Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (230)
  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

  • Open Access

    ARTICLE

    An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking

    Cong Shen1,*, Wei Zhang1,2,*, Tanping Zhou1,2, Yiming Zhang1, Lingling Zhang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4729-4748, 2024, DOI:10.32604/cmc.2024.054434 - 12 September 2024

    Abstract With the increasing awareness of privacy protection and the improvement of relevant laws, federal learning has gradually become a new choice for cross-agency and cross-device machine learning. In order to solve the problems of privacy leakage, high computational overhead and high traffic in some federated learning schemes, this paper proposes a multiplicative double privacy mask algorithm which is convenient for homomorphic addition aggregation. The combination of homomorphic encryption and secret sharing ensures that the server cannot compromise user privacy from the private gradient uploaded by the participants. At the same time, the proposed TQRR (Top-Q-Random-R) More >

  • Open Access

    ARTICLE

    Improving Transferable Targeted Adversarial Attack for Object Detection Using RCEN Framework and Logit Loss Optimization

    Zhiyi Ding, Lei Sun*, Xiuqing Mao, Leyu Dai, Ruiyang Ding

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4387-4412, 2024, DOI:10.32604/cmc.2024.052196 - 12 September 2024

    Abstract Object detection finds wide application in various sectors, including autonomous driving, industry, and healthcare. Recent studies have highlighted the vulnerability of object detection models built using deep neural networks when confronted with carefully crafted adversarial examples. This not only reveals their shortcomings in defending against malicious attacks but also raises widespread concerns about the security of existing systems. Most existing adversarial attack strategies focus primarily on image classification problems, failing to fully exploit the unique characteristics of object detection models, thus resulting in widespread deficiencies in their transferability. Furthermore, previous research has predominantly concentrated on… More >

  • Open Access

    ARTICLE

    Droplet Condensation and Transport Properties on Multiple Composite Surface: A Molecular Dynamics Study

    Haowei Hu1,2,*, Qi Wang1, Xinnuo Chen1, Qin Li3, Mu Du4, Dong Niu5,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.4, pp. 1245-1259, 2024, DOI:10.32604/fhmt.2024.054223 - 30 August 2024

    Abstract To investigate the microscopic mechanism underlying the influence of surface-chemical gradient on heat and mass recovery, a molecular dynamics model including droplet condensation and transport process has been developed to examine heat and mass recovery performance. This work aimed at identify optimal conditions for enhancing heat and mass recovery through the combination of wettability gradient and nanopore transport. For comprehensive analysis, the structure in the simulation was categorized into three distinct groups: a homogeneous structure, a small wettability gradient, and a large wettability gradient. The homogeneous surface demonstrated low efficiency in heat and mass transfer, More >

  • Open Access

    ARTICLE

    Droplet Self-Driven Characteristics on Wedge-Shaped Surface with Composite Gradients: A Molecular Dynamics Study

    Haowei Hu1,2,*, Xinnuo Chen1, Qi Wang1, Qin Li3, Dong Niu4, Mu Du5,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.4, pp. 1071-1085, 2024, DOI:10.32604/fhmt.2024.054218 - 30 August 2024

    Abstract The self-driven behavior of droplets on a functionalized surface, coupled with wetting gradient and wedge patterns, is systematically investigated using molecular dynamics (MD) simulations. The effects of key factors, including wedge angle, wettability, and wetting gradient, on the droplet self-driving effect is revealed from the nanoscale. Results indicate that the maximum velocity of droplets on hydrophobic wedge-shaped surfaces increases with the wedge angle, accompanied by a rapid attenuation of driving force; however, the average velocity decreases with the increased wedge angle. Conversely, droplet movement on hydrophilic wedge-shaped surfaces follows the opposite trend, particularly in terms… More >

  • Open Access

    ARTICLE

    Three-Dimensional Convection in an Inclined Porous Layer Subjected to a Vertical Temperature Gradient

    Ivan Shubenkov1,2,*, Tatyana Lyubimova1,2, Evgeny Sadilov1

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.9, pp. 1957-1970, 2024, DOI:10.32604/fdmp.2024.050167 - 23 August 2024

    Abstract In this paper, we study the onset and development of three-dimensional convection in a tilted porous layer saturated with a liquid. The layer is subjected to a gravitational field and a strictly vertical temperature gradient. Typically, problems of thermal convection in tilted porous media saturated with a liquid are studied by assuming constant different temperatures at the boundaries of the layer, which prevent these systems from supporting conductive (non-convective) states. The boundary conditions considered in the present work allow a conductive state and are representative of typical geological applications. In an earlier work, we carried… More > Graphic Abstract

    Three-Dimensional Convection in an Inclined Porous Layer Subjected to a Vertical Temperature Gradient

  • Open Access

    ARTICLE

    A Novel Model for the Prediction of Liquid Film Thickness Distribution in Pipe Gas-Liquid Flows

    Yubo Wang1,2,*, Yanan Yu1,2, Qiming Wang3, Anxun Liu3

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.9, pp. 1993-2006, 2024, DOI:10.32604/fdmp.2024.049510 - 23 August 2024

    Abstract A model is proposed for liquid film profile prediction in gas-liquid two-phase flow, which is able to provide the film thickness along the circumferential direction and the pressure gradient in the flow direction. A two-fluid model is used to calculate both gas and liquid phases’ flow characteristics. The secondary flow occurring in the gas phase is taken into account and a sailing boat mechanism is introduced. Moreover, energy conservation is applied for obtaining the liquid film thickness distribution along the circumference. Liquid film thickness distribution is calculated accordingly for different cases; its values are compared More >

  • Open Access

    ARTICLE

    Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection

    Islam Zada1,*, Mohammed Naif Alatawi2, Syed Muhammad Saqlain1, Abdullah Alshahrani3, Adel Alshamran4, Kanwal Imran5, Hessa Alfraihi6

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2917-2939, 2024, DOI:10.32604/cmc.2024.052835 - 15 August 2024

    Abstract Malware attacks on Windows machines pose significant cybersecurity threats, necessitating effective detection and prevention mechanisms. Supervised machine learning classifiers have emerged as promising tools for malware detection. However, there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection. Addressing this gap can provide valuable insights for enhancing cybersecurity strategies. While numerous studies have explored malware detection using machine learning techniques, there is a lack of systematic comparison of supervised classifiers for Windows malware detection. Understanding the relative effectiveness of these classifiers can inform the selection of… More >

  • Open Access

    ARTICLE

    Impact Performance Research of Re-Entrant Octagonal Negative Poisson’s Ratio Honeycomb with Gradient Design

    Yiyuan Li1, Yongjing Li1,2, Shilin Yan1,2,*, Pin Wen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3105-3119, 2024, DOI:10.32604/cmes.2024.051375 - 08 July 2024

    Abstract Based on the traditional re-entrant honeycomb, a novel re-entrant octagon honeycomb (ROH) is proposed. The deformation mode of the honeycomb under quasi-static compression is analyzed by numerical simulation, and the results are in good agreement with the experimental ones. The deformation modes, mechanical properties, and energy absorption characteristics of ROH along the impact and perpendicular directions gradient design are investigated under different velocities. The results indicated that the deformation mode of ROH is affected by gradient design along the direction of impact and impact speed. In addition, gradient design along the direction of impact can… More >

  • Open Access

    ARTICLE

    Improving the Transmission Security of Vein Images Using a Bezier Curve and Long Short-Term Memory

    Ahmed H. Alhadethi1,*, Ikram Smaoui2, Ahmed Fakhfakh3, Saad M. Darwish4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4825-4844, 2024, DOI:10.32604/cmc.2024.047852 - 20 June 2024

    Abstract The act of transmitting photos via the Internet has become a routine and significant activity. Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced. This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images. The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression. This paper introduces… More >

Displaying 1-10 on page 1 of 230. Per Page