Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,874)
  • Open Access

    ARTICLE

    Robust Particle Swarm Optimization Algorithm for Modeling the Effect of Oxides Thermal Properties on AMIG 304L Stainless Steel Welds

    Rachid Djoudjou1,*, Abdeljlil Chihaoui Hedhibi3, Kamel Touileb1, Abousoufiane Ouis1, Sahbi Boubaker2, Hani Said Abdo4,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1809-1825, 2024, DOI:10.32604/cmes.2024.053621 - 27 September 2024

    Abstract There are several advantages to the MIG (Metal Inert Gas) process, which explains its increased use in various welding sectors, such as automotive, marine, and construction. A variant of the MIG process, where the same equipment is employed except for the deposition of a thin layer of flux before the welding operation, is the AMIG (Activated Metal Inert Gas) technique. This study focuses on investigating the impact of physical properties of individual metallic oxide fluxes for 304L stainless steel welding joint morphology and to what extent it can help determine a relationship among weld depth… More >

  • Open Access

    ARTICLE

    IWTW: A Framework for IoWT Cyber Threat Analysis

    GyuHyun Jeon1, Hojun Jin1, Ju Hyeon Lee1, Seungho Jeon2, Jung Taek Seo2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1575-1622, 2024, DOI:10.32604/cmes.2024.053465 - 27 September 2024

    Abstract The Internet of Wearable Things (IoWT) or Wearable Internet of Things (WIoT) is a new paradigm that combines IoT and wearable technology. Advances in IoT technology have enabled the miniaturization of sensors embedded in wearable devices and the ability to communicate data and access real-time information over low-power mobile networks. IoWT devices are highly interdependent with mobile devices. However, due to their limited processing power and bandwidth, IoWT devices are vulnerable to cyberattacks due to their low level of security. Threat modeling and frameworks for analyzing cyber threats against existing IoT or low-power protocols have… More >

  • Open Access

    ARTICLE

    The Machine Learning Ensemble for Analyzing Internet of Things Networks: Botnet Detection and Device Identification

    Seung-Ju Han, Seong-Su Yoon, Ieck-Chae Euom*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1495-1518, 2024, DOI:10.32604/cmes.2024.053457 - 27 September 2024

    Abstract The rapid proliferation of Internet of Things (IoT) technology has facilitated automation across various sectors. Nevertheless, this advancement has also resulted in a notable surge in cyberattacks, notably botnets. As a result, research on network analysis has become vital. Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods. In this paper, we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework. The results indicate that using the More >

  • Open Access

    ARTICLE

    Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence

    Il Hwan Ji1, Ju Hyeon Lee1, Seungho Jeon2, Jung Taek Seo2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1519-1549, 2024, DOI:10.32604/cmes.2024.053437 - 27 September 2024

    Abstract In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lack of performance of each component, such as computing resources like CPUs and batteries, to encrypt and decrypt data. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomical financial and human casualties. For this reason, the application of encrypted communication to IoT has been required, and the application of encrypted communication to IoT has become possible due to improvements in the computing performance of IoT devices and the development… More >

  • Open Access

    ARTICLE

    Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach

    Ana Hermosilla1,2,*, Jorge Gallego-Madrid1, Pedro Martinez-Julia3, Jordi Ortiz4, Ved P. Kafle3, Antonio Skarmeta1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1447-1471, 2024, DOI:10.32604/cmes.2024.053379 - 27 September 2024

    Abstract As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly prevalent, ensuring not only network security but also the security and reliability of the applications, the so-called network applications, becomes of paramount importance. This paper introduces a novel integrated model architecture, combining a network application validation framework with an AI-driven reactive system to enhance security in real-time. The proposed model leverages machine learning (ML) and artificial intelligence (AI) to dynamically monitor and respond to security threats, effectively mitigating potential risks before they impact the network infrastructure. This dual approach not only validates the functionality… More >

  • Open Access

    ARTICLE

    Ensemble Filter-Wrapper Text Feature Selection Methods for Text Classification

    Oluwaseun Peter Ige1,2, Keng Hoon Gan1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1847-1865, 2024, DOI:10.32604/cmes.2024.053373 - 27 September 2024

    Abstract Feature selection is a crucial technique in text classification for improving the efficiency and effectiveness of classifiers or machine learning techniques by reducing the dataset’s dimensionality. This involves eliminating irrelevant, redundant, and noisy features to streamline the classification process. Various methods, from single feature selection techniques to ensemble filter-wrapper methods, have been used in the literature. Metaheuristic algorithms have become popular due to their ability to handle optimization complexity and the continuous influx of text documents. Feature selection is inherently multi-objective, balancing the enhancement of feature relevance, accuracy, and the reduction of redundant features. This… More >

  • Open Access

    ARTICLE

    A Dynamical Study of Modeling the Transmission of Typhoid Fever through Delayed Strategies

    Muhammad Tashfeen1, Fazal Dayan1, Muhammad Aziz Ur Rehman1, Thabet Abdeljawad2,3,4,5,*, Aiman Mukheimer2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1419-1446, 2024, DOI:10.32604/cmes.2024.053242 - 27 September 2024

    Abstract This study analyzes the transmission of typhoid fever caused by Salmonella typhi using a mathematical model that highlights the significance of delay in its effectiveness. Time delays can affect the nature of patterns and slow down the emergence of patterns in infected population density. The analyzed model is expanded with the equilibrium analysis, reproduction number, and stability analysis. This study aims to establish and explore the non-standard finite difference (NSFD) scheme for the typhoid fever virus transmission model with a time delay. In addition, the forward Euler method and Runge-Kutta method of order 4 (RK-4)… More >

  • Open Access

    ARTICLE

    Far and Near Optimization: A New Simple and Effective Metaphor-Less Optimization Algorithm for Solving Engineering Applications

    Tareq Hamadneh1,2, Khalid Kaabneh3, Omar Alssayed4, Kei Eguchi5,*, Zeinab Monrazeri6, Mohammad Dehghani6

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1725-1808, 2024, DOI:10.32604/cmes.2024.053236 - 27 September 2024

    Abstract In this article, a novel metaheuristic technique named Far and Near Optimization (FNO) is introduced, offering versatile applications across various scientific domains for optimization tasks. The core concept behind FNO lies in integrating global and local search methodologies to update the algorithm population within the problem-solving space based on moving each member to the farthest and nearest member to itself. The paper delineates the theory of FNO, presenting a mathematical model in two phases: (i) exploration based on the simulation of the movement of a population member towards the farthest member from itself and (ii)… More >

  • Open Access

    ARTICLE

    A Non-Intrusive Stochastic Phase-Field for Fatigue Fracture in Brittle Materials with Uncertainty in Geometry and Material Properties

    Rajan Aravind1,2, Sundararajan Natarajan1, Krishnankutty Jayakumar2, Ratna Kumar Annabattula1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 997-1032, 2024, DOI:10.32604/cmes.2024.053047 - 27 September 2024

    Abstract Understanding the probabilistic nature of brittle materials due to inherent dispersions in their mechanical properties is important to assess their reliability and safety for sensitive engineering applications. This is all the more important when elements composed of brittle materials are exposed to dynamic environments, resulting in catastrophic fatigue failures. The authors propose the application of a non-intrusive polynomial chaos expansion method for probabilistic studies on brittle materials undergoing fatigue fracture when geometrical parameters and material properties are random independent variables. Understanding the probabilistic nature of fatigue fracture in brittle materials is crucial for ensuring the… More >

  • Open Access

    ARTICLE

    Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems

    Ye-Seul Kil1,#, Yu-Ran Jeon1,#, Sun-Jin Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1473-1493, 2024, DOI:10.32604/cmes.2024.052637 - 27 September 2024

    Abstract With the rise of remote work and the digital industry, advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics, rendering them difficult to detect with conventional intrusion detection methods. Signature-based intrusion detection methods can be used to detect attacks; however, they cannot detect new malware. Endpoint detection and response (EDR) tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques. However, EDR tools are restricted by the continuous generation of unnecessary logs, resulting in poor detection… More >

Displaying 21-30 on page 3 of 3874. Per Page