Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (307)
  • Open Access

    ARTICLE

    Prediction and Analysis of Vehicle Interior Road Noise Based on Mechanism and Data Series Modeling

    Jian Pang1,3, Tingting Mao2, Wenyu Jia3, Xiaoli Jia3,*, Peisong Dai2, Haibo Huang1,2,*

    Sound & Vibration, Vol.58, pp. 59-80, 2024, DOI:10.32604/sv.2024.046247 - 27 February 2024

    Abstract Currently, the inexorable trend toward the electrification of automobiles has heightened the prominence of road noise within overall vehicle noise. Consequently, an in-depth investigation into automobile road noise holds substantial practical importance. Previous research endeavors have predominantly centered on the formulation of mechanism models and data-driven models. While mechanism models offer robust controllability, their application encounters challenges in intricate analyses of vehicle body acoustic-vibration coupling, and the effective utilization of accumulated data remains elusive. In contrast, data-driven models exhibit efficient modeling capabilities and can assimilate conceptual vehicle knowledge, but they impose stringent requirements on both… More >

  • Open Access

    ARTICLE

    A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM

    Zhenxiang He*, Xunxi Wang, Chunwei Li

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 845-871, 2024, DOI:10.32604/cmc.2023.046607 - 30 January 2024

    Abstract In the fast-evolving landscape of digital networks, the incidence of network intrusions has escalated alarmingly. Simultaneously, the crucial role of time series data in intrusion detection remains largely underappreciated, with most systems failing to capture the time-bound nuances of network traffic. This leads to compromised detection accuracy and overlooked temporal patterns. Addressing this gap, we introduce a novel SSAE-TCN-BiLSTM (STL) model that integrates time series analysis, significantly enhancing detection capabilities. Our approach reduces feature dimensionality with a Stacked Sparse Autoencoder (SSAE) and extracts temporally relevant features through a Temporal Convolutional Network (TCN) and Bidirectional Long… More >

  • Open Access

    ARTICLE

    Cybernet Model: A New Deep Learning Model for Cyber DDoS Attacks Detection and Recognition

    Azar Abid Salih1,*, Maiwan Bahjat Abdulrazaq2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1275-1295, 2024, DOI:10.32604/cmc.2023.046101 - 30 January 2024

    Abstract Cyberspace is extremely dynamic, with new attacks arising daily. Protecting cybersecurity controls is vital for network security. Deep Learning (DL) models find widespread use across various fields, with cybersecurity being one of the most crucial due to their rapid cyberattack detection capabilities on networks and hosts. The capabilities of DL in feature learning and analyzing extensive data volumes lead to the recognition of network traffic patterns. This study presents novel lightweight DL models, known as Cybernet models, for the detection and recognition of various cyber Distributed Denial of Service (DDoS) attacks. These models were constructed… More >

  • Open Access

    ARTICLE

    A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN

    Haizhen Wang1,2,*, Jinying Yan1,*, Na Jia1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 569-588, 2024, DOI:10.32604/cmc.2023.046055 - 30 January 2024

    Abstract Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured content. The extraction of encrypted traffic attributes and their subsequent identification presents a formidable challenge. The existing models have predominantly relied on direct extraction of encrypted traffic data from imbalanced datasets, with the dataset’s imbalance significantly affecting the model’s performance. In the present study, a new model, referred to as UD-VLD (Unbalanced Dataset-VAE-LSTM-DRN), was proposed to address above problem. The proposed model is an encrypted traffic identification model for handling unbalanced datasets. The encoder of the… More >

  • Open Access

    ARTICLE

    Network Intrusion Traffic Detection Based on Feature Extraction

    Xuecheng Yu1, Yan Huang2, Yu Zhang1, Mingyang Song1, Zhenhong Jia1,3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 473-492, 2024, DOI:10.32604/cmc.2023.044999 - 30 January 2024

    Abstract With the increasing dimensionality of network traffic, extracting effective traffic features and improving the identification accuracy of different intrusion traffic have become critical in intrusion detection systems (IDS). However, both unsupervised and semisupervised anomalous traffic detection methods suffer from the drawback of ignoring potential correlations between features, resulting in an analysis that is not an optimal set. Therefore, in order to extract more representative traffic features as well as to improve the accuracy of traffic identification, this paper proposes a feature dimensionality reduction method combining principal component analysis and Hotelling’s T2 and a multilayer convolutional bidirectional… More >

  • Open Access

    ARTICLE

    Comparative Analysis of ARIMA and LSTM Model-Based Anomaly Detection for Unannotated Structural Health Monitoring Data in an Immersed Tunnel

    Qing Ai1,2, Hao Tian2,3,*, Hui Wang1,*, Qing Lang1, Xingchun Huang1, Xinghong Jiang4, Qiang Jing5

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1797-1827, 2024, DOI:10.32604/cmes.2023.045251 - 29 January 2024

    Abstract Structural Health Monitoring (SHM) systems have become a crucial tool for the operational management of long tunnels. For immersed tunnels exposed to both traffic loads and the effects of the marine environment, efficiently identifying abnormal conditions from the extensive unannotated SHM data presents a significant challenge. This study proposed a model-based approach for anomaly detection and conducted validation and comparative analysis of two distinct temporal predictive models using SHM data from a real immersed tunnel. Firstly, a dynamic predictive model-based anomaly detection method is proposed, which utilizes a rolling time window for modeling to achieve… More >

  • Open Access

    ARTICLE

    Privacy Enhanced Mobile User Authentication Method Using Motion Sensors

    Chunlin Xiong1,2, Zhengqiu Weng3,4,*, Jia Liu1, Liang Gu2, Fayez Alqahtani5, Amr Gafar6, Pradip Kumar Sharma7

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 3013-3032, 2024, DOI:10.32604/cmes.2023.031088 - 15 December 2023

    Abstract With the development of hardware devices and the upgrading of smartphones, a large number of users save privacy-related information in mobile devices, mainly smartphones, which puts forward higher demands on the protection of mobile users’ privacy information. At present, mobile user authentication methods based on human-computer interaction have been extensively studied due to their advantages of high precision and non-perception, but there are still shortcomings such as low data collection efficiency, untrustworthy participating nodes, and lack of practicability. To this end, this paper proposes a privacy-enhanced mobile user authentication method with motion sensors, which mainly… More >

  • Open Access

    ARTICLE

    Modeling Geometrically Nonlinear FG Plates: A Fast and Accurate Alternative to IGA Method Based on Deep Learning

    Se Li1, Tiantang Yu1,*, Tinh Quoc Bui2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2793-2808, 2024, DOI:10.32604/cmes.2023.030278 - 15 December 2023

    Abstract Isogeometric analysis (IGA) is known to show advanced features compared to traditional finite element approaches. Using IGA one may accurately obtain the geometrically nonlinear bending behavior of plates with functional grading (FG). However, the procedure is usually complex and often is time-consuming. We thus put forward a deep learning method to model the geometrically nonlinear bending behavior of FG plates, bypassing the complex IGA simulation process. A long bidirectional short-term memory (BLSTM) recurrent neural network is trained using the load and gradient index as inputs and the displacement responses as outputs. The nonlinear relationship between More >

  • Open Access

    ARTICLE

    An Innovative Deep Architecture for Flight Safety Risk Assessment Based on Time Series Data

    Hong Sun1, Fangquan Yang2, Peiwen Zhang3,*, Yang Jiao4, Yunxiang Zhao5

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2549-2569, 2024, DOI:10.32604/cmes.2023.030131 - 15 December 2023

    Abstract With the development of the integration of aviation safety and artificial intelligence, research on the combination of risk assessment and artificial intelligence is particularly important in the field of risk management, but searching for an efficient and accurate risk assessment algorithm has become a challenge for the civil aviation industry. Therefore, an improved risk assessment algorithm (PS-AE-LSTM) based on long short-term memory network (LSTM) with autoencoder (AE) is proposed for the various supervised deep learning algorithms in flight safety that cannot adequately address the problem of the quality on risk level labels. Firstly, based on… More >

  • Open Access

    ARTICLE

    DL-Powered Anomaly Identification System for Enhanced IoT Data Security

    Manjur Kolhar*, Sultan Mesfer Aldossary

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2857-2879, 2023, DOI:10.32604/cmc.2023.042726 - 26 December 2023

    Abstract In many commercial and public sectors, the Internet of Things (IoT) is deeply embedded. Cyber security threats aimed at compromising the security, reliability, or accessibility of data are a serious concern for the IoT. Due to the collection of data from several IoT devices, the IoT presents unique challenges for detecting anomalous behavior. It is the responsibility of an Intrusion Detection System (IDS) to ensure the security of a network by reporting any suspicious activity. By identifying failed and successful attacks, IDS provides a more comprehensive security capability. A reliable and efficient anomaly detection system… More >

Displaying 111-120 on page 12 of 307. Per Page