Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Combining Deep Learning with Knowledge Graph for Design Knowledge Acquisition in Conceptual Product Design

    Yuexin Huang1,2, Suihuai Yu1, Jianjie Chu1,*, Zhaojing Su1,3, Yangfan Cong1, Hanyu Wang1, Hao Fan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 167-200, 2024, DOI:10.32604/cmes.2023.028268 - 22 September 2023

    Abstract The acquisition of valuable design knowledge from massive fragmentary data is challenging for designers in conceptual product design. This study proposes a novel method for acquiring design knowledge by combining deep learning with knowledge graph. Specifically, the design knowledge acquisition method utilises the knowledge extraction model to extract design-related entities and relations from fragmentary data, and further constructs the knowledge graph to support design knowledge acquisition for conceptual product design. Moreover, the knowledge extraction model introduces ALBERT to solve memory limitation and communication overhead in the entity extraction module, and uses multi-granularity information to overcome More >

  • Open Access

    ARTICLE

    Application Research on Two-Layer Threat Prediction Model Based on Event Graph

    Shuqin Zhang, Xinyu Su*, Yunfei Han, Tianhui Du, Peiyu Shi

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3993-4023, 2023, DOI:10.32604/cmc.2023.044526 - 26 December 2023

    Abstract Advanced Persistent Threat (APT) is now the most common network assault. However, the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks. They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats. To address the above problems, firstly, this paper constructs the multi-source threat element analysis ontology (MTEAO) by integrating multi-source network security knowledge bases. Subsequently, based on MTEAO, we propose a two-layer threat prediction model (TL-TPM) that combines… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Inference System for Managing Intensive Care Unit Resources Based on Knowledge Graph

    Ahmad F Subahi*, Areej Athama

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3801-3816, 2023, DOI:10.32604/cmc.2023.034522 - 26 December 2023

    Abstract With the rapid growth in the availability of digital health-related data, there is a great demand for the utilization of intelligent information systems within the healthcare sector. These systems can manage and manipulate this massive amount of health-related data and encourage different decision-making tasks. They can also provide various sustainable health services such as medical error reduction, diagnosis acceleration, and clinical services quality improvement. The intensive care unit (ICU) is one of the most important hospital units. However, there are limited rooms and resources in most hospitals. During times of seasonal diseases and pandemics, ICUs… More >

  • Open Access

    ARTICLE

    Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge

    Shuqin Zhang, Xinyu Su*, Peiyu Shi, Tianhui Du, Yunfei Han

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 349-377, 2023, DOI:10.32604/cmc.2023.040964 - 31 October 2023

    Abstract Cyber Threat Intelligence (CTI) is a valuable resource for cybersecurity defense, but it also poses challenges due to its multi-source and heterogeneous nature. Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly. To address these challenges, we propose a novel approach that consists of three steps. First, we construct the attack and defense analysis of the cybersecurity ontology (ADACO) model by integrating multiple cybersecurity databases. Second, we develop the threat evolution prediction algorithm (TEPA), which can automatically detect threats at device nodes, correlate More >

  • Open Access

    ARTICLE

    Traffic Scene Captioning with Multi-Stage Feature Enhancement

    Dehai Zhang*, Yu Ma, Qing Liu, Haoxing Wang, Anquan Ren, Jiashu Liang

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2901-2920, 2023, DOI:10.32604/cmc.2023.038264 - 08 October 2023

    Abstract Traffic scene captioning technology automatically generates one or more sentences to describe the content of traffic scenes by analyzing the content of the input traffic scene images, ensuring road safety while providing an important decision-making function for sustainable transportation. In order to provide a comprehensive and reasonable description of complex traffic scenes, a traffic scene semantic captioning model with multi-stage feature enhancement is proposed in this paper. In general, the model follows an encoder-decoder structure. First, multi-level granularity visual features are used for feature enhancement during the encoding process, which enables the model to learn… More >

  • Open Access

    ARTICLE

    Multi-Domain Malicious Behavior Knowledge Base Framework for Multi-Type DDoS Behavior Detection

    Ouyang Liu, Kun Li*, Ziwei Yin, Deyun Gao, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2955-2977, 2023, DOI:10.32604/iasc.2023.039995 - 11 September 2023

    Abstract Due to the many types of distributed denial-of-service attacks (DDoS) attacks and the large amount of data generated, it becomes a challenge to manage and apply the malicious behavior knowledge generated by DDoS attacks. We propose a malicious behavior knowledge base framework for DDoS attacks, which completes the construction and application of a multi-domain malicious behavior knowledge base. First, we collected malicious behavior traffic generated by five mainstream DDoS attacks. At the same time, we completed the knowledge collection mechanism through data pre-processing and dataset design. Then, we designed a malicious behavior category graph and… More >

  • Open Access

    ARTICLE

    Construction Method of Equipment Defect Knowledge Graph in IoT

    Huafei Yang1, Wenqing Yang1, Nan Zhang1, Shanming Wei2,*, Yingnan Shang1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2745-2765, 2023, DOI:10.32604/iasc.2023.036614 - 11 September 2023

    Abstract Equipment defect detection is essential to the security and stability of power grid networking operations. Besides the status of the power grid itself, environmental information is also necessary for equipment defect detection. At the same time, different types of intelligent sensors can monitor environmental information, such as temperature, humidity, dust, etc. Therefore, we apply the Internet of Things (IoT) technology to monitor the related environment and pervasive interconnections to diverse physical objects. However, the data related to device defects in the existing Internet of Things are complex and lack uniform association hence building a knowledge… More >

  • Open Access

    ARTICLE

    A Weakly-Supervised Method for Named Entity Recognition of Agricultural Knowledge Graph

    Ling Wang, Jingchi Jiang*, Jingwen Song, Jie Liu

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 833-848, 2023, DOI:10.32604/iasc.2023.036402 - 29 April 2023

    Abstract It is significant for agricultural intelligent knowledge services using knowledge graph technology to integrate multi-source heterogeneous crop and pest data and fully mine the knowledge hidden in the text. However, only some labeled data for agricultural knowledge graph domain training are available. Furthermore, labeling is costly due to the need for more data openness and standardization. This paper proposes a novel model using knowledge distillation for a weakly supervised entity recognition in ontology construction. Knowledge distillation between the target and source data domain is performed, where Bi-LSTM and CRF models are constructed for entity recognition. More >

  • Open Access

    ARTICLE

    Code Reviewer Intelligent Prediction in Open Source Industrial Software Project

    Zhifang Liao1, Bolin Zhang1, Xuechun Huang1, Song Yu1,*, Yan Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 687-704, 2023, DOI:10.32604/cmes.2023.027466 - 23 April 2023

    Abstract Currently, open-source software is gradually being integrated into industrial software, while industry protocols in industrial software are also gradually transferred to open-source community development. Industrial protocol standardization organizations are confronted with fragmented and numerous code PR (Pull Request) and informal proposals, and different workflows will lead to increased operating costs. The open-source community maintenance team needs software that is more intelligent to guide the identification and classification of these issues. To solve the above problems, this paper proposes a PR review prediction model based on multi-dimensional features. We extract 43 features of PR and divide… More >

  • Open Access

    ARTICLE

    Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning

    Zibo Wang1,3, Chaobin Huo2, Yaofang Zhang1,3, Shengtao Cheng1,3, Yilu Chen1,3, Xiaojie Wei5, Chao Li4, Bailing Wang1,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2957-2979, 2023, DOI:10.32604/cmc.2023.035694 - 31 March 2023

    Abstract With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific… More >

Displaying 11-20 on page 2 of 47. Per Page