Home / Journals / CMES / Online First
Special Issues
Table of Content
  • Open Access

    ARTICLE

    Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence

    Il Hwan Ji1, Ju Hyeon Lee1, Seungho Jeon2, Jung Taek Seo2,*
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053437
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lack of performance of each component, such as computing resources like CPUs and batteries, to encrypt and decrypt data. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomical financial and human casualties. For this reason, the application of encrypted communication to IoT has been required, and the application of encrypted communication to IoT has become possible due to improvements in the computing performance of IoT devices and the development… More >

  • Open Access

    ARTICLE

    DeepBio: A Deep CNN and Bi-LSTM Learning for Person Identification Using Ear Biometrics

    Anshul Mahajan*, Sunil K. Singla
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.054468
    (This article belongs to the Special Issue: Artificial Intelligence Emerging Trends and Sustainable Applications in Image Processing and Computer Vision)
    Abstract The identification of individuals through ear images is a prominent area of study in the biometric sector. Facial recognition systems have faced challenges during the COVID-19 pandemic due to mask-wearing, prompting the exploration of supplementary biometric measures such as ear biometrics. The research proposes a Deep Learning (DL) framework, termed DeepBio, using ear biometrics for human identification. It employs two DL models and five datasets, including IIT Delhi (IITD-I and IITD-II), annotated web images (AWI), mathematical analysis of images (AMI), and EARVN1. Data augmentation techniques such as flipping, translation, and Gaussian noise are applied to More >

  • Open Access

    ARTICLE

    A Fast and Memory-Efficient Direct Rendering Method for Polynomial-Based Implicit Surfaces

    Jiayu Ren1,*, Susumu Nakata2
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.054238
    Abstract Three-dimensional surfaces are typically modeled as implicit surfaces. However, direct rendering of implicit surfaces is not simple, especially when such surfaces contain finely detailed shapes. One approach is ray-casting, where the field of the implicit surface is assumed to be piecewise polynomials defined on the grid of a rectangular domain. A critical issue for direct rendering based on ray-casting is the computational cost of finding intersections between surfaces and rays. In particular, ray-casting requires many function evaluations along each ray, severely slowing the rendering speed. In this paper, a method is proposed to achieve direct More >

  • Open Access

    ARTICLE

    Advancements in Numerical Solutions: Fractal Runge-Kutta Approach to Model Time-Dependent MHD Newtonian Fluid with Rescaled Viscosity on Riga Plate

    Muhammad Shoaib Arif1,2,*, Kamaleldin Abodayeh1, Yasir Nawaz2
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.054819
    (This article belongs to the Special Issue: New Trends on Meshless Method and Numerical Analysis)
    Abstract Fractal time-dependent issues in fluid dynamics provide a distinct difficulty in numerical analysis due to their complex characteristics, necessitating specialized computing techniques for precise and economical solutions. This study presents an innovative computational approach to tackle these difficulties. The main focus is applying the Fractal Runge-Kutta Method to model the time-dependent magnetohydrodynamic (MHD) Newtonian fluid with rescaled viscosity flow on Riga plates. An efficient computational scheme is proposed for handling fractal time-dependent problems in flow phenomena. The scheme is comprised of three stages and constructed using three different time levels. The stability of the scheme… More >

  • Open Access

    ARTICLE

    Precision Motion Control of Hydraulic Actuator Using Adaptive Back-Stepping Sliding Mode Controller

    Zhenshuai Wan1,2,*, Longwang Yue2, Yanfeng Wang2, Pu Zhao2
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053773
    Abstract Hydraulic actuators are highly nonlinear when they are subjected to different types of model uncertainties and dynamic disturbances. These unfavorable factors adversely affect the control performance of the hydraulic actuator. Although various control methods have been employed to improve the tracking precision of the dynamic system, optimizing and adjusting control gain to mitigate the hydraulic actuator model uncertainties remains elusive. This study presents an adaptive back-stepping sliding mode controller (ABSMC) to enhance the trajectory tracking precision, where the virtual control law is constructed to replace the position error. The adaptive control theory is introduced in More >

  • Open Access

    ARTICLE

    IWTW: A Framework for IoWT Cyber Threat Analysis

    GyuHyun Jeon1, Hojun Jin1, Ju Hyeon Lee1, Seungho Jeon2, Jung Taek Seo2,*
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053465
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract The Internet of Wearable Things (IoWT) or Wearable Internet of Things (WIoT) is a new paradigm that combines IoT and wearable technology. Advances in IoT technology have enabled the miniaturization of sensors embedded in wearable devices and the ability to communicate data and access real-time information over low-power mobile networks. IoWT devices are highly interdependent with mobile devices. However, due to their limited processing power and bandwidth, IoWT devices are vulnerable to cyberattacks due to their low level of security. Threat modeling and frameworks for analyzing cyber threats against existing IoT or low-power protocols have… More >

  • Open Access

    ARTICLE

    Three-Dimensional Multiferroic Structures under Time-Harmonic Loading

    Sonal Nirwal1,3,*, Ernian Pan1,2,*, Chih-Ping Lin1,2, Quoc Kinh Tran1
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.054255
    (This article belongs to the Special Issue: Recent Advances on Smart MEE Composites: Testing, Modeling and Simulation)
    Abstract Magneto-electro-elastic (MEE) materials are a specific class of advanced smart materials that simultaneously manifest the coupling behavior under electric, magnetic, and mechanical loads. This unique combination of properties allows MEE materials to respond to mechanical, electric, and magnetic stimuli, making them versatile for various applications. This paper investigates the static and time-harmonic field solutions induced by the surface load in a three-dimensional (3D) multilayered transversally isotropic (TI) linear MEE layered solid. Green’s functions corresponding to the applied uniform load (in both horizontal and vertical directions) are derived using the Fourier-Bessel series (FBS) system of vector… More >

  • Open Access

    ARTICLE

    Far and Near Optimization: A New Simple and Effective Metaphor-Less Optimization Algorithm for Solving Engineering Applications

    Tareq Hamadneh1,2, Khalid Kaabneh3, Omar Alssayed4, Kei Eguchi5,*, Zeinab Monrazeri6, Mohammad Dehghani6
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053236
    (This article belongs to the Special Issue: Swarm and Metaheuristic Optimization for Applied Engineering Application)
    Abstract In this article, a novel metaheuristic technique named Far and Near Optimization (FNO) is introduced, offering versatile applications across various scientific domains for optimization tasks. The core concept behind FNO lies in integrating global and local search methodologies to update the algorithm population within the problem-solving space based on moving each member to the farthest and nearest member to itself. The paper delineates the theory of FNO, presenting a mathematical model in two phases: (i) exploration based on the simulation of the movement of a population member towards the farthest member from itself and (ii)… More >

  • Open Access

    ARTICLE

    A Dynamical Study of Modeling the Transmission of Typhoid Fever through Delayed Strategies

    Muhammad Tashfeen1, Fazal Dayan1, Muhammad Aziz Ur Rehman1, Thabet Abdeljawad2,3,4,5,*, Aiman Mukheimer2
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053242
    (This article belongs to the Special Issue: Mathematical Aspects of Computational Biology and Bioinformatics-II)
    Abstract This study analyzes the transmission of typhoid fever caused by Salmonella typhi using a mathematical model that highlights the significance of delay in its effectiveness. Time delays can affect the nature of patterns and slow down the emergence of patterns in infected population density. The analyzed model is expanded with the equilibrium analysis, reproduction number, and stability analysis. This study aims to establish and explore the non-standard finite difference (NSFD) scheme for the typhoid fever virus transmission model with a time delay. In addition, the forward Euler method and Runge-Kutta method of order 4 (RK-4)… More >

  • Open Access

    ARTICLE

    Numerical Simulation and Parallel Computing of Acoustic Wave Equation in Isotropic-Heterogeneous Media

    Arshyn Altybay1,2,*, Niyaz Tokmagambetov1,3
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.054892
    (This article belongs to the Special Issue: Scientific Computing and Its Application to Engineering Problems)
    Abstract In this paper, we consider the numerical implementation of the 2D wave equation in isotropic-heterogeneous media. The stability analysis of the scheme using the von Neumann stability method has been studied. We conducted a study on modeling the propagation of acoustic waves in a heterogeneous medium and performed numerical simulations in various heterogeneous media at different time steps. Developed parallel code using Compute Unified Device Architecture (CUDA) technology and tested on domains of various sizes. Performance analysis showed that our parallel approach showed significant speedup compared to sequential code on the Central Processing Unit (CPU). More >

  • Open Access

    ARTICLE

    Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach

    Ana Hermosilla1,2,*, Jorge Gallego-Madrid1, Pedro Martinez-Julia3, Jordi Ortiz4, Ved P. Kafle3, Antonio Skarmeta1,2
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053379
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly prevalent, ensuring not only network security but also the security and reliability of the applications, the so-called network applications, becomes of paramount importance. This paper introduces a novel integrated model architecture, combining a network application validation framework with an AI-driven reactive system to enhance security in real-time. The proposed model leverages machine learning (ML) and artificial intelligence (AI) to dynamically monitor and respond to security threats, effectively mitigating potential risks before they impact the network infrastructure. This dual approach not only validates the functionality… More >

  • Open Access

    ARTICLE

    A Non-Intrusive Stochastic Phase-Field for Fatigue Fracture in Brittle Materials with Uncertainty in Geometry and Material Properties

    Rajan Aravind1,2, Sundararajan Natarajan1, Krishnankutty Jayakumar2, Ratna Kumar Annabattula1,*
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053047
    Abstract Understanding the probabilistic nature of brittle materials due to inherent dispersions in their mechanical properties is important to assess their reliability and safety for sensitive engineering applications. This is all the more important when elements composed of brittle materials are exposed to dynamic environments, resulting in catastrophic fatigue failures. The authors propose the application of a non-intrusive polynomial chaos expansion method for probabilistic studies on brittle materials undergoing fatigue fracture when geometrical parameters and material properties are random independent variables. Understanding the probabilistic nature of fatigue fracture in brittle materials is crucial for ensuring the… More >

  • Open Access

    ARTICLE

    An Efficient Technique for One-Dimensional Fractional Diffusion Equation Model for Cancer Tumor

    Daasara Keshavamurthy Archana1, Doddabhadrappla Gowda Prakasha1, Pundikala Veeresha2, Kottakkaran Sooppy Nisar3,4,*
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053916
    (This article belongs to the Special Issue: Analytical and Numerical Solution of the Fractional Differential Equation)
    Abstract This study intends to examine the analytical solutions to the resulting one-dimensional differential equation of a cancer tumor model in the frame of time-fractional order with the Caputo-fractional operator employing a highly efficient methodology called the -homotopy analysis transform method. So, the preferred approach effectively found the analytic series solution of the proposed model. The procured outcomes of the present framework demonstrated that this method is authentic for obtaining solutions to a time-fractional-order cancer model. The results achieved graphically specify that the concerned paradigm is dependent on arbitrary order and parameters and also disclose the More >

  • Open Access

    ARTICLE

    Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model

    Mohamed A. Mahdi1, Suliman Mohamed Fati2,*, Mohamed A.G. Hazber1, Shahanawaj Ahamad3, Sawsan A. Saad4
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.052291
    (This article belongs to the Special Issue: Emerging Artificial Intelligence Technologies and Applications)
    Abstract Cyberbullying, a critical concern for digital safety, necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces. To tackle this challenge, our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers (BERT) base model (cased), originally pretrained in English. This model is uniquely adapted to recognize the intricate nuances of Arabic online communication, a key aspect often overlooked in conventional cyberbullying detection methods. Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media (SM) tweets showing a notable… More >

  • Open Access

    ARTICLE

    A Two-Stage Scenario-Based Robust Optimization Model and a Column-Row Generation Method for Integrated Aircraft Maintenance-Routing and Crew Rostering

    Khalilallah Memarzadeh1, Hamed Kazemipoor1,*, Mohammad Fallah1, Babak Farhang Moghaddam2
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.050306
    (This article belongs to the Special Issue: Advances in Ambient Intelligence and Social Computing under uncertainty and indeterminacy: From Theory to Applications)
    Abstract Motivated by a critical issue of airline planning process, this paper addresses a new two-stage scenario-based robust optimization in operational airline planning to cope with uncertainty and possible flight disruptions. Following the route network scheme and generated flight timetables, aircraft maintenance routing and crew scheduling are critical factors in airline planning and operations cost management. This study considers the simultaneous assignment of aircraft fleet and crew to the scheduled flight while satisfying a set of operational constraints, rules, and regulations. Considering multiple locations for airline maintenance and crew bases, we solve the problem of integrated… More >
    Graphic Abstract

    A Two-Stage Scenario-Based Robust Optimization Model and a Column-Row Generation Method for Integrated Aircraft Maintenance-Routing and Crew Rostering

  • Open Access

    ARTICLE

    Concurrent Two–Scale Topology Optimization of Thermoelastic Structures Using a M–VCUT Level Set Based Model of Microstructures

    Jin Zhou, Minjie Shao*, Ye Tian, Qi Xia*
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.054059
    (This article belongs to the Special Issue: Advanced Structural Optimization Methods and their Applications in Designing Metamaterials)
    Abstract By analyzing the results of compliance minimization of thermoelastic structures, we observed that microstructures play an important role in this optimization problem. Then, we propose to use a multiple variable cutting (M–VCUT) level set-based model of microstructures to solve the concurrent two–scale topology optimization of thermoelastic structures. A microstructure is obtained by combining multiple virtual microstructures that are derived respectively from multiple microstructure prototypes, thus giving more diversity of microstructure and more flexibility in design optimization. The effective mechanical properties of microstructures are computed in an off-line phase by using the homogenization method, and then More >

  • Open Access

    ARTICLE

    Modeling the Dynamics of Tuberculosis with Vaccination, Treatment, and Environmental Impact: Fractional Order Modeling

    Muhammad Altaf Khan1,*, Mahmoud H. DarAssi2, Irfan Ahmad3, Noha Mohammad Seyam4, Ebraheem Alzahrani5
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053681
    (This article belongs to the Special Issue: Analytical and Numerical Solution of the Fractional Differential Equation)
    Abstract A mathematical model is designed to investigate Tuberculosis (TB) disease under the vaccination, treatment, and environmental impact with real cases. First, we introduce the model formulation in non-integer order derivative and then, extend the model into fractional order derivative. The fractional system’s existence, uniqueness, and other relevant properties are shown. Then, we study the stability analysis of the equilibrium points. The disease-free equilibrium (DFE) is locally asymptotically stable (LAS) when . Further, we show the global asymptotical stability (GAS) of the endemic equilibrium (EE) for and for . The existence of bifurcation analysis in the More >

  • Open Access

    ARTICLE

    The Machine Learning Ensemble for Analyzing Internet of Things Networks: Botnet Detection and Device Identification

    Seung-Ju Han, Seong-Su Yoon, Ieck-Chae Euom*
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.053457
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract The rapid proliferation of Internet of Things (IoT) technology has facilitated automation across various sectors. Nevertheless, this advancement has also resulted in a notable surge in cyberattacks, notably botnets. As a result, research on network analysis has become vital. Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods. In this paper, we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework. The results indicate that using the More >

  • Open Access

    ARTICLE

    Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems

    Ye-Seul Kil1,, Yu-Ran Jeon1,, Sun-Jin Lee1, Il-Gu Lee1,2,*
    CMES-Computer Modeling in Engineering & Sciences, DOI:10.32604/cmes.2024.052637
    (This article belongs to the Special Issue: Advanced Security for Future Mobile Internet: A Key Challenge for the Digital Transformation)
    Abstract With the rise of remote work and the digital industry, advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics, rendering them difficult to detect with conventional intrusion detection methods. Signature-based intrusion detection methods can be used to detect attacks; however, they cannot detect new malware. Endpoint detection and response (EDR) tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques. However, EDR tools are restricted by the continuous generation of unnecessary logs, resulting in poor detection… More >