Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (200)
  • Open Access

    ARTICLE

    Research on a Simulation Platform for Typical Internal Corrosion Defects in Natural Gas Pipelines Based on Big Data Analysis

    Changchao Qi1, Lingdi Fu1, Ming Wen1, Hao Qian2, Shuai Zhao1,*

    Structural Durability & Health Monitoring, Vol.19, No.4, pp. 1073-1087, 2025, DOI:10.32604/sdhm.2025.061898 - 30 June 2025

    Abstract The accuracy and reliability of non-destructive testing (NDT) approaches in detecting interior corrosion problems are critical, yet research in this field is limited. This work describes a novel way to monitor the structural integrity of steel gas pipelines that uses advanced numerical modeling techniques to anticipate fracture development and corrosion effects. The objective is to increase pipeline dependability and safety through more precise, real-time health evaluations. Compared to previous approaches, our solution provides higher accuracy in fault detection and quantification, making it ideal for pipeline integrity monitoring in real-world applications. To solve this issue, statistical… More >

  • Open Access

    ARTICLE

    Development of an Index System for the Optimization of Shut-In and Flowback Stages in Shale Gas Wells

    Weiyang Xie1,2, Cheng Chang1,2, Ziqin Lai1,2,*, Sha Liu1,2, Han Xiao1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.6, pp. 1417-1438, 2025, DOI:10.32604/fdmp.2025.060956 - 30 June 2025

    Abstract In the context of post-stimulation shale gas wells, the terms “shut-in” and “flowback” refer to two critical phases that occur after hydraulic fracturing (fracking) has been completed. These stages play a crucial role in determining both the well’s initial production performance and its long-term hydrocarbon recovery. By establishing a comprehensive big data analysis platform, the flowback dynamics of over 1000 shale gas wells were analyzed in this work, leading to the development of an index system for evaluating flowback production capacity. Additionally, a shut-in chart was created for wells with different types of post-stimulation fracture More >

  • Open Access

    ARTICLE

    AI-Driven Sentiment-Enhanced Secure IoT Communication Model Using Resilience Behavior Analysis

    Menwa Alshammeri1, Mamoona Humayun2,*, Khalid Haseeb3, Ghadah Naif Alwakid1

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 433-446, 2025, DOI:10.32604/cmc.2025.065660 - 09 June 2025

    Abstract Wireless technologies and the Internet of Things (IoT) are being extensively utilized for advanced development in traditional communication systems. This evolution lowers the cost of the extensive use of sensors, changing the way devices interact and communicate in dynamic and uncertain situations. Such a constantly evolving environment presents enormous challenges to preserving a secure and lightweight IoT system. Therefore, it leads to the design of effective and trusted routing to support sustainable smart cities. This research study proposed a Genetic Algorithm sentiment-enhanced secured optimization model, which combines big data analytics and analysis rules to evaluate… More >

  • Open Access

    ARTICLE

    FSFS: A Novel Statistical Approach for Fair and Trustworthy Impactful Feature Selection in Artificial Intelligence Models

    Ali Hamid Farea1,*, Iman Askerzade1,2, Omar H. Alhazmi3, Savaş Takan4

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1457-1484, 2025, DOI:10.32604/cmc.2025.064872 - 09 June 2025

    Abstract Feature selection (FS) is a pivotal pre-processing step in developing data-driven models, influencing reliability, performance and optimization. Although existing FS techniques can yield high-performance metrics for certain models, they do not invariably guarantee the extraction of the most critical or impactful features. Prior literature underscores the significance of equitable FS practices and has proposed diverse methodologies for the identification of appropriate features. However, the challenge of discerning the most relevant and influential features persists, particularly in the context of the exponential growth and heterogeneity of big data—a challenge that is increasingly salient in modern artificial… More >

  • Open Access

    ARTICLE

    TIDS: Tensor Based Intrusion Detection System (IDS) and Its Application in Large Scale DDoS Attack Detection

    Hanqing Sun1, Xue Li2,*, Qiyuan Fan3, Puming Wang3

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1659-1679, 2025, DOI:10.32604/cmc.2025.061426 - 09 June 2025

    Abstract The era of big data brings new challenges for information network systems (INS), simultaneously offering unprecedented opportunities for advancing intelligent intrusion detection systems. In this work, we propose a data-driven intrusion detection system for Distributed Denial of Service (DDoS) attack detection. The system focuses on intrusion detection from a big data perceptive. As intelligent information processing methods, big data and artificial intelligence have been widely used in information systems. The INS system is an important information system in cyberspace. In advanced INS systems, the network architectures have become more complex. And the smart devices in… More >

  • Open Access

    ARTICLE

    Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment: Advancing Big Data Intelligence in Control Systems

    Peiying Zhang1,2,*, Yihong Yu1,2, Jing Liu3, Chong Lv1,2, Lizhuang Tan4,5, Yulin Zhang6,7,8

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4393-4409, 2025, DOI:10.32604/cmc.2025.064654 - 19 May 2025

    Abstract As Internet of Things (IoT) technologies continue to evolve at an unprecedented pace, intelligent big data control and information systems have become critical enablers for organizational digital transformation, facilitating data-driven decision making, fostering innovation ecosystems, and maintaining operational stability. In this study, we propose an advanced deployment algorithm for Service Function Chaining (SFC) that leverages an enhanced Practical Byzantine Fault Tolerance (PBFT) mechanism. The main goal is to tackle the issues of security and resource efficiency in SFC implementation across diverse network settings. By integrating blockchain technology and Deep Reinforcement Learning (DRL), our algorithm not… More >

  • Open Access

    ARTICLE

    BIG-ABAC: Leveraging Big Data for Adaptive, Scalable, and Context-Aware Access Control

    Sondes Baccouri1,2,#,*, Takoua Abdellatif 3,#

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1071-1093, 2025, DOI:10.32604/cmes.2025.062902 - 11 April 2025

    Abstract Managing sensitive data in dynamic and high-stakes environments, such as healthcare, requires access control frameworks that offer real-time adaptability, scalability, and regulatory compliance. BIG-ABAC introduces a transformative approach to Attribute-Based Access Control (ABAC) by integrating real-time policy evaluation and contextual adaptation. Unlike traditional ABAC systems that rely on static policies, BIG-ABAC dynamically updates policies in response to evolving rules and real-time contextual attributes, ensuring precise and efficient access control. Leveraging decision trees evaluated in real-time, BIG-ABAC overcomes the limitations of conventional access control models, enabling seamless adaptation to complex, high-demand scenarios. The framework adheres to the… More >

  • Open Access

    Retraction: Comparison of Structural Probabilistic and Non-Probabilistic Reliability Computational Methods under Big Data Condition

    Yongfeng Fang1,3, Kong Fah Tee2,*

    Structural Durability & Health Monitoring, Vol.19, No.3, pp. 771-771, 2025, DOI:10.32604/sdhm.2024.061036 - 03 April 2025

    Abstract This article has no abstract. More >

  • Open Access

    EDITORIAL

    Guest Editorial Special Issue on Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems

    Jipu Li1, Haidong Shao2,*, Yun Kong3, Zhuyun Chen4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3609-3613, 2025, DOI:10.32604/cmc.2024.062183 - 17 February 2025

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    A Support Vector Machine (SVM) Model for Privacy Recommending Data Processing Model (PRDPM) in Internet of Vehicles

    Ali Alqarni*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 389-406, 2025, DOI:10.32604/cmc.2024.059238 - 03 January 2025

    Abstract Open networks and heterogeneous services in the Internet of Vehicles (IoV) can lead to security and privacy challenges. One key requirement for such systems is the preservation of user privacy, ensuring a seamless experience in driving, navigation, and communication. These privacy needs are influenced by various factors, such as data collected at different intervals, trip durations, and user interactions. To address this, the paper proposes a Support Vector Machine (SVM) model designed to process large amounts of aggregated data and recommend privacy-preserving measures. The model analyzes data based on user demands and interactions with service More >

Displaying 1-10 on page 1 of 200. Per Page