Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (198)
  • Open Access

    EDITORIAL

    Introduction to the Special Issue on Computational Intelligent Systems for Solving Complex Engineering Problems: Principles and Applications

    Danial Jahed Armaghani1,*, Ahmed Salih Mohammed2,3, Ramesh Murlidhar Bhatawdekar4, Pouyan Fakharian5, Ashutosh Kainthola6, Wael Imad Mahmood7

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2023-2027, 2024, DOI:10.32604/cmes.2023.031701

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Innovative Deep Architecture for Flight Safety Risk Assessment Based on Time Series Data

    Hong Sun1, Fangquan Yang2, Peiwen Zhang3,*, Yang Jiao4, Yunxiang Zhao5

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2549-2569, 2024, DOI:10.32604/cmes.2023.030131

    Abstract With the development of the integration of aviation safety and artificial intelligence, research on the combination of risk assessment and artificial intelligence is particularly important in the field of risk management, but searching for an efficient and accurate risk assessment algorithm has become a challenge for the civil aviation industry. Therefore, an improved risk assessment algorithm (PS-AE-LSTM) based on long short-term memory network (LSTM) with autoencoder (AE) is proposed for the various supervised deep learning algorithms in flight safety that cannot adequately address the problem of the quality on risk level labels. Firstly, based on the normal distribution characteristics of… More >

  • Open Access

    ARTICLE

    Effect of NaCl Concentration on the Cumulative Strain and Pore Distribution of Clay under Cyclic Loading

    Xinshan Zhuang*, Shunlei Xia, Ruijie Pan

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.2, pp. 447-461, 2024, DOI:10.32604/fdmp.2023.042220

    Abstract Clay, as the most common soil used for foundation fill, is widely used in various infrastructure projects. The physical and mechanical properties of clay are influenced by the pore solution environment. This study uses a GDS static/dynamic triaxial apparatus and nuclear magnetic resonance experiments to investigate the effects of cyclic loading on clay foundations. Moreover, the development of cumulative strain in clay is analyzed, and a fitting model for cumulative plastic strain is introduced by considering factors such as NaCl solution concentration, consolidation stress ratio, and cycle number. In particular, the effects of the NaCl solution concentration and consolidation stress… More >

  • Open Access

    ARTICLE

    Automated Pavement Crack Detection Using Deep Feature Selection and Whale Optimization Algorithm

    Shorouq Alshawabkeh, Li Wu*, Daojun Dong, Yao Cheng, Liping Li, Mohammad Alanaqreh

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 63-77, 2023, DOI:10.32604/cmc.2023.042183

    Abstract Pavement crack detection plays a crucial role in ensuring road safety and reducing maintenance expenses. Recent advancements in deep learning (DL) techniques have shown promising results in detecting pavement cracks; however, the selection of relevant features for classification remains challenging. In this study, we propose a new approach for pavement crack detection that integrates deep learning for feature extraction, the whale optimization algorithm (WOA) for feature selection, and random forest (RF) for classification. The performance of the models was evaluated using accuracy, recall, precision, F1 score, and area under the receiver operating characteristic curve (AUC). Our findings reveal that Model… More >

  • Open Access

    ARTICLE

    Detecting Phishing Using a Multi-Layered Social Engineering Framework

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable

    Journal of Cyber Security, Vol.5, pp. 13-32, 2023, DOI:10.32604/jcs.2023.043359

    Abstract As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A web application system and browser… More >

  • Open Access

    ARTICLE

    CFD-Based Optimization of a Shell-and-Tube Heat Exchanger

    Juanjuan Wang*, Jiangping Nan, Yanan Wang

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.11, pp. 2761-2775, 2023, DOI:10.32604/fdmp.2023.021175

    Abstract The main objective of this study is the technical optimization of a Shell-and-Tube Heat Exchanger (STHE). In order to do so, a simulation model is introduced that takes into account the related gas-phase circulation. Then, simulation verification experiments are designed in order to validate the model. The results show that the temperature field undergoes strong variations in time when an inlet wind speed of 6 m/s is considered, while the heat transfer error reaches a minimum of 5.1%. For an inlet velocity of 9 m/s, the heat transfer drops to the lowest point, while the heat transfer error reaches a… More >

  • Open Access

    REVIEW

    Phishing Attacks in Social Engineering: A Review

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah

    Journal of Cyber Security, Vol.4, No.4, pp. 239-267, 2022, DOI:10.32604/jcs.2023.041095

    Abstract Organisations closed their offices and began working from home online to prevent the spread of the COVID-19 virus. This shift in work culture coincided with increased online use during the same period. As a result, the rate of cybercrime has skyrocketed. This study examines the approaches, techniques, and countermeasures of Social Engineering and phishing in this context. The study discusses recent trends in the existing approaches for identifying phishing assaults. We explore social engineering attacks, categorise them into types, and offer both technical and social solutions for countering phishing attacks which makes this paper different from similar works that mainly… More >

  • Open Access

    ARTICLE

    Evaluation of IoT Measurement Solutions from a Metrology Perspective

    Donatien Koulla Moulla1,2,*, Ernest Mnkandla1, Alain Abran3

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2455-2479, 2023, DOI:10.32604/csse.2023.039736

    Abstract To professionally plan and manage the development and evolution of the Internet of Things (IoT), researchers have proposed several IoT performance measurement solutions. IoT performance measurement solutions can be very valuable for managing the development and evolution of IoT systems, as they provide insights into performance issues, resource optimization, predictive maintenance, security, reliability, and user experience. However, there are several issues that can impact the accuracy and reliability of IoT performance measurements, including lack of standardization, complexity of IoT systems, scalability, data privacy, and security. While previous studies proposed several IoT measurement solutions in the literature, they did not evaluate… More >

  • Open Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917

    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open Access

    TUTORIAL

    Loss Factors and their Effect on Resonance Peaks in Mechanical Systems

    Roman Vinokur*

    Sound & Vibration, Vol.57, pp. 1-13, 2023, DOI:10.32604/sv.2023.041784

    Abstract The loss factors and their effects on the magnitude and frequency of resonance peaks in various mechanical systems are reviewed for acoustic, vibration, and vibration fatigue applications. The main trends and relationships were obtained for linear mechanical models with hysteresis damping. The well-known features (complex module of elasticity, total loss factor, etc.) are clarified for practical engineers and students, and new results are presented (in particular, for 2-DOF in-series models with hysteresis friction). The results are of both educational and practical interest and may be applied for NVH analysis and testing, mechanical and aeromechanical design, and noise and vibration control… More >

Displaying 11-20 on page 2 of 198. Per Page