Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (485)
  • Open Access

    ARTICLE

    Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems

    Xia Li1, Zhanyou Ma1,*, Zhibao Mian2, Ziyuan Liu1, Ruiqi Huang1, Nana He1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4129-4152, 2024, DOI:10.32604/cmc.2024.047168

    Abstract Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications. Although there is an extensive literature on qualitative properties such as safety and liveness, there is still a lack of quantitative and uncertain property verifications for these systems. In uncertain environments, agents must make judicious decisions based on subjective epistemic. To verify epistemic and measurable properties in multi-agent systems, this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge (FCTLK). We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

    Bin Wu1,2, Xianyi Chen3, Jinzhou Huang4,*, Caicai Zhang5, Jing Wang6, Jing Yu1,2, Zhiqiang Zhao7, Zhuolin Mei1,2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3177-3194, 2024, DOI:10.32604/cmc.2023.047147

    Abstract In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in… More >

  • Open Access

    ARTICLE

    A Hybrid SIR-Fuzzy Model for Epidemic Dynamics: A Numerical Study

    Muhammad Shoaib Arif1,2,*, Kamaleldin Abodayeh1, Yasir Nawaz2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3417-3434, 2024, DOI:10.32604/cmes.2024.046944

    Abstract This study focuses on the urgent requirement for improved accuracy in disease modeling by introducing a new computational framework called the Hybrid SIR-Fuzzy Model. By integrating the traditional Susceptible-Infectious-Recovered (SIR) model with fuzzy logic, our method effectively addresses the complex nature of epidemic dynamics by accurately accounting for uncertainties and imprecisions in both data and model parameters. The main aim of this research is to provide a model for disease transmission using fuzzy theory, which can successfully address uncertainty in mathematical modeling. Our main emphasis is on the imprecise transmission rate parameter, utilizing a three-part description of its membership level.… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

  • Open Access

    ARTICLE

    Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder

    S. Abinaya*, K. Uttej Kumar

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2269-2286, 2024, DOI:10.32604/cmc.2024.047167

    Abstract A Recommender System (RS) is a crucial part of several firms, particularly those involved in e-commerce. In conventional RS, a user may only offer a single rating for an item-that is insufficient to perceive consumer preferences. Nowadays, businesses in industries like e-learning and tourism enable customers to rate a product using a variety of factors to comprehend customers’ preferences. On the other hand, the collaborative filtering (CF) algorithm utilizing AutoEncoder (AE) is seen to be effective in identifying user-interested items. However, the cost of these computations increases nonlinearly as the number of items and users increases. To triumph over the… More >

  • Open Access

    ARTICLE

    Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing

    Huixiang Xu*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2309-2335, 2024, DOI:10.32604/cmc.2024.046253

    Abstract The Internet of Things (IoT) has revolutionized how we interact with and gather data from our surrounding environment. IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights. The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented data generation and connectivity. These IoT devices, equipped with many sensors and actuators, continuously produce vast volumes of data. However, the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges. However, transmitting all this data to a… More >

  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks, with a focus on developing… More >

  • Open Access

    ARTICLE

    Complex Decision Modeling Framework with Fairly Operators and Quaternion Numbers under Intuitionistic Fuzzy Rough Context

    Nadeem Salamat1, Muhammad Kamran1,2,*, Shahzaib Ashraf1, Manal Elzain Mohammed Abdulla3, Rashad Ismail3, Mohammed M. Al-Shamiri3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1893-1933, 2024, DOI:10.32604/cmes.2023.044697

    Abstract The main goal of informal computing is to overcome the limitations of hypersensitivity to defects and uncertainty while maintaining a balance between high accuracy, accessibility, and cost-effectiveness. This paper investigates the potential applications of intuitionistic fuzzy sets (IFS) with rough sets in the context of sparse data. When it comes to capture uncertain information emanating from both upper and lower approximations, these intuitionistic fuzzy rough numbers (IFRNs) are superior to intuitionistic fuzzy sets and pythagorean fuzzy sets, respectively. We use rough sets in conjunction with IFSs to develop several fairly aggregation operators and analyze their underlying properties. We present numerous… More > Graphic Abstract

    Complex Decision Modeling Framework with Fairly Operators and Quaternion Numbers under Intuitionistic Fuzzy Rough Context

  • Open Access

    ARTICLE

    Einstein Hybrid Structure of q-Rung Orthopair Fuzzy Soft Set and Its Application for Diagnosis of Waterborne Infectious Disease

    Rana Muhammad Zulqarnain1, Hafiz Khalil ur Rehman2, Imran Siddique3, Hijaz Ahmad4,5, Sameh Askar6, Shahid Hussain Gurmani1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1863-1892, 2024, DOI:10.32604/cmes.2023.031480

    Abstract This research is devoted to diagnosing water-borne infectious diseases caused by floods employing a novel diagnosis approach, the Einstein hybrid structure of q-rung orthopair fuzzy soft set. This approach integrates parts of fuzzy logic and soft set theory to develop a robust alternative for disease detection in stressful situations, especially in areas affected by floods. Compared to the traditional intuitionistic fuzzy soft set and Pythagorean fuzzy soft set, the q-rung orthopair fuzzy soft set (q-ROFSS) adequately incorporates unclear and indeterminate facts. The major objective of this investigation is to formulate the q-rung orthopair fuzzy soft Einstein hybrid weighted average (q-ROFSEHWA)… More >

Displaying 1-10 on page 1 of 485. Per Page