Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (124)
  • Open Access

    ARTICLE

    Experimental and Numerical Study on Progressive Collapse Analysis of a Glulam Frame Structure: I. Side Column Exposed to Fire

    Xiaowu Cheng, Xinyan Tao, Lu Wang*

    Journal of Renewable Materials, Vol.11, No.2, pp. 905-920, 2023, DOI:10.32604/jrm.2022.023196

    Abstract This paper presents experimental and numerical investigations on progressive collapse behavior of a two-story glulam frame when the side column is exposed to ISO834 standard fire. The collapse mechanism initiated by fire is identified. The experimental results show that the progressive collapse of a glulam frame could be described for three stages, namely bending effect stage, catenary effect stage and failure stage, respectively. These stages are discussed in detail to understand the structural behavior before and during collapse. It is demonstrated that the entire frame slopes towards the side of the heated column, and the “overturning” collapse occurs eventually. The… More >

  • Open Access

    ARTICLE

    Fuzzy Firefly Based Intelligent Algorithm for Load Balancing in Mobile Cloud Computing

    Poonam*, Suman Sangwan

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1783-1799, 2023, DOI:10.32604/cmc.2023.031729

    Abstract This paper presents a novel fuzzy firefly-based intelligent algorithm for load balancing in mobile cloud computing while reducing makespan. The proposed technique implicitly acts intelligently by using inherent traits of fuzzy and firefly. It automatically adjusts its behavior or converges depending on the information gathered during the search process and objective function. It works for 3-tier architecture, including cloudlet and public cloud. As cloudlets have limited resources, fuzzy logic is used for cloudlet selection using capacity and waiting time as input. Fuzzy provides human-like decisions without using any mathematical model. Firefly is a powerful meta-heuristic optimization technique to balance diversification… More >

  • Open Access

    ARTICLE

    Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios

    Lei Yan1, Maode Ma2, Dandan Li1, Xiaohong Huang1,*, Yan Ma1, Kun Xie1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 2137-2162, 2023, DOI:10.32604/cmes.2022.022462

    Abstract The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. In these existing mechanisms, the identification of malicious flows depends on the IP address. However, the IP address is easy to be changed by attacks. Compared with the IP address, the certificate is more challenging to be tampered with or forged. Moreover, the traffic trend in the network is towards encryption. The certificates are popularly utilized by IoT devices for authentication in encryption protocols. DTLShps proposed a new… More > Graphic Abstract

    Certrust: An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios

  • Open Access

    ARTICLE

    Numerical Analysis of the Erosion Mechanism inside the Tube Sockets of Main Steam Thermometers in a Coal-Fired Power Plant

    Yukun Lv1, Fan Yang1,*, Zi’an Wei1, Quan Lu2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 379-397, 2023, DOI:10.32604/fdmp.2022.020373

    Abstract Leakage occurring in the tube sockets of the main steam thermometers can seriously threaten the safe operation of coal-fired power plants. Here, assuming a 300 MW unit as a relevant testbed, this problem is investigated numerically through solution of the equations of fluid-dynamics in synergy with the mathematical treatment of relevant statistics. The results indicate that the steam can form a large-scale spiral flow inside the tube socket and continuously scour the inner wall. In the model with the protective casing setting angle of 60°, the average tangential fluid velocity can reach up to 4.8 m/s, which is about twice higher… More > Graphic Abstract

    Numerical Analysis of the Erosion Mechanism inside the Tube Sockets of Main Steam Thermometers in a Coal-Fired Power Plant

  • Open Access

    ARTICLE

    Shape and Size Optimization of Truss Structures under Frequency Constraints Based on Hybrid Sine Cosine Firefly Algorithm

    Ran Tao, Xiaomeng Yang, Huanlin Zhou*, Zeng Meng*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 405-428, 2023, DOI:10.32604/cmes.2022.020824

    Abstract Shape and size optimization with frequency constraints is a highly nonlinear problem with mixed design variables, non-convex search space, and multiple local optima. Therefore, a hybrid sine cosine firefly algorithm (HSCFA) is proposed to acquire more accurate solutions with less finite element analysis. The full attraction model of firefly algorithm (FA) is analyzed, and the factors that affect its computational efficiency and accuracy are revealed. A modified FA with simplified attraction model and adaptive parameter of sine cosine algorithm (SCA) is proposed to reduce the computational complexity and enhance the convergence rate. Then, the population is classified, and different populations… More >

  • Open Access

    ARTICLE

    Unmanned Aerial Vehicle Assisted Forest Fire Detection Using Deep Convolutional Neural Network

    A. K. Z Rasel Rahman1, S. M. Nabil Sakif1, Niloy Sikder1, Mehedi Masud2, Hanan Aljuaid3, Anupam Kumar Bairagi1,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3259-3277, 2023, DOI:10.32604/iasc.2023.030142

    Abstract Disasters may occur at any time and place without little to no presage in advance. With the development of surveillance and forecasting systems, it is now possible to forebode the most life-threatening and formidable disasters. However, forest fires are among the ones that are still hard to anticipate beforehand, and the technologies to detect and plot their possible courses are still in development. Unmanned Aerial Vehicle (UAV) image-based fire detection systems can be a viable solution to this problem. However, these automatic systems use advanced deep learning and image processing algorithms at their core and can be tuned to provide… More >

  • Open Access

    ARTICLE

    Systematic Approach for Web Protection Runtime Tools’ Effectiveness Analysis

    Tomás Sureda Riera1,*, Juan Ramón Bermejo Higuera2, Javier Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, José Javier Martínez Herráiz1

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 579-599, 2022, DOI:10.32604/cmes.2022.020976

    Abstract Web applications represent one of the principal vehicles by which attackers gain access to an organization’s network or resources. Thus, different approaches to protect web applications have been proposed to date. Of them, the two major approaches areWeb Application Firewalls (WAF) and Runtime Application Self Protection (RASP). It is, thus, essential to understand the differences and relative effectiveness of both these approaches for effective decisionmaking regarding the security of web applications. Here we present a comparative study between WAF and RASP simulated settings, with the aim to compare their effectiveness and efficiency against different categories of attacks. For this, we… More >

  • Open Access

    ARTICLE

    A Deep Real-Time Fire Prediction Parallel D-CNN Model on UDOO BOLT V8

    Amal H. Alharbi, Hanan A. Hosni Mahmoud*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6237-6252, 2022, DOI:10.32604/cmc.2022.030963

    Abstract Hazardous incidences have significant influences on human life, and fire is one of the foremost causes of such hazard in most nations. Fire prediction and classification model from a set of fire images can decrease the risk of losing human lives and assets. Timely promotion of fire emergency can be of great aid. Therefore, construction of these prediction models is relevant and critical. This article proposes an operative fire prediction model that depends on a prediction unit embedded in the processor UDOO BOLT V8 hardware to predict fires in real time. A fire image database is improved to enhance the… More >

  • Open Access

    ARTICLE

    Swarm Optimization and Machine Learning for Android Malware Detection

    K. Santosh Jhansi1,2,*, P. Ravi Kiran Varma2, Sujata Chakravarty3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6327-6345, 2022, DOI:10.32604/cmc.2022.030878

    Abstract Malware Security Intelligence constitutes the analysis of applications and their associated metadata for possible security threats. Application Programming Interfaces (API) calls contain valuable information that can help with malware identification. The malware analysis with reduced feature space helps for the efficient identification of malware. The goal of this research is to find the most informative features of API calls to improve the android malware detection accuracy. Three swarm optimization methods, viz., Ant Lion Optimization (ALO), Cuckoo Search Optimization (CSO), and Firefly Optimization (FO) are applied to API calls using auto-encoders for identification of most influential features. The nature-inspired wrapper-based algorithms… More >

  • Open Access

    ARTICLE

    Randomized MILP framework for Securing Virtual Machines from Malware Attacks

    R. Mangalagowri1,*, Revathi Venkataraman2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360

    Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.… More >

Displaying 41-50 on page 5 of 124. Per Page