Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,555)
  • Open Access

    ARTICLE

    FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface

    Xingxing Zhang1, Liang Liu1,*, Yu Fan1, Qian Zhou2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 969-987, 2024, DOI:10.32604/csse.2024.046615

    Abstract System calls are essential interfaces that enable applications to access and utilize the operating system’s services and resources. Attackers frequently exploit application’s vulnerabilities and misuse system calls to execute malicious code, aiming to elevate privileges and so on. Consequently, restricting the misuse of system calls becomes a crucial measure in ensuring system security. It is an effective method known as reducing the attack surface. Existing attack surface reduction techniques construct a global whitelist of system calls for the entire lifetime of the application, which is coarse-grained. In this paper, we propose a Fine-grained Function-level framework… More >

  • Open Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access

    ARTICLE

    Experimental Study on Improving Performance and Productivity of Pyramid Solar Still Using Rotation Technique

    Ali Abdullah Abbas Baiee, Sasan Asiaei*, Sayed Mostafa Hosseinalipour*

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 955-976, 2024, DOI:10.32604/fhmt.2024.051532

    Abstract Globally, potable water scarcity is pervasive problem. The solar distillation device is a straightforward apparatus that has been purposefully engineered to convert non-potable water into potable water. The experimental study is distinctive due to the implementation of a rotational mechanism within the pyramidal solar still (PSS), which serves to enhance the evaporation and condensation processes. The objective of this research study is to examine the impact of integrating rotational motion into pyramidal solar stills on various processes: water distillation, evaporation, condensation, heat transfer, and energy waste reduction, shadow effects, and low water temperature in saline… More >

  • Open Access

    ARTICLE

    Study on the Influence of Setting Parameters of Tunnel Centralized Smoke Extraction System on Fire Smoke Flow and Temperature Decay

    Zhisheng Xu*, Sohail Mahmood, Zihan Yu

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 791-816, 2024, DOI:10.32604/fhmt.2024.051058

    Abstract The centralized smoke exhaust system of shield tunnel is an important determinant for tunnel fire safety, and the use of different design parameters of the tunnel smoke exhaust system will affect the smoke exhaust effect in the tunnel, and the influence of different design parameters on the smoke exhaust effect and temperature attenuation of the tunnel can help engineers in designing a more effective centralized smoke exhaust system for the tunnel. In this paper, the Fire Dynamic Simulator (FDS) is utilized to examine smoke exhaust vent settings for a centralized exhaust system in shield tunnel… More >

  • Open Access

    ARTICLE

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications

    Li-Woei Chen1, Kun-Lin Tsai2,*, Fang-Yie Leu3, Wen-Cheng Jiang2, Shih-Ting Tseng2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2779-2794, 2024, DOI:10.32604/cmes.2024.052124

    Abstract Various mobile devices and applications are now used in daily life. These devices require high-speed data processing, low energy consumption, low communication latency, and secure data transmission, especially in 5G and 6G mobile networks. High-security cryptography guarantees that essential data can be transmitted securely; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE) algorithm based on the Advanced Encryption Standard (AES) for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things (IoT) devices. In the proposed LEDE algorithm, the system time More >

  • Open Access

    ARTICLE

    Enhancing Critical Path Problem in Neutrosophic Environment Using Python

    M. Navya Pratyusha, Ranjan Kumar*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2957-2976, 2024, DOI:10.32604/cmes.2024.051581

    Abstract In the real world, one of the most common problems in project management is the unpredictability of resources and timelines. An efficient way to resolve uncertainty problems and overcome such obstacles is through an extended fuzzy approach, often known as neutrosophic logic. Our rigorous proposed model has led to the creation of an advanced technique for computing the triangular single-valued neutrosophic number. This innovative approach evaluates the inherent uncertainty in project durations of the planning phase, which enhances the potential significance of the decision-making process in the project. Our proposed method, for the first time… More >

  • Open Access

    ARTICLE

    Instance Segmentation of Characters Recognized in Palmyrene Aramaic Inscriptions

    Adéla Hamplová1,*, Alexey Lyavdansky2,*, Tomáš Novák1, Ondřej Svojše1, David Franc1, Arnošt Veselý1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2869-2889, 2024, DOI:10.32604/cmes.2024.050791

    Abstract This study presents a single-class and multi-class instance segmentation approach applied to ancient Palmyrene inscriptions, employing two state-of-the-art deep learning algorithms, namely YOLOv8 and Roboflow 3.0. The goal is to contribute to the preservation and understanding of historical texts, showcasing the potential of modern deep learning methods in archaeological research. Our research culminates in several key findings and scientific contributions. We comprehensively compare the performance of YOLOv8 and Roboflow 3.0 in the context of Palmyrene character segmentation—this comparative analysis mainly focuses on the strengths and weaknesses of each algorithm in this context. We also created… More >

  • Open Access

    ARTICLE

    A Framework Based on the DAO and NFT in Blockchain for Electronic Document Sharing

    Lin Chen1, Jiaming Zhu1, Yuting Xu1, Huanqin Zheng1, Shen Su1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2373-2395, 2024, DOI:10.32604/cmes.2024.049996

    Abstract In the information age, electronic documents (e-documents) have become a popular alternative to paper documents due to their lower costs, higher dissemination rates, and ease of knowledge sharing. However, digital copyright infringements occur frequently due to the ease of copying, which not only infringes on the rights of creators but also weakens their creative enthusiasm. Therefore, it is crucial to establish an e-document sharing system that enforces copyright protection. However, the existing centralized system has outstanding vulnerabilities, and the plagiarism detection algorithm used cannot fully detect the context, semantics, style, and other factors of the… More >

  • Open Access

    ARTICLE

    A Novel ISSA–DELM Model for Predicting Rock Mass Permeability

    Chen Xing1, Leihua Yao1,*, Yingdong Wang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2825-2848, 2024, DOI:10.32604/cmes.2024.049330

    Abstract In pumped storage projects, the permeability of rock masses is a crucial parameter in engineering design and construction. The rock mass permeability coefficient (K) is influenced by various geological parameters, and previous studies aimed to establish an accurate relationship between K and geological parameters. This study uses the improved sparrow search algorithm (ISSA) to optimize the parameter settings of the deep extreme learning machine (DELM), constructing a prediction model with flexible parameter selection and high accuracy. First, the Spearman method is applied to analyze the correlation between geological parameters. A sample database is built by comprehensively… More >

  • Open Access

    ARTICLE

    A Novel Graph Structure Learning Based Semi-Supervised Framework for Anomaly Identification in Fluctuating IoT Environment

    Weijian Song1,, Xi Li1,, Peng Chen1,*, Juan Chen1, Jianhua Ren2, Yunni Xia3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3001-3016, 2024, DOI:10.32604/cmes.2024.048563

    Abstract With the rapid development of Internet of Things (IoT) technology, IoT systems have been widely applied in healthcare, transportation, home, and other fields. However, with the continuous expansion of the scale and increasing complexity of IoT systems, the stability and security issues of IoT systems have become increasingly prominent. Thus, it is crucial to detect anomalies in the collected IoT time series from various sensors. Recently, deep learning models have been leveraged for IoT anomaly detection. However, owing to the challenges associated with data labeling, most IoT anomaly detection methods resort to unsupervised learning techniques.… More >

Displaying 1-10 on page 1 of 1555. Per Page