Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (458)
  • Open Access

    ARTICLE

    Evaluation and Benchmarking of Cybersecurity DDoS Attacks Detection Models through the Integration of FWZIC and MABAC Methods

    Alaa Mahmood, İsa Avcı*

    Computer Systems Science and Engineering, Vol.49, pp. 401-417, 2025, DOI:10.32604/csse.2025.062413 - 25 April 2025

    Abstract A Distributed Denial-of-Service (DDoS) attack poses a significant challenge in the digital age, disrupting online services with operational and financial consequences. Detecting such attacks requires innovative and effective solutions. The primary challenge lies in selecting the best among several DDoS detection models. This study presents a framework that combines several DDoS detection models and Multiple-Criteria Decision-Making (MCDM) techniques to compare and select the most effective models. The framework integrates a decision matrix from training several models on the CiC-DDOS2019 dataset with Fuzzy Weighted Zero Inconsistency Criterion (FWZIC) and Multi-Attribute Boundary Approximation Area Comparison (MABAC) methodologies.… More >

  • Open Access

    ARTICLE

    Optimal Evaluation of Photovoltaic Consumption Schemes in Distribution Networks Based on BASS Model for Photovoltaic Installed Capacity Prediction

    Chenyang Fu*, Xinghua Wang, Zilv Li, Xixian Liu, Xiongfei Zhang, Zhuoli Zhao

    Energy Engineering, Vol.122, No.5, pp. 1805-1821, 2025, DOI:10.32604/ee.2025.061172 - 25 April 2025

    Abstract With the large-scale promotion of distributed photovoltaics, new challenges have emerged in the photovoltaic consumption within distribution networks. Traditional photovoltaic consumption schemes have primarily focused on static analysis. However, as the scale of photovoltaic power generation devices grows and the methods of integration diversify, a single consumption scheme is no longer sufficient to meet the actual needs of current distribution networks. Therefore, this paper proposes an optimal evaluation method for photovoltaic consumption schemes based on BASS model predictions of installed capacity, aiming to provide an effective tool for generating and evaluating photovoltaic consumption schemes in… More > Graphic Abstract

    Optimal Evaluation of Photovoltaic Consumption Schemes in Distribution Networks Based on BASS Model for Photovoltaic Installed Capacity Prediction

  • Open Access

    ARTICLE

    Modeling and Performance Evaluation of Streaming Data Processing System in IoT Architecture

    Feng Zhu*, Kailin Wu, Jie Ding

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2573-2598, 2025, DOI:10.32604/cmc.2025.062007 - 16 April 2025

    Abstract With the widespread application of Internet of Things (IoT) technology, the processing of massive real-time streaming data poses significant challenges to the computational and data-processing capabilities of systems. Although distributed streaming data processing frameworks such as Apache Flink and Apache Spark Streaming provide solutions, meeting stringent response time requirements while ensuring high throughput and resource utilization remains an urgent problem. To address this, the study proposes a formal modeling approach based on Performance Evaluation Process Algebra (PEPA), which abstracts the core components and interactions of cloud-based distributed streaming data processing systems. Additionally, a generic service… More >

  • Open Access

    ARTICLE

    DRG-DCC: A Driving Risk Gaming Based Distributed Congestion Control Method for C-V2X Technology

    Lingqiu Zeng1, Peibing Sa1, Qingwen Han2, Lei Ye2,*, Letian Yang1, Cheng Zhang1, Jiqiang Cheng2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2059-2086, 2025, DOI:10.32604/cmc.2025.060392 - 16 April 2025

    Abstract Congestion control is an inherent challenge of V2X (Vehicle to Everything) technologies. Due to the use of a broadcasting mechanism, channel congestion becomes severe with the increase in vehicle density. The researchers suggested reducing the frequency of packet dissemination to relieve congestion, which caused a rise in road driving risk. Obviously, high-risk vehicles should be able to send messages timely to alarm surrounding vehicles. Therefore, packet dissemination frequency should be set according to the corresponding vehicle’s risk level, which is hard to evaluate. In this paper, a two-stage fuzzy inference model is constructed to evaluate More >

  • Open Access

    ARTICLE

    Safety Evaluation of Bridge under Moving Abnormal Indivisible Load Based on Fusing Bridge Inspection Data and Load Test Data

    He Zhang1,2,*, He-Qing Mu2,*, Xiao Zhang3, He Zhang2, Yuedong Yang4

    Structural Durability & Health Monitoring, Vol.19, No.3, pp. 499-530, 2025, DOI:10.32604/sdhm.2025.059070 - 03 April 2025

    Abstract Safety evaluation of a bridge under Moving Abnormal Indivisible Loads (MAILs) directly relates to whether an oversized and/or overweight Large-Cargo Transportation (LCT) vehicle is permitted to pass the bridge. Safety evaluation can be updated by fusing bridge inspection data and load test data, but there are two fundamental difficulties in updating. The first difficulty is to develop an updating scheme to utilize the unstructured inspection data. The second difficulty is to develop a successive updating scheme using load test data based on the previous updating results of the inspection data. This paper proposed a framework,… More >

  • Open Access

    ARTICLE

    Numerical Evaluation of the Performance Enhancement of S-Shaped Diffuser at the Intake of Gas Turbine by Energy Promoters

    Hussain H. Al-Kayiem1,*, Raed A. Jessam2, Sinan S. Hamdi3, Ali M. Tukkee4,5

    Energy Engineering, Vol.122, No.4, pp. 1311-1335, 2025, DOI:10.32604/ee.2025.061709 - 31 March 2025

    Abstract Size reduction of the gas turbines (GT) by reducing the inlet S-shaped diffuser length increases the power-to-weight ratio. It improves the techno-economic features of the GT by lesser fuel consumption. However, this Length reduction of a bare S-shaped diffuser to an aggressive S-shaped diffuser would risk flow separation and performance reduction of the diffuser and the air intake of the GT. The objective of this research is to propose and assess fitted energy promoters (EPs) to enhance the S-shaped diffuser performance by controlling and modifying the flow in the high bending zone of the diffuser.… More >

  • Open Access

    ARTICLE

    Analysis of Hydraulic Fracture Network Morphology in Stimulated Coal Reservoirs with Pre-Existing Natural Fractures

    Weiping Ouyang1,2, Luoyi Huang3,*, Jinghua Liu3,*, Hongzhong Zhang1,2

    Energy Engineering, Vol.122, No.4, pp. 1491-1509, 2025, DOI:10.32604/ee.2025.061171 - 31 March 2025

    Abstract Hydraulic fracturing is a crucial technique for efficient development of coal reservoirs. Coal rocks typically contain a high density of natural fractures, which serve as conduits for fracturing fluid. Upon injection, the fluid infiltrates these natural fractures and leaks out, resulting in complex fracture morphology. The prediction of hydraulic fracture network propagation for coal reservoirs has important practical significance for evaluating hydraulic fracturing. This study proposes a novel inversion method for predicting fracture networks in coal reservoirs, explicitly considering the distribution of natural fractures. The method incorporates three distinct natural fracture opening modes and employs… More >

  • Open Access

    ARTICLE

    Utilizing Fine-Tuning of Large Language Models for Generating Synthetic Payloads: Enhancing Web Application Cybersecurity through Innovative Penetration Testing Techniques

    Stefan Ćirković1, Vladimir Mladenović1, Siniša Tomić2, Dalibor Drljača2, Olga Ristić1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4409-4430, 2025, DOI:10.32604/cmc.2025.059696 - 06 March 2025

    Abstract With the increasing use of web applications, challenges in the field of cybersecurity are becoming more complex. This paper explores the application of fine-tuned large language models (LLMs) for the automatic generation of synthetic attacks, including XSS (Cross-Site Scripting), SQL Injections, and Command Injections. A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence. The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks. This approach not only improves the model’s precision and dependability but… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trust Model for Inter-Domain Routing

    Qiong Yang1, Li Ma1,2,*, Sami Ullah3, Shanshan Tu1, Hisham Alasmary4, Muhammad Waqas5,6

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4821-4839, 2025, DOI:10.32604/cmc.2025.059497 - 06 March 2025

    Abstract Border Gateway Protocol (BGP), as the standard inter-domain routing protocol, is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems (AS). BGP nodes, communicating in a distributed dynamic environment, face several security challenges, with trust being one of the most important issues in inter-domain routing. Existing research, which performs trust evaluation when exchanging routing information to suppress malicious routing behavior, cannot meet the scalability requirements of BGP nodes. In this paper, we propose a blockchain-based trust model for inter-domain routing. Our model achieves scalability by allowing the master node of… More >

  • Open Access

    ARTICLE

    Evaluation Model for Energy Efficiency of Factory Workshop Based on DSR and Fuzzy Borda

    Shengjie Yang1,2, Zijian Zhu1,*, Xu Ouyang3

    Energy Engineering, Vol.122, No.3, pp. 1073-1092, 2025, DOI:10.32604/ee.2025.060293 - 07 March 2025

    Abstract In the context of advancing towards dual carbon goals, numerous factories are actively engaging in energy efficiency upgrades and transformations. To accurately pinpoint energy efficiency bottlenecks within factories and prioritize renovation sequences, it is crucial to conduct comprehensive evaluations of the energy performance across various workshops. Therefore, this paper proposes an evaluation model for workshop energy efficiency based on the drive-state-response (DSR) framework combined with the fuzzy BORDA method. Firstly, an in-depth analysis of the relationships between different energy efficiency indicators was conducted. Based on the DSR model, evaluation criteria were selected from three dimensions—drive… More >

Displaying 1-10 on page 1 of 458. Per Page