Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (495)
  • Open Access

    ARTICLE

    Evaluation of Industrial IoT Service Providers with TOPSIS Based on Circular Intuitionistic Fuzzy Sets

    Elif Çaloğlu Büyükselçuk*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 715-746, 2024, DOI:10.32604/cmc.2024.052509

    Abstract Industrial Internet of Things (IIoT) service providers have become increasingly important in the manufacturing industry due to their ability to gather and process vast amounts of data from connected devices, enabling manufacturers to improve operational efficiency, reduce costs, and enhance product quality. These platforms provide manufacturers with real-time visibility into their production processes and supply chains, allowing them to optimize operations and make informed decisions. In addition, IIoT service providers can help manufacturers create new revenue streams through the development of innovative products and services and enable them to leverage the benefits of emerging technologies… More >

  • Open Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1123-1142, 2024, DOI:10.32604/cmc.2024.052088

    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

  • Open Access

    ARTICLE

    Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1457-1490, 2024, DOI:10.32604/cmc.2024.051996

    Abstract This study describes improving network security by implementing and assessing an intrusion detection system (IDS) based on deep neural networks (DNNs). The paper investigates contemporary technical ways for enhancing intrusion detection performance, given the vital relevance of safeguarding computer networks against harmful activity. The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset, a popular benchmark for IDS research. The model performs well in both the training and validation stages, with 91.30% training accuracy and 94.38% validation accuracy. Thus, the model shows good learning and generalization capabilities with minor losses of… More >

  • Open Access

    ARTICLE

    Fully Completed Spherical Fuzzy Approach-Based Z Numbers (PHI Model) for Enhanced Group Expert Consensus

    Phi-Hung Nguyen*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1655-1675, 2024, DOI:10.32604/cmc.2024.050713

    Abstract This study aims to establish an expert consensus and enhance the efficacy of decision-making processes by integrating Spherical Fuzzy Sets (SFSs) and Z-Numbers (SFZs). A novel group expert consensus technique, the PHI model, is developed to address the inherent limitations of both SFSs and the traditional Delphi technique, particularly in uncertain, complex scenarios. In such contexts, the accuracy of expert knowledge and the confidence in their judgments are pivotal considerations. This study provides the fundamental operational principles and aggregation operators associated with SFSs and Z-numbers, encompassing weighted geometric and arithmetic operators alongside fully developed operators… More >

  • Open Access

    ARTICLE

    Study on the Influence of Setting Parameters of Tunnel Centralized Smoke Extraction System on Fire Smoke Flow and Temperature Decay

    Zhisheng Xu*, Sohail Mahmood, Zihan Yu

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 791-816, 2024, DOI:10.32604/fhmt.2024.051058

    Abstract The centralized smoke exhaust system of shield tunnel is an important determinant for tunnel fire safety, and the use of different design parameters of the tunnel smoke exhaust system will affect the smoke exhaust effect in the tunnel, and the influence of different design parameters on the smoke exhaust effect and temperature attenuation of the tunnel can help engineers in designing a more effective centralized smoke exhaust system for the tunnel. In this paper, the Fire Dynamic Simulator (FDS) is utilized to examine smoke exhaust vent settings for a centralized exhaust system in shield tunnel… More >

  • Open Access

    ARTICLE

    An Integrated Bipolar Picture Fuzzy Decision Driven System to Scrutinize Food Waste Treatment Technology through Assorted Factor Analysis

    Navaneethakrishnan Suganthi Keerthana Devi1, Samayan Narayanamoorthy1, Thirumalai Nallasivan Parthasarathy1, Chakkarapani Sumathi Thilagasree2, Dragan Pamucar3,4,*, Vladimir Simic5,6, Hasan Dinçer7,8, Serhat Yüksel7,8

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2665-2687, 2024, DOI:10.32604/cmes.2024.050954

    Abstract Food Waste (FW) is a pressing environmental concern that affects every country globally. About one-third of the food that is produced ends up as waste, contributing to the carbon footprint. Hence, the FW must be properly treated to reduce environmental pollution. This study evaluates a few available Food Waste Treatment (FWT) technologies, such as anaerobic digestion, composting, landfill, and incineration, which are widely used. A Bipolar Picture Fuzzy Set (BPFS) is proposed to deal with the ambiguity and uncertainty that arise when converting a real-world problem to a mathematical model. A novel Criteria Importance Through… More >

  • Open Access

    REVIEW

    A Comprehensive Systematic Review: Advancements in Skin Cancer Classification and Segmentation Using the ISIC Dataset

    Madiha Hameed1,3, Aneela Zameer1,*, Muhammad Asif Zahoor Raja2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2131-2164, 2024, DOI:10.32604/cmes.2024.050124

    Abstract The International Skin Imaging Collaboration (ISIC) datasets are pivotal resources for researchers in machine learning for medical image analysis, especially in skin cancer detection. These datasets contain tens of thousands of dermoscopic photographs, each accompanied by gold-standard lesion diagnosis metadata. Annual challenges associated with ISIC datasets have spurred significant advancements, with research papers reporting metrics surpassing those of human experts. Skin cancers are categorized into melanoma and non-melanoma types, with melanoma posing a greater threat due to its rapid potential for metastasis if left untreated. This paper aims to address challenges in skin cancer detection… More >

  • Open Access

    ARTICLE

    Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems

    Siwan Noh1, Kyung-Hyune Rhee2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3805-3826, 2024, DOI:10.32604/cmc.2024.050949

    Abstract In Decentralized Machine Learning (DML) systems, system participants contribute their resources to assist others in developing machine learning solutions. Identifying malicious contributions in DML systems is challenging, which has led to the exploration of blockchain technology. Blockchain leverages its transparency and immutability to record the provenance and reliability of training data. However, storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs. Additionally, current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data. However, less… More >

  • Open Access

    ARTICLE

    Fine-Grained Ship Recognition Based on Visible and Near-Infrared Multimodal Remote Sensing Images: Dataset, Methodology and Evaluation

    Shiwen Song, Rui Zhang, Min Hu*, Feiyao Huang

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5243-5271, 2024, DOI:10.32604/cmc.2024.050879

    Abstract Fine-grained recognition of ships based on remote sensing images is crucial to safeguarding maritime rights and interests and maintaining national security. Currently, with the emergence of massive high-resolution multi-modality images, the use of multi-modality images for fine-grained recognition has become a promising technology. Fine-grained recognition of multi-modality images imposes higher requirements on the dataset samples. The key to the problem is how to extract and fuse the complementary features of multi-modality images to obtain more discriminative fusion features. The attention mechanism helps the model to pinpoint the key information in the image, resulting in a… More >

  • Open Access

    ARTICLE

    CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4319-4347, 2024, DOI:10.32604/cmc.2024.050586

    Abstract Intrusion detection systems (IDS) are essential in the field of cybersecurity because they protect networks from a wide range of online threats. The goal of this research is to meet the urgent need for small-footprint, highly-adaptable Network Intrusion Detection Systems (NIDS) that can identify anomalies. The NSL-KDD dataset is used in the study; it is a sizable collection comprising 43 variables with the label’s “attack” and “level.” It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks (CNN). Furthermore, this dataset makes it easier to conduct… More >

Displaying 1-10 on page 1 of 495. Per Page