Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (144)
  • Open Access

    ARTICLE

    Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications

    Reza Nadimi1,*, Maryam Hashemi2, Koji Tokimatsu3

    Journal on Internet of Things, Vol.7, pp. 49-69, 2025, DOI:10.32604/jiot.2025.070822 - 30 September 2025

    Abstract Existing Internet of Things (IoT) systems that rely on Amazon Web Services (AWS) often encounter inefficiencies in data retrieval and high operational costs, especially when using DynamoDB for large-scale sensor data. These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems. This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services. The proposed method employs AWS Lambda functions with Amazon Relational Database Service (RDS) to facilitate the transmission of data collected from temperature and humidity sensors to the… More >

  • Open Access

    ARTICLE

    Deep Learning-Based NLP Framework for Public Sentiment Analysis on Green Consumption: Evidence from Social Media

    Luyu Ma1,*, Xiu Cheng1,*, Zongyan Xing1, Yue Wu1, Weiwei Jiang2

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3921-3943, 2025, DOI:10.32604/cmc.2025.067786 - 23 September 2025

    Abstract Green consumption (GC) are crucial for achieving the Sustainable Development Goals (SDGs). However, few studies have explored public attitudes toward GC using social media data, missing potential public concerns captured through big data. To address this gap, this study collects and analyzes public attention toward GC using web crawler technology. Based on the data from Sina Weibo, we applied RoBERTa, an advanced NLP model based on transformer architecture, to conduct fine-grained sentiment analysis of the public’s attention, attitudes and hot topics on GC, demonstrating the potential of deep learning methods in capturing dynamic and contextual… More >

  • Open Access

    ARTICLE

    Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue.js, Spring Boot and MySQL

    Kevin Santiago Rey Rodriguez, Julián David Avellaneda Galindo, Josep Tárrega Juan, Juan Ramón Bermejo Higuera*, Javier Bermejo Higuera, Juan Antonio Sicilia Montalvo

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1807-1858, 2025, DOI:10.32604/cmc.2025.067127 - 29 August 2025

    Abstract In today’s rapidly evolving digital landscape, web application security has become paramount as organizations face increasingly sophisticated cyber threats. This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js, Spring Boot, and MySQL architecture. The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication, fine-grained authorization controls, sophisticated session management, data confidentiality and integrity protection, secure logging mechanisms, comprehensive error handling, high availability strategies, advanced input validation, and security headers implementation. Significant… More >

  • Open Access

    ARTICLE

    Hydration Heat Analysis and Crack Control of Composite Box Girders with Corrugated Steel Webs in Prefabrication

    Xuefeng Wang1,2, Haiqing Cao1,2, Ke Jiao3,*, Aoxiang Li1,2, Zhongwei Li1,2

    Structural Durability & Health Monitoring, Vol.19, No.4, pp. 985-1010, 2025, DOI:10.32604/sdhm.2025.061554 - 30 June 2025

    Abstract This study examines the temperature field distribution characteristics and temperature effects during the prefabrication of composite box girders with corrugated steel webs (CBGCSWs), aiming to provide practical recommendations for controlling temperature-induced cracking and technical guidance for concrete mix proportions and placement processes. Based on field measurement data, a three-dimensional finite element model was developed to simulate the temperature effects at critical locations during the prefabrication phase. By varying the concrete mix proportions, initial casting temperature, and ambient temperature, the study elucidates the variation patterns of the temperature field during precast placement. The results show that… More >

  • Open Access

    ARTICLE

    Sensitive Target-Guided Directed Fuzzing for IoT Web Services

    Xiongwei Cui, Yunchao Wang, Qiang Wei*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4939-4959, 2025, DOI:10.32604/cmc.2025.063592 - 19 May 2025

    Abstract The development of the Internet of Things (IoT) has brought convenience to people’s lives, but it also introduces significant security risks. Due to the limitations of IoT devices themselves and the challenges of re-hosting technology, existing fuzzing for IoT devices is mainly conducted through black-box methods, which lack effective execution feedback and are blind. Meanwhile, the existing static methods mainly rely on taint analysis, which has high overhead and high false alarm rates. We propose a new directed fuzz testing method for detecting bugs in web service programs of IoT devices, which can test IoT… More >

  • Open Access

    ARTICLE

    A Novel CAPTCHA Recognition System Based on Refined Visual Attention

    Zaid Derea1,2,*, Beiji Zou1, Xiaoyan Kui1,*, Monir Abdullah3, Alaa Thobhani1, Amr Abdussalam4

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 115-136, 2025, DOI:10.32604/cmc.2025.062729 - 26 March 2025

    Abstract Improving website security to prevent malicious online activities is crucial, and CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) has emerged as a key strategy for distinguishing human users from automated bots. Text-based CAPTCHAs, designed to be easily decipherable by humans yet challenging for machines, are a common form of this verification. However, advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising efficiency. In our comprehensive investigation into CAPTCHA recognition, we have tailored the renowned UpDown image captioning model specifically for this… More >

  • Open Access

    ARTICLE

    Utilizing Fine-Tuning of Large Language Models for Generating Synthetic Payloads: Enhancing Web Application Cybersecurity through Innovative Penetration Testing Techniques

    Stefan Ćirković1, Vladimir Mladenović1, Siniša Tomić2, Dalibor Drljača2, Olga Ristić1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4409-4430, 2025, DOI:10.32604/cmc.2025.059696 - 06 March 2025

    Abstract With the increasing use of web applications, challenges in the field of cybersecurity are becoming more complex. This paper explores the application of fine-tuned large language models (LLMs) for the automatic generation of synthetic attacks, including XSS (Cross-Site Scripting), SQL Injections, and Command Injections. A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence. The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks. This approach not only improves the model’s precision and dependability but… More >

  • Open Access

    REVIEW

    A Review of Joint Extraction Techniques for Relational Triples Based on NYT and WebNLG Datasets

    Chenglong Mi1, Huaibin Qin1,*, Quan Qi1, Pengxiang Zuo2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3773-3796, 2025, DOI:10.32604/cmc.2024.059455 - 06 March 2025

    Abstract In recent years, with the rapid development of deep learning technology, relational triplet extraction techniques have also achieved groundbreaking progress. Traditional pipeline models have certain limitations due to error propagation. To overcome the limitations of traditional pipeline models, recent research has focused on jointly modeling the two key subtasks-named entity recognition and relation extraction-within a unified framework. To support future research, this paper provides a comprehensive review of recently published studies in the field of relational triplet extraction. The review examines commonly used public datasets for relational triplet extraction techniques and systematically reviews current mainstream… More >

  • Open Access

    ARTICLE

    X-OODM: Leveraging Explainable Object-Oriented Design Methodology for Multi-Domain Sentiment Analysis

    Abqa Javed1, Muhammad Shoaib1,*, Abdul Jaleel2, Mohamed Deriche3, Sharjeel Nawaz4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4977-4994, 2025, DOI:10.32604/cmc.2025.057359 - 06 March 2025

    Abstract Incorporation of explainability features in the decision-making web-based systems is considered a primary concern to enhance accountability, transparency, and trust in the community. Multi-domain Sentiment Analysis is a significant web-based system where the explainability feature is essential for achieving user satisfaction. Conventional design methodologies such as object-oriented design methodology (OODM) have been proposed for web-based application development, which facilitates code reuse, quantification, and security at the design level. However, OODM did not provide the feature of explainability in web-based decision-making systems. X-OODM modifies the OODM with added explainable models to introduce the explainability feature for… More >

  • Open Access

    ARTICLE

    A Dual-Layer Attention Based CAPTCHA Recognition Approach with Guided Visual Attention

    Zaid Derea1,2, Beiji Zou1, Xiaoyan Kui1,*, Alaa Thobhani1, Amr Abdussalam3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2841-2867, 2025, DOI:10.32604/cmes.2025.059586 - 03 March 2025

    Abstract Enhancing website security is crucial to combat malicious activities, and CAPTCHA (Completely Automated Public Turing tests to tell Computers and Humans Apart) has become a key method to distinguish humans from bots. While text-based CAPTCHAs are designed to challenge machines while remaining human-readable, recent advances in deep learning have enabled models to recognize them with remarkable efficiency. In this regard, we propose a novel two-layer visual attention framework for CAPTCHA recognition that builds on traditional attention mechanisms by incorporating Guided Visual Attention (GVA), which sharpens focus on relevant visual features. We have specifically adapted the… More >

Displaying 1-10 on page 1 of 144. Per Page