Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (486)
  • Open Access

    ARTICLE

    Upper and Lower Bounds of the α-Universal Triple I Method for Unified Interval Implications

    Yiming Tang1,2, Jianwei Gao1,*, Yifan Huang1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1063-1088, 2024, DOI:10.32604/cmc.2024.049341

    Abstract The α-universal triple I (α-UTI) method is a recognized scheme in the field of fuzzy reasoning, which was proposed by our research group previously. The robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent, which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without interference. Therefore, in this study, the interval robustness (embodied as the interval stability) of the α-UTI method is explored in the interval-valued fuzzy environment. To begin with, the stability of the α-UTI method is explored for the case of an individual rule,… More >

  • Open Access

    ARTICLE

    Alternative Method of Constructing Granular Neural Networks

    Yushan Yin1, Witold Pedrycz1,2, Zhiwu Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 623-650, 2024, DOI:10.32604/cmc.2024.048787

    Abstract Utilizing granular computing to enhance artificial neural network architecture, a new type of network emerges—the granular neural network (GNN). GNNs offer distinct advantages over their traditional counterparts: The ability to process both numerical and granular data, leading to improved interpretability. This paper proposes a novel design method for constructing GNNs, drawing inspiration from existing interval-valued neural networks built upon NNNs. However, unlike the proposed algorithm in this work, which employs interval values or triangular fuzzy numbers for connections, existing methods rely on a pre-defined numerical network. This new method utilizes a uniform distribution of information granularity to granulate connections with… More >

  • Open Access

    ARTICLE

    Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems

    Xia Li1, Zhanyou Ma1,*, Zhibao Mian2, Ziyuan Liu1, Ruiqi Huang1, Nana He1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4129-4152, 2024, DOI:10.32604/cmc.2024.047168

    Abstract Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications. Although there is an extensive literature on qualitative properties such as safety and liveness, there is still a lack of quantitative and uncertain property verifications for these systems. In uncertain environments, agents must make judicious decisions based on subjective epistemic. To verify epistemic and measurable properties in multi-agent systems, this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge (FCTLK). We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

    Bin Wu1,2, Xianyi Chen3, Jinzhou Huang4,*, Caicai Zhang5, Jing Wang6, Jing Yu1,2, Zhiqiang Zhao7, Zhuolin Mei1,2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3177-3194, 2024, DOI:10.32604/cmc.2023.047147

    Abstract In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in… More >

  • Open Access

    ARTICLE

    A Hybrid SIR-Fuzzy Model for Epidemic Dynamics: A Numerical Study

    Muhammad Shoaib Arif1,2,*, Kamaleldin Abodayeh1, Yasir Nawaz2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3417-3434, 2024, DOI:10.32604/cmes.2024.046944

    Abstract This study focuses on the urgent requirement for improved accuracy in disease modeling by introducing a new computational framework called the Hybrid SIR-Fuzzy Model. By integrating the traditional Susceptible-Infectious-Recovered (SIR) model with fuzzy logic, our method effectively addresses the complex nature of epidemic dynamics by accurately accounting for uncertainties and imprecisions in both data and model parameters. The main aim of this research is to provide a model for disease transmission using fuzzy theory, which can successfully address uncertainty in mathematical modeling. Our main emphasis is on the imprecise transmission rate parameter, utilizing a three-part description of its membership level.… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO

    Ashraf S. Mashaleh1,2,*, Noor Farizah Binti Ibrahim1, Mohammad Alauthman3, Mohammad Almseidin4, Amjad Gawanmeh5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2245-2267, 2024, DOI:10.32604/cmc.2023.047323

    Abstract Increasing Internet of Things (IoT) device connectivity makes botnet attacks more dangerous, carrying catastrophic hazards. As IoT botnets evolve, their dynamic and multifaceted nature hampers conventional detection methods. This paper proposes a risk assessment framework based on fuzzy logic and Particle Swarm Optimization (PSO) to address the risks associated with IoT botnets. Fuzzy logic addresses IoT threat uncertainties and ambiguities methodically. Fuzzy component settings are optimized using PSO to improve accuracy. The methodology allows for more complex thinking by transitioning from binary to continuous assessment. Instead of expert inputs, PSO data-driven tunes rules and membership functions. This study presents a… More >

  • Open Access

    ARTICLE

    Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder

    S. Abinaya*, K. Uttej Kumar

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2269-2286, 2024, DOI:10.32604/cmc.2024.047167

    Abstract A Recommender System (RS) is a crucial part of several firms, particularly those involved in e-commerce. In conventional RS, a user may only offer a single rating for an item-that is insufficient to perceive consumer preferences. Nowadays, businesses in industries like e-learning and tourism enable customers to rate a product using a variety of factors to comprehend customers’ preferences. On the other hand, the collaborative filtering (CF) algorithm utilizing AutoEncoder (AE) is seen to be effective in identifying user-interested items. However, the cost of these computations increases nonlinearly as the number of items and users increases. To triumph over the… More >

  • Open Access

    ARTICLE

    Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing

    Huixiang Xu*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2309-2335, 2024, DOI:10.32604/cmc.2024.046253

    Abstract The Internet of Things (IoT) has revolutionized how we interact with and gather data from our surrounding environment. IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights. The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented data generation and connectivity. These IoT devices, equipped with many sensors and actuators, continuously produce vast volumes of data. However, the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges. However, transmitting all this data to a… More >

  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks, with a focus on developing… More >

Displaying 1-10 on page 1 of 486. Per Page