Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Binary Program Vulnerability Mining Based on Neural Network

    Zhenhui Li1, Shuangping Xing1, Lin Yu1, Huiping Li1, Fan Zhou1, Guangqiang Yin1, Xikai Tang2, Zhiguo Wang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1861-1879, 2024, DOI:10.32604/cmc.2023.046595

    Abstract Software security analysts typically only have access to the executable program and cannot directly access the source code of the program. This poses significant challenges to security analysis. While it is crucial to identify vulnerabilities in such non-source code programs, there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods. However, these tools suffer from some shortcomings. In terms of targeted fuzzing, the path searching for target points is not streamlined enough, and the completely random testing leads to an excessively large search space. Additionally, when it comes to code similarity analysis,… More >

  • Open Access

    ARTICLE

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms

    Shehab Abdulhabib Alzaeemi1, Kim Gaik Tay1,*, Audrey Huong1, Saratha Sathasivam2, Majid Khan bin Majahar Ali2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1163-1184, 2023, DOI:10.32604/csse.2023.038912

    Abstract Radial Basis Function Neural Network (RBFNN) ensembles have long suffered from non-efficient training, where incorrect parameter settings can be computationally disastrous. This paper examines different evolutionary algorithms for training the Symbolic Radial Basis Function Neural Network (SRBFNN) through the behavior’s integration of satisfiability programming. Inspired by evolutionary algorithms, which can iteratively find the near-optimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN-2SAT). The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA),… More >

  • Open Access

    ARTICLE

    A Survey on Binary Code Vulnerability Mining Technology

    Pengzhi Xu1,2, Zetian Mai1,2, Yuhao Lin1, Zhen Guo1,2,*, Victor S. Sheng3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 165-179, 2021, DOI:10.32604/jihpp.2021.027280

    Abstract With the increase of software complexity, the security threats faced by the software are also increasing day by day. So people pay more and more attention to the mining of software vulnerabilities. Although source code has rich semantics and strong comprehensibility, source code vulnerability mining has been widely used and has achieved significant development. However, due to the protection of commercial interests and intellectual property rights, it is difficult to obtain source code. Therefore, the research on the vulnerability mining technology of binary code has strong practical value. Based on the investigation of related technologies, this article firstly introduces the… More >

  • Open Access

    ARTICLE

    Lacunary Generating Functions of Hybrid Type Polynomials in Viewpoint of Symbolic Approach

    Nusrat Raza1, Umme Zainab2 and Serkan Araci3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 903-921, 2022, DOI:10.32604/cmes.2022.017669

    Abstract In this paper, we introduce mon-symbolic method to obtain the generating functions of the hybrid class of Hermite-associated Laguerre and its associated polynomials. We obtain the series definitions of these hybrid special polynomials. Also, we derive the double lacunary generating functions of the Hermite-Laguerre polynomials and the Hermite-Laguerre-Wright polynomials. Further, we find multiplicative and derivative operators for the Hermite-Laguerre-Wright polynomials which helps to find the symbolic differential equation of the Hermite-Laguerre-Wright polynomials. Some concluding remarks are also given. More >

  • Open Access

    ABSTRACT

    Solvability of a Plane Integral Geometry Problem\ and a Solution Algorithm

    Arif Amirov1, Mustafa Yildiz1, Zekeriya Ustaoglu1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.12, No.4, pp. 115-124, 2009, DOI:10.3970/icces.2009.012.115

    Abstract In this work we deal with solvability and aproximation to the solution of the two dimensional integral geometry problem for a family of regular curves of given curvature. Solvability of the problem is proved by using the Galerkin method and an algorithm is developed to compute the approximate solution of the problem. More >

  • Open Access

    ABSTRACT

    On the solution of a coefficient inverse problem for the non-stationary kinetic equation

    Mustafa Yildiz1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.12, No.3, pp. 103-110, 2009, DOI:10.3970/icces.2009.012.103

    Abstract The solvability conditions of an inverse problem for the non-stationary kinetic equation is formulated and a new numerical method is developed to obtain the approximate solution of the problem. A comparison between the approximate solution and the exact solution of the problem is presented. More >

  • Open Access

    ARTICLE

    A New Method Based on Evolutionary Algorithm for Symbolic Network Weak Unbalance

    Yirong Jiang1, Weijin Jiang2,3,4,*, Jiahui Chen2,*, Yang Wang2, Yuhui Xu2, Lina Tan2, Liang Guo5

    Journal on Internet of Things, Vol.1, No.2, pp. 41-53, 2019, DOI:10.32604/jiot.2019.07231

    Abstract The symbolic network adds the emotional information of the relationship, that is, the “+” and “-” information of the edge, which greatly enhances the modeling ability and has wide application in many fields. Weak unbalance is an important indicator to measure the network tension. This paper starts from the weak structural equilibrium theorem, and integrates the work of predecessors, and proposes the weak unbalanced algorithm EAWSB based on evolutionary algorithm. Experiments on the large symbolic networks Epinions, Slashdot and WikiElections show the effectiveness and efficiency of the proposed method. In EAWSB, this paper proposes a compression-based indirect representation method, which… More >

  • Open Access

    ARTICLE

    Bäcklund Transformations: a Link Between Diffusion Models and Hydrodynamic Equations

    J.R. Zabadal1, B. Bodmann1, V. G. Ribeiro2, A. Silveira2, S. Silveira2

    CMES-Computer Modeling in Engineering & Sciences, Vol.103, No.4, pp. 215-227, 2014, DOI:10.3970/cmes.2014.103.215

    Abstract This work presents a new analytical method to transform exact solutions of linear diffusion equations into exact ones for nonlinear advection-diffusion models. The proposed formulation, based on Bäcklund transformations, is employed to obtain velocity fields for the unsteady two-dimensional Helmholtz equation, starting from analytical solutions of a heat conduction type model. More >

  • Open Access

    ARTICLE

    Stochastic Finite Element Analysis and Reliability Of Steel Telecommunication Towers

    M.M. Kamiński1, J. Szafran1

    CMES-Computer Modeling in Engineering & Sciences, Vol.83, No.2, pp. 143-168, 2012, DOI:10.32604/cmes.2012.083.143

    Abstract The main issue in this article is computational probabilistic analysis and reliability assessment of the steel telecommunication towers subjected to material and environmental uncertainty. Such a discussion is important since very wide, frequent and relatively modern application of these structures, which are subjected to various sources of uncertainty and having at this moment no rich and time-dependent failure evidence. Numerical analysis is based on the generalized stochastic perturbation technique implemented as the Stochastic Finite Elements using the Response Function Method applied with the use of computer algebra system. A simultaneous usage of the engineering FEM system and mathematical package enables… More >

  • Open Access

    ARTICLE

    On application of the Stochastic Finite Volume Method in Navier-Stokes problems

    Marcin Kamiński1, Rafał Leszek Ossowski1

    CMES-Computer Modeling in Engineering & Sciences, Vol.81, No.3&4, pp. 311-334, 2011, DOI:10.3970/cmes.2011.081.311

    Abstract The main aim of this article is numerical solution of the fully coupled Navier-Stokes equations with Gaussian random parameters. It is provided thanks to the specially adopted Finite Volume Method, modified using the generalized stochastic perturbation technique. This Stochastic Finite Volume Method is applied to model 3D problem with uncertainty in liquid viscosity and a coefficient of the heat conduction, separately. Probabilistic moments and characteristics of up to the fourth order are determined with the use of the Response Function Method realized numerically via the polynomial inpterpolation. Although mathematical formulation of the SFVM has been proposed in addition to the… More >

Displaying 1-10 on page 1 of 15. Per Page