Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (125)
  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core of the methodology lies in… More >

  • Open Access

    ARTICLE

    WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC

    Mai Alzamel1,*, Hamza Ali Rizvi2, Najwa Altwaijry1, Isra Al-Turaiki1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4177-4204, 2024, DOI:10.32604/cmc.2024.048370

    Abstract Scalability and information personal privacy are vital for training and deploying large-scale deep learning models. Federated learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web browsers. Nevertheless, relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client numbers. Additionally, information relating to the training dataset can possibly be extracted from the distributed weights, potentially reducing the privacy of the local data used for training. In this research paper, we aim to investigate… More >

  • Open Access

    ARTICLE

    NAMO Géoweb

    Une plateforme pour valoriser la narration et la modélisation de l’espace géographique et des territoires

    Jean-Pierre Chery1, Marie Gradeler1, Vincent Bonnal2,3,4

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 355-376, 2022, DOI:10.3166/RIG.31.355-376© 2022

    Abstract The need to enhance and share generic and original information from different research projects, led to the design of a dedicated geoweb, called NAMO. Its design uses open and free functionalities that demonstrate their flexibility in an agile and iterative approach. It is in particular the development of two dimensions of valorization and positioning in geoweb 2.0 that is highlighted: narrative mapping and systemic modeling. The use of geographic information, in particular in co-construction and open science approaches, can thus be better equipped.

    RÉSUMÉ.
    Les besoins de valoriser et de partager des informations génériques et originales de différents projets… More >

  • Open Access

    EDITORIAL

    A TRIBUTE IN MEMORY OF PROFESSOR RALPH L. WEBB (1934 – 2011)

    Frontiers in Heat and Mass Transfer, Vol.2, No.2, pp. 1-1, 2011, DOI:10.5098/hmt.v2.2.1001

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Dynamic Response Impact of Vehicle Braking on Simply Supported Beam Bridges with Corrugated Steel Webs Based on Vehicle-Bridge Coupled Vibration Analysis

    Yan Wang*, Siwen Li, Na Wei

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3467-3493, 2024, DOI:10.32604/cmes.2024.046454

    Abstract A novel approach for analyzing coupled vibrations between vehicles and bridges is presented, taking into account spatiotemporal effects and mechanical phenomena resulting from vehicle braking. Efficient modeling and solution of bridge vibrations induced by vehicle deceleration are realized using this method. The method’s validity and reliability are substantiated through numerical examples. A simply supported beam bridge with a corrugated steel web is taken as an example and the effects of parameters such as the initial vehicle speed, braking acceleration, braking location, and road surface roughness on the mid-span displacement and impact factor of the bridge are analyzed. The results show… More >

  • Open Access

    ARTICLE

    A Measurement Study of the Ethereum Underlying P2P Network

    Mohammad Z. Masoud1, Yousef Jaradat1, Ahmad Manasrah2, Mohammad Alia3, Khaled Suwais4,*, Sally Almanasra4

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 515-532, 2024, DOI:10.32604/cmc.2023.044504

    Abstract This work carried out a measurement study of the Ethereum Peer-to-Peer (P2P) network to gain a better understanding of the underlying nodes. Ethereum was applied because it pioneered distributed applications, smart contracts, and Web3. Moreover, its application layer language “Solidity” is widely used in smart contracts across different public and private blockchains. To this end, we wrote a new Ethereum client based on Geth to collect Ethereum node information. Moreover, various web scrapers have been written to collect nodes’ historical data from the Internet Archive and the Wayback Machine project. The collected data has been compared with two other services… More >

  • Open Access

    ARTICLE

    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, images are divided into equal… More >

  • Open Access

    ARTICLE

    Empirical Analysis of Neural Networks-Based Models for Phishing Website Classification Using Diverse Datasets

    Shoaib Khan, Bilal Khan, Saifullah Jan*, Subhan Ullah, Aiman

    Journal of Cyber Security, Vol.5, pp. 47-66, 2023, DOI:10.32604/jcs.2023.045579

    Abstract Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information, a problem that persists despite user awareness. This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning (ML) models—Artificial Neural Networks (ANN), Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories. Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%. On the other hand, LSTM shows the lowest accuracy of 96%. These findings underscore the potential of ML techniques in… More >

  • Open Access

    ARTICLE

    Web Layout Design of Large Cavity Structures Based on Topology Optimization

    Xiaoqiao Yang, Jialiang Sun*, Dongping Jin

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2665-2689, 2024, DOI:10.32604/cmes.2023.031482

    Abstract Large cavity structures are widely employed in aerospace engineering, such as thin-walled cylinders, blades and wings. Enhancing performance of aerial vehicles while reducing manufacturing costs and fuel consumption has become a focal point for contemporary researchers. Therefore, this paper aims to investigate the topology optimization of large cavity structures as a means to enhance their performance, safety, and efficiency. By using the variable density method, lightweight design is achieved without compromising structural strength. The optimization model considers both concentrated and distributed loads, and utilizes techniques like sensitivity filtering and projection to obtain a robust optimized configuration. The mechanical properties are… More >

  • Open Access

    ARTICLE

    Phishing Website URL’s Detection Using NLP and Machine Learning Techniques

    Dinesh Kalla1,*, Sivaraju Kuraku2

    Journal on Artificial Intelligence, Vol.5, pp. 145-162, 2023, DOI:10.32604/jai.2023.043366

    Abstract Phishing websites present a severe cybersecurity risk since they can lead to financial losses, data breaches, and user privacy violations. This study uses machine learning approaches to solve the problem of phishing website detection. Using artificial intelligence, the project aims to provide efficient techniques for locating and thwarting these dangerous websites. The study goals were attained by performing a thorough literature analysis to investigate several models and methods often used in phishing website identification. Logistic Regression, K-Nearest Neighbors, Decision Trees, Random Forests, Support Vector Classifiers, Linear Support Vector Classifiers, and Naive Bayes were all used in the inquiry. This research… More >

Displaying 1-10 on page 1 of 125. Per Page