Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Research on a Simulation Platform for Typical Internal Corrosion Defects in Natural Gas Pipelines Based on Big Data Analysis

    Changchao Qi1, Lingdi Fu1, Ming Wen1, Hao Qian2, Shuai Zhao1,*

    Structural Durability & Health Monitoring, Vol.19, No.4, pp. 1073-1087, 2025, DOI:10.32604/sdhm.2025.061898 - 30 June 2025

    Abstract The accuracy and reliability of non-destructive testing (NDT) approaches in detecting interior corrosion problems are critical, yet research in this field is limited. This work describes a novel way to monitor the structural integrity of steel gas pipelines that uses advanced numerical modeling techniques to anticipate fracture development and corrosion effects. The objective is to increase pipeline dependability and safety through more precise, real-time health evaluations. Compared to previous approaches, our solution provides higher accuracy in fault detection and quantification, making it ideal for pipeline integrity monitoring in real-world applications. To solve this issue, statistical… More >

  • Open Access

    ARTICLE

    Utilizing Fine-Tuning of Large Language Models for Generating Synthetic Payloads: Enhancing Web Application Cybersecurity through Innovative Penetration Testing Techniques

    Stefan Ćirković1, Vladimir Mladenović1, Siniša Tomić2, Dalibor Drljača2, Olga Ristić1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4409-4430, 2025, DOI:10.32604/cmc.2025.059696 - 06 March 2025

    Abstract With the increasing use of web applications, challenges in the field of cybersecurity are becoming more complex. This paper explores the application of fine-tuned large language models (LLMs) for the automatic generation of synthetic attacks, including XSS (Cross-Site Scripting), SQL Injections, and Command Injections. A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence. The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks. This approach not only improves the model’s precision and dependability but… More >

  • Open Access

    ARTICLE

    Big Data Testing Techniques: Taxonomy, Challenges and Future Trends

    Iram Arshad1,*, Saeed Hamood Alsamhi1, Wasif Afzal2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2739-2770, 2023, DOI:10.32604/cmc.2023.030266 - 31 October 2022

    Abstract Big Data is reforming many industrial domains by providing decision support through analyzing large data volumes. Big Data testing aims to ensure that Big Data systems run smoothly and error-free while maintaining the performance and quality of data. However, because of the diversity and complexity of data, testing Big Data is challenging. Though numerous research efforts deal with Big Data testing, a comprehensive review to address testing techniques and challenges of Big Data is not available as yet. Therefore, we have systematically reviewed the Big Data testing techniques’ evidence occurring in the period 2010–2021. This… More >

  • Open Access

    ARTICLE

    Analysis of Security Testing Techniques

    Omer Bin Tauqeer1, Sadeeq Jan1,*, Alaa Omar Khadidos2, Adil Omar Khadidos3, Fazal Qudus Khan3, Sana Khattak1

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 291-306, 2021, DOI:10.32604/iasc.2021.017260 - 12 May 2021

    Abstract In the past decades, a significant increase has been observed in cyber-attacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in… More >

  • Open Access

    REVIEW

    Automated Test Case Generation from Requirements: A Systematic Literature Review

    Ahmad Mustafa1, Wan M. N. Wan-Kadir1, Noraini Ibrahim1, Muhammad Arif Shah3,*, Muhammad Younas2, Atif Khan4, Mahdi Zareei5, Faisal Alanazi6

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1819-1833, 2021, DOI:10.32604/cmc.2021.014391 - 05 February 2021

    Abstract Software testing is an important and cost intensive activity in software development. The major contribution in cost is due to test case generations. Requirement-based testing is an approach in which test cases are derivative from requirements without considering the implementation’s internal structure. Requirement-based testing includes functional and nonfunctional requirements. The objective of this study is to explore the approaches that generate test cases from requirements. A systematic literature review based on two research questions and extensive quality assessment criteria includes studies. The study identifies 30 primary studies from 410 studies spanned from 2000 to 2018.… More >

  • Open Access

    ARTICLE

    Exploring the Abnormal Brain Regions and Abnormal Functional Connections in SZ by Multiple Hypothesis Testing Techniques

    Lan Yang1, Shun Qi2,3,#, Chen Qiao1,*, Yanmei Kang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 215-237, 2020, DOI:10.32604/cmes.2020.010796 - 18 September 2020

    Abstract Schizophrenia (SZ) is one of the most common mental diseases. Its main characteristics are abnormal social behavior and inability to correctly understand real things. In recent years, the magnetic resonance imaging (MRI) technique has been popularly utilized to study SZ. However, it is still a great challenge to reveal the essential information contained in the MRI data. In this paper, we proposed a biomarker selection approach based on the multiple hypothesis testing techniques to explore the difference between SZ and healthy controls by using both functional and structural MRI data, in which biomarkers represent both… More >

Displaying 1-10 on page 1 of 6. Per Page