Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,788)
  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

  • Open Access

    ARTICLE

    Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder

    S. Abinaya*, K. Uttej Kumar

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047167

    Abstract A Recommender System (RS) is a crucial part of several firms, particularly those involved in e-commerce. In conventional RS, a user may only offer a single rating for an item-that is insufficient to perceive consumer preferences. Nowadays, businesses in industries like e-learning and tourism enable customers to rate a product using a variety of factors to comprehend customers’ preferences. On the other hand, the collaborative filtering (CF) algorithm utilizing AutoEncoder (AE) is seen to be effective in identifying user-interested items. However, the cost of these computations increases nonlinearly as the number of items and users increases. To triumph over the… More >

  • Open Access

    ARTICLE

    Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks

    Shiyan Zhang1,*, Ruohan Xu2, Zhangbo Xu3, Cenhua Yu1, Yuyang Jiang1, Yuting Zhao4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046550

    Abstract The 6th generation mobile networks (6G) network is a kind of multi-network interconnection and multi-scenario coexistence network, where multiple network domains break the original fixed boundaries to form connections and convergence. In this paper, with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness, this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration. Due to the conflict between the utility of different flows, the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions. Regarding the tradeoff between… More >

  • Open Access

    ARTICLE

    Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing

    Huixiang Xu*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.046253

    Abstract The Internet of Things (IoT) has revolutionized how we interact with and gather data from our surrounding environment. IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights. The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented data generation and connectivity. These IoT devices, equipped with many sensors and actuators, continuously produce vast volumes of data. However, the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges. However, transmitting all this data to a… More >

  • Open Access

    ARTICLE

    An Improved Harris Hawk Optimization Algorithm for Flexible Job Shop Scheduling Problem

    Zhaolin Lv1, Yuexia Zhao2, Hongyue Kang3,*, Zhenyu Gao3, Yuhang Qin4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045826

    Abstract Flexible job shop scheduling problem (FJSP) is the core decision-making problem of intelligent manufacturing production management. The Harris hawk optimization (HHO) algorithm, as a typical metaheuristic algorithm, has been widely employed to solve scheduling problems. However, HHO suffers from premature convergence when solving NP-hard problems. Therefore, this paper proposes an improved HHO algorithm (GNHHO) to solve the FJSP. GNHHO introduces an elitism strategy, a chaotic mechanism, a nonlinear escaping energy update strategy, and a Gaussian random walk strategy to prevent premature convergence. A flexible job shop scheduling model is constructed, and the static and dynamic FJSP is investigated to minimize… More >

  • Open Access

    ARTICLE

    Artificial Immune Detection for Network Intrusion Data Based on Quantitative Matching Method

    Cai Ming Liu1,2,3, Yan Zhang1,2,*, Zhihui Hu1,2, Chunming Xie1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045282

    Abstract Artificial immune detection can be used to detect network intrusions in an adaptive approach and proper matching methods can improve the accuracy of immune detection methods. This paper proposes an artificial immune detection model for network intrusion data based on a quantitative matching method. The proposed model defines the detection process by using network data and decimal values to express features and artificial immune mechanisms are simulated to define immune elements. Then, to improve the accuracy of similarity calculation, a quantitative matching method is proposed. The model uses mathematical methods to train and evolve immune elements, increasing the diversity of… More >

  • Open Access

    ARTICLE

    Machine Learning Security Defense Algorithms Based on Metadata Correlation Features

    Ruchun Jia, Jianwei Zhang*, Yi Lin

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.044149

    Abstract With the popularization of the Internet and the development of technology, cyber threats are increasing day by day. Threats such as malware, hacking, and data breaches have had a serious impact on cybersecurity. The network security environment in the era of big data presents the characteristics of large amounts of data, high diversity, and high real-time requirements. Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats. This paper proposes a machine-learning security defense algorithm based on metadata association features. Emphasize control over unauthorized users through privacy, integrity, and availability. The… More >

  • Open Access

    ARTICLE

    CircR-ZC3HC1 mediates MiR-384-5p/SIRT1 axis to promote neuronal autophagy and relieves ischemic stroke

    MIN SHEN1,2, XIAOMAN XU1,2, GUANGLING SUN1, LIANGZHU WANG1, TAO YING1, HANG SU1, WEI WANG1, QINGHUA CAO1,*, ZHEZHE SUN1,*

    BIOCELL, Vol., , DOI:10.32604/biocell.2023.047640

    Abstract Objective: Circular RNAs (circRNAs) have been shown to involve in pathological processes of ischemic stroke (IS), including autophagy. This study was designed to explore the effect of circR-ZC3HC1 on neuronal autophagy in IS and the related mechanisms. Methods: Expression of circR-ZC3HC1 in blood samples of IS patients and healthy controls was detected. Hippocampal neurons were treated with oxygen and glucose deprivation (OGD) to establish IS in vitro model. The expression of LC3 and p62 and the number of autophagosomes were examined to evaluate the autophagy level of OGD induced neurons using western blotting and transmission electron microscope. Cell apoptosis rate… More >

  • Open Access

    ARTICLE

    CMTM6 deletion affects chemoresistance and macrophage M2 polarization in colorectal cancer cells

    YANG XU1,#, HONGYUN LI1,#, GE YOU2,*

    BIOCELL, Vol., , DOI:10.32604/biocell.2023.045030

    Abstract Background: Colorectal cancer (CRC) constitutes the leading cause of death worldwide. Chemoresistance and tumor immune evasion are critical contributors to therapeutic failure in cancer patients. CKLF-like MARVEL transmembrane domain-containing 6 (CMTM6) is aberrantly expressed in various cancers and can regulate tumor immunity. However, its role in chemoresistance and tumor immunity of CRC is not well understood. Methods: Online bioinformatics tools were used to analyze expression and prognosis of CMTM6 in CRC patients. CRC cells were transfected with si-CMTM6. Subsequently, the effects on CRC cell viability and chemoresistance were investigated by CCK-8 assay and flow cytometer. Furthermore, CRC cell-induced macrophage recruitments… More > Graphic Abstract

    CMTM6 deletion affects chemoresistance and macrophage M2 polarization in colorectal cancer cells

  • Open Access

    ARTICLE

    E3 ubiquitin ligase CBL-B suppresses vascular endothelial cell pyroptosis and injury in intracranial aneurysm by facilitating NLRP3 degradation

    WEI ZHENG1, CHENG LIU2,*

    BIOCELL, Vol., , DOI:10.32604/biocell.2023.044211

    Abstract Objective: Intracranial aneurysm (IA) represents a devastating disease with high rates of disability and mortality, which is initiated by dysfunction of endothelial cells (ECs). Evidence suggests the dysregulation of the E3 ubiquitin ligase family during EC injury. In this work, the role of an E3 ubiquitin ligase, casitas B lymphoma-B (CBL-B), was explored in human brain microvascular EC (HBMEC) function through the NLRP3 pathway. Methods: In vitro IA model was induced by treating HBMECs with oxidized low-density lipoprotein (ox-LDL). The levels of CBL-B and pyroptosis-related proteins NLRP3, ASC, cleaved caspase-1, and GSDME-N were determined by real-time-quantitative polymerase chain reaction and… More >

Displaying 591-600 on page 60 of 2788. Per Page