Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    : A Protocol Message Structure Reconstruction Method Based on Execution Slice Embedding

    Yuyao Huang, Hui Shu, Fei Kang*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.071552 - 12 January 2026

    Abstract Message structure reconstruction is a critical task in protocol reverse engineering, aiming to recover protocol field structures without access to source code. It enables important applications in network security, including malware analysis and protocol fuzzing. However, existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery, resulting in imprecise and incomplete reconstructions. In this paper, we propose ProRE, a novel method for reconstructing protocol field structures based on program execution slice embedding. ProRE extracts code slices from protocol parsing at runtime, converts them into embedding vectors using a data flow-sensitive assembly language model, More >

  • Open Access

    ARTICLE

    Solving Multi-Depot Vehicle Routing Problems with Dynamic Customer Demand Using a Scheduling System TS-DPU Based on TS-ACO

    Tsu-Yang Wu1, Chengyuan Yu1, Yanan Zhao2, Saru Kumari3, Chien-Ming Chen1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.069139 - 12 January 2026

    Abstract With the increasing complexity of logistics operations, traditional static vehicle routing models are no longer sufficient. In practice, customer demands often arise dynamically, and multi-depot systems are commonly used to improve efficiency. This paper first introduces a vehicle routing problem with the goal of minimizing operating costs in a multi-depot environment with dynamic demand. New customers appear in the delivery process at any time and are periodically optimized according to time slices. Then, we propose a scheduling system TS-DPU based on an improved ant colony algorithm TS-ACO to solve this problem. The classical ant colony More >

  • Open Access

    ARTICLE

    Drying Characteristics and Process Optimization of Banana Slices Using Hot Air-Infrared Combined Drying

    Guofeng Han, Chenxi Luo, Xin Liu, Yuanyuan Li, Yuling Cheng, Shuai Huang, Dan Huang*

    Frontiers in Heat and Mass Transfer, Vol.23, No.6, pp. 1981-1999, 2025, DOI:10.32604/fhmt.2025.074593 - 31 December 2025

    Abstract Bananas are highly perishable after harvest, and processing them into dried products is a crucial approach to reducing losses and adding their economic values. To address the inefficiency and prolonged duration of traditional hot air drying (HAD) and the quality inconsistency associated with single infrared drying (IRD), this study proposed a novel hot air-infrared combined drying (HAD-IRD) strategy. The effects of HAD, IRD, and HAD-IRD on the drying kinetics, color, rehydration capacity, moisture diffusion mechanism, and sensory quality of banana slices were systematically investigated. The parameters of the combined drying process were optimized using an L9(33)… More >

  • Open Access

    ARTICLE

    Slice-Based 6G Network with Enhanced Manta Ray Deep Reinforcement Learning-Driven Proactive and Robust Resource Management

    Venkata Satya Suresh kumar Kondeti1, Raghavendra Kulkarni1, Binu Sudhakaran Pillai2, Surendran Rajendran3,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4973-4995, 2025, DOI:10.32604/cmc.2025.066428 - 30 July 2025

    Abstract Next-generation 6G networks seek to provide ultra-reliable and low-latency communications, necessitating network designs that are intelligent and adaptable. Network slicing has developed as an effective option for resource separation and service-level differentiation inside virtualized infrastructures. Nonetheless, sustaining elevated Quality of Service (QoS) in dynamic, resource-limited systems poses significant hurdles. This study introduces an innovative packet-based proactive end-to-end (ETE) resource management system that facilitates network slicing with improved resilience and proactivity. To get around the drawbacks of conventional reactive systems, we develop a cost-efficient slice provisioning architecture that takes into account limits on radio, processing, and… More >

  • Open Access

    ARTICLE

    YOLO-SIFD: YOLO with Sliced Inference and Fractal Dimension Analysis for Improved Fire and Smoke Detection

    Mariam Ishtiaq1,2, Jong-Un Won1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5343-5361, 2025, DOI:10.32604/cmc.2025.061466 - 06 March 2025

    Abstract Fire detection has held stringent importance in computer vision for over half a century. The development of early fire detection strategies is pivotal to the realization of safe and smart cities, inhabitable in the future. However, the development of optimal fire and smoke detection models is hindered by limitations like publicly available datasets, lack of diversity, and class imbalance. In this work, we explore the possible ways forward to overcome these challenges posed by available datasets. We study the impact of a class-balanced dataset to improve the fire detection capability of state-of-the-art (SOTA) vision-based models and proposeMore >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

    Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4881-4912, 2025, DOI:10.32604/cmc.2025.061001 - 06 March 2025

    Abstract DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the… More >

  • Open Access

    ARTICLE

    Multi-Layer Deep Sparse Representation for Biological Slice Image Inpainting

    Haitao Hu1, Hongmei Ma2, Shuli Mei1,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3813-3832, 2023, DOI:10.32604/cmc.2023.041416 - 08 October 2023

    Abstract Biological slices are an effective tool for studying the physiological structure and evolution mechanism of biological systems. However, due to the complexity of preparation technology and the presence of many uncontrollable factors during the preparation processing, leads to problems such as difficulty in preparing slice images and breakage of slice images. Therefore, we proposed a biological slice image small-scale corruption inpainting algorithm with interpretability based on multi-layer deep sparse representation, achieving the high-fidelity reconstruction of slice images. We further discussed the relationship between deep convolutional neural networks and sparse representation, ensuring the high-fidelity characteristic of… More >

  • Open Access

    ARTICLE

    An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing

    Ratih Hikmah Puspita1, Jehad Ali1,*, Byeong-hee Roh2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4611-4631, 2023, DOI:10.32604/cmc.2023.033598 - 31 March 2023

    Abstract 5G use cases, for example enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and an ultra-reliable low latency communication (URLLC), need a network architecture capable of sustaining stringent latency and bandwidth requirements; thus, it should be extremely flexible and dynamic. Slicing enables service providers to develop various network slice architectures. As users travel from one coverage region to another area, the call must be routed to a slice that meets the same or different expectations. This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks. Rules of… More >

  • Open Access

    ARTICLE

    Transplanted choroidal plexus epithelial cells can integrate with organotypic spinal cord slices into a new system

    JINGJIE LIU1,#, XIAOYAN DING2,#, LI XIANG1, SHENGLI HUANG3,*

    BIOCELL, Vol.46, No.6, pp. 1537-1544, 2022, DOI:10.32604/biocell.2022.018441 - 07 February 2022

    Abstract This study aimed to evaluate the integration of transplanted choroidal plexus epithelial cells with organotypic spinal cord slices. Organotypic spinal cord slices, normally cultured for 6 days, were divided into control group (Ctrl) and transplanted group (T). The choroidal plexus epithelial cells were dissociated and primary cultured (C group). The choroidal plexus epithelial cells cultured for 6–7 days were labeled by 1,1’-dioctadecyl-3,3,3’,3’-tetramethyl-indocarbocyanineperchlorate (CM-Dil), and were identified by transthyretin (TTR) in immunocytochemistry. They were adjusted to the density of 0.5–1 × 107/ml, then 2 μl cells suspension were transplanted to the spinal cord slices in the T… More >

  • Open Access

    ARTICLE

    2D Finite Element Analysis of Asynchronous Machine Influenced Under Power Quality Perturbations

    Jasmin Pamela S1 , R. Saranya1 , V. Indragandhi1 , R. Raja Singh1 , V. Subramaniyaswamy2, Yuvaraja Teekaraman3 , Shabana Urooj4,*, Norah Alwadai5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5745-5763, 2022, DOI:10.32604/cmc.2022.020093 - 11 October 2021

    Abstract

    Asynchronous machines are predominantly preferred in industrial sectors for its reliability. Power quality perturbations have a greater impact on industries; among the different power quality events, voltage fluctuations are the most common and that may cause adverse effect on machine's operation since they are longer enduring. The article discusses a numerical technique for evaluating asynchronous motors while taking into account magnetic saturation, losses, leakage flux, and voltage drop. A 2D linear analysis involving a multi-slice time stepping finite element model is used to predict the end effects. As an outcome, the magnetic saturation and losses are

    More >

Displaying 1-10 on page 1 of 15. Per Page