Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (123)
  • Open Access

    ARTICLE

    Impact Damage Testing Study of Shanxi-Beijing Natural Gas Pipeline Based on Decision Tree Rotary Tiller Operation

    Liqiong Chen1, Kai Zhang1,*, Song Yang1, Duo Xu1, Weihe Huang1, Hongxuan Hu2, Haonan Liu2

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 683-706, 2024, DOI:10.32604/sdhm.2024.049536

    Abstract The North China Plain and the agricultural region are crossed by the Shanxi-Beijing natural gas pipeline. Residents in the area use rototillers for planting and harvesting; however, the depth of the rototillers into the ground is greater than the depth of the pipeline, posing a significant threat to the safe operation of the pipeline. Therefore, it is of great significance to study the dynamic response of rotary tillers impacting pipelines to ensure the safe operation of pipelines. This article focuses on the Shanxi-Beijing natural gas pipeline, utilizing finite element simulation software to establish a finite More >

  • Open Access

    ARTICLE

    BArcherFuzzer: An Android System Services Fuzzier via Transaction Dependencies of BpBinder

    Jiawei Qin1,2, Hua Zhang1,*, Hanbing Yan2, Tian Zhu2, Song Hu1, Dingyu Yan2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 527-544, 2024, DOI:10.32604/iasc.2024.047509

    Abstract By the analysis of vulnerabilities of Android native system services, we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server. The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage. In this paper, we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy. Based on the above method, More >

  • Open Access

    ARTICLE

    Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory

    Ziqiao Zhou1, Tianyang Zhou1,*, Jinghao Xu2, Junhu Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2613-2634, 2024, DOI:10.32604/cmes.2023.028553

    Abstract Intelligent penetration testing is of great significance for the improvement of the security of information systems, and the critical issue is the planning of penetration test paths. In view of the difficulty for attackers to obtain complete network information in realistic network scenarios, Reinforcement Learning (RL) is a promising solution to discover the optimal penetration path under incomplete information about the target network. Existing RL-based methods are challenged by the sizeable discrete action space, which leads to difficulties in the convergence. Moreover, most methods still rely on experts’ knowledge. To address these issues, this paper… More >

  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core… More >

  • Open Access

    ARTICLE

    Flammabilty and Mechanical Performance of MWCNT Incorporated Cyante Ester/Carbon Fiber Composites

    JITENDRA. S. TATE1,2,*, HARISH KALLAGUNTA1,2, ANDREW ALVAREZ1

    Journal of Polymer Materials, Vol.38, No.1-2, pp. 101-120, 2021, DOI:10.32381/JPM.2021.38.1-2.9

    Abstract The exponential growth in composites and their increased use in military, aerospace, energy, and automotive industry is driven by their high performance and light weight. High performance thermosetting polymers such as cyanate ester have received considerable attention due to its ability of volatile-free curing. It also offers advantages such as excellent radiation shielding, high thermal stability, and hydrophobicity with lots of potential for enhanced mechanical strength. This research article discusses the results of effects of multiwalled carbon nanotubes (MWCNT) at predetermined loading levels of 0.5wt%, 1wt% and 1.5wt% on mechanical, thermal and flammability properties of More >

  • Open Access

    REVIEW

    Fuzzing: Progress, Challenges, and Perspectives

    Zhenhua Yu1, Zhengqi Liu1, Xuya Cong1,*, Xiaobo Li2, Li Yin3

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1-29, 2024, DOI:10.32604/cmc.2023.042361

    Abstract As one of the most effective techniques for finding software vulnerabilities, fuzzing has become a hot topic in software security. It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system. In recent years, considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing, so there are more and more methods and forms, which make it difficult to have a comprehensive understanding of the technique. This paper conducts a thorough survey of fuzzing, focusing on its general process, classification, common application scenarios, and some More >

  • Open Access

    ARTICLE

    C-CORE: Clustering by Code Representation to Prioritize Test Cases in Compiler Testing

    Wei Zhou1, Xincong Jiang2,*, Chuan Qin2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2069-2093, 2024, DOI:10.32604/cmes.2023.043248

    Abstract Edge devices, due to their limited computational and storage resources, often require the use of compilers for program optimization. Therefore, ensuring the security and reliability of these compilers is of paramount importance in the emerging field of edge AI. One widely used testing method for this purpose is fuzz testing, which detects bugs by inputting random test cases into the target program. However, this process consumes significant time and resources. To improve the efficiency of compiler fuzz testing, it is common practice to utilize test case prioritization techniques. Some researchers use machine learning to predict… More >

  • Open Access

    ARTICLE

    Analysis of Capacity Decay, Impedance, and Heat Generation of Lithium-ion Batteries Experiencing Multiple Simultaneous Abuse Conditions

    Casey Jones, Meghana Sudarshan, Vikas Tomar*

    Energy Engineering, Vol.120, No.12, pp. 2721-2740, 2023, DOI:10.32604/ee.2023.043219

    Abstract Abuse of Lithium-ion batteries, both physical and electrochemical, can lead to significantly reduced operational capabilities. In some instances, abuse can cause catastrophic failure, including thermal runaway, combustion, and explosion. Many different test standards that include abuse conditions have been developed, but these generally consider only one condition at a time and only provide go/no-go criteria. In this work, different types of cell abuse are implemented concurrently to determine the extent to which simultaneous abuse conditions aggravate cell degradation and failure. Vibrational loading is chosen to be the consistent type of physical abuse, and the first… More >

  • Open Access

    ARTICLE

    Dynamic Testing of Elastic Modulus, Shear Modulus, and Poisson’s Ratio of Bamboo Scrimber

    Xiaoyu Gu1, Linbi Chen2, Seithati Mapesela3, Zheng Wang1,*, Aijin Zhou4

    Journal of Renewable Materials, Vol.11, No.12, pp. 4197-4210, 2023, DOI:10.32604/jrm.2023.028768

    Abstract The bamboo scrimber is an anisotropic material. The elastic constant values of the bamboo scrimber specimens measured by the dynamic and static methods are consistent, and the dynamic test method has the advantages of rapidity, simplicity, good repeatability, and high precision. Bamboo scrimber has strong potential as a building material, and its elastic constant is an important index to measure its mechanical properties. To quickly, simply, non-destructively, and accurately detect the elastic constant of the bamboo scrimber, they were dynamically tested by the free plate transient excitation method and cantilever plate torsional vibration method. The More >

  • Open Access

    ARTICLE

    Design and Experimental Testing of an Electric Field-Driven Droplet Injection Device

    Fulai Cao1,*, Yanpu Chao1,*, Hao Yi2,3, Shuai Lu1, Chengshui Guo4

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.11, pp. 2891-2905, 2023, DOI:10.32604/fdmp.2023.029243

    Abstract The properties of droplets produced by existing on-demand injection systems are typically determined by the nozzle diameter, i.e., only droplets with size larger than this diameter can be obtained. To solve this problem, a system for electric field-driven droplet injection and deposition was developed, and the related performances were compared with those of a standard pneumatic system. The results show that the diameter of droplets generated accordingly can be significantly smaller than the nozzle diameter. In particular, the effects of frequency and duty ratio on the number of droplets were studied by assuming microcrystalline wax More > Graphic Abstract

    Design and Experimental Testing of an Electric Field-Driven Droplet Injection Device

Displaying 1-10 on page 1 of 123. Per Page