Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (300)
  • Open Access

    ARTICLE

    Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing

    Emad Alsuwat1,*, Suhare Solaiman1, Hatim Alsuwat2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3743-3759, 2023, DOI:10.32604/cmc.2023.035126

    Abstract Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning (ML) models. Due to attackers’ (and/or benign equivalents’) dynamic behavior changes, testing data distribution frequently diverges from original training data over time, resulting in substantial model failures. Due to their dispersed and dynamic nature, distributed denial-of-service attacks pose a danger to cybersecurity, resulting in attacks with serious consequences for users and businesses. This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service (DDOS) in the network.… More >

  • Open Access

    ARTICLE

    MLD-MPC Approach for Three-Tank Hybrid Benchmark Problem

    Hanen Yaakoubi1, Hegazy Rezk2, Mujahed Al-Dhaifallah3,4,*, Joseph Haggège1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3657-3675, 2023, DOI:10.32604/cmc.2023.034929

    Abstract The present paper aims at validating a Model Predictive Control (MPC), based on the Mixed Logical Dynamical (MLD) model, for Hybrid Dynamic Systems (HDSs) that explicitly involve continuous dynamics and discrete events. The proposed benchmark system is a three-tank process, which is a typical case study of HDSs. The MLD-MPC controller is applied to the level control of the considered tank system. The study is initially focused on the MLD approach that allows consideration of the interacting continuous dynamics with discrete events and includes the operating constraints. This feature of MLD modeling is very advantageous when an MPC controller synthesis… More >

  • Open Access

    ARTICLE

    ML and CFD Simulation of Flow Structure around Tandem Bridge Piers in Pressurized Flow

    Aliasghar Azma1, Ramin Kiyanfar2, Yakun Liu1,*, Masoumeh Azma3,*, Di Zhang1, Ze Cao1, Zhuoyue Li1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1711-1733, 2023, DOI:10.32604/cmc.2023.036680

    Abstract Various regions are becoming increasingly vulnerable to the increased frequency of floods due to the recent changes in climate and precipitation patterns throughout the world. As a result, specific infrastructures, notably bridges, would experience significant flooding for which they were not intended and would be submerged. The flow field and shear stress distribution around tandem bridge piers under pressurized flow conditions for various bridge deck widths are examined using a series of three-dimensional (3D) simulations. It is indicated that scenarios with a deck width to pier diameter (Ld/p) ratio of 3 experience the highest levels of turbulent disturbance. In addition,… More >

  • Open Access

    ARTICLE

    Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

    Sarah Alzahrani1, Joud Alderaan1, Dalya Alatawi1, Bandar Alotaibi1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 651-667, 2023, DOI:10.32604/cmc.2023.035173

    Abstract Internet of Things (IoT) devices incorporate a large amount of data in several fields, including those of medicine, business, and engineering. User authentication is paramount in the IoT era to assure connected devices’ security. However, traditional authentication methods and conventional biometrics-based authentication approaches such as face recognition, fingerprints, and password are vulnerable to various attacks, including smudge attacks, heat attacks, and shoulder surfing attacks. Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication. Artificial Intelligence (AI)-based approaches introduce a bright future in refining large amounts of homogeneous biometric… More >

  • Open Access

    ARTICLE

    Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications

    Samah Alshathri1, Ezz El-Din Hemdan2, Walid El-Shafai3,4,*, Amged Sayed5,6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 183-196, 2023, DOI:10.32604/cmc.2023.034048

    Abstract In recent years, Digital Twin (DT) has gained significant interest from academia and industry due to the advanced in information technology, communication systems, Artificial Intelligence (AI), Cloud Computing (CC), and Industrial Internet of Things (IIoT). The main concept of the DT is to provide a comprehensive tangible, and operational explanation of any element, asset, or system. However, it is an extremely dynamic taxonomy developing in complexity during the life cycle that produces a massive amount of engendered data and information. Likewise, with the development of AI, digital twins can be redefined and could be a crucial approach to aid the… More >

  • Open Access

    ARTICLE

    TinyML-Based Classification in an ECG Monitoring Embedded System

    Eunchan Kim1, Jaehyuk Kim2, Juyoung Park3, Haneul Ko4, Yeunwoong Kyung5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1751-1764, 2023, DOI:10.32604/cmc.2023.031663

    Abstract Recently, the development of the Internet of Things (IoT) has enabled continuous and personal electrocardiogram (ECG) monitoring. In the ECG monitoring system, classification plays an important role because it can select useful data (i.e., reduce the size of the dataset) and identify abnormal data that can be used to detect the clinical diagnosis and guide further treatment. Since the classification requires computing capability, the ECG data are usually delivered to the gateway or the server where the classification is performed based on its computing resource. However, real-time ECG data transmission continuously consumes battery and network resources, which are expensive and… More >

  • Open Access

    ARTICLE

    Visualization Techniques via MLBS for Personnel Management in Major Events

    Yu Su1,2,3, Lingjuan Hou2,3,*, Sinan Li1, Zhaochang Jiang1, Haoran Peng4

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 521-536, 2023, DOI:10.32604/csse.2022.028606

    Abstract Mobile location-based services (MLBS) refer to services around geographic location data. Mobile terminals use wireless communication networks (or satellite positioning systems) to obtain users’ geographic location coordinate information based on spatial databases and integrate with other information to provide users with required location-related services. The development of systems based on MLBS has significance and practical value. In this paper a visualization management information system for personnel in major events based on microservices, namely MEPMIS, is designed and implemented by using MLBS. The system consists of a server and a client app, and it has some functions including map search and… More >

  • Open Access

    ARTICLE

    Fault Recognition of Multilevel Inverter Using Artificial Neural Network Approach

    Aravind Athimoolam1,*, Karthik Balasubramanian2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1331-1347, 2023, DOI:10.32604/iasc.2023.033465

    Abstract This paper focuses on the development of a diagnostic tool for detecting insulated gate bipolar transistor power electronic switch flaws caused by both open and short circuit faults in multi-level inverter time-frequency output voltage specifications. High-resolution laboratory virtual instrument engineering workbench software testing tool with a sample rate data collection system, as well as specialized signal processing and soft computing technologies, are used in this proposed method. On a single-phase cascaded H-bridge multilevel inverter, simulation and experimental investigations of both open and short issues of the insulated gate bipolar transistor components are performed out. In all conceivable switch issues, the… More >

  • Open Access

    ARTICLE

    Modeling CO2 Emission in Residential Sector of Three Countries in Southeast of Asia by Applying Intelligent Techniques

    Mohsen Sharifpur1,2, Mohamed Salem3, Yonis M Buswig4, Habib Forootan Fard5, Jaroon Rungamornrat6,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5679-5690, 2023, DOI:10.32604/cmc.2023.034726

    Abstract Residential sector is one of the energy-consuming districts of countries that causes CO2 emission in large extent. In this regard, this sector must be considered in energy policy making related to the reduction of emission of CO2 and other greenhouse gases. In the present work, CO2 emission related to the residential sector of three countries, including Indonesia, Thailand, and Vietnam in Southeast Asia, are discussed and modeled by employing Group Method of Data Handling (GMDH) and Multilayer Perceptron (MLP) neural networks as powerful intelligent methods. Prior to modeling, data related to the energy consumption of these countries are represented, discussed,… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

Displaying 31-40 on page 4 of 300. Per Page