Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (259)
  • Open Access

    ARTICLE

    Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things

    So-Eun Jeon, Sun-Jin Lee, Il-Gu Lee*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2407-2419, 2023, DOI:10.32604/iasc.2023.039937

    Abstract With the development of the 5th generation of mobile communication (5G) networks and artificial intelligence (AI) technologies, the use of the Internet of Things (IoT) has expanded throughout industry. Although IoT networks have improved industrial productivity and convenience, they are highly dependent on nonstandard protocol stacks and open-source-based, poorly validated software, resulting in several security vulnerabilities. However, conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and computing power. This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy. Experimental results using a software… More >

  • Open Access

    ARTICLE

    ASETS-II OSCILLATING HEAT PIPE SPACE FLIGHT EXPERIMENT: THE FIRST SIX MONTHS ON ORBIT

    Brenton S. Tafta,*, Kevin W. Irickb

    Frontiers in Heat and Mass Transfer, Vol.12, pp. 1-7, 2019, DOI:10.5098/hmt.12.24

    Abstract On September 7th, 2017 the U.S. Air Force Research Laboratory launched the second Advanced Structurally Embedded Thermal Spreader (ASETSII) flight experiment to space on Orbital Test Vehicle 5. The ASETS-II experiment is made of three low-mass, low-cost oscillating heat pipes (OHPs) and an electronics/experiment control box. The three primary science objectives of the experiment are to measure the initial on-orbit thermal performance, to measure long duration thermal performance, and to assess any lifetime degradation. The three OHPs on ASETS-II are of varying configuration (center heating with single- and double-sided cooling) and working fluids (butane and R-134a) in order to isolate… More >

  • Open Access

    ARTICLE

    Lightweight Surface Litter Detection Algorithm Based on Improved YOLOv5s

    Zunliang Chen1,2, Chengxu Huang1,2, Lucheng Duan1,2, Baohua Tan1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1085-1102, 2023, DOI:10.32604/cmc.2023.039451

    Abstract In response to the problem of the high cost and low efficiency of traditional water surface litter cleanup through manpower, a lightweight water surface litter detection algorithm based on improved YOLOv5s is proposed to provide core technical support for real-time water surface litter detection by water surface litter cleanup vessels. The method reduces network parameters by introducing the deep separable convolution GhostConv in the lightweight network GhostNet to substitute the ordinary convolution in the original YOLOv5s feature extraction and fusion network; introducing the C3Ghost module to substitute the C3 module in the original backbone and neck networks to further reduce… More >

  • Open Access

    ARTICLE

    Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System

    Turke Althobaiti1,2, Yousef Sanjalawe3,*, Naeem Ramzan4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 453-469, 2023, DOI:10.32604/csse.2023.039207

    Abstract Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in Cloud Computing (CC). Botnets are often used by attackers to perform a wide range of DDoS attacks. With advancements in technology, bots are now able to simulate DDoS attacks as flash crowd events, making them difficult to detect. When it comes to application layer DDoS attacks, the Flash Crowd attack that occurs during a Flash Event is viewed as the most intricate issue. This is mainly because it can imitate… More >

  • Open Access

    ARTICLE

    Towards Sustainable Agricultural Systems: A Lightweight Deep Learning Model for Plant Disease Detection

    Sana Parez1, Naqqash Dilshad2, Turki M. Alanazi3, Jong Weon Lee1,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 515-536, 2023, DOI:10.32604/csse.2023.037992

    Abstract A country’s economy heavily depends on agricultural development. However, due to several plant diseases, crop growth rate and quality are highly suffered. Accurate identification of these diseases via a manual procedure is very challenging and time-consuming because of the deficiency of domain experts and low-contrast information. Therefore, the agricultural management system is searching for an automatic early disease detection technique. To this end, an efficient and lightweight Deep Learning (DL)-based framework (E-GreenNet) is proposed to overcome these problems and precisely classify the various diseases. In the end-to-end architecture, a MobileNetV3Small model is utilized as a backbone that generates refined, discriminative,… More >

  • Open Access

    ARTICLE

    A New System for Road Traffic Optimisation Using the Virtual Traffic Light Technology

    Ahmad A. A. Alkhatib*, Adnan A. Hnaif, Thaer Sawalha

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 637-656, 2023, DOI:10.32604/csse.2023.037345

    Abstract Large cities suffer from traffic congestion, particularly at intersections, due to a large number of vehicles, which leads to the loss of time by increasing carbon emissions, including fuel consumption. Therefore, the need for optimising the flow of vehicles at different intersections and reducing the waiting time is a critical challenge. Conventional traffic lights have been used to control traffic flow at different intersections and have been improved to become more efficient by using different algorithms, sensors and cameras. However, they also face some challenges, such as high-cost installation, operation, and maintenance issues. This paper develops a new system based… More >

  • Open Access

    ARTICLE

    A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments

    Zakariae Dlimi*, Abdellah Ezzati, Said Ben Alla

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 79-103, 2023, DOI:10.32604/csse.2023.037099

    Abstract The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud computing technologies. The integration of IoT in the cloud enables storage and computational capabilities for IoT users. However, security has been one of the main concerns of cloud-integrated IoT. Existing work attempts to address the security concerns of cloud-integrated IoT through authentication, access control, and blockchain-based methods. However, existing frameworks are somewhat limited by scalability, privacy, and centralized structures. To mitigate the existing problems, we propose a blockchain-based distributed access control method for secure storage in the IoT cloud (BL-DAC). Initially, the BL-DAC performs… More >

  • Open Access

    ARTICLE

    Carbon Capture from Flue Gas Based on the Combination of Non-Contact Hydrophobic Porous Ceramic Membrane and Bubbling Absorption

    Yongde Luo, Jiang Jin*, Hua Zhang*

    Journal of Renewable Materials, Vol.11, No.7, pp. 3143-3153, 2023, DOI:10.32604/jrm.2023.027396

    Abstract A hybrid system combined with a non-contact membrane and bubbling absorption is proposed to capture CO2 from flue gas. The non-contact way of membrane and liquid absorbent effectively avoids the reduction of gas diffusion flux through the membrane. High-porosity ceramic membranes in hybrid systems are used for gas-solid separation in fuel gas treatment. Due to the high content of H2O and cement dust in the flue gas of the cement plant, the membrane is hydrophobically modified by polytetrafluoroethylene (PTFE) to improve its anti-water, anti-fouling, and self-cleaning performances. The results show that the diffusion flux of CO2 through the membrane is… More >

  • Open Access

    ARTICLE

    Intron Retention Fine-Tunes the Resistance of the Rice Mutant pls4 to Rice Sheath Blight (Rhizotonia solani AG I.1a)

    Shaochun Liu, Jiamin Hu, Haohua He, Junru Fu, Xu Jie, Dahu Zhou*, Haihui Fu*

    Phyton-International Journal of Experimental Botany, Vol.92, No.7, pp. 2035-2049, 2023, DOI:10.32604/phyton.2023.028296

    Abstract OsPLS4 encodes a β-ketoacyl carrier protein reductase (KAR). The role of OsPLS4 in rice sheath blight (Rhizoctonia solani) remains unclear. Our preliminary studies showed that premature leaf senescence mutants (pls4) were highly susceptive to sheath blight in the early stage of rice development. To explore the role of this gene in the development of rice sheath blight, the transcriptome profiles of the rice pls4 mutant and wild type were compared by RNA-seq. The results revealed 2,569 differentially expressed genes (DEGs). The down-regulated genes were significantly enriched in the defense response-related biological processes. These down-regulated genes included the chitinase genes and… More >

  • Open Access

    ARTICLE

    Light-controlled phosphorylation in the TrkA-Y785 site by photosensitive UAAs activates the MAPK/ERK signaling pathway

    SHU ZHAO1,*, SHIXIN YE2

    BIOCELL, Vol.47, No.6, pp. 1377-1388, 2023, DOI:10.32604/biocell.2023.023874

    Abstract Background: This paper aims to establish a light-controlled phosphorylation detection method at the Y785 site of tropomyosin receptor kinase A (TrkA) receptor in mammalian cells by using genetic code expansion technology and detecting the effects of optical activation of this site on the downstream MAPK/ERK pathway. The study is based on the current situation that the regulatory mechanism of TrkA phosphorylation has not been fully elucidated. Methods: Two photosensitive unnatural amino acids, p-azido-L-phenylalanine (AzF) and photo-caged tyrosine (ONB) were introduced into the TrkA-Y785 site by genetic code expansion technology and site-directed mutagenesis. Western blotting and laser confocal imaging were conducted… More >

Displaying 41-50 on page 5 of 259. Per Page