firstly, this paper constructs the multi-source threat element analysis ontology (MTEAO) by integrating multi-source network security knowledge bases. Subsequently, based on MTEAO, we propose a two-layer threat prediction model (TL-TPM) that combines… More >

  • Open Access

    ARTICLE

    Customer Segment Prediction on Retail Transactional Data Using K-Means and Markov Model

    A. S. Harish*, C. Malathy

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 589-600, 2023, DOI:10.32604/iasc.2023.032030 - 29 September 2022

    Abstract Retailing is a dynamic business domain where commodities and goods are sold in small quantities directly to the customers. It deals with the end user customers of a supply-chain network and therefore has to accommodate the needs and desires of a large group of customers over varied utilities. The volume and volatility of the business makes it one of the prospective fields for analytical study and data modeling. This is also why customer segmentation drives a key role in multiple retail business decisions such as marketing budgeting, customer targeting, customized offers, value proposition etc. The… More >

  • Open Access

    ARTICLE

    Active Kriging-Based Adaptive Importance Sampling for Reliability and Sensitivity Analyses of Stator Blade Regulator

    Hong Zhang1, Lukai Song1,2,*, Guangchen Bai1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1871-1897, 2023, DOI:10.32604/cmes.2022.021880 - 20 September 2022

    Abstract

    The reliability and sensitivity analyses of stator blade regulator usually involve complex characteristics like high-nonlinearity, multi-failure regions, and small failure probability, which brings in unacceptable computing efficiency and accuracy of the current analysis methods. In this case, by fitting the implicit limit state function (LSF) with active Kriging (AK) model and reducing candidate sample pool with adaptive importance sampling (AIS), a novel AK-AIS method is proposed. Herein, the AK model and Markov chain Monte Carlo (MCMC) are first established to identify the most probable failure region(s) (MPFRs), and the adaptive kernel density estimation (AKDE) importance sampling

    More >

  • Open Access

    ARTICLE

    Intelligent Vehicular Communication Using Vulnerability Scoring Based Routing Protocol

    M. Ramya Devi*, I. Jasmine Selvakumari Jeya

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 31-45, 2023, DOI:10.32604/iasc.2023.026152 - 06 June 2022

    Abstract Internet of Vehicles (IoV) is an intelligent vehicular technology that allows vehicles to communicate with each other via internet. Communications and the Internet of Things (IoT) enable cutting-edge technologies including such self-driving cars. In the existing systems, there is a maximum communication delay while transmitting the messages. The proposed system uses hybrid Co-operative, Vehicular Communication Management Framework called CAMINO (CA). Further it uses, energy efficient fast message routing protocol with Common Vulnerability Scoring System (CVSS) methodology for improving the communication delay, throughput. It improves security while transmitting the messages through networks. In this research, we… More >

  • Open Access

    ARTICLE

    Selfish Mining and Defending Strategies in the Bitcoin

    Weijian Zhang1,*, Hao Wang2, Hao Hua3, Qirun Wang4

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1861-1875, 2022, DOI:10.32604/iasc.2022.030274 - 25 May 2022

    Abstract As a kind of distributed, decentralized and peer-to-peer transmitted technology, blockchain technology has gradually changed people’s lifestyle. However, blockchain technology also faces many problems including selfish mining attack, which causes serious effects to the development of blockchain technology. Selfish mining is a kind of mining strategy where selfish miners increase their profit by selectively publishing hidden blocks. This paper builds the selfish mining model from the perspective of node state conversion and utilize the function extremum method to figure out the optimal profit of this model. Meanwhile, based on the experimental data of honest mining, More >

  • Open Access

    ARTICLE

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3929-3943, 2022, DOI:10.32604/cmc.2022.026307 - 29 March 2022

    Abstract The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely… More >

Displaying 1-10 on page 1 of 21. Per Page