Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (343)
  • Open Access

    ARTICLE

    CSRWA: Covert and Severe Attacks Resistant Watermarking Algorithm

    Balsam Dhyia Majeed1,2, Amir Hossein Taherinia1,*, Hadi Sadoghi Yazdi1, Ahad Harati1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1027-1047, 2025, DOI:10.32604/cmc.2024.059789 - 03 January 2025

    Abstract Watermarking is embedding visible or invisible data within media to verify its authenticity or protect copyright. The watermark is embedded in significant spatial or frequency features of the media to make it more resistant to intentional or unintentional modification. Some of these features are important perceptual features according to the human visual system (HVS), which means that the embedded watermark should be imperceptible in these features. Therefore, both the designers of watermarking algorithms and potential attackers must consider these perceptual features when carrying out their actions. The two roles will be considered in this paper… More >

  • Open Access

    REVIEW

    Navigating the Complexities of Controller Placement in SD-WANs: A Multi-Objective Perspective on Current Trends and Future Challenges

    Abdulrahman M. Abdulghani1,*, Azizol Abdullah1, A. R. Rahiman1, Nor Asilah Wati Abdul Hamid1,2, Bilal Omar Akram3,4, Hafsa Raissouli1

    Computer Systems Science and Engineering, Vol.49, pp. 123-157, 2025, DOI:10.32604/csse.2024.058314 - 03 January 2025

    Abstract This review article provides a comprehensive analysis of the latest advancements and persistent challenges in Software-Defined Wide Area Networks (SD-WANs), with a particular emphasis on the multi-objective Controller Placement Problem (CPP). As SD-WAN technology continues to gain prominence for its capacity to offer flexible and efficient network management, the task of 36optimally placing controllers—responsible for orchestrating and managing network traffic—remains a critical yet complex challenge. This review delves into recent innovations in multi-objective controller placement strategies, including clustering techniques, heuristic-based approaches, and the integration of machine learning and deep learning models. Each methodology is critically More >

  • Open Access

    ARTICLE

    SEF: A Smart and Energy-Aware Forwarding Strategy for NDN-Based Internet of Healthcare

    Naeem Ali Askar1,*, Adib Habbal1,*, Hassen Hamouda2, Abdullah Mohammad Alnajim3, Sheroz Khan4

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4625-4658, 2024, DOI:10.32604/cmc.2024.058607 - 19 December 2024

    Abstract Named Data Networking (NDN) has emerged as a promising communication paradigm, emphasizing content-centric access rather than location-based access. This model offers several advantages for Internet of Healthcare Things (IoHT) environments, including efficient content distribution, built-in security, and natural support for mobility and scalability. However, existing NDN-based IoHT systems face inefficiencies in their forwarding strategy, where identical Interest packets are forwarded across multiple nodes, causing broadcast storms, increased collisions, higher energy consumption, and delays. These issues negatively impact healthcare system performance, particularly for individuals with disabilities and chronic diseases requiring continuous monitoring. To address these challenges,… More >

  • Open Access

    PROCEEDINGS

    Numerical Simulation of In Situ Deformation Behavior of Pt-DNA Hydrogel

    Isamu Riku1,*, Arisa Fukatsu1, Koji Mimura1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.3, pp. 1-1, 2024, DOI:10.32604/icces.2024.011356

    Abstract Pt-DNA hydrogel is formed by cross-linking the DNA strands with Pt-ions and the resultant three-dimensionally cross-linked DNA strands’ network is expected be used as a biocompatible polymeric carrier, i.e. the drug delivery platform for in situ tissue repair due to its high toughness. On the other hand, as another essential qualification for the drug delivery platform, the stability of the microstructure of the platform is indispensable.
    To evaluate the stability of the microstructure of Pt-DNA hydrogel, in this study, we at first employ the nonaffine molecular chains’ network model to reproduce the experimental results of the More >

  • Open Access

    PROCEEDINGS

    Towards High Reynolds Number Flows by a High-Order SPH Method

    Zifei Meng1, Pengnan Sun1,*, Yang Xu1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.011674

    Abstract DNS simulations on incompressible flows with high Reynolds number using meshfree methods remain an enduring challenge to be addressed. In the present work, we attempt to use a high-order SPH scheme (TENO-SPH) to make DNS simulations on high Reynolds number flows. To investigate this, several spatial reconstructions are applied under the Riemann-ALE-SPH framework, and their performances are compared. Particularly, the accuracy of SPH is significantly enhanced by WENO and TENO reconstructions. For free surface flows, we implement a Lagrangian TENO-SPH to reproduce these flows at different Reynolds numbers. More importantly, to make DNS simulations, the More >

  • Open Access

    ARTICLE

    Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking

    Hira Akhtar Butt1, Khoula Said Al Harthy2, Mumtaz Ali Shah3, Mudassar Hussain2,*, Rashid Amin4,*, Mujeeb Ur Rehman1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3003-3031, 2024, DOI:10.32604/cmc.2024.057185 - 18 November 2024

    Abstract Detecting sophisticated cyberattacks, mainly Distributed Denial of Service (DDoS) attacks, with unexpected patterns remains challenging in modern networks. Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking (SDN) environments. While Machine Learning (ML) models can distinguish between benign and malicious traffic, their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining. In this paper, we propose a novel DDoS detection framework that combines Machine Learning (ML) and Ensemble Learning (EL) techniques to improve DDoS attack detection and mitigation in SDN environments. Our model… More >

  • Open Access

    ARTICLE

    An Adaptive Congestion Control Optimization Strategy in SDN-Based Data Centers

    Jinlin Xu1,2, Wansu Pan1,*, Haibo Tan1,2, Longle Cheng1, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2709-2726, 2024, DOI:10.32604/cmc.2024.056925 - 18 November 2024

    Abstract The traffic within data centers exhibits bursts and unpredictable patterns. This rapid growth in network traffic has two consequences: it surpasses the inherent capacity of the network’s link bandwidth and creates an imbalanced network load. Consequently, persistent overload situations eventually result in network congestion. The Software Defined Network (SDN) technology is employed in data centers as a network architecture to enhance performance. This paper introduces an adaptive congestion control strategy, named DA-DCTCP, for SDN-based Data Centers. It incorporates Explicit Congestion Notification (ECN) and Round-Trip Time (RTT) to establish congestion awareness and an ECN marking model.… More >

  • Open Access

    ARTICLE

    LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques

    Shanjita Akter Prome1, Md Rafiqul Islam2,*, Md. Kowsar Hossain Sakib1, David Asirvatham1, Neethiahnanthan Ari Ragavan3, Cesar Sanin2, Edward Szczerbicki4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2845-2871, 2024, DOI:10.32604/cmc.2024.055311 - 18 November 2024

    Abstract Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions. The human face is a rich source of data that offers trustworthy markers of deception. The deception or lie detection systems are non-intrusive, cost-effective, and mobile by identifying facial expressions. Over the last decade, numerous studies have been conducted on deception detection using several advanced techniques. Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception. So, it could be challenging to spot trends, practical approaches, gaps, and chances for contribution.… More >

  • Open Access

    ARTICLE

    Boundedness and Positivity Preserving Numerical Analysis of a Fuzzy-Parameterized Delayed Model for Foot and Mouth Disease Dynamics

    Muhammad Tashfeen1, Fazal Dayan1, Muhammad Aziz ur Rehman1, Thabet Abdeljawad2,3,4,5,*, Aiman Mukheimer2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2527-2554, 2024, DOI:10.32604/cmes.2024.056269 - 31 October 2024

    Abstract Foot-and-mouth disease (FMD) is a viral disease that affects cloven-hoofed animals including cattle, pigs, and sheep, hence causing export bans among others, causing high economic losses due to reduced productivity. The global effect of FMD is most felt where livestock rearing forms an important source of income. It is therefore important to understand the modes of transmission of FMD to control its spread and prevent its occurrence. This work intends to address these dynamics by including the efficacy of active migrant animals transporting the disease from one area to another in a fuzzy mathematical modeling… More >

  • Open Access

    ARTICLE

    Effect of Liquid Temperature on Surface and Mechanical Characteristics of Al-Mg Alloy Treated with a Cavitating Waterjet

    Can Kang1,*, Shifeng Yan1, Haixia Liu2, Jie Chen2, Kejin Ding3

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.11, pp. 2431-2442, 2024, DOI:10.32604/fdmp.2024.055688 - 28 October 2024

    Abstract The presented study aims to reveal the effect of liquid temperature on cavitation-induced erosion of an Al-Mg alloy. An experimental work was conducted using a submerged cavitating waterjet to impact the specimen surface. For a certain cavitation number and a given standoff distance, different liquid temperatures were considered. Accordingly, a comprehensive comparison was implemented by inspecting the mass loss and surface morphology of the tested specimens. The results show that the cumulative mass loss increases continuously with the liquid temperature. A cavitation zone with an irregular profile becomes evident as the cavitation treatment proceeds. Increasing More > Graphic Abstract

    Effect of Liquid Temperature on Surface and Mechanical Characteristics of Al-Mg Alloy Treated with a Cavitating Waterjet

Displaying 1-10 on page 1 of 343. Per Page