Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (71)
  • Open Access

    ARTICLE

    Numerical Exploration on Load Transfer Characteristics and Optimization of Multi-Layer Composite Pavement Structures Based on Improved Transfer Matrix Method

    Guo-Zhi Li1, Hua-Ping Wang1,2,*, Si-Kai Wang1, Jing-Cheng Zhou1, Ping Xiang3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.3, pp. 3165-3195, 2025, DOI:10.32604/cmes.2025.072750 - 23 December 2025

    Abstract Transportation structures such as composite pavements and railway foundations typically consist of multi-layered media designed to withstand high bearing capacity. A theoretical understanding of load transfer mechanisms in these multi-layer composites is essential, as it offers intuitive insights into parametric influences and facilitates enhanced structural performance. This paper employs an improved transfer matrix method to address the limitations of existing theoretical approaches for analyzing multi-layer composite structures. By establishing a two-dimensional composite pavement model, it investigates load transfer characteristics and validates the accuracy through finite element simulation. The proposed method offers a straightforward analytical approach… More >

  • Open Access

    ARTICLE

    Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames

    Sara H. Elsayed1, Rodaina Abdelsalam1, Mahmoud A. Ismail Shoman2, Raed Alotaibi3,*, Omar Reyad4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4995-5013, 2025, DOI:10.32604/cmc.2025.068429 - 23 October 2025

    Abstract Ensuring the secure transmission of secret messages, particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security. Relying on a single-layered security approach is often insufficient for safeguarding sensitive data. This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique (HCT), Rotation Left Digits (RLD), and Discrete Wavelet Transform (DWT) to embed secret messages within video frames securely. The approach begins with encrypting the secret text using a private key matrix (PK1) of size 2 × 2 up to 6 × 6… More >

  • Open Access

    ARTICLE

    Adaptive Multi-Layer Defense Mechanism for Trusted Federated Learning in Network Security Assessment

    Lincong Zhao1, Liandong Chen1, Peipei Shen1, Zizhou Liu1, Chengzhu Li1, Fanqin Zhou2,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5057-5071, 2025, DOI:10.32604/cmc.2025.067521 - 23 October 2025

    Abstract The rapid growth of Internet of things devices and the emergence of rapidly evolving network threats have made traditional security assessment methods inadequate. Federated learning offers a promising solution to expedite the training of security assessment models. However, ensuring the trustworthiness and robustness of federated learning under multi-party collaboration scenarios remains a challenge. To address these issues, this study proposes a shard aggregation network structure and a malicious node detection mechanism, along with improvements to the federated learning training process. First, we extract the data features of the participants by using spectral clustering methods combined… More >

  • Open Access

    ARTICLE

    Research on Multimodal AIGC Video Detection for Identifying Fake Videos Generated by Large Models

    Yong Liu1,2, Tianning Sun3,*, Daofu Gong1,4, Li Di5, Xu Zhao1

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1161-1184, 2025, DOI:10.32604/cmc.2025.062330 - 29 August 2025

    Abstract To address the high-quality forged videos, traditional approaches typically have low recognition accuracy and tend to be easily misclassified. This paper tries to address the challenge of detecting high-quality deepfake videos by promoting the accuracy of Artificial Intelligence Generated Content (AIGC) video authenticity detection with a multimodal information fusion approach. First, a high-quality multimodal video dataset is collected and normalized, including resolution correction and frame rate unification. Next, feature extraction techniques are employed to draw out features from visual, audio, and text modalities. Subsequently, these features are fused into a multilayer perceptron and attention mechanisms-based More >

  • Open Access

    ARTICLE

    Intrusion Detection Model on Network Data with Deep Adaptive Multi-Layer Attention Network (DAMLAN)

    Fatma S. Alrayes1, Syed Umar Amin2,*, Nada Ali Hakami2, Mohammed K. Alzaylaee3, Tariq Kashmeery4

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.1, pp. 581-614, 2025, DOI:10.32604/cmes.2025.065188 - 31 July 2025

    Abstract The growing incidence of cyberattacks necessitates a robust and effective Intrusion Detection Systems (IDS) for enhanced network security. While conventional IDSs can be unsuitable for detecting different and emerging attacks, there is a demand for better techniques to improve detection reliability. This study introduces a new method, the Deep Adaptive Multi-Layer Attention Network (DAMLAN), to boost the result of intrusion detection on network data. Due to its multi-scale attention mechanisms and graph features, DAMLAN aims to address both known and unknown intrusions. The real-world NSL-KDD dataset, a popular choice among IDS researchers, is used to… More >

  • Open Access

    ARTICLE

    Optimization of Machine Learning Methods for Intrusion Detection in IoT

    Alireza Bahmani*

    Journal on Internet of Things, Vol.7, pp. 1-17, 2025, DOI:10.32604/jiot.2025.060786 - 24 June 2025

    Abstract With the development of the Internet of Things (IoT) technology and its widespread integration in various aspects of life, the risks associated with cyberattacks on these systems have increased significantly. Vulnerabilities in IoT devices, stemming from insecure designs and software weaknesses, have made attacks on them more complex and dangerous compared to traditional networks. Conventional intrusion detection systems are not fully capable of identifying and managing these risks in the IoT environment, making research and evaluation of suitable intrusion detection systems for IoT crucial. In this study, deep learning, multi-layer perceptron (MLP), Random Forest (RF),… More >

  • Open Access

    ARTICLE

    A Multi-Layers Information Fused Deep Architecture for Skin Cancer Classification in Smart Healthcare

    Veena Dillshad1, Muhammad Attique Khan2,*, Muhammad Nazir1, Jawad Ahmad2, Dina Abdulaziz AlHammadi3, Taha Houda2, Hee-Chan Cho4, Byoungchol Chang5,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5299-5321, 2025, DOI:10.32604/cmc.2025.063851 - 19 May 2025

    Abstract Globally, skin cancer is a prevalent form of malignancy, and its early and accurate diagnosis is critical for patient survival. Clinical evaluation of skin lesions is essential, but several challenges, such as long waiting times and subjective interpretations, make this task difficult. The recent advancement of deep learning in healthcare has shown much success in diagnosing and classifying skin cancer and has assisted dermatologists in clinics. Deep learning improves the speed and precision of skin cancer diagnosis, leading to earlier prediction and treatment. In this work, we proposed a novel deep architecture for skin cancer… More >

  • Open Access

    ARTICLE

    Prediction and Comparative Analysis of Rooftop PV Solar Energy Efficiency Considering Indoor and Outdoor Parameters under Real Climate Conditions Factors with Machine Learning Model

    Gökhan Şahin1,*, Ihsan Levent2, Gültekin Işık2, Wilfried van Sark1, Sabir Rustemli3

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1215-1248, 2025, DOI:10.32604/cmes.2025.063193 - 11 April 2025

    Abstract This research investigates the influence of indoor and outdoor factors on photovoltaic (PV) power generation at Utrecht University to accurately predict PV system performance by identifying critical impact factors and improving renewable energy efficiency. To predict plant efficiency, nineteen variables are analyzed, consisting of nine indoor photovoltaic panel characteristics (Open Circuit Voltage (Voc), Short Circuit Current (Isc), Maximum Power (Pmpp), Maximum Voltage (Umpp), Maximum Current (Impp), Filling Factor (FF), Parallel Resistance (Rp), Series Resistance (Rs), Module Temperature) and ten environmental factors (Air Temperature, Air Humidity, Dew Point, Air Pressure, Irradiation, Irradiation Propagation, Wind Speed, Wind… More >

  • Open Access

    ARTICLE

    An Enhanced Task Migration Technique Based on Convolutional Neural Network in Machine Learning Framework

    Hamayun Khan1,*, Muhammad Atif Imtiaz2, Hira Siddique3, Muhammad Tausif Afzal Rana4, Arshad Ali5, Muhammad Zeeshan Baig6, Saif ur Rehman7, Yazed Alsaawy5

    Computer Systems Science and Engineering, Vol.49, pp. 317-331, 2025, DOI:10.32604/csse.2025.061118 - 19 March 2025

    Abstract The migration of tasks aided by machine learning (ML) predictions IN (DPM) is a system-level design technique that is used to reduce energy by enhancing the overall performance of the processor. In this paper, we address the issue of system-level higher task dissipation during the execution of parallel workloads with common deadlines by introducing a machine learning-based framework that includes task migration using energy-efficient earliest deadline first scheduling (EA-EDF). ML-based EA-EDF enhances the overall throughput and optimizes the energy to avoid delay and performance degradation in a multiprocessor system. The proposed system model allocates processors… More >

  • Open Access

    ARTICLE

    TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks

    Baoquan Liu1,3, Xi Chen2,3, Qingjun Yuan2,3, Degang Li2,3, Chunxiang Gu2,3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3179-3201, 2025, DOI:10.32604/cmc.2024.059688 - 17 February 2025

    Abstract With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based on GNN can deal with encrypted traffic well. However, existing GNN-based approaches ignore the relationship between client or server packets. In this paper, we design a network traffic topology based on GCN, called Flow Mapping Graph (FMG). FMG establishes sequential edges between vertexes by the arrival order of packets and establishes jump-order edges between vertexes by connecting packets in different bursts with the same direction. It not… More >

Displaying 1-10 on page 1 of 71. Per Page