Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (409)
  • Open Access

    ARTICLE

    Fake News Detection Using Machine Learning and Deep Learning Methods

    Ammar Saeed1,*, Eesa Al Solami2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2079-2096, 2023, DOI:10.32604/cmc.2023.030551

    Abstract The evolution of the internet and its accessibility in the twenty-first century has resulted in a tremendous increase in the use of social media platforms. Some social media sources contribute to the propagation of fake news that has no real validity, but they accumulate over time and begin to appear in the feed of every consumer producing even more ambiguity. To sustain the value of social media, such stories must be distinguished from the true ones. As a result, an automated system is required to save time and money. The classification of fake news and misinformation from social media data… More >

  • Open Access

    REVIEW

    Survey on Deep Learning Approaches for Detection of Email Security Threat

    Mozamel M. Saeed1,*, Zaher Al Aghbari2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 325-348, 2023, DOI:10.32604/cmc.2023.036894

    Abstract Emailing is among the cheapest and most easily accessible platforms, and covers every idea of the present century like banking, personal login database, academic information, invitation, marketing, advertisement, social engineering, model creation on cyber-based technologies, etc. The uncontrolled development and easy access to the internet are the reasons for the increased insecurity in email communication. Therefore, this review paper aims to investigate deep learning approaches for detecting the threats associated with e-mail security. This study compiles the literature related to the deep learning methodologies, which are applicable for providing safety in the field of cyber security of email in different… More >

  • Open Access

    ARTICLE

    A Calculation Method of Double Strength Reduction for Layered Slope Based on the Reduction of Water Content Intensity

    Feng Shen1,*, Yang Zhao1, Bingyi Li1, Kai Wu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 221-243, 2024, DOI:10.32604/cmes.2023.029159

    Abstract The calculation of the factor of safety (FOS) is an important means of slope evaluation. This paper proposed an improved double strength reduction method (DRM) to analyze the safety of layered slopes. The physical properties of different soil layers of the slopes are different, so the single coefficient strength reduction method (SRM) is not enough to reflect the actual critical state of the slopes. Considering that the water content of the soil in the natural state is the main factor for the strength of the soil, the attenuation law of shear strength of clayey soil changing with water content is… More >

  • Open Access

    PROCEEDINGS

    Numerical Simulation of Multiphase Flow in Subsurface Reservoirs: Existing Challenges and New Treatments

    Shuyu Sun1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.2, pp. 1-2, 2023, DOI:10.32604/icces.2023.09671

    Abstract Two or multiple phases commonly occur as fluid mixture in petroleum industry, where oil, gas and water are often produced and transported together. As a result, petroleum reservoir engineers spent great efforts in the development and production of oil and gas reservoirs by conducting and interpolating the simulation of multiphase flows in porous geological formation. Meanwhile, environmental scientists use subsurface flow and transport models to investigate and compare for example various schemes to inject and store CO2 in subsurface geological formations, such as depleted reservoirs and deep saline aquifers. In this work, we first present an introduction of numerical simulation… More >

  • Open Access

    PROCEEDINGS

    Research Advances on the Collocation Methods Based on the PhysicalInformed Kernel Functions

    Zhuojia Fu1,*, Qiang Xi2, Wenzhi Xu1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.1, pp. 1-1, 2023, DOI:10.32604/icces.2023.09393

    Abstract In the past few decades, although traditional computational methods such as finite element have been successfully used in many scientific and engineering fields, they still face several challenging problems such as expensive computational cost, low computational efficiency, and difficulty in mesh generation in the numerical simulation of wave propagation under infinite domain, large-scale-ratio structures, engineering inverse problems and moving boundary problems. This paper introduces a class of collocation discretization techniques based on physical-informed kernel function (PIKF) to efficiently solve the above-mentioned problems. The key issue in the physical-informed kernel function collocation methods (PIKFCMs) is to construct the related basis functions,… More >

  • Open Access

    RETRACTION

    Retraction: A Hybrid Modified Sine CosineAlgorithm Using Inverse Filtering andClipping Methods forLow AutocorrelationBinary Sequences

    Siti Julia Rosli1,2, Hasliza A Rahim1,2,*, Khairul Najmy Abdul Rani1,2, Ruzelita Ngadiran2,3, Wan Azani Mustafa3,4, Muzammil Jusoh1,2, Mohd Najib Mohd Yasin1,2, Thennarasan Sabapathy1,2, Mohamedfareq Abdulmalek5, Wan Suryani Firuz Wan Ariffin2, Ahmed Alkhayyat6

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2571-2571, 2023, DOI:10.32604/cmc.2023.045533

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Fusion of Feature Ranking Methods for an Effective Intrusion Detection System

    Seshu Bhavani Mallampati1, Seetha Hari2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1721-1744, 2023, DOI:10.32604/cmc.2023.040567

    Abstract Expanding internet-connected services has increased cyberattacks, many of which have grave and disastrous repercussions. An Intrusion Detection System (IDS) plays an essential role in network security since it helps to protect the network from vulnerabilities and attacks. Although extensive research was reported in IDS, detecting novel intrusions with optimal features and reducing false alarm rates are still challenging. Therefore, we developed a novel fusion-based feature importance method to reduce the high dimensional feature space, which helps to identify attacks accurately with less false alarm rate. Initially, to improve training data quality, various preprocessing techniques are utilized. The Adaptive Synthetic oversampling… More >

  • Open Access

    PROCEEDINGS

    A Review of Differential Form Meshfree Methods for Industrial Applications

    Félix R. Saucedo Zendejo1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.1, pp. 1-1, 2023, DOI:10.32604/icces.2023. 09622

    Abstract This report documents the application and development of differential form meshfree methods for the numerical simulation and modeling in engineering applied problems. Some of the features of this family of methods include its good numerical stability, the ease boundary condition incorporation, the approximation of the governing equations directly in the nodes that discretize the domain and the ease with which they can be numerically implemented [1-2]. Moreover, their meshless nature gives them the advantage of dealing with fragmentation and highly distorted domains without the use of computational expensive remeshing approaches. All these characteristics have promoted its application in different industrial… More >

  • Open Access

    PROCEEDINGS

    Experimental and Numerical Methods for Characterizing Thermal Gradient Induced Stress in Elevated Temperature Fatigue Testing

    Guo Li1, Shaochen Bao2, Shuiting Ding3, Zhenlei Li2,*, Liangliang Zuo1, Shuyang Xia1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.25, No.2, pp. 1-1, 2023, DOI:10.32604/icces.2023.09927

    Abstract Advanced air-cooling turbine blades are capable of operating above the melting temperature of Nickel-based superalloy, which accordingly withstand complex thermomechanical fatigue loads during service life. This paper considers the problem of realizing gas turbine representative thermal gradients in the elevated temperature fatigue test, while ensuring the thermal gradient induced stress inside the specimens. For this purpose, a novel temperature control device utilizing impingement cooling, which supplies cooling air inside the gauge section and releases toward the inner wall, was constructed in tubular fatigue specimens. A single induction coil was arranged outside the gauge section, providing heat sources to establish thermal… More >

  • Open Access

    ARTICLE

    INTERFACIAL HEAT TRANSFER COEFFICIENT ESTIMATION DURING SOLIDIFICATION OF RECTANGULAR ALUMINUM ALLOY CASTING USING TWO DIFFERENT INVERSE METHODS

    R. Rajaramana , L. Anna Gowsalyab,*, R. Velrajc

    Frontiers in Heat and Mass Transfer, Vol.11, pp. 1-8, 2018, DOI:10.5098/hmt.11.23

    Abstract To get accurate results in casting simulations, prediction of interfacial heat transfer coefficient (IHTC) is imperative. In this paper an attempt has been made for estimating IHTC during solidification process of a rectangular aluminium alloy casting in a sand mould. The cast temperature and mould temperature are measured during the experimental process at different time intervals during the process of solidification. Two different inverse methods, namely control volume and Beck’s approach are used to estimate the heat flux and temperature at the mould surface by using the experimentally measured temperatures. In the case of control volume technique, the partial derivative… More >

Displaying 21-30 on page 3 of 409. Per Page